Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

IT and Computer Science Quiz Questions, Slides of Logic

A series of questions covering various topics in Information Technology and Computer Science, including LIFO lists, OOPS concepts, SQL commands, viruses, and networking protocols.

Typology: Slides

2021/2022

Uploaded on 09/27/2022

gwen
gwen 🇺🇸

5

(8)

285 documents

1 / 9

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
S. No Question A B C D Answer
1
Independent malicious program that need not any
host program is known as
Trap doors Trojan horse Virus Worm D D
2 Which was the first ever web server software GWA IIS 5.0 CERN httpd nginx C
3
which of the following name does not relate to
stacks?
LIFO list Piles Push-down lists FIFO lists D
4 The error that can be pointed out by compiler Semantic error Logic error Syntax error Internal error C
5 What is degauss
Erasing magnetic
media
Creating magnetic
media
Attachment
with CPU
None of the
above
A
6
Using SQL Server 2000, which of the following
symbols is used to indicate parameters in stored
procedures?
$ # % @ D
7
Devices on one network can communicate with
devices on another network via a
File server Gateway Utility server Printer server B
8 Which is the feature of OOPS Polymorphism Encapsulation Inheritance
All of the
above
D
9 XML Schemas consist of
Properties and
methods
Elements and
attributes
Structure and
data
Tables and
relationships
B
10
A device that protects against a sudden increase in
electrical power is a(n)
Electrical
manipulator
Surge protector Anti-spiker
Voltage
regulator
B
11
In SQL, which command(s) is(are) used to
enable/disable a database trigger?
MODIFY USER ALTER USER CHANGE USER
All of the
above
B
12 E-R modelling technique is a Top-down
approach
Bottom-up
approach
Left-right
approach
None of the
above
A
13 To sort the results of a query use: ORDER BY SORT BY GROUP BY
None of the
above
A
14 Which of these is a documented hoax virus?
McDonalds
screensaver
Alien.worm Merry Xmas Adolph A
15
Technique that is used to send more than one call
over a single line is
Digital transmission
Infrared
transmission
Streaming Multiplexing D
pf3
pf4
pf5
pf8
pf9

Partial preview of the text

Download IT and Computer Science Quiz Questions and more Slides Logic in PDF only on Docsity!

S. No Question A B C D Answer 1 Independent malicious program that need not any host program is known as Trap doors Trojan horse Virus Worm D D 2 Which was the first ever web server software GWA IIS 5.0 CERN httpd nginx C 3 which of the following name does not relate to stacks? LIFO list Piles Push-down lists FIFO lists D 4 The error that can be pointed out by compiler Semantic error Logic error Syntax error Internal error C 5 What is degauss Erasing magnetic media Creating magnetic media Attachment with CPU None of the above

A

Using SQL Server 2000, which of the following symbols is used to indicate parameters in stored procedures?

$ # % @ D

Devices on one network can communicate with devices on another network via a File server Gateway Utility server Printer server B 8 Which is the feature of OOPS Polymorphism Encapsulation Inheritance All of the above

D

9 XML Schemas consist of Properties and methods Elements and attributes Structure and data Tables and relationships

B

A device that protects against a sudden increase in electrical power is a(n) Electrical manipulator Surge protector Anti-spiker Voltage regulator

B

In SQL, which command(s) is(are) used to enable/disable a database trigger?

MODIFY USER ALTER USER CHANGE USER

All of the above

B

12 E-R modelling technique is a Top-down approach Bottom-up approach Left-right approach None of the above

A

13 To sort the results of a query use: ORDER BY SORT BY GROUP BY None of the above

A

14 Which of these is a documented hoax virus? McDonalds screensaver Alien.worm Merry Xmas Adolph A 15 Technique that is used to send more than one call over a single line is Digital transmission Infrared transmission Streaming Multiplexing D

Which one of the folloiwng would you find on LinkedIn Games Connections Chat Applications B 17 _________ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses Cyber Crime Memory Shaving Synflooding Software Piracy

C

A USB communication device that supports data encryption for secure wireless communication for notebooks users is called a USB Wireless network adapter Wireless switch wireless hub router A 19 Collecting personal information and effectively posing a another individual is known as the crime of Spooling Spoofing Hacking Identify theft D 20 The first digital computer built with IC Chips was known as IBM 7090 Apple - IBM System / 360

VAX-10 C

Different components of the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called? Conductors Buses Connectors Consecutive B 22 The displayed data over internet can be classifed into two types. They are Static & Dynamic Graphica & Text Data & Voice None A 23 Which of the following activity can be termed as software piracy Soft loading Counterfieting Both (a) & (b) None D 24 Layer which deals with the transportation of binary data and defines cable & electrical specifications is known as Data Link Layer Physical Layer Session Layer None B 25 In Windows ME, what does ME stand for? Micro-Expert Millennium-Edition Multi-Expert None B 26 Dr. EF Codd represented _________ rules that a database must obey if it has to be considered a truly relational

 4 
 8 
 12 
 7 

C

27 In ER diagram; relationship type is represented by Rectangle Diamond Ellipse Circle A

The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI model. A number of standards were agreed upon during that time. Which of the following is the standard for Ethernet?

