Friday 18 October 2013

Computer Awareness-64

    1.     The term ‘remote’ in  network means
a.       A device that cannot control network functions
b.      Machine located far off
c.       Any peripheral or application located far off
d.      FEP
    2.     Which access control mechanism does security label fit into?
a.       Logical access control 
b.      Discretionary access control
c.       Physical access control 
d.      None of these
    3.     A character that retains its value during program execution is______
a.        Constant 
b.      Variables
c.       Type definitions 
d.      Function

    4.      All decisions for a LAN are taken by
a.       The it steering committee 
b.       The top management
c.       A business analyst 
d.      A project manager
    5.     Generation of PIN in Bank ATM would require :
a.       Acquirer validates
b.      Acquirer sends response to the acceptor
c.       Authorizations request is sent to the acquirer
d.      PIN entered is encrypted
    6.      _______are self replicating malicious code independent of the action of the user, but  slow down the processor on entering a network
a.       Viruses 
b.      Worms
c.       Trojan Horse 
d.      None of the above
    7.     Physical access to a database can be altered by which factors?
a.       OS used by the software 
b.      Hiring Procedure
c.       Biometric security tools 
d.      Access privileges
    8.     Steganography is
a.       Hiding the data to make it necessarily invisible and not easily detectable
b.      Hiding the data but not necessarily making it invisible and not easily  detectable
c.       Detecting and destroying the hidden data
d.      None of these
    9.     Mark I computer was
a.       Electrical machine 
b.      Mechanical Machine
c.       Electronic Machine 
d.      None of these
    10.  A computer faster with
a.       GUI 
b.      Mouse
c.       Keyboard 
d.       None of these
    11. Which of the following do you think is NOT required to develop an application for computer?
a.       Feasibility study 
b.      Designing
c.       Testing 
d.      None of these
    12. The data flow diagram is for analyzing
a.       How to do a function efficiently
b.      Restrict the number of times a function can be performed
c.       Requirements of user
d.      None of these
    13. Buffer is device/storage area:
a.     Where data are temporarily stored
b.    Where data is permanently stored
c.    Where data error occurs
d.    All of the above
    14.  A network geometric arrangement in which a single connecting line is shared by a      number of nodes is called:
a.     Car Topology
b.    Bus Topology
c.    Truck Topology
d.     All of the above
    15.  An error in a computer program is referred as:
a.    Bug
b.    Bit
c.    Virus
d.    All of the above
    16. Circuits that provide a communication path between two or more devices of a digital    computer system is:
a.    Car
b.    Bus
c.    Truck
d.    All of the above
    17. A fixed number of adjacent bits that represent a particular character or symbol are     referred as:
a.    Byte
b.    Octal
c.    Bubble
d.    All of the above
    18. Cache memory is a:
a.    Small buffer storage
b.    Permanent storage
c.    Main memory
d.    All of the above
    19. The total number of digits (symbols) available to represent numbers in a  positional   number system is referred as:
a.    Number system
b.    Base
c.    Power
d.    All of the above
    20. Cache memory is:
a.    Smaller and faster than main storage
b.    Bigger and slower than main storage
c.    Smaller but slower than main memory

d.    Bigger and faster than main memory

No comments: