Computer Hardware Maintenance and Computer Networking QB

EASY From What location are the 1st computer instructions available on boot up? A. ROM BIOS B. CPU C. boot.ini D. CONFIG.SYS ANSWER: A

What could cause a fixed disk error. A. No- installed B. bad ram C. slow processor D. Incorrect CMOS settings ANSWER: D

Missing slot covers on a computer can cause? A. over heat B. power surges C. EMI. D. incomplete for ESD ANSWER: A

With respect to a network interface card, the term 10/100 refers to A. protocol speed B. a fiber speed C. megabits per seconds D. minimum and maximum server speed ANSWER: C

Which Motherboard form factor uses one 20 pin connector A. ATX B. C. BABY AT D. All of the above ANSWER: A

A hard disk is divided into tracks which are further subdivided into: A. clusters B. sectors C. vectors D. heads ANSWER: B

A wrist grounding strap contains which of the following: A. Surge protector B. Capacitor C. Voltmeter D. Resistor ANSWER: D

ESD would cause the most damage to which component? A. Power supply B. Expansion board C. Monitor D. Keyboard E. All of the mentioned ANSWER: B

Most PCs give a single beep on bootup to indicate they are ok hardware wise. You boot your PC and don't get a beep. What should you check first? A. system board B. RAM C. microprocessor D. power supply E. speaker ANSWER: E

Which peripheral port provides the FASTEST throughput to laser printers? A. RS-232 B. SCSI C. Parallel D. Serial E. None of the mentioned ANSWER: C

If there are multiple recycle bin for a hard disk A. You can set different size for each recycle bin B. You can choose which recycle bin to use to store your deleted files C. You can any one of them default recycle bin D. None of above ANSWER: A

Identify false statement A. You can deleted files in recycle bin B. You can restore any files in recycle bin if you ever need C. You can increase free space of disk by sending files in recycle bin D. You can right click and choose Empty Recycle Bin to clean it at once ANSWER: C

If the displayed system and date is wrong, you can reset it using A. B. Calendar C. Write D. Control panel ANSWER: D

You should save your computer from? A. Viruses B. Time bombs C. Worms D. All of the mentioned ANSWER: D

World Wide Web is being standard by A. Worldwide corporation B. W3C C. World Wide Consortium D. World Wide Web Standard ANSWER: B

A co-processor A. Is relatively easy to support in software B. Causes all processor to function equally C. Works with any application D. Is quite common in modern computer ANSWER: A

A Windows is a(n) A. B. Graphic program C. Word Processing D. Database program ANSWER: A

Which of the following is program group? A. Accessories B. Paint C. Word D. All of the mentioned ANSWER: A

Which is not application software? A. Windows NT B. Page Maker C. WinWord XP D. Photoshop ANSWER: A

The ...... program compresses large files into a smaller file A. WinZip B. WinShrink C. WinStyle D. None of the mentioned ANSWER: A

1. Which of the following is an example of a real time operating system? A. Lynx B. MS DOS C. Windows XP D. Process Control ANSWER: D

Which of the following operating system does not implement the multitasking truly? A. Windows 98 B. Windows NT C. Windows XP D. MS DOS ANSWER: D

Which of the following windows version support 64 bit processor? A. Windows 98 B. Windows 2000 C. Windows XP

D. Windows 95 ANSWER: C

Which of the following Operating systems is better for implementing a Client-Server network A. MS DOS B. Windows 95 C. Windows 98 D. Windows 2000 ANSWER: D

Which of the following Windows do not have button A. Windows Vista B. Windows 7 C. Windows 8 D. None of the mentioned ANSWER: C

Which operating system doesn't support networking between computers? A. Windows 3.1 B. Windows 95 C. Windows 2000 D. Windows NT ANSWER: A

Which of the following does not support than one program at a time? A. DOS B. C. Windows D. ANSWER: A

Which of the following is not an operating system? A. DOS B. Linux C. Windows D. Oracle ANSWER: D

Linux is a(n) ...... operating system A. Open source

B. Microsoft C. Windows D. Mac ANSWER: A

Which operating system can you give smallest file name? A. /2 B. Dos C. Windows D. Windows NT ANSWER: B

Which of the following is not a multitasking operating system? A. Windows B. Linux C. Win NT D. DOS ANSWER: D

You should choose option when A. The computer is tired after working for the whole day B. You are leaving for a very short time and want to resume you work shortly C. When computer gets hanged frequently. Let it sleep for some time D. You finish working and going to bed ANSWER: D

The ..... displays the name of every computer user on the computer A. Wish list screen B. Command screen C. Welcome screen D. None of the mentioned ANSWER: C

The category of software most appropriate for controlling the design and layout of complex document like newsletters and brochure is: A. Word processing B. Computer aided design C. Web page authoring D. Desktop publishing ANSWER: A

Which one is not a system tool?

A. Backup B. Disk defragment C. Virus scanning D. All of the above ANSWER: C

The memory which allocates space for DOS and application is called A. Expanded memory B. Cache memory C. Virtual memory D. Conventional memory ANSWER: D

The operating system creates _____ from the physical computer A. Virtual space B. Virtual computers C. Virtual device D. None ANSWER: B

Which menu bar selection would you access to open file? A. Option B. C. View D. None of the mentioned ANSWER: D

Which mode loads minimal set of drivers when starting Windows? A. Safe Mode B. Normal Mode C. VGA Mode D. Network Support Mode ANSWER: A

Which of the following are loaded in safe mode? A. Keyboard driver B. Mouse driver C. VGA drive D. All of the mentioned ANSWER: D

...... is a named location on a disk where files are stored

A. Folder B. Pod C. Version D. None of the mentioned ANSWER: A

Which of command requires additional files to perform specific operations? A. Internal commands B. External commands C. Valuable commands D. Primary commands ANSWER: B

Which of the following is system software? A. Operating system B. Compiler C. Utilities D. All of the mentioned ANSWER: D A user-interface that is easy to use is considered to be A. User-happy B. User-simple C. User-friendly D. None of the mentioned ANSWER: C

A ..... is a flash memory storage device that plugins into a USB port A.USB snap drive B.USB flash drive C.USB memory maker drive D.None of above ANSWER: B

The ...... is the drive containing the files to be copied A.Source drive B.Destination drive C.USB drive D.None of the above ANSWER: A

Which one of the following is not a multitasking operating system? A.DOS B.Windows C.Unix D.Linux ANSWER: A

The most recent version of MAC OS is based on the ...... operating system A. Windows B. Linux C. Unix D. CMOS ANSWER: C

In Windows, start button is used to A. Run applications B. Device setting C. Turn off the system D. All of the mentioned ANSWER: D

Which one is true for unconditional disk formatting? A. Destroys every byte of data on a disk by overwriting it with with blank spaces B. Do not check/scan surface after C. Transfer system files after format D. All of the mentioned ANSWER: A

From what location are the 1st computer instructions available on boot up? A. ROM BIOS B. CPU C. boot.ini D. CONFIG.SYS E. None of the mentioned ANSWER: A

What could cause a fixed disk error. A. No-CD installed B. bad ram C. Slow processor D. Incorrect CMOS settings E. None of the mentioned ANSWER: D

Missing slot covers on a computer can cause? A. overheat B. power surges C. EMI. D. incomplete path for ESD E. None of the mentioned ANSWER: A

When installing PCI NICS you can check the IRQ availability by looking at A. dip switches B. CONFIG.SYS C. jumper settings D. motherboard BIOS E. None of the mentioned ANSWER: D

With respect to a network interface card, the term 10/100 refers to A.protocol speed B.a fiber speed C.megabits per seconds D.minimum and maximum server speed E.None of the mentioned ANSWER: C

Virtual memory is A. simple to implement B. used in all major commercial operating systems C. less efficient in utilization of memory D. useful when fast I/O devices are not available E. None of the mentioned ANSWER: B

Backups should be done A. daily for most installations B. weekly for most installations C. as several image copies, followed by an incremental D. as several incrementals, followed by an image E. None of the mentioned ANSWER: B

Which of the following systems software does the job of merging the records from two files into one? A.Security software B.Utility program C.Networking software D.Documentation system E.None of the above ANSWER: B

Booting means A. Restarting computer B. Installing program C. Removing errors D. Switch off ANSWER: A

In which addressing mode the operand is given explicitly in the instruction? A. absolute mode B. immediate mode C. indirect mode D. index mode E. None of the mentioned ANSWER: B

It is the default folder for many Windows Applications to save your file A. My Document B. My Pictures C. Documents and Settings D. My Computer ANSWER: D

Netscape navigator is a A.Browser B.Compose C.Editor D.None of these ANSWER: D

Which of the following command is used to switch between the window programs? A. Alt+Tab B. Alt+F4

C. Ctrl+Tab D. None of the mentioned ANSWER: D

A device that provides a central connection point for cables is – A. Switch B. Hub C. Gateway D. Proxy Server ANSWER: A

Which of the following is not the user file extension? A..ppt B..xls C.. D..doc ANSWER: C

Which of the following windows version support 64 bit processor? A. Windows 98 B. Windows 2000 C. Windows XP D. Windows 95 ANSWER: C

Which of the following memory unit that processor can access more rapidly A. Main Memory B. Virtual Memory C. Cache memory D. Read Only Memory ANSWER: C

A ...... is a named location on a disk where files are stored A. Folder B. Pod C. Version D. None of the mentioned ANSWER: A

When you open my computer on desktop you see the information of A. Hard disk B. CD C. Removable disk

D. All of the mentioned ANSWER: D

Which of the following is used to display the content of a certain drive or folder? A. Click the drive or folder while holding down the Alt key B. Triple click the drive or folder C. Right click the drive or folder D. Double click the drive or folder ANSWER: D

The box on ...... that allows you to choose where to go and is located below the standard toolbar A. System menu B. Address bar C. Menu bar D. None of these ANSWER: C

Which of the following is a disk compression tool? A. Drive space B. Scan disk C. Defragmenter D. None of the above ANSWER: C

Which of the following file menu option saves document to disk? A. Save B. Create C. Rename D. All of above ANSWER: A

All the time a computer is switched on, its operating system software has to stay in A. main storage B. primary storage C. floppy disk D. disk drive E. None of the above ANSWER: A

Save operation means A. Put data into processor B. Put data into internal memory C. Put data into secondary storage D. Put data into monitor

ANSWER: B

Scheduling is A. allowing jobs to use the processor B. unrelated to performance consideration C. not required in uniprocessor systems D. the same regard-less of the purpose of the system E. None of the mentioned ANSWER: A

RAM' stands for A. Random Access Memory B. Read Access Memory C. Read Arithmetic Memory D. Random Arithmetic Memory ANSWER: A

Devices that accepts data from outside computer and transfer into CPU are called A. input devices B. digital devices C. analogue devices D. truth table peripherals ANSWER: A

Central Processing Unit (CPU) consists of A. control unit B. arithmetic and logic unit C. main store D. All of the mentioned ANSWER: D

Devices which are used to receive data from central processing unit are classified as A. output/input devices B. digital devices C. signaled devices D. output devices ANSWER: D

Place where large amounts of data are stored outside central processing unit is called A. backing store B. peripherals C. control unit D. AL unit ANSWER: A

Devices that are under control of computer and are directly connected to computer peripherals are termed as A. off-line devices B. on-line devices C. IN gate device D. IF gate device ANSWER: B

If any instruction consist of any arithmetic operation, data is transferred to A.quantitative unit B.qualitative unit C.arithmetic and logical unit D.central processing unit ANSWER: B

Devices such as mercury thermometer and kitchen scales are classified as A. digital devices B. analogue devices C. programmed devices D. signal led devices ANSWER: B 'main store' of CPU is also called A. main memory B. temporary memory C. immediate access store D. both A and C ANSWER: D

If a quantity in device is treated as different set of separate values, device is said to be A. digital B. analogues C. signals D. computer ANSWER: A

Material on which data is stored or an input/output is classified is termed as A. mini frame medium B. micro medium C. macro medium D. medium ANSWER: D

Type of integrated circuit which consists of arithmetic unit, control unit and some main store is called a A. mega processor B. micro processor C. micro computers D. mega computers ANSWER: B

Visual display unit is an example of A. output device B. input/output devices C. backup devices D. mediums ANSWER: B

Devices that are not connected to computers central processing unit are classified as A. AND gate devices B. OR gate devices C. off-line devices D. on-line devices ANSWER: C

Keyboard and mouse are A. DC devices B. analogue devices C. truth table devices D. input devices ANSWER: D

Silicon piece with a system circuit on it is termed as A.chip B.circuit C.logical gate D.circuit network ANSWER: D

Large computers with wide range of peripheral devices are classified as A. mainframe computers B. mini frame computers C. mainframe processors D. peripheral interface ANSWER: A

Computer for which processing is used to be done with help of microprocessors is termed as A. micro processor B. micro computers C. mega processor D. mega computers ANSWER: B

Actual equipment of computer system that can be touched are A.hardware B.software C.applications D.bugs ANSWER: A

Decoding and execution of instructions rapidly, one after another is called A. AL unit B. backup device C. keyboard D. control unit ANSWER: A

Input and Output devices such as monitors and keyboards are classified as A. arithmetic units B. control unit devices C. peripheral devices D. main store devices ANSWER: C

'ROM' stands for A. read only memory B. random only memory C. readily object memory D. random available memory ANSWER: A

Line printer, a voice synthesizer and computer terminal screen are classic examples of A. logic circuit devices B. analogue circuit devices C. AND gate devices D. output devices ANSWER: D

Devices that are controlled by central processing unit but are not a part of it are called A. peripheral devices B. arithmetic units C. control unit devices D. main store devices

ANSWER: A

Main categories of peripheral devices are A.input/output devices B.on-line devices C.backing storage devices D.both a and c ANSWER: C

Two type of memories 'RAM' and 'ROM' are part of A.backup memory B.main memory C.shorter memory D.long-term memory ANSWER: B

Magnetic tape unit and magnetic disc unit are classic example of A.storage devices B.backing storage devices C.on-line devices D.off-line devices ANSWER: B

Device in which data is represented by continuous variable quantity is called A. analogue device B. computer device C. system programs D. digital program ANSWER: A

Small computers that are not microcomputers are classified as A. micro computers B. mini computers C. mainframe computers D. mega processors

ANSWER: B

Circuit consisting of different electronic components and connections are called A. integrated circuits B. interrelated circuits C. inverting circuits D. reversing circuits ANSWER: A

Devices used to read to and write from central processing unit are classified as A. analogue circuit devices B. AND gate devices C. OR gate devices D. backing storage devices ANSWER: D

Secondary storage memory is basically A.volatile memory B.non volatile memory C.backup memory D.impact memory ANSWER: B

Which one is true for unconditional disk formatting? A. Destroys every byte of data on a disk by overwriting it with with blank spaces B. Do not check/scan surface after format C. Transfer system files after format D. All of above ANSWER: A

A piece of data that can be transferred between CPU and backup storage is called A. block

B. stream C. cartridge D. gap ANSWER: A

In fixed discs, sum of rotational delay and transfer time is equals to A. access time B. delay time C. processing time D. storage time ANSWER: A

The IETF standards documents are called A. RFC B. RCF C. ID D. None of the mentioned ANSWER: A

In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are A. Added B. Removed C. Rearranged D. Modified ANSWER: A

The structure or format of data is called A. Syntax B. Semantics C. Struct D. None of the mentioned ANSWER: A

Communication between a computer and a keyboard involves ______transmission A. Automatic

B. Half-duplex C. Full-duplex D. Simplex ANSWER: D

The first Network A. CNNET B. NSFNET C. ASAPNET D. ARPANET ANSWER: D

The ______is the physical path over which a message travels A. Path B. Medium C. Protocol D. ANSWER: B

Which organization has authority over interstate and international commerce in the communications field? A. ITU-T B. IEEE C. FCC D. ISOC ANSWER: C

Which of this is not a network edge device? A. PC B. Smartphones C. Servers D. Switch ANSWER: D