802.2 802.3 802.4 802.5 B

Who is considered to be the "father" of artificial intelligence? Fisher Ada Allen Newell Alan Turning John McCarthy

D

The conference that launched the AI revolution in 1956 was held at? Stanford Dartmouth New York Harvard B 42 Banker's algorithm for resource allocation deals with deadlock avoidance deadlock prevention deadlock recovery mutual exclusion

A

43 Daisy chain is a device for connecting a number of controllers to a device Connecting a number of devices to a controller interconnecting a number of devices to a number of controllers Nonel of the above

B

44 Which one fo the following best describes phishing? An email directing the recipient to enter personal details on a fake website An email warning the recipient of a computer virus threat An email advertyising a department store An unwanted email that installs a virus on the recipeint's computer

A

45 What is WPA? wi-fi protected access wired protected access wired process access wi-fi process access

A

46 Information Technology Act in India was amended in

 2000 
 2004 
 2008 
 2010 

C

47 What is a trap door in a program? a security hole, inserted at programming time in the system for later use a type of antivirus security hole in a network None of the above

A

The Caesar cipher is a _______cipher that has a key of 3. transposition additive shift None of the above

C

Which of the following is independent malicious program that need not any host program? Trap doors Trojan horse Worm Virus C 50 Protocol that has flow control, but not error control is Simplest Selective-Repeat ARQ Go-Back-N ARQ Stop-and-Wait D 51 SONET sends ________ frames per second.

 1000 
 2000 
 4000 
 8000 

D

52 The root of the DNS tree is _______. a string of characters a string of 63 characters an empty string None of the above

C

53 __________ uses thin coaxial cable. 10Base5 10Base2 10Base-T 10Base-F B 54 Which topology requires a multipoint connection? Mesh Star Bus Ring C 55 Which agency developed standards for physical connection interfaces and electronic signaling specifications?

ITU-T EIA ISO ANSI B

______ refers to the physical or logical arrangement of a network? Data flow Topology Mode of operation None of the above

B

Which one of the following is not a layer of operating system? Kernel Shell Application program Critical selection

D

58 What is the extension of font file? .ttf .mdb .fft .txt A 59 What is TSR in operating system? Test Status Request Terminate and Stay Resident program Take Status Request Token Set Ready

B

Which of the following is characteristic of an operating system? resource management error recovery memory management All the above D 61 What is the initial value of the semaphore to allow only one of the many processes to enter their critical section?

 8 
 1 
 16 
 0 

B

What scheduling algorithm allows processes that are logical runnable to be temporarily suspended? preemptive scheduling non-preemptive scheduling

FIFO FCFS A

Which of the following definitions correctly describes the Dynamic Host Configuration Protocol (DHCP)? DHCP enables a NIC to determine the MAC address for a given IP address DHCP enables a NIC to determine the IP address for a given MAC address DHCP is a technique whereby IP addresses are assigned centrally by a server to each host. DHCP is a routing protocol run by routers within a network

C

Which of the following registers is used to keep track of address of the memory location where the next instruction is located? Memory address register Memory data register Instruction register Program counter

D

74 The view of total database content is Conceptual view. Internal view. External view. Physical View. A 75 What is the range of the numbers which can be stored in an eight bit register? -127 to +127 -128 to +128 -128 to +127 -127 to +128 C 76 In memory management , a technique called as paging, physical memory is broken into fixed-sized blocks called Pages Frames Blocks Segments B 77 Computers that control processes, accept data in a continous….. Data traffic pattern Data highway Infitine loop Feedback loop D 78 A device for changing the connection on a connector to a different configuration A converter A component An attachment An adapter D 79 The method of Internet access that requires a phone line, but offers faster access speeds than dial-up is the ________ Connection Cable access Satellite access Fiber Optic Service Digital Subscriber Line (DSL)

D

Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _________ security is concerned with protecting software from unauthorized tampering or damage Data Cyber Internet Metaphysical A 81 Where you are likely to find an embedded operating system? On a desktop operating system On a networked PC On a PDA On a mainframe

C

Human beings are referred to a Homo Sapiens, which device is called Silico Sapiens Analog Computer Digital Computer Hybrid Computer Mainframe Computer

C

Computer is free from tiresome and boredom. We call it Accuracy Diligence Versatility None B 84 Before a disk drive can access any sector record, a computer program has to provide the record's disk address. What information does this address specify? Track number Sector number Surface number All of above D 85 A set of flip flops integrated together is called Counter Adder Register None of above C 86 1 nibble equals to 1 bit 2 bits 4 bits 8 bits C 87 Daisy wheel printer is a type of Matrix printer Impact printer Laser printer Manual printer

B

88 Which of these is considered intelligent CASE tool Workbench Toolkit Upper CASE Lower CASE A 89 ______ is one reason for problems of data integrity Data availability constraints Data inconsistency Data redundancy None of above A 90 Malicious modification or destruction of data such as changing information on Web sites is called Super Zapping Vandalism Spamming None B 91 Which one of the following is a cryptographic protocol used to secure http concession? Transport Layer Security Explicit Congestion Notification Resource Reservation Notification (R&N) Data Link Layer

A

The script <?$ email='adminyeahhub.com'; $ new = strstr ($email, '@'; print $ new); ?> will output admin admin@yeahhub @yeahhub.com yeahhub.com C 93 The @active data warehouse architecture includes which of the following? At least one data mart Data that can extracted from numerous internal and external sources Near real-time updates All of above D 94 A snowflake schema is which of the following types of tables? Fact Dimension Helper All of above D 95 A procedure that calls itself is called reverse polish illegal call recursive all of the above

C