Friday, June 8, 2012

Computer Set-2

1.       A repair for a known software bug, usually available at no change on the internet is called-
        (1) Version                                  (2) patch
(3) Tutorial                                  (4) FAQ
(5) None of these
2.       The code for web pages is written using-
        (1) Fifth generation language
(2) HTML                                      (3) WInZIp
(4) C++                                         (5) None of these
3.       Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as-
(1) Flash                                       (2) spiders
(3) Cookies                                 (4) applets
(5) Sparks
4.       Which of the following is the example of connectivity?
        (1) Internet                                                (2) floppy disk
(3) Power cord                          (4) data               
(5) None of these
5.       When sending email, the ____ line describes the contents of the message
        (1) to                                             (2) subjects
(3) contents                                               (4) CC   
(5) None of these   
6.       A chat is -
        (1) An internet standard that allows users to upload and download files
        (2) A typed conversation that takes place on a computer
        (3) An area in which users conduct written discussions about a particular subjects.
        (4) The transmission of messages and files via a computer network.
        (5) None of these
7.       Which is the slowest internet connection?
        (1) Digital subscriber line       (2) TI
(3) Cable modem                     (4) Leased line
(5) Dial-up service
8.       Outlook express is a-
        (1)Email-client                           (2) scheduler
(3) Address book                     (4) address book             
(5) None of these
9.       What kind of data you can send by email?
        (1) Audio                                     (2) Video            
(3) Pictures                                 (4) All of the above
(5) None of these
10.   When a user subscribe to a news group?
        (1) All new posts are emailed to the user automatically
        (2) The user must agree with everything said in the newsgroup
        (3) The user is billed annually for the subscription
        (4) The user is barraged with spam
        (5) None of these
11.   A home page is-
(1) A web page is created by an individual home user, as opposed to one created by a corporation
(2) the web page you like to visit the most
(3) the entry page of most websites
(4) a web page you eventually reach by clicking a series of hyperlinks
(5) None of these
12.   The transmission mode which allow both communicating devices to transmit and receive data simultaneously is      
        (1) Simplex                                 (2) full-duplex
(3) half-duplex                          (4) duplex          
(5) None of these
13.   Which media does not come under the guided media?
        (1) Fiber optics                          (2) two wire open line
(3) Microwave                           (4) coaxial cable
(5) None of these
14.   The network topology in which devices are not linked to each other and where hub act as central controller is
        (1) Mesh                                      (2) star 
(3) bus                                          (4) Ring
(5) None of these
15.   Which of the cable support the highest bandwidth and faster transmission rate?
        (1) Fiber optics                          (2) two wire open line
(3) Microwave                           (4) coaxial cable               
(5) None of these
16.   The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as:
        (1) Business to business        (2) consumer to business
(3) Client to business              (4) business to consumer
(5) None of these
17.   ____ is the encompassing term that involves the use of electronic platforms - intranets, extranets and the Internet - to conduct a company's business.
(1) e-commerce                       (2) e-business
(3) e-governance                     (4) e-payment
(5) None of these
18.   Which Layer is not present in TCP/IP model?
(1) Presentation layer            (2) transport layer
(3) Network layer                    (4) session layer              
(5) None of these
19.   IP-Address 192.5.48.3 belongs to-
        (1) class A                                    (2) Class B
(3) Class C                                    (4) Class D
(5) None of these
20.   In IP addressing scheme, class used for multicasting is:
        (1) class A                                    (2) Class B
(3) Class C                                    (4) Class D
(5) None of these
21.   The total number of class of IP address are
        (1)3                                                                (2) 4
(3) 5                                               (4) 9
(5) None of these
22.   Which type of web document is run at the client site
        (1) Static                                      (2) Dynamic
(3) Active                                     (4) All of the above
(5) None of these
23.   ATM is an example of
        (1) Ring topology                      (2) Star topology
(3) bus topology                       (4) all     (5) None of these
24.   UDP ( User Diagram Protocol) is-
        (1) Connectionless                  (2) Message Oriented
(3) Connection oriented       (4)  a & b
(5)None of these
25.   Quicktime, RealOne, and Shockwave are among the most popular Web browser
        (1) Plug-ins                                 (2) Cookies
(3) Cascading style sheets    (4) Search engines
(5) Security tools