A set of rules that governs data communication A. Protocols B. Standards

C. RFCs D. None of the mentioned ANSWER: A

Three or more devices share a link in ______connection A. Unipoint B. Multipoint C. Point to point D. None of the mentioned ANSWER: B

When collection of various computers seems a single coherent system to its client, then it is called A. computer network B. distributed system C. networking system D. none of the mentioned ANSWER: B Two devices are in network if A. a process in one device is able to exchange information with a process in another device B. a process is running on both devices C. PIDs of the processes running of different devices are same D. none of the mentioned ANSWER: A

Which one of the following computer network is built on the top of another network? A. prior network B. chief network C. prime network D. overlay network ANSWER: D n computer network nodes are A. the computer that originates the data B. the computer that routes the data C. the computer that terminates the data D. all of the mentioned

ANSWER: D

Communication channel is shared by all the machines on the network in A. broadcast network B. unicast network C. multicast network D. none of the mentioned ANSWER: A

Bluetooth is an example of A. personal area network B. local area network C. virtual private network D. none of the mentioned ANSWER: A

A ______is a device that forwards packets between networks by processing the routing information included in the packet. A. bridge B. firewall C. router D. all of the mentioned ANSWER: C

A list of protocols used by a system, one protocol per layer, is called A. protocol architecture B. protocol stack C. protocol suite D. none of the mentioned ANSWER: B

Network congestion occurs A. in case of traffic overloading B. when a system terminates C. when connection between two nodes terminates D. none of the mentioned ANSWER: A

Which one of the following extends a private network across public networks? A. local area network B. virtual private network C. enterprise private network D. storage area network ANSWER: B

Which of this is not a constituent of residential telephone line? A. A high-speed downstream channel B. A medium-speed downstream channel C. A low-speed downstream channel D. None of the mentioned ANSWER: C

The physical layer concerns with A. bit-by-bit delivery B. process to process delivery C. application to application delivery D. none of the mentioned ANSWER: A

Which transmission media has the highest transmission speed in a network? A. coaxial cable B. twisted pair cable C. optical fiber D. electrical cable ANSWER: C he portion of physical layer that interfaces with the media access control sublayer is called A. physical signalling sublayer B. physical data sublayer C. physical address sublayer D. none of the mentioned ANSWER: A physical layer provides A. mechanical specifications of electrical connectors and cables B. electrical specification of transmission line signal level

C. specification for IR over optical fiber D. all of the mentioned ANSWER: D

In asynchronous serial communication the physical layer provides A. start and stop signalling B. flow control C. both start & stop signalling and flow control D. none of the mentioned ANSWER: C

Which of the following Windows do not have Start button A. Windows Vista B. Windows 7 C. Windows 8 D. None of above ANSWER: C

Which operating system doesn't support networking between computers? A. Windows 3.1 B. Windows 95 C. Windows 2000 D. Windows NT ANSWER: A

Which of the following does not support more than one program at a time? A. DOS B. Linux C. Windows D. Unix ANSWER: A

Which of the following is not an operating system? A. DOS B. Linux C. Windows D. Oracle ANSWER: D

Linux is a(n) ...... operating system A. Open source B. Microsoft C. Windows D. Mac ANSWER: A

The physical layer is responsible for A. line coding B. channel coding C. modulation D. all of the mentioned ANSWER: A

The physical layer translates logical communication requests from the ______into hardware specific operations. A. data link layer B. network layer D. application layer ANSWER: A

A single channel is shared by multiple signals by A. analog modulation B. digital modulation C. multiplexing D. none of the mentioned ANSWER: C

The data link layer takes the packets from ______and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer ANSWER: A

Which one of the following task is not done by data link layer? a) framing b) error control c) flow control d) channel coding ANSWER: D

Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. none of the mentioned ANSWER: B

Header of a frame generally contains A. synchronization bytes B. addresses C. frame identifier D. all of the mentioned ANSWER: D Automatic repeat request error management mechanism is provided by A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. none of the mentioned ANSWER: A

CRC stands for A. cyclic redundancy check B. code repeat check

C. code redundancy check D. cyclic repeat check ANSWER: A

Which one of the following is a data link protocol? A. ethernet B. point to point protocol C. hdlc D. all of the mentioned ANSWER: D

Which one of the following is the multiple access protocol for channel access control? A. CSMA/CD B. CSMA/CA C. Both CSMA/CD & CSMA/CA D. None of the mentioned ANSWER: C

The network layer concerns with A. bits B. frames C. packets D. none of the mentioned ANSWER: C

Ping can A. Measure round-trip time B. Report packet loss C. Report latency D. All of the mentioned ANSWER: D

ICMP is used in A. Ping B. C. D. Both Ping & Traceroute

ANSWER: D

______command is used to manipulate TCP/IP routing table. A. route B. C. Ifconfig D.Traceroute ANSWER: A

If you want to find the number of routers between a source and destination, the utility to be used is. A. route B. Ipconfig C. Ifconfig D. Traceroute ANSWER: A

Which of the following is related to ipconfig in ? A. Display all current TCP/IP network configuration values B. Modify DHCP settings C. Modify DNS settings D. All of the mentioned ANSWER: D

This allows to check if a domain is available for registration. A. Domain Check B. Domain Dossier C. Domain Lookup D. None of the mentioned ANSWER: A Which of the following is/are true for Linux? A. Linux is an operating system or a kernel, it is open source and supports all kind of hardware components. B. It is like the Unix system. C. Linux has a GUI system D. All mentioned are true ANSWER: D

The command "" is used to: A. make a new directory B. make a new folder C. make a new file D. list all directories in the folder ANSWER: A

The command "" in Linux is: A. Concatenator and it can be used to view the contents of a file. B. Concatenator C. Catenation to review files D. All are true ANSWER: A

The user interface allows the user to communicate with the OS. Which of the following is/are exapmle if interfaces: A. Command Line Interface,Graphical User Interface (GUI)and Menu-driven B. Command Line Interface,Graphical User Interface (GUI) C. Command Line Interface,Graphical User Interface (GUI),Menu-driven,Form-based and Natural language D. Command Line Interface,Graphical User Interface (GUI),Menu-driven and Form- basedWhich of the following is/are true for Linux? A. Linux is an operating system or a kernel, it is open source and supports all kind of hardware components. B. It is like the Unix system. C. Linux has a GUI system D. All mentioned are true ANSWER: D The command "mkdir" is used to: A. make a new directory B. make a new folder

C. make a new file D. list all directories in the folder ANSWER: A

The command "cat" in Linux is: A. Concatenator and it can be used to view the contents of a file. B. Concatenator C. Catenation to review files D. All are true ANSWER: A

The user interface allows the user to communicate with the OS. Which of the following is/are exapmle if interfaces: A. Command Line Interface,Graphical User Interface (GUI)and Menu-driven B. Command Line Interface,Graphical User Interface (GUI) C. Command Line Interface,Graphical User Interface (GUI),Menu-driven,Form-based and Natural language ANSWER: C

The purpose of taskbar in GUI element is: A. To show all the system task running in past. B. To show which programming is running currently in the system. C. To show all the directories present in the system D. All are true ANSWER: B

A ______is an object which can store data, information, settings used by a computer program. A. Folder B. File C. Window Explorer

D. Start Menu ANSWER: B command in Linux OS does which of the following: A. It prints the path of the working directory, starting from the root. B. It is shell built-in command(pwd) or an actual binary(/bin/pwd). C. It is an which stores the path of the current directory. D. All are true ANSWER: D

______is the main package management program in Debian used to install, build, remove, and manage packages. A. B. C. dpkg D. Whatis ANSWER: C

System calls are the classical method of enabling user processes to interact with the kernel. A. True B. False ANSWER: A

Which of the following Operating System is not type of Linux? A. BSD B. Ubuntu C. Redhat D. CentOS ANSWER: A

Which of the following is a Linux platform? A. Darwin B. IOS C. Blackberry D. Android ANSWER: D

The Linux command ______tape archive, is used to create Archive and extract the Archive files. A. B. xvgh C. D. gzip ANSWER: A

What is Shell in Linux? A. Script B. Program C. User D. Account ANSWER: B

All users passwords are stored in: A. /etc/passwd B. /etc/password C. /root/password D. /root/passwd ANSWER: A

Which of the following command is used to show current working directory?

