Wednesday, May 11, 2016

1. In MICR, C stands for?
a) Code
b) Colour
c) Computer
d) Character
e) None of the above

2. Which of the following scrambles a message by applying a secret code?
a) Encryption
b) Audits
c) UPS
d) Firewalls
e) None of the above

3. The uniform resource locator (URL) is case sensitive in the ____.
a) Protocol
b) Authority
c) Directory
d) Type
e) None of the above

4. A peer-to-peer LAN is an appropriate network architecture for____.
a) The Internet
b) Home network
c) Network requiring a server with shared resources.
d) wide area network
e) None of the above

5. Cell phones use ____________ to access the Internet.
a) MMS technology
b) a notation system
c) Micro browser software
d) HTML language
e) None of the above

6. Which of the following is NOT a basic function of the operating system?
a) Manage memory
b) Provide the word processing system
c) Start the computer
d) Provide the user interface
e) None of the above

7. ASCII is a(n)________.
a) Numbering system for representing numbers with decimals.
b) Character representation standard common in older mainframe computers.
c) Encoding standard used to represent letters and characters.
d) Symbolic programming language that directly represents machine instructions.
e) None of the above

8. In CSMA/CD, the computer sends a fixed unit of data called a(n)_______.
a) Node
b) Packet
c) Override
d) Token
e) None of the above

9. A global network made up of thousands of privately owned computers and networks is called the?
a) World Wide Web
b) Internet
c) Specialized search engine
d) Internet 2
e) None of the above

10. Similar to a hub in an Ethernet network, a ____________ helps relay data between wireless network nodes.
a) Wireless port
b) Wireless access point
c) wireless adapter
d) wireless transceiver
e) None of the above

Follow by Email



Blog Archive