26.   Which of the following is NOT a Microsoft Internet tool or technology?
        (1) Dreamweaver                    (2) Silver light
(3) Internet Explorer              (4) Expression Web
(5) None of these
27.   A protocol used to control the secure sending of data on the internet is
        (1) SMTP                                      (2) HTTP
(3) HTTPS                                     (4) TCP/IP
(5) None of these
28.   Which piece of hardware protects the resources of a private network from users from other networks?
        (1) Cache server                       (2) proxy server               
(3) Firewall                                  (4) Router
(5) None of these
29.   A tool for locating information on the Internet by matching search terms with indexed pages is called a(n)...
(1)  Database                             (2) Search Engine
(3) web page                             (4) web server
(5) None of these
30.   A huge collection of information arranged for quick retrieval by a computer is known as a(n)...
(1)  Database                             (2) Search Engine
(3) web page                             (4) web server
(5) None of these
31.   Determining whether an Internet site is a commercial (.com) or governmental (.gov) site helps determine its-
        (1) purpose                                                (2) objective
(3) accurate                                                (4) timely
(5) None of these
32.   Electronic junk mail is known as-
        (1) site                                          (2) spam
(3) worm                                     (4) virus               
(5) None of these
33.   ____ are used by companies for marketing purpose.
        (1) Spyware                                                (2) adware
(3) Liveware                               (4) freeware
(5) None of these
34.   HTML introduced by-
        (1)Tim burners lee                   (2) Vinton Cerf
(3) Bob willies                            (4) Steve jobs
(5) None of these
35.   Ethical hacker known as-
        (1) White hat                             (2) black hat
(3) Grey hat                                                (4) elite               
(5) None of these
36.   A person new in the hacking world known as………..
        (1) Neophyte                             (2) black hat
(3) grey hat                                 (4) elite               
(5) None of these
37.   ____spreads on network.
(1) WORM                                   (2) Virus              
(3) Trojan Horse                       (4) Computer virus
(5) None of these
38.   The Internet was originally a project for this government agency.
(1) ARPA                                      (2) NSF
(3) NSA                                         (4) PCC
(5) None of these
39.   A word in a web page that, when clicked, opens another document.
(1) Anchor                                   (2) URL
(3) Hyperlink                              (4) reference
(5) None of these
40.   A network’s ____ is the central structure that connects other portions of the network.
(1)  trunk                                     (2) backbone
(3) protocol                                                (4) server
(5) None of these
41.   ____ is the protocol that supports linking from one web page to another page.
(1) HTML                                      (2) IP
(3) HTTP                                       (4) FTP
(5) None of these
42.   The first part of a complete URL is the ____ needed to access the web resource.
(1) address                                 (2) name
(3) location                                 (4) protocol
(5) None of these
43.   You can organize your bookmarks using-
(1) structures                             (2) containers
(3) folders                                   (4) menus
(5) None of these
44.   The browser’s ____ keeps a list of web pages you have visited during the current session.
(1) history                                   (2) cache
(3) favorites                                               (4) trail
(5) None of these
45.   A ____ organizes the web into categories.
(1) search engine                     (2) encyclopedia
(3) archive                                   (4) directory
(5) None of these
46.   E-mail addresses separate the user name from the ISP using the ____ symbol.
(1) &                                              (2) @
(3) %                                              (4) *
(5) None of these
47.   The mail server as defined in the text uses the ____ protocol.
(1) HTTP                                       (2) FTP
(3) POP                                         (4) SMTP
(5) None of these
48.   To send email to a large group at one time, a ____ can be use-
(1) listserv                                   (2) group
(3) alias                                         (4) mail server
(5) None of these
49.   Discussion groups may have a ____ who monitors the postings and enforces the site’s rules.
(1) Judge                                     (2) Sysop
(3) narrator                                 (4) censor
(5) None of these
50.   A message with replies on a newsgroup is often called a-
(1) post                                        (2) list
(3) thread                                    (4) comment
(5) None of these


ANSWERSHEET
Qns.
Ans.
Qns.
Ans.
Qns.
Ans.
Qns.
Ans.
Qns.
Ans.
1.
2
11.
3
21.
3
31.
1
41.
3
2.
2
12.
2
22.
1
32.
2
42.
4
3.
1
13.
3
23.
2
33.
2
43.
3
4.
1
14.
2
24.
4
34.
1
44.
1
5.
3
15.
1
25.
1
35.
1
45.
4
6.
2
16.
2
26.
1
36.
1
46.
2
7.
5
17.
1
27.
3
37.
1
47.
3
8.
1
18.
1
28.
3
38.
1
48.
1
9.
4
19.
3
29.
2
39.
3
49.
2
10.
1
20.
4
30.
1
40.
2
50.
3

No comments:

Post a Comment