A. B. C. pwd D. ANSWER: C

How do you change to a different directory in Windows OS? A. cd .. B. cd . C. cd.. D. cd... ANSWER: A

Taskbar is used for A. Navigation program B. Switching between program C. Start a program D. All of mentioned ANSWER:D

The contents in the current or a specified directory. A. B. ls C. dir D. list ANSWER:B

Folder may contain those are______A. Files and sub folders

B. Only files C. Only sub folders D. None of the mentioned ANSWER:A

First personal computer controlled with a keyboard was invented in the year A. 1955 B. 1957 C. 1956 D. 1952 ANSWER:B

Text Editor is______A. Wordpad B. Paint C. Photoshop D. Notepad ANSWER: D

Collection of related files and subfolders is______A. Menu B. Disk C. Operating System D. Folder ANSWER:D

Program files and more number of folders to your in _____ A. Hard disk B. RAM C. Memory disk

D. Floppy ANSWER:A

One Gigabyte (GB) is equal to______- A. 1024 bytes B. 1024 KB C. 1024 MB D. 1024 TB ANSWER:C

Which key, when pressed once, is used to provide command completion in the terminal? A. Tab B. Esc C. Enter D. Ctrl ANSWER:A

Which of the following command displays a listing of previously entered commands? A. commands B. review C. history D. export ANSWER:C

A ______is an all-purpose knife used for cutting. A. Metal Vise B. Steel File C. Utility knife D. Chalk Line ANSWER: C

Which of the following is a hand tool? A. Bubble levels B. All of the mentioned C. Spanner D. Pliers ANSWER: B

______protects the eyes from all directions during machining. A. Speed Square B. Safety goggles C. Respirator D. Face shield ANSWER: B

Which device is used to combine two pieces of metal by twist one or both in a way that causes them to hold each other? A. Plier B. Crimping tool C. Tweezer D. Screwdriver ANSWER: B

An electronic tool that allows information to be input, processed, and output A. Operating Systems B. Motherboard C. Computer D. CPU ANSWER: C

Who invented the modern computer A. Charles Babbage B. Thomas Edison C. John Logie Baird D. Alexander Graham Bell ANSWER: A

Which of the following tasks can be done on a modern computer? A. Complex calculations B. Internet surfing C. All of the mentioned D. Watch movies ANSWER: C

A worldwide network of computers is called A. Internet B. RAM C. Intranet D. CPU ANSWER: C

Whether is an academic institution, hospital, government office, railway stations, airports or any other place, computers are an inevitable part of human life. A. True B. False ANSWER: A

The brain of the computer. This part does the calculation, moving, and processing of information A. Hard drive B. Motherboard

C. CPU D. RAM ANSWER: C

What does RAM stand for, on a computer? A. Readily Available Memory B. Remember All Memory C. Random Access Memory D. None of the mentioned ANSWER: C

ALU is the place where the actual executions of instructions take place during the processing operation. A. True B. False ANSWER: A

The physical part of the computer is known as A. Hardware B. Software C. Hard disk D. Disk drive ANSWER: A

Parts of a computer that allow the user to see or hear information that comes out from the computer A. Motherboard B. Input device C. Output device D. Operating System ANSWER: C

Which of the following is a part of the CPU A. Mouse B. Keyboard C. Desktop D. Arithmetic Logic Unit ANSWER: D

Among the options, which device enables video conferencing on computers? A. Digital Camera B. Microphone C. Webcam D. Voice Recognition ANSWER: C

If you turn ON a PC and the unit is clearly ON but the monitor is dark, the problem could be that: A. The monitor is not plugged in B. The monitor is not turned on C. The monitor is not plugged into the PC D. Any or all of the mentioned ANSWER: D

If a PC behaves freezes or behaves erratically and the system unit is very quiet, there is a chance that A. A virus has infected the system B. The RAM of the system is failing C. The power supply fan has failed and the system is overheating D. The hard drive is almost out of space ANSWER: C

The hardware in a PC that keeps track of the hardware resources of the system is called A. CMOS-RAM B. Motherboard C. ROM BIOS CHIP D. Power Supply ANSWER: B

A message saying “Invalid drive configuration” appears during the bootup of a PC. The problem most likely could be A. The hard drive cable is not attached to the controller B. The hard drive has failed C. The hard drive has no partitions D. Any of the mentioned ANSWER: D

You have loaded a new video card on your computer and now everything looks really bad. What should you do first? A. Check the log in the B. View the and see if the card is configured correctly. C. Go to the printed manual D. Restart the computer ANSWER: B

Which of the following should be done first to remove an application that you no longer need? A. Delete the program files B. Use the uninstall program that came with the application C. Use the add or remove programs feature D. Use the registry editor to remove the references to the program ANSWER: B

Which utility is useful to identify the program that is hogging the processing resources of the computer? A. Device Manager B. System Monitor C. Task Manager D. System Information ANSWER: C

What program can be used to keep your system up to date and patched up? A. Windows dispatcher B. Windows Upgrade C. Windows Update D. Device Manager ANSWER: B

What would be the first step in case of troubleshooting a seemingly faulty monitor? A. Use a meter to check internal circuitry for continuity B. Power down the monitor and then turn it back on to see if it solves the problem C. Power down the computer and then turn it back on to see if solves the problem D. Check its connection to the power source and the CPU ANSWER: D

What do we call the power protection device that has a battery and provides a few minutes of power? A. Generator B. UPS C. Line conditioner D. Surge suppressor ANSWER: B

What is the measurement unit of resistance?

A. Ohms B. Watts C. Volts D. Amperes ANSWER: A

Which of the following hardware can not be found inside a CPU casing of a computer? A. RAM B. Video Card C. Graphics Processor D.Graphic Display Unit ANSWER: D

Different components of the motherboard of a PC are linked together by a set of parallel electrical conducting lines. What are these lines called? A. Buses B. Connectors C. Conductors D. Drivers ANSWER: A

RS-232 is a standard that applies to? A. Serial Communication B. Parallel Communication C. Audio ports D. Network ports ANSWER: A

In computer terminology, VGA stands for? A. Volatile Graphics Access

B. Video Graphics Array C. Video Graphics Adapter D. Voltage Graph Adapter ANSWER: B

Select the odd one out. A. VGA B. HDMI C. DVI D. RJ-45 ANSWER: D

USB is a parallel connector. A. True B. False ANSWER: B

What type of cable is used for a high-speed ethernet connection? A. Optical Fibre B. Coaxial Cable C. Twisted Pair Cable D. Ribbon Cable ANSWER: A

What is the software that controls system performances called? A. Overlay Software B. System Software C. Control Software D. Application Software ANSWER: B

A program is A. a device where information is stored B. control system that controls the ALU C. a sequence of instructions D. None of the mentioned ANSWER: C

______is designed to solve a specific problem or execute a specific task. A. Utility software B. User software C. Application software D. System software ANSWER: C

______is the part of the computer that contains data and/or computer instructions? A. Hardware B. Software C. BIOS D. Chip ANSWER: B

Special Purpose Softwares are also called A. System Softwares B. Utility Softwares C. Application Softwares

D. User Interface ANSWER: C

In a computer, an Operating System is an example of A. System Software B. Device drivers C. Application Softwares D. Custom Softwares ANSWER: A

Choose the two main types of software from the following. A. Operating System and Device drivers B. LINUX and UNIX C. Application and System D. Windows and macOS ANSWER: C

Word processing is NOT application software. A. True B. False ANSWER: B

Which of the following is NOT an Operating System? A. Windows B. Android C. Ubuntu D. None of the mentioned ANSWER: D

The installation method depends on your Operating System and the program you are installing.

