Monday, May 30, 2016

1.Which technology is used by cell phones to access the internet? 
 Cloud computing
 Neural Networks
 XML language
 micro browser software
 None of the above

2.Which of the following scrambles a message by applying a secret code? 

 Audits
 Encryption
 UPS
 Firewalls
 Encapsulation

3.What type of monitoring file is commonly used on and accepted from Internet sites? 

 Smartware
 Phishes
 Cookies
 Trojans
 None of the above

4.The software that secretly collects information about the web client's internet habits? 

 Detectware
 Spam
 Spyware
 Pharming
 All of the above

5. Which register is used as a working area in CPU? 

 Program counter
 Instruction registers
 Instruction decoder
 Parity generator
 Accumulator

6. Which of the following is the valid subnet mask for class B IP Address? 

 251.254.25.5
 255.255.0.0
 155.151.12.9
 255.0.0.0
 255.255.255.0

7.Repeaters function in which layer? 

 physical layer
 data link layer
 network layer
 both (a) and (b)
 session layer

8.Name the input device from the given options, that cannot be used to work in MS Office ? 

 Scanner
 Mouse
 Keyboard
 Joy stick
 All of the above

9.Select the odd one out : 

 Interpreter
 operating system
 Compiler
 Assembler
 both (a) and (d)

10. Name the first widespread computer virus for MS-DOS? 

 Brain
 Handshake
 Code Red
 Melissa
 Sasser

Follow by Email

Advertising

Advertisement

Blog Archive