Monday, May 30, 2016

1.Which technology is used by cell phones to access the internet? 
 Cloud computing
 Neural Networks
 XML language
 micro browser software
 None of the above

2.Which of the following scrambles a message by applying a secret code? 


3.What type of monitoring file is commonly used on and accepted from Internet sites? 

 None of the above

4.The software that secretly collects information about the web client's internet habits? 

 All of the above

5. Which register is used as a working area in CPU? 

 Program counter
 Instruction registers
 Instruction decoder
 Parity generator

6. Which of the following is the valid subnet mask for class B IP Address?

7.Repeaters function in which layer? 

 physical layer
 data link layer
 network layer
 both (a) and (b)
 session layer

8.Name the input device from the given options, that cannot be used to work in MS Office ? 

 Joy stick
 All of the above

9.Select the odd one out : 

 operating system
 both (a) and (d)

10. Name the first widespread computer virus for MS-DOS? 

 Code Red

Follow by Email



Blog Archive