

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Common Topics in Competitive and Entrance exams , Union Public Service Commission (UPSC) , Indian Administrative Service (IAS) .
101. |
In the right setting a thief will steal your information by simply watching what you type. |
A. | snagging |
B. | spying |
C. | social engineering |
D. | shoulder surfing |
E. | None of these |
Answer» D. shoulder surfing |
102. |
A………..is a small program embedded inside of a GIF image. |
A. | web bug |
B. | cookie |
C. | spyware application |
D. | spam |
E. | None of these |
Answer» A. web bug |
103. |
A hacker contacts you my phone or email and attempts to acquire your password |
A. | spoofing |
B. | phishing |
C. | spamming |
D. | bugging |
E. | None of these |
Answer» B. phishing |
104. |
A hacker that changes or forges information in an electronic resource, is engaging in……… |
A. | denial of service |
B. | sniffing |
C. | terrorism |
D. | data diddling |
E. | None of these |
Answer» D. data diddling |
105. |
Hackers often gain entry to a network be pretending to be at a legitimate computer. |
A. | Spoofing |
B. | forging |
C. | IP spoofing |
D. | ID theft |
E. | None of these |
Answer» C. IP spoofing |
106. |
The………..of a threat measures its potential impact on a system. |
A. | vulnerabilities |
B. | countermeasures |
C. | degree of harm |
D. | susceptibility |
E. | None of these |
Answer» C. degree of harm |
107. |
The power level drops below 120V. |
A. | brownout |
B. | spike |
C. | blackout |
D. | surge |
E. | None of these |
Answer» C. blackout |
108. |
Which of the following is NOT a Microsoft Internet tool or technology? |
A. | Dreamweaver |
B. | Silverlight |
C. | Internet Explorer |
D. | Expression Web |
E. | None of these |
Answer» A. Dreamweaver |
109. |
A protocol used to control the secure sending of data on the internet is : |
A. | SMTP |
B. | HTTPS |
C. | TCP/IP |
D. | HTTP |
E. | None of these |
Answer» B. HTTPS |
110. |
Programs from the same developer sold bundled together, that provide better integration and share common features, toolbars and menus are known as ……….. |
A. | software suites |
B. | integrated software packages |
C. | software processing packages |
D. | personal information managers |
E. | None of these |
Answer» A. software suites |
111. |
……………terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. |
A. | Data |
B. | Sales |
C. | Query |
D. | Point-of-Sale (POS) |
E. | None of these |
Answer» D. Point-of-Sale (POS) |
112. |
The OSI model is divided into …………processes called layers. |
A. | five |
B. | six |
C. | seven |
D. | eight |
E. | None of these |
Answer» C. seven |
113. |
………..are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat. |
A. | Servers |
B. | Embedded computers |
C. | Robotic computers |
D. | Mainframes |
E. | None of these |
Answer» B. Embedded computers |
114. |
In a ring topology, the computer in possession of the………can transmit data |
A. | packet |
B. | data |
C. | access method |
D. | token |
E. | None of these |
Answer» D. token |
115. |
…………Viruses are often transmitted by a floppy disk left in the floppy drive |
A. | Trojan horse |
B. | Boot sector |
C. | Script |
D. | Logic bomb |
E. | None of these |
Answer» B. Boot sector |
116. |
A database management system (DBMS) is a……….. |
A. | hardware system used to create, maintain and provide controlled access to a database |
B. | hardware system used to create, maintain, and provide uncontrolled access to a database. |
C. | software system used to create, maintain, and provide uncontrolled access to a database. |
D. | software system used to create, maintain, and provide controlled access to a database. |
E. | None o these |
Answer» D. software system used to create, maintain, and provide controlled access to a database. |
117. |
A Proxy server is used for which of the following? |
A. | To provide security against unauthorized users |
B. | To process client requests for web pages |
C. | To process client requests for database access |
D. | To provide TCP/IP |
E. | None of these |
Answer» B. To process client requests for web pages |
118. |
……….are words that a programming language has set aside for its own use. |
A. | Control words |
B. | Reserved words |
C. | Control structures |
D. | Reserved keys |
