





Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A series of questions covering various topics in Information Technology and Computer Science, including LIFO lists, OOPS concepts, SQL commands, viruses, and networking protocols.
Typology: Slides
1 / 9
This page cannot be seen from the preview
Don't miss anything!
S. No Question A B C D Answer 1 Independent malicious program that need not any host program is known as Trap doors Trojan horse Virus Worm D D 2 Which was the first ever web server software GWA IIS 5.0 CERN httpd nginx C 3 which of the following name does not relate to stacks? LIFO list Piles Push-down lists FIFO lists D 4 The error that can be pointed out by compiler Semantic error Logic error Syntax error Internal error C 5 What is degauss Erasing magnetic media Creating magnetic media Attachment with CPU None of the above
Using SQL Server 2000, which of the following symbols is used to indicate parameters in stored procedures?
Devices on one network can communicate with devices on another network via a File server Gateway Utility server Printer server B 8 Which is the feature of OOPS Polymorphism Encapsulation Inheritance All of the above
9 XML Schemas consist of Properties and methods Elements and attributes Structure and data Tables and relationships
A device that protects against a sudden increase in electrical power is a(n) Electrical manipulator Surge protector Anti-spiker Voltage regulator
In SQL, which command(s) is(are) used to enable/disable a database trigger?
All of the above
12 E-R modelling technique is a Top-down approach Bottom-up approach Left-right approach None of the above
13 To sort the results of a query use: ORDER BY SORT BY GROUP BY None of the above
14 Which of these is a documented hoax virus? McDonalds screensaver Alien.worm Merry Xmas Adolph A 15 Technique that is used to send more than one call over a single line is Digital transmission Infrared transmission Streaming Multiplexing D
Which one of the folloiwng would you find on LinkedIn Games Connections Chat Applications B 17 _________ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses Cyber Crime Memory Shaving Synflooding Software Piracy
A USB communication device that supports data encryption for secure wireless communication for notebooks users is called a USB Wireless network adapter Wireless switch wireless hub router A 19 Collecting personal information and effectively posing a another individual is known as the crime of Spooling Spoofing Hacking Identify theft D 20 The first digital computer built with IC Chips was known as IBM 7090 Apple - IBM System / 360
Different components of the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called? Conductors Buses Connectors Consecutive B 22 The displayed data over internet can be classifed into two types. They are Static & Dynamic Graphica & Text Data & Voice None A 23 Which of the following activity can be termed as software piracy Soft loading Counterfieting Both (a) & (b) None D 24 Layer which deals with the transportation of binary data and defines cable & electrical specifications is known as Data Link Layer Physical Layer Session Layer None B 25 In Windows ME, what does ME stand for? Micro-Expert Millennium-Edition Multi-Expert None B 26 Dr. EF Codd represented _________ rules that a database must obey if it has to be considered a truly relational
4
8
12
7
27 In ER diagram; relationship type is represented by Rectangle Diamond Ellipse Circle A
The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI model. A number of standards were agreed upon during that time. Which of the following is the standard for Ethernet?
Who is considered to be the "father" of artificial intelligence? Fisher Ada Allen Newell Alan Turning John McCarthy
The conference that launched the AI revolution in 1956 was held at? Stanford Dartmouth New York Harvard B 42 Banker's algorithm for resource allocation deals with deadlock avoidance deadlock prevention deadlock recovery mutual exclusion
43 Daisy chain is a device for connecting a number of controllers to a device Connecting a number of devices to a controller interconnecting a number of devices to a number of controllers Nonel of the above
44 Which one fo the following best describes phishing? An email directing the recipient to enter personal details on a fake website An email warning the recipient of a computer virus threat An email advertyising a department store An unwanted email that installs a virus on the recipeint's computer
45 What is WPA? wi-fi protected access wired protected access wired process access wi-fi process access
46 Information Technology Act in India was amended in
2000
2004
2008
2010
47 What is a trap door in a program? a security hole, inserted at programming time in the system for later use a type of antivirus security hole in a network None of the above
The Caesar cipher is a _______cipher that has a key of 3. transposition additive shift None of the above
Which of the following is independent malicious program that need not any host program? Trap doors Trojan horse Worm Virus C 50 Protocol that has flow control, but not error control is Simplest Selective-Repeat ARQ Go-Back-N ARQ Stop-and-Wait D 51 SONET sends ________ frames per second.
