advertisements

121.  Good password helps organization

a

  In securing information

b

 From hackers

c

 From spyware

d

 All of the above

e

 Both 2 and 3

Answer & Explanation
Answer : Option D
Explanation :
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource which should be kept secret from those not allowed access. A good password is used in many ways to protect data; systems, and networks, and helps consumers and organizations secure and manage their informationdriven world. It provides security from hackers and malafide programs.

122.  The main function of the ALU is to -

a

  perform arithmetic and logical operations

b

 None of these

c

 control computer output, such as printing

d

 monitor all computer activities

e

 store data and information for future use

Answer & Explanation
Answer : Option A
Explanation :
The main function of the Arithmetic Logic Unit (ALU), present in CPU, is to perform arithmetic operations like addition, subtraction, multiplication, division and logical comparisons such as greater than, less than, equal to, AND, NAND, etc.

123.  .......... allows voice conversations to travel over the Internet.

a

  None of these

b

 Instant messaging

c

 E-mail

d

 Internet telephony

e

 E-commerce

Answer & Explanation
Answer : Option C
Explanation :
Internet Telephony refers to the technology that converts analog speech (voice) signals into digital signals and routes them through packet-switched networks of the internet. Those signals bypass the traditional circuit switched networks used for telephone calls and thus escape the longdistance phone charges.

124.  Software such as viruses, worms and Trojan horses that has a malicious content is known as

a

  Spyware

b

 adware

c

 Malicious Software (Malware)

d

 firewall

e

 scareware

Answer & Explanation
Answer : Option C
Explanation :
Malware (malicious software) is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware includes computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.

125.  The hardware device or software program that sends messages between networks is known as a

a

  None of these

b

 Bridge

c

 Backbone

d

 Router

e

 Gateway

Answer & Explanation
Answer : Option D
Explanation :
The device or program that forwards messages between networks is known as a router. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect.

126.  Which component of a computer system perform arithmetic calculations ?

a

  ALU

b

 CD-ROM

c

 CU

d

 Memory

e

 US

Answer & Explanation
Answer : Option A
Explanation :
An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic operations. It represents the fundamental building block of the central processing unit (CPU) of a computer. Modern CPUs contain very powerful and complex ALUs.

127.  What is the full form of LAN?

a

  None of these

b

 Land Area Network

c

 Leased Area Network

d

 Local Area Network

e

 London Agglomeration Network

Answer & Explanation
Answer : Option D
Explanation :
LAN stands for Local Area Network is a computer network that interconnects computers within a limited area such as a home, school, computer laboratory, or office building, using network media In contrast to wide area networks (WANs), LANs include smaller geographic area, and marked by non-inclusion of leased telecommunication lines.

128.  Which of the following statement best describes the batch method of input?

a

  Data is processed as soon as it is input

b

 Data is input at the time it is collected

c

 Data is collected in the form of source documents, placed into groups, and then input to the computer

d

 Source documents are not used

e

 None of these

Answer & Explanation
Answer : Option C
Explanation :
Batch processing refers to processing transactions in a group or batch. No user interaction is required once batch processing is underway. While batch processing can be carried out at any time, it is particularly suited to end-ofcycle processing, such as for processing a bank's reports at the end of a day, or generating monthly or bi-weekly payrolls.

129.  What are the two parts of an Email address?

a

  Legal name and phone number

b

 Initials and password

c

 User name and street address

d

 None of these

e

 User name and domain name

Answer & Explanation
Answer : Option E
Explanation :
An email address is an address composed of two parts- a username and a domain name seperated by a @ sign eg. abc @ example. com. The username (abc) is the name you choose to be identified with for email purposes and that you have provided to the email host to create youremail account. The domain name is the internet destination for the emailhost, which may be a private site, company, organization or government entity. The extension can be any of many options such as .com, .org, .gov, .int, .info, etc.

130.  The IC chip, used in computers, is made of _______

a

  Silica

b

 Iron Oxide

c

 Chromium

d

 Copper

e

 Silicon

Answer & Explanation
Answer : Option E
Explanation :
An integrated circuit (IC) is a microscopic array of electronic circuits and components diffused or implanted onto the surface of a single crystal, or chip, of semiconducting material such as silicon. It is called an integrated circuit because the components, circuits, and base material are all made together, or integrated, out of a single piece of silicon.

131.  In UNIX, command ' $' is used to

a

  repeat last word of last command line

b

 repeat entire last command line

c

 None of these

d

 match to unknown values

e

 count the number of arguments

Answer & Explanation
Answer : Option A
Explanation :
$ in unix repeats the last argument for the command last used. repeats the line last entered at the shell.

132.  A difference between a worm and a virus is that _________.

a

  Viruses expand the master boot record.

b

 A worm cannot harm a computer like a virus can.

c

 A virus must be attached to a carrier

d

 there is no difference at all.

e

 Worms run faster than viruses

Answer & Explanation
Answer : Option C
Explanation :
Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program orhuman help to propagate. A virus must attach itself to a program or document and is spread by traveling with the carrier. A worm, however, can travel by itself (Security Awareness: Applying Practical Security in Your World By Mark Ciampa).

133.  Microsoft Office is an example of a

a

  closed-source software

b

 open-source software

c

 compiler

d

 horizontal-market software

e

 Vertical-market software

Answer & Explanation
Answer : Option D
Explanation :
Horizontal market software is application software that is useful to wide range of industries. This is opposite of vertical market software which has a scope of usefulness limited to few industries. Horizontal market software is also called productivity software, eg. word processor, web browsers, spreadsheet applications like MS-Excel and genericbook keeping applications.

134.  Encryption and decryption are functions of

a

  All of the above

b

 None of these

c

 Presentation layer

d

 Session layer

e

 Transport layer

Answer & Explanation
Answer : Option C
Explanation :
The presentation layer presents data to application layer in format that can be procured by an end user. This is actually a translator that provides coding and conversion functions. Main tasks are data compression, decompression, encryption and decryption.

135.  Which of the following colors can represent 6 bit?

a

  Green

b

 Blue

c

 Red

d

 Cyan

e

 Yellow

Answer & Explanation
Answer : Option A
Explanation :
Systems with an 18-bit RGB palette use 6 bits for each of the red, green, and blue color components. This results in a (26)3 = 643 = 262,144-color palette.
Sponsored Links



Sponsored Links