E. | None of these |
Answer» B. Reserved words |
119. |
What is the primary difference between a virus and a worm? |
A. | A worm has the ability to self-propagate from an infected user’s computer to other computers |
B. | A worm is usually written by a cracker : Script bunnies do not have the skills to develop worm program |
C. | A virus is very harmful to the computers it infects; a worm is not a serious a problem |
D. | Anti-virus software is effective in fighting viruses but not worms |
E. | None of these |
Answer» C. A virus is very harmful to the computers it infects; a worm is not a serious a problem |
120. |
………..describe what is database fields. |
A. | Structures |
B. | Field markers |
C. | Field definition |
D. | Field names |
E. | None of these |
Answer» D. Field names |
121. |
A goal of normalization is to…………. |
A. | minimize the number of relationships |
B. | minimize the number of entities |
C. | minimize the number of tables |
D. | minimize the numbe of redundancy |
E. | None of these |
Answer» D. minimize the numbe of redundancy |
122. |
A(n)………….uses pictures (called icons) and menus displayed on the screen to send commands to the computer system. |
A. | command-based user interface |
B. | GUI |
C. | system utility |
D. | API |
E. | None of these |
Answer» B. GUI |
123. |
Communication using a modulated carrier to apply a data signal to a transmission medium in analog form is |
A. | Local area network |
B. | Modem |
C. | Base band networking |
D. | Broad band networking |
E. | None of these |
Answer» D. Broad band networking |
124. |
‘ITS’ stands for |
A. | Intelligent Teaching Systems |
B. | International Tutoring Systems |
C. | Intelligent Tutoring Systems |
D. | All of these |
E. | None of these |
Answer» C. Intelligent Tutoring Systems |
125. |
Any piece of equipment forming an interface to a data communication system is |
A. | DTE |
B. | DTA |
C. | CSA |
D. | DCA |
E. | None of these |
Answer» B. DTA |
126. |
In the language of the computer profession, one thousand position of main storage is represented with the letter |
A. | K |
B. | L |
C. | M |
D. | C |
E. | None of these |
Answer» A. K |
127. |
The control of the jobs running within a system is |
A. | Job monitoring |
B. | Job stream |
C. | Job min |
D. | Job step |
E. | None of these |
Answer» A. Job monitoring |
128. |
The total number of messages handled by a computerized telephone system on a daily basis is an example of : |
A. | Frequency |
B. | Updating |
C. | Volume |
D. | All of these |
E. | None of these |
Answer» D. All of these |
129. |
A device mounted on a communication satellite which receives, amplifies and re- transmits signals from earth station is |
A. | Track |
B. | Transponder |
C. | Transistor |
D. | Terminal |
E. | None of these |
Answer» B. Transponder |
130. |
What is the acronym for Single In-Line Memory Module? |
A. | SIMM |
B. | SILMM |
C. | SM |
D. | SMM |
E. | None of these |
Answer» A. SIMM |
131. |
Which type of processing that produces output results immediately after input data are entered into a computer system |
A. | Time-sharing |
B. | Interactive |
C. | Batch Processing |
D. | Real-time processing |
E. | None of these |
Answer» B. Interactive |
132. |
A computer program that instructs other programs to perform a particular type of operation is |
A. | System software |
B. | Application program |
C. | Compiler |
D. | Interpreter |
E. | None of these |
Answer» A. System software |
133. |
The provides a path between the CPU and peripheral devices, which are connected via interface cards |
A. | computer |
B. | expansion bus |
C. | memory |
D. | CPU |
E. | None of these |
Answer» B. expansion bus |
134. |
Programs prepared by an outside supplier & provided to a user in a machine readable form is known as |
A. | Utility program |
B. | Canned program |
C. | Application program |
D. | Application software |
E. | None of these |
Answer» B. Canned program |
135. |
Pictures or drawings, typically displayed on a VDU to allow users to select program options is called |
A. | HIPO charts |
B. | Icons |
C. | Graphics |
D. | Network |
E. | None of these |
Answer» B. Icons |
136. |
The pieces of equipment which are attached to the CPU of a computer and which it can access are called |
A. | output devices |
B. | control units |