A. True B. False ANSWER: A

MFD stands for A. Main File Directory B. Memory File Directory C. Master File Directory D. Master Format Directory ANSWER:A linux is a(an)______Operating System A. Microsoft B. Mac C. Open source D. Solaris ANSWER:C

Files are maintain in which hierachical structure? A. Descriptors B. Directories C. Modifiers D. Relative Files ANSWER:B

Basic element of data in a file is______A. Memory B. Record C. Field D. Value

ANSWER:C

Uer can load and execute program but can't copy this process is______A. Appending B. Execution C. Reading D. Updating ANSWER:B

File access type supported by most operating systems are A. Sequential access B. Random access C. Structural access D. Direct access ANSWER:B

Secondary storage of a computer performs______operation A. Volatile B. Non-volatile C. Complex D. Non-circuit ANSWER:B

Which command will display the system date? A. Date B. C. Dir D. Format ANSWER:A

Not based Linux OS is______A. Ubuntu B. Redhat C. CentOs D. BSD ANSWER:D

Find can be used to A. Locate a program B. Locate a document C. Locate a network computer D. All of the mentioned ANSWER: D

Abbreviation of GUI? A. Giga uses internet B. Geographical user interface C. Graphical User interface D. Graphical unlimited interface ANSWER:C

Cursor is a______A. Pixel B. Thin blinking line C. Pointing device D. None of mentioned ANSWER:C

Run command for Calculator to open A. cals

B. calc C. calee D. ANSWER:B

Recently deleted files are stored in which place? A. Desktop B. Recycle bin C. Taskbar D. My Computer ANSWER:B

Open Office is A. Application Software B. System Software C. Operating System D. All of the mentioned ANSWER:A

Navigating one page to another page is called______A. Hyperlink B. Menu C. Source drive D. None of mentioned ANSWER:A

Default Open Word font is______A. Times New Roman B. Algerian C. Arial

D. None of mentioned

Default extension of open open Word Document is______A. .txts B. .Docs C. .odt D. .word ANSWER:C

What is the shortcutkey used for "Open File" in Word A. Ctrl+F B. Ctrl+H C. Ctrl+O D. Ctrl+S ANSWER:C

Text-style feature of word is A. WordColor B. WordFont C. WordArt D. WordFill ANSWER:C

An unrecoverable error is known as ______A. hard error B. tough error C. soft error D. None of the mentioned ANSWER:A

A disk that has a boot partition is called as ______A. start disk B. end disk C. boot disk D. All of the mentioned ANSWER: C

Which is not the function of OS? A. Memory management B. Disk management C. Application management D. Virus protection ANSWER:D

Filevirus attaches itself to the file ______A. source file B. object file C. executable file D. all of the mentioned ANSWER:B

Program that concede with normal routine of computer is called A. virus B. anti virus C. freeware D. shareware ANSWER:A

The first computer virus is A. Creeper

B. PARAM C. The Famous D. HARLIE ANSWER:A

Virus can destroy A. Hardware B. Software C. Data D. All of the mentioned ANSWER:C

______infects the master boot record of complex task to remove this virus. A. Boot Sector Virus B. Polymorphic C. Multipartite D. Trojans ANSWER:A

What is hyper terminal ? A. Hyper Terminal is a communications software to connect and transfer files between the two computers. B. It a media player C. It is a antivirous D. Something else Answer: A

What is Hypernet?

A. Hypernet is a parallel computing protocol

B. Takes advantage of idle computing power on a network of decentralized devices. C. Hypernet connects network of devices in order to reduce computing time. D. All of the mentioned Answer: D

Telnet is used for ______a) Television on b) Network of Telephones c) Remote Login d) Teleshopping site Ans: C

For which operating system, Absolute Telnet is a telnet client? a) windows b) linux c) mac d) ubuntu Ans: a

In which mode of telnet, the client echoes the character on the screen but does not send it until a whole line is completed? a) command mode c) character mode c) server mode d) default mode Ans: d

TeamViewer was founded in Goppingen, Germany in ______a)2004 b)2005 c)2006

d)2007

Ans: b

Which is a good way of flushing potentially sensitive information? a) Deleting b) Clearing History c) Clearing Cache d) None Answer: C

Who provides the path for enterprise mode site list to overcome compatibility issues? a) Enterprise mode site list path b) site list path c) Enterprise browser path d) Site path Answer: A

The purpose of a web browser? a) To fetch information resources from the Web and display them on a user's device. b) To fetch information resources from the Web. c) To delete the cookies d) None Answer: A

Is spam a type of virus? A. Yes B. No C. Just an unwanted email

D. none Answer: C

Which is the number one tool for filtering spam? A. SPAMfighter B. fighterSPAM C. VIRUSfighter D. fighterVIRUS Answer: A

What is another name for spambots? A. Spam spiders B. fighterSPAM C. VIRUSfighter D. fighterVIRUS Answer: A

There are ______major ways of spamming? A. 4 B. 3 C. 2 D. 5 Answer: B

Which of the following is not a type of spamming attack? a) Page-jacking b) Image spamming c) Spear phishing d) Blog & wiki spamming

Answer: C

What is populating the inbox of any targeted victim with junk emails? a) Phishing b) Spamming c) DoA d) DoS Answer: B

What is routing? A. A path for sending packets through one network to another network. B. The way of arranging the OSI model. C. The path defining the dropping of the packets. D. The path through which the network is accessed. Answer: A

How many types of routes are there? A. 1 B. 0. C. 5 D. 10 Answer: C

What is the route? A. A gateway that can forward packets to a specific host on another network. B. A gateway that can forward packets to any host on a specific network. C. A gateway that can forward packets from a specific host to a specific network. D. none

Answer: A

Which route’s IP is always 127.0.0.1? A. Broadcast route B. Default route C. Local route D. loopback route Answer: C

What kind of routing Is TCP/IP? A.Dynamic B.Static C. static and dynamic D. static or dynamic Answer: D

Which level do the gateways route at? A.Physical level B.Network-level C. Application-level D. Transport level Answer: B

If multiple matching routes have Equal distance which route is chosen? A.Most specific route B.Random route C. Both routes D. depending on IP address Answer: A

You must have______on the local device, or you must have the appropriate permissions to update a Object (GPO) on the domain controller to perform these procedures. A. Administrators rights B. User account C. User Details D. Something else Answer: A

When a local setting is inaccessible, it indicates that a ______currently controls that setting. A. User B. Guest User C. Group Policy Object (GPO) D. Something else Answer: C

To configure a setting using the Local Security Policy console, which file to run from start screen ? A. Security Settings B. Control Panel C. secpol.msc D. Something else Answer: C

Select the appropriate way to configure a security policy setting. A. Using the Local Security Policy console B. Using the Local Group Policy Editor console C. Using domain controller D. All of the mentioned

Answer: D

Why might you want to run SWAT? A. It provides name resolution using NetBIOS protocols. B. It provides Web-based GUI administration of a Samba server. C. Its run from the inetd or xinetd super server, unlike many servers. D. It helps to find and correct bugs in a wide variety of servers. ANSWER: C

What port should you block with a firewall if you want to limit access to a web server running on its standard port? A. TCP port 22 B. TCP port 25 C. TCP port 80 D. TCP port 901 ANSWER: D

Which servers might you consider retiring after activating an SSH server? A. SMTP B. Telnet C. FTP D. NFS ANSWER: a

For best SSH server security, how should you set the Protocol option in /etc/ssh/sshd_config? A. Protocol 1 B. Protocol 2 C. Protocol 1,2 D. Protocol 2,1

ANSWER: A

Which command changes a file’s group owner a) cgrp b) c) change d) group ANSWER: B

Which command is used to display disk consumption of a specific directory a) b) ds c) d) dds ANSWER: A

Which command creates an empty file if file does not exist? a) cat b) c) d) read ANSWER: B

Which option of rm command is used to remove a directory with all its subdirectories a) -b b) -o c) -p d) -r ANSWER: D

DHCP (dynamic host configuration protocol) provides ______to the client. A. IP address B. MAC address C. Url D. None of the mentioned ANSWER: A

DHCP is used for ______A. IPv6 B. IPv4 C. Both IPv6 and IPv4 D. None of the mentioned ANSWER: C

The DHCP server ______A. maintains a database of available IP addresses B. maintains the information about client configuration parameters C. grants a IP address when receives a request from a client D. all of the mentioned

ANSWER: D

IP assigned for a client by DHCP server is a) for a limited period b) for an unlimited period c) not time dependent d) none of the mentioned ANSWER: A

DHCP uses UDP port ______for sending data to the server. a) 66 b) 67 c) 68 d) 69 ANSWER: B