1000
2000
4000
8000
52 The root of the DNS tree is _______. a string of characters a string of 63 characters an empty string None of the above
53 __________ uses thin coaxial cable. 10Base5 10Base2 10Base-T 10Base-F B 54 Which topology requires a multipoint connection? Mesh Star Bus Ring C 55 Which agency developed standards for physical connection interfaces and electronic signaling specifications?
______ refers to the physical or logical arrangement of a network? Data flow Topology Mode of operation None of the above
Which one of the following is not a layer of operating system? Kernel Shell Application program Critical selection
58 What is the extension of font file? .ttf .mdb .fft .txt A 59 What is TSR in operating system? Test Status Request Terminate and Stay Resident program Take Status Request Token Set Ready
Which of the following is characteristic of an operating system? resource management error recovery memory management All the above D 61 What is the initial value of the semaphore to allow only one of the many processes to enter their critical section?
8
1
16
0
What scheduling algorithm allows processes that are logical runnable to be temporarily suspended? preemptive scheduling non-preemptive scheduling
Which of the following definitions correctly describes the Dynamic Host Configuration Protocol (DHCP)? DHCP enables a NIC to determine the MAC address for a given IP address DHCP enables a NIC to determine the IP address for a given MAC address DHCP is a technique whereby IP addresses are assigned centrally by a server to each host. DHCP is a routing protocol run by routers within a network
Which of the following registers is used to keep track of address of the memory location where the next instruction is located? Memory address register Memory data register Instruction register Program counter
74 The view of total database content is Conceptual view. Internal view. External view. Physical View. A 75 What is the range of the numbers which can be stored in an eight bit register? -127 to +127 -128 to +128 -128 to +127 -127 to +128 C 76 In memory management , a technique called as paging, physical memory is broken into fixed-sized blocks called Pages Frames Blocks Segments B 77 Computers that control processes, accept data in a continous….. Data traffic pattern Data highway Infitine loop Feedback loop D 78 A device for changing the connection on a connector to a different configuration A converter A component An attachment An adapter D 79 The method of Internet access that requires a phone line, but offers faster access speeds than dial-up is the ________ Connection Cable access Satellite access Fiber Optic Service Digital Subscriber Line (DSL)
Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _________ security is concerned with protecting software from unauthorized tampering or damage Data Cyber Internet Metaphysical A 81 Where you are likely to find an embedded operating system? On a desktop operating system On a networked PC On a PDA On a mainframe
Human beings are referred to a Homo Sapiens, which device is called Silico Sapiens Analog Computer Digital Computer Hybrid Computer Mainframe Computer
Computer is free from tiresome and boredom. We call it Accuracy Diligence Versatility None B 84 Before a disk drive can access any sector record, a computer program has to provide the record's disk address. What information does this address specify? Track number Sector number Surface number All of above D 85 A set of flip flops integrated together is called Counter Adder Register None of above C 86 1 nibble equals to 1 bit 2 bits 4 bits 8 bits C 87 Daisy wheel printer is a type of Matrix printer Impact printer Laser printer Manual printer
88 Which of these is considered intelligent CASE tool Workbench Toolkit Upper CASE Lower CASE A 89 ______ is one reason for problems of data integrity Data availability constraints Data inconsistency Data redundancy None of above A 90 Malicious modification or destruction of data such as changing information on Web sites is called Super Zapping Vandalism Spamming None B 91 Which one of the following is a cryptographic protocol used to secure http concession? Transport Layer Security Explicit Congestion Notification Resource Reservation Notification (R&N) Data Link Layer
The script <?$ email='adminyeahhub.com'; $ new = strstr ($email, '@'; print $ new); ?> will output admin admin@yeahhub @yeahhub.com yeahhub.com C 93 The @active data warehouse architecture includes which of the following? At least one data mart Data that can extracted from numerous internal and external sources Near real-time updates All of above D 94 A snowflake schema is which of the following types of tables? Fact Dimension Helper All of above D 95 A procedure that calls itself is called reverse polish illegal call recursive all of the above