C. | hardware |
D. | disk drive |
E. | peripherals |
Answer» E. peripherals |
137. |
A factor which might cause an individual to consider using a computer in criminal activities is : |
A. | The computer’s access to large sums of money |
B. | The speed with which the crime can be accomplished |
C. | EFTS (Electronic Funds Transfer System) |
D. | All the these |
E. | None of these |
Answer» D. All the these |
138. |
The Secure Electronic Transaction (SET) specification |
A. | is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate |
B. | provides private-key encryption of all data that passes between a client and a server |
C. | allows users to choose an encryption scheme for the data that passes between a client and a server |
D. | uses a public-key encryption to secure credit-card transaction systems |
E. | None of these |
Answer» D. uses a public-key encryption to secure credit-card transaction systems |
139. |
‘DOS’ floppy disk does not have |
A. | A Boot Record |
B. | A File Allocation Table |
C. | A Root Directory |
D. | Virtual Memory |
E. | BIOS |
Answer» E. BIOS |
140. |
All the information collected during database development is stored in a_ |
A. | repository |
B. | data warehouse |
C. | RAD |
D. | CASE |
E. | None of these |
Answer» B. data warehouse |
141. |
The…………component is used by the data analyst to create the queries that access the database. |
A. | data extraction |
B. | end-user query tool |
C. | end-user presentation tool |
D. | data store |
E. | None of these |
Answer» B. end-user query tool |
142. |
A polymorphic virus |
A. | modifies its program code each time it attaches itself to another program or file |
B. | is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains. |
C. | a malicious-logic program that hides within or looks like a legitimate program |
D. | infects a program file, but still reports the size and creation date of the original uninfected program |
E. | None of these |
Answer» A. modifies its program code each time it attaches itself to another program or file |
143. |
Microwave transmission is used in environments where installing physical transmission media is _ |
A. | difficult or impossible and where line-of- sight transmission is unavailable |
B. | easy or promising and where line-of-sight transmission is unavailable |
C. | difficult or impossible and where line-of- sight transmission is available |
D. | easy or promising and where line-of-sight transmission is available |
E. | None of these |
Answer» D. easy or promising and where line-of-sight transmission is available |
144. |
Which is NOT a good Web security strategy? |
A. | Restrict access to the Web server; keep a minimum number of ports open |
B. | Limit the users who can load software, edit or add files. |
C. | Add demo programs, so users can test system without accessing production data. |
D. | Remove unnecessary compilers and interpreters |
E. | None of these |
Answer» D. Remove unnecessary compilers and interpreters |
145. |
The word FTP stands for |
A. | File Translate Protocol |
B. | File Transit Protocol |
C. | File Typing Protocol |
D. | File Transfer Protocol |
E. | None of these |
Answer» D. File Transfer Protocol |
146. |
This…………tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data. |
A. | Client |
B. | Applications/Web server |
C. | Enterprise Server |
D. | DBA |
E. | None of these |
Answer» A. Client |
147. |
RSA is |
A. | Symmetric Cryptosystem |
B. | Asymmetric Cryptosystem |
C. | Block Cypher |
D. | Digital Signature |
E. | None of these |
Answer» D. Digital Signature |
148. |
A DVD-RAM is similar to a …………except it has storage capacities upto 5.2 GB. |
A. | CD-R |
B. | floppy disk |
C. | CD-RW |
D. | hard disk |
E. | None of these |
Answer» C. CD-RW |
149. |
How is power supplied to a low-power USB device? |
A. | Through a power cable |
B. | From an external power supply |
C. | Directly from the computer’s power supply |
D. | Through the USB cable |
E. | None of these |
Answer» D. Through the USB cable |
150. |
The………data mining techniques derives rules from real-world case examples. |
A. | Rule discover |
B. | Signal processing |
C. | Neural nets |
D. | Case-based reasoning |
E. | None of these |
Answer» C. Neural nets |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.