The DHCP server can provide the ______of the IP addresses. A. dynamic allocation B. automatic allocation C. static allocation D. all of the mentioned ANSWER: D

DHCP client and servers on the same subnet communicate via ______a) UDP broadcast b) UDP unicast c) TCP broadcast d) TCP unicast ANSWER: A

After obtaining the IP address, to prevent the IP conflict the client may use ______a) internet relay chat b) broader gateway protocol c) address resolution protocol d) none of the mentioned

ANSWER: C

What access rights are required for the /etc/shadow file? A. -r------B. -rw-rw-r-- C. -r--r----- D. -rwxr--r--

Answer: A

Which command will immediately shut down a computer running Linux? A. B. telinit 6 C. shutdown now D. telinit 0

Answer: D

Which command would give the owner and group of myfile the permissions of read and execute while all others have read access? A. chmod 003 myfile B. chmod 554 myfile C. chmod 331 myfile D. chmod 662 myfile

Answer: B

The PS1 environment variable is used to define which of the following? A. command path B. home directory C. shell prompt D. signature file

Answer: C

Which of the following directories is used to store system utilities used by the superuser? A. /etc B. /root C. /sbin D. /usr/local

Answer: C

Which of the following does authentication aim to accomplish? a. Restrict what operations/data the user can access b. Determine if the user is an attacker c. Flag the user if he/she misbehaves d. Determine who the user is ANSWER: D

Which of the following does authorization aim to accomplish? a. Restrict what operations/data the user can access b. Determine if the user is an attacker c. Flag the user if he/she misbehaves d. Determine who the user is ANSWER: A

Which of the following does authentication aim to accomplish? a. Restrict what operations/data the user can access b. Determine if the user is an attacker c. Flag the user if he/she misbehaves d. Determine who the user is

ANSWER: D

Which of the following does authorization aim to accomplish? a. Restrict what operations/data the user can access b. Determine if the user is an attacker c. Flag the user if he/she misbehaves d. Determine who the user is ANSWER: A

Which is not a valid file system? A. FAT 16 B. FAT 32 C. NTFS D. FXZ ANSWER: D

Which file system DOS typically use? A. FAT 16 B. FAT 32 C. NTFS D. LMFS ANSWER: A

The file system "NTFS" stands for A. New Type File System B. Never Terminated File System C. New Technology File System D. Non Terminated File System ANSWER: C

What is primarily required to achieve 56K modem speed? A. A modem capable of sending at 56K B. A software package capable of sending at 56K C. A cable modem D. A modem on both ends of the connection that can send and receive at 56K ANSWER: D

What type of transceivers do modems use? A. RJ-11 B. RJ-12 C. UTP D. RJ-45 ANSWER: D

You want to get information about DNS request types and DNS query packet content. What kind of DNS logging do you need to enable to get that information? A. DNS server log B. logging C. Analytic event logging D. DNS monitoring ANSWER: B

What security principal is assigned as the owner of les and folders created by the operating system? A. The Administrator account B. The Administrators group C. The SYSVOL special identity D. The SYSTEM special identity Ans: B

By default, members of which Active Directory groups can assign ownership of an NTFS le or folder to another user? A. Administrators, Backup Operators B. Administrators, Backup Operators, Server Operators C. Administrators, Server Operators D. Administrators, Backup Operators, Account Operators Ans: B

DHCP (dynamic host configuration protocol) provides ______to the client. A. IP address B. MAC address C. Url D. None of the mentioned ANSWER: A

The entire has a maximum of ______A. 255 characters B. 127 characters C. 63 characters D. 31 characters ANSWER: A

A DNS client is called ______A. DNS updater B. DNS resolver C. DNS handler D. none of the mentioned ANSWER: B

Which of the following is an authentication method? a. Secret question

b. Biometric c. Password d. All of the above ANSWER: D

Which of the following describes the first step in establishing an encrypted session using a Data Encryption Standard (DES) key? A. Key clustering B. Key compression C. Key signing D. Key exchange ANSWER: DWhich of the following is an authentication method? a. Secret question b. Biometric c. Password d. All of the above ANSWER: D

Which of the following describes the first step in establishing an encrypted session using a Data Encryption Standard (DES) key? A. Key clustering B. Key compression C. Key signing D. Key exchange ANSWER: DWhich of the following is an authentication method? a. Secret question b. Biometric c. Password d. All of the above ANSWER: D

Which of the following describes the first step in establishing an encrypted session using a Data Encryption Standard (DES) key? A. Key clustering B. Key compression C. Key signing D. Key exchange ANSWER: D

Which of the following is not a component of “chain oWhich of the following is an authentication method? a. Secret question b. Biometric c. Password d. All of the above ANSWER: D

Which of the following describes the first step in establishing an encrypted session using a Data Encryption Standard (DES) key? A. Key clustering B. Key compression C. Key signing D. Key exchange ANSWER: D

Which of the following is not a component of “chain of evidence”: A. Location evidence obtained. B. Time evidence obtained. C. Who discovered the evidence. D. Identification of person who left the evidence. ANSWER:D

Which of the following entity is ultimately responsible for information security within an organization? A. IT Security Officer B. Project Managers C. Department Directors D. Senior Management ANSWER: D

What type of cryptanalytic attack where an adversary has the least amount of information to work with? A. Known-plaintext B. Ciphertext-only C. Plaintext-only D. Chosen-ciphertext ANSWER:Bf evidence”: A. Location evidence obtained. B. Time evidence obtained. C. Who discovered the evidence. D. Identification of person who left the evidence. ANSWER:D

Which of the following entity is ultimately responsible for information security within an organization? A. IT Security Officer B. Project Managers C. Department Directors

D. Senior Management ANSWER: D

What type of cryptanalytic attack where an adversary has the least amount of information to work with? A. Known-plaintext B. Ciphertext-only C. Plaintext-only D. Chosen-ciphertext ANSWER:B

Which of the following is not a component of “chain of evidence”: A. Location evidence obtained. B. Time evidence obtained. C. Who discovered the evidence. D. Identification of person who left the evidence. ANSWER:D

Which of the following entity is ultimately responsible for information security within an organization? A. IT Security Officer B. Project Managers C. Department Directors D. Senior Management ANSWER: D

What type of cryptanalytic attack where an adversary has the least amount of

information to work with? A. Known-plaintext B. Ciphertext-only C. Plaintext-only D. Chosen-ciphertext ANSWER:B

Which of the following is not a component of “chain of evidence”: A. Location evidence obtained. B. Time evidence obtained. C. Who discovered the evidence. D. Identification of person who left the evidence. ANSWER:D

Which of the following entity is ultimately responsible for information security within an organization? A. IT Security Officer B. Project Managers C. Department Directors D. Senior Management ANSWER: D

What type of cryptanalytic attack where an adversary has the least amount of information to work with? A. Known-plaintext B. Ciphertext-only C. Plaintext-only D. Chosen-ciphertext

ANSWER:B Which of the following items is not used in Local Area Networks(LANs)? A. Computer Modem B. Cable C. Modem D. Interface card ANSWER: C

Which of the following represents the fastest data transmission speed? A. Gbps B. Kbps C. Bps D. Bandwidth ANSWER: A

A device that connects to a network with our the use of cables is said to be A. Open source B. Cabled C. Distributed D. Wireless ANSWER: D

WI–FI uses A. Phase line B. Radio waves C. Optic fiber D. Sound waves ANSWER: B

Filter port allows you to ______specific ports, displayed as rows.

