Q1: Which of the following line spacing is invalid in MS-Word?
A) Multiple
B) Double
C) Triple
D) Single
Q2: When your computer stops working suddenly. it is referred to as a ________.
A. crash
B. die
C. death
D. penalty
E. fault tolerance
Q4 Which of the following domains is used for profit businesses?
A. .com
B. .edu
C. .net
D. Both (1) and (3)
E. None of these
A) Multiple
B) Double
C) Triple
D) Single
Answer:(c)Triple
(Please note: Line spacing determines the amount of vertical space between lines of text in a paragraph)
Q2: When your computer stops working suddenly. it is referred to as a ________.
B. die
C. death
D. penalty
E. fault tolerance
Answer:Crash
Q3: Which among the following is a distinctive feature by which a CD-ROM drive is classified in a personal computer?
A. Storage period
B.Memory capacity
C.Software bundle
D.Data transfer rate
E.None of the above
Answer: Data transfer rate
Q4 Which of the following domains is used for profit businesses?
B. .edu
C. .net
D. Both (1) and (3)
E. None of these
Answer: .com
Q5. A repeater with multiple parts is called:
A. Hub
B. Switch
C. Router
D. Bridge
E. Gateway
Answer: Hub
Q6: An inverter is also called a ________ gate.
A. NOT
B. OR
C. AND
D. NAND
Answer: NOT
Q7: A relational database consists of a collection of
A. Tables
B. Fields
C. Records
D. Keys
E. ROM
Answer: Tables
Q8: SCSI is a set of standard electronic interfaces that allow personal computers (PCs) to communicate with peripheral hardware such as disk drives, tape drives. What is the full form of "SCSI" in this context?
Answer: Small Computer Systems Interface
Q9: IDS is a device or software application that monitors a network or systems for malicious activity or policy violations. IDS Stands for______
Answer: Intrusion Detection System
Q10: _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
A) Denial of service
B) Exploits
C) Scams
D) Keylogging
E) Spamming
A) Denial of service
B) Exploits
C) Scams
D) Keylogging
E) Spamming
Answer: Keylogging
Q11: _______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data.
A) Denial of service
B) Exploits
C) Scams
D) Payload
E) Spamming
A) Denial of service
B) Exploits
C) Scams
D) Payload
E) Spamming
Answer: Payload
No comments:
Post a Comment