Q1. What is the term used for measurement of how fast data moves from one place to another?
(a) data per unit
(b) bits per second
(c) bits per hour
(e) ratio per bit
(d) None of the above
Q2. Functions of keys F1, F2 and F3 are _____________ respectively.
(a) activating menu bar, search and renaming selected icon
(b) search, reboot and activating menu bar
(c) activating help, renaming selected icon and search
(d) reboot, activating help and refresh
(e) activating help, reboot, renaming selected icon
Q3. What type of monitoring file is commonly used on and accepted from Internet sites?
(a)Smartware
(b) Phishes
(c) Cookies
(d) Trojans
(e) None of the above
Q4. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
(a) Haptics
(b) Caves
(c) Biometrics
(d) RFID
(e) All of above
Q5. What is Disk operating system referred for?
(a) Memory management system
(b) Operating system which contains the disk-oriented commands and uses disk devices for permanent storage
(c) DOS
(d) Both (b) and (c)
(e) None of these
Q6. What does the SMTP in an SMTP server stand for?
(a) Simple Mail Transfer Protocol
(b) Serve Message Text Process
(c) Short Messaging Text Process
(d) Short Messaging Transfer Protocol
(e) Simple Messaging Text Process
Q7. Which among the following was the first graphical web browser?
(a) Mosaic
(b) WAIS
(c) CERN
(d) Gopher
(e) None of the above
Q8. What is JDBC?
(a) Utility Software
(b) Application Software
(c) Application Programming Interface (API)
(d) Programming Language
(e) None of the above
Q9. Which of the following is any malicious computer program which is used to hack into a computer by misleading users of its true intent?
(a) Worm
(b) Spyware
(C) Trojan horse
(d) Keylogger
(e) VGA file
Q10. Which protocol is used to obtain an IP and other network configuration information from a server on local network?
(a) Transmission Control Protocol
(b) User Datagram Protocol
(c) Code division multiple access
(d) Dynamic Host Configuration Protocol
(e) None of the above
Q11. Name the first widespread computer virus for MS-DOS?
(a) Brain
(b) Handshake
(c) Code Red
(d) Melissa
(e) Sasser
Q12. A string of eight 0s and 1s is called a _______.
(a) megabyte
(b) byte
(c) kilobyte
(d) gigabyte
(e) bit
Q13. Name the input device from the given options, that cannot be used to work in MS Office?
(a) Scanner
(b) Mouse
(c) Keyboard
(d) Joy stick
(e) All of the above
Q14. Which type of virus is generally scripted into common application programs like Excel and Word to infect the other documents and spreads to the other parts when the application is running.?
(a) Macro Viruses
(b) File infector virus
(c) Resident Viruses
(d) Boot virus
(e) Worms
Q15. Which of the following scrambles a message by applying a secret code?
(a) Audits
(b) Encryption
(c) UPS
(d) Firewalls
(e) Encapsulation