A. Drop B. Configure C. Hide or display D. None of the mentioned ANSWER: C

A web server usually listes on Port Number: A. 90 B. 9 C. 80 D. Any random assigned port ANSWER: C

Why the ports should not be kept open in Linux Server: A. Open ports are connected to all folders. B. Open ports cause OS to hang. C. All of the mentioned. D. Open port can be used by attackers to exploit a vulnerability. ANSWER: D

What is the port assigned to Telnet by default? A. 23 B. 80 C. 13 D. 4 ANSWER: A

Telnet protocol allows you to connect to remote over ______network. A. Free B. Telnet

C. OS D. TCP/IP ANSWER: D

Which yum command can be used to install telnet A. yum install telnet-server B. yum install-telnet C. yum apt get install telnet D. None of the mentioned ANSWER: A

Which is the device that connects devices to create network? A. Switch B. Router C. Modem D. LAN ANSWER: A

What is the device that connects seperate network? A. Router B. Modem C. Internet D. Hub ANSWER: A

Unmanaged switch in network allows you to: A. Increase bandwidth B. Have greater control C. Immediately plug-and-play devices into your network D. Prioritiza channels

ANSWER: C

Which of the following is true for unmanaged switch: A. It allows for networking of Ethernet devices for data communication. B. Forward broadcasts C. No user configuration D. All are true ANSWER: D

The advantage to unmanaged switches when it comes to performance is that: A. You need to prioritize things B. There’s no need to set anything up C. Prioritze SNMP D. Troubeshoot the network ANSWER: B

Switches are the connectivity points of an ______network. A. Wifi B. WAN C. All D. Ethernet ANSWER: D

If you wanted to ping a host but also follow the path at which it pings, what would you use? A. ping B. ifconfig C. tracert D. lookup ANSWER: C

You want to find out the IP address of a hostname, like google.com, you should use... A. ping B. ifconfig C. tracert D. ANSWER: D

This cmd utility is used for remote server management. A. ping B. ifconfig C. telnet D. ssh ANSWER: C

These type of switches have many features like the highest levels of security, precision control and full management of the network: A. Router B. Managed Switch C. Unmanaged Switch D. None of the options ANSWER: B

Which of the following is not a feature of unmanaged switches: A. It has no concept of virtual LANs (VLANs). B. All devices belong to the same broadcast domain. C. Has defined user configuration. D. All of the mentioned. ANSWER: C

A managed switch:

A. Lets you adjust each port on the switch to any setting you desire. B. Doesnt allow to configure your network. C. No control over how data travels over the network. D. All are true ANSWER: A

When it comes to smaller networks, such as for small businesses then ______switch is more likely to be used. A. Managed B. Unmanaged C. Dual D. Fully controlled ANSWER: B

Unmanaged switches only allow ethernet devices to communicate over the network. A. False B. True ANSWER: B

NS-205 unmanaged switch has how many switching ports: A. 5 B. 3 C. 4 D. 7 ANSWER: A

A managed switch supports: A. Port Security B. Reduntant Ring fail over protection C. Port Mirroring D. Multicast VLAN

E. All are true ANSWER: E

Umanaged and managed switches are type of: A. Fixed Configuration B. Modular ANSWER: A

QOS(Quality of Service) is a feature of: A. Unmanaged Switches B. Managed Switches ANSWER: B

To configure managed switches: A. You can expand ports via WLAN B. You can use port based VLAN connection or configure via RS232 port C. You can restrict the numbers of ports via VLAN D. Disconnect DB9 Connector ANSWER: B

Port mirroring in managed switches helps: A. Supervisor monitoring network B. Mirror OS C. Mirror all the rights ANSWER: A

Managed Switches are used in: A. Data centre B. Small Enterprise C. Small Business

D. Home and Labs ANSWER: A

Which of this network is plug and play: A. Managed B. Unmanaged C. Auto D. Expandable ANSWER: B

To configure a Wireless Access Point: A. Register the hardware (MAC) address of the wireless card. B. Disable encryption C. Reroute the SSID D. Open network configuration and disable encryption. ANSWER: A

What WLAN device is installed in or attached to a PC to provide an interface to a wireless network? A. Network Adaptor B. Access Point C. Antenna D. Repeater ANSWER: A

A wireless extension to a wired network can eliminate the need for new ______to be installed. A. Cables B. Access Point C. Router D. Bridges

ANSWER: A

What is the acronym given to a wireless network defined into a specific area? A. WAN B. CAN C. WLAN D. LAN ANSWER: C

What is SSID? A. Stationary Set Identifier used to enter network. B. Service Set Identifier used to identify the network. C. Super Service Intermediator used to configure network D. Stationary Set Intermediator used to identify network ANSWER: B

Wireless Access Point (WAP): A. segmentation of users cannot be done. B. gives users less flexibility to stay online C. is complicated to add new users in the network. D. is easier to set up compared to setting up a wired network. ANSWER: D

The ______standard designates the radio frequencies used and wireless access points (WAPs) A. 801.17 B. 802.11 C. 800.19 D. 804.22 ANSWER: B

What is Broadband? A. It is device which can switch connection between two networks B. It is device that provides large bandwidth via DSL,cables or optics or satellite. C. It is device which multplies the frequency of your base network D. All are true ANSWER: B

Broadband includes several high-speed transmission technologies such as: A. DSL B. Cabel Modem C. Fiber D. Satellite E. All ANSWER: E

Broadbands are available as______: A. Wired and Wireless B. Wired C. Wireless D. Dual Network Mode ANSWER: A ifcofig command helps to: A. Configure system security B. Configure a network interface C. Configure wireless ports only D. Configure additional devices ANSWER: B

______is a tool used to perform DNS lookups in Linux.

A. dns B. lookup C. dnslookup D. nslookup ANSWER: D MEDIUM

Which standard govern parallel communications? A. RS232 B. RS-232a C. CAT 5 D. IEEE 1284 ANSWER: D

In laser printer technology, what happens during the conditioning stage? A. The corona wire places a uniform positive charge on the paper B. A uniform negative charge is placed on the photosensitive drum C. A uniform negative charge is placed on the toner D. All of the above ANSWER: B

What product is used to clean smudged keys on a keyboard? A. TMC solvent B. Silicone spray C. Denatured alcohol D. All-purpose cleaner ANSWER: D

The mouse pointer moves erratically, what is the possible cause? The mouse A. ball is dirty B. is not connected C. driver is not installed properly D. has an incorrect IRQ setting E. None of the above ANSWER: A

Voltage4s measured: A. in parallel B. in series

C. after breaking the circuit D. after checking resistance E. after checking current ANSWER: A

On the 16-bit ISA bus, IRQ2 is elevated to which higher level Interrupt? A. 9 B. 11 C. 13 D. 15 E. None of the above ANSWER: A

What beep codes could indicate a system board or power supply failure? A. steady short beep B. no beep C. one long continuous beep tone D. steady long beeps E. All of the above ANSWER: E

To view any currently running Terminate Stay Resident (TSR's) programs you could type: A. Memory B. MEM C. SYS /M D. Memmaker E. None of the above ANSWER: B

Which part of the laser printer should NOT be exposed to sunlight? A. Transfer corona assembly B. PC drum C. Primary corona wire D. Toner cartridge E. None of the above ANSWER: B

After doing a low-level format, what would be the next step in configuring the hard drive in a system? A. Format DOS partition B. Install operating system C. Configure DMA channel and back-up interrupt D. Partition had disk E. None of the above ANSWER: A

Resistance is measured in ? A. Volts B. Amps C. Watts D. Ohms E. None of the above ANSWER: D

When installing a SCSI CD-ROM drive, you must set the CD-ROM SCSI adapter to A. B0007 B. An unused SCSI address C. The same address as the SCSI device before the CD-ROM D. SCSI ID=1 E. None of the above ANSWER: B

During boot-up, the memory : A. Is a superfluous step that should be ignored B. Checks and verifies that contiguous memory is installed C. Is an operational error D. Displays what memory is installed, but nothing else E. None of the above ANSWER: B

What is the size of the reserved memory area? A. 64 kb B. 384 kb C. 640 kb D. 1024 kb E. None of the above ANSWER: B

What program runs first after computer is booted and loading GUI? A. Desktop Manager B. File Manager C. Windows Explorer D. Authentication ANSWER: D

Which of the following operating system do you choose to implement a client server network? A. MS DOS

B. Windows C. Windows 98 D. Windows 2000 ANSWER: D

A hardware networking device used to connect two LANs or LAN segment? A, Router B. Switch C. Telephone D. Modem ANSWER: B

Which of the following tasks can you not perform remotely on a server running Windows Server 2008? A. Install roles by using Server Manager B. Install roles by using Windows PowerShell C. Connect to the remote server by using the Computer Management snap-in D. Monitor event log entries ANSWER: D

When you run Server Manager from a Windows 8 workstation using Remote Server Administration Tools, which of the following elements do not appear in the default display? A.The Dashboard B.The Local Server home page C. The All Servers home page D.The Welcome tile ANSWER: B

Which of the following statements about Type I and Type II virtualization are true? (Choose all that apply.) A. In Type I virtualization, the hypervisor runs on top of a host OS. B. In Type I virtualization, the hypervisor runs directly on the computer hardware. C. In Type II virtualization, the hypervisor runs on top of a host OS. D. In Type II virtualization, the hypervisor runs directly on the computer hardware. ANSWER: B,C

Which of the following types of server virtualization provides the best performance for high-traffic servers in production environments? A.Type I virtualization B. Type II virtualization C. Presentation virtualization D. RemoteApp ANSWER: A

What does protocol defines?

A. Protocol defines what data is communicated. B. Protocol defines how data is communicated. C. Protocol defines when data is communicated. D. All of above ANSWER: D

Which of the following Microsoft operating systems includes a license that enables you to license an unlimited number of virtual instances? A. Hyper-V Server B. Windows Server 2012 R2 Datacenter C. Windows Server 2012 R2 Standard D. Windows Server 2012 R2 Foundation ANSWER: B

When you install the Hyper-V role on a server running Windows Server 2012 R2, the instance of the OS on which you installed the role is converted to what system element? A. The hypervisor B. The Virtual Machine Monitor C. The parent partition D. A child partition ANSWER: C

Which one is a 'text editor' for Microsoft Windows? A. MS Word B. Ms Excel C. WordPad D. Notepad ANSWER: D

Which one is the default 'Word Processor' for Microsoft Windows? A. MS Word B. Ms Paint C. WordPad D. Notepad ANSWER: C

From what location are the 1st computer instructions available on boot up? A. ROM BIOS B. CPU C. boot.ini D. CONFIG.SYS E. None of the above ANSWER: A

What could cause a fixed disk error.

A. No-CD installed B. bad ram C. slow processor D. Incorrect CMOS settings E. None of the above ANSWER: D

What is the maximum number of Primary Partitions that can be created on a Hard-disk? A. 1 B. 2 C. 3 D. 4 ANSWER: D

Which key combination is used to minimize all open windows and displays in the screen? A. Alt+M B. Shift+M C. Windows Key+D D. CTRL+D ANSWER: D

How many users can access a share folder simultaneously from a Windows XP machine? A. 8 B. 9 C. 10 D. Unlimited ANSWER: C

Which key combination is used to close a open application in Windows machine? A.Alt+F8 B. CTRL+X C .Alt+F4 D. Shift+P ANSWER: A

Total number of function keys in a computer keyboard? A. 10 B .12 C .14 D.16 ANSWER: B

Which one is the latest release of Windows Client Operating System? A. Windows XP B. Windows 7 C. Windows 8 D. Windows 10 ANSWER: D

Which function key needs to be press during reboot to enter in Safe Mode of a Windows machine? A. F8 B. F2 C. F1 D. F9 ANSWER: A

Which key combination is used to permanently delete a file or folder? A. Shift+delete B. Alt+delete C. CTRL+delete D. DeleteView Answer ANSWER: A

Which is an Input device? A. Monitor B. Printer C. Mouse D. None of the above ANSWER: C

Which one is an example of connectionless protocols? A. TCP B. IPX/SPX C. Frame Relay D. UDP ANSWER: D

A common boundary between two computer systems is known as A. Intradiction B. Surface C. Interface D. None of the above ANSWER : C

Which one of the following is not a computer language? A. BASIC B. LOTUS C. C++ D. JAVA ANSWER : B

Which one is used for making presentation file from Microsoft Office package? A. MS Outlook B. MS Excel C. MS Word D. MS Powerpoint ANSWER : D

Network Interface Card (NIC) is generally used for? A. Connectivity B. Programming C. Printing D. Deleting ANSWER : A

Which web browser is provided default with a Windows machine? A. Opera B. IE C. Chrome D. Mosaic ANSWER : B

Which company bought the popular video teleconferencing software 'Skype'? A. Google B. Accenture C. Oracle D. Microsoft ANSWER : D

Which one is used for making presentation file from Microsoft Office package A. MS Outlook B. MS Excel C. MS Word D. MS Powerpoint ANSWER : D

______folder contains the recently viewed Web pages content A. Explorer B. History C. Temporary Internet Files

D. Windows

ANSWER : (C)

Which of the following does not support more than one program at a time? A. DOS B. Linux C. Windows D. Unix ANSWER: A

Which of the following is not an operating system? A. DOS B. Linux C. Windows D. Oracle ANSWER: D

Which of the following tasks can you not perform remotely on a server running Windows Server 2008? A. Install roles by using Server Manager B. Install roles by using Windows PowerShell C. Connect to the remote server by using the Computer Management snap-in D. Monitor event log entries ANSWER: D

When you run Server Manager from a Windows 8 workstation using Remote Server Administration Tools, which of the following elements do not appear in the default display? A. The Dashboard B. The Local Server home page C. The All Servers home page D. The Welcome tile ANSWER: B

Which of the following statements about Type I and Type II virtualization are true? (Choose all that apply.) A. In Type I virtualization, the hypervisor runs on top of a host OS. B. In Type I virtualization, the hypervisor runs directly on the computer hardware. C. In Type II virtualization, the hypervisor runs on top of a host OS. D. In Type II virtualization, the hypervisor runs directly on the computer hardware. ANSWER: B,C

Which of the following types of server virtualization provides the best performance for high-traffic servers in production environments? A.Type I virtualization

B. Type II virtualization C. Presentation virtualization D. RemoteApp ANSWER: A

What does protocol defines? A. Protocol defines what data is communicated. B. Protocol defines how data is communicated. C. Protocol defines when data is communicated. D. All of above ANSWER: D

Which of the following Microsoft operating systems includes a license that enables you to license an unlimited number of virtual instances? A.Hyper-V Server B. Windows Server 2012 R2 Datacenter C. Windows Server 2012 R2 Standard D. Windows Server 2012 R2 Foundation ANSWER: B

When you install the Hyper-V role on a server running Windows Server 2012 R2, the instance of the OS on which you installed the role is converted to what system element? A. The hypervisor B. The Virtual Machine Monitor C.The parent partition D.A child partition ANSWER: C

Which one is a 'text editor' for Microsoft Windows? A. MS Word B. Ms Excel C. WordPad D. Notepad ANSWER: D

Which one is the default 'Word Processor' for Microsoft Windows? A. MS Word B. Ms Paint C. WordPad D. Notepad ANSWER: C

From what location are the 1st computer instructions available on boot up? A. ROM BIOS B. CPU

C. boot.ini D. CONFIG.SYS E. None of the above ANSWER : A

What could cause a fixed disk error. A. No-CD installed B. bad ram C. slow processor D. Incorrect CMOS settings E. None of the above ANSWER: D

What is the maximum number of Primary Partitions that can be created on a Hard-disk? A. 1 B. 2 C. 3 D. 4 ANSWER: D

Which key combination is used to minimize all open windows and displays in the screen? A. Alt+M B. Shift+M C. Windows Key+D D. CTRL+D

ANSWER : D

How many users can access a share folder simultaneously from a Windows XP machine? A. 8 B. 9 C. 10 D. Unlimited ANSWER : C

If there are multiple recycle bin for a hard disk A. you can set different size for each recycle bin B. you can choose which recycle bin to use to store your deleted files C. You can make any one of them default recycle bin D. None of above ANSWER: A

Identify false statement

A. You can find deleted files in recycle bin B. You can restore any files in recycle bin if you ever need C. You can increase free space of disk by sending files in recycle bin D. You can right click and choose Empty Recycle Bin to clean it at once ANSWER: C

If the displayed and date is wrong, you can reset it using A. Write B. Calendar C. Write file D. Control panel ANSWER: D

You should save your computer from? A. Viruses B. Time bombs C. Worms D. All of the above ANSWER: D

World Wide Web is being standard by A. Worldwide corporation B. W3C C. World Wide Consortium D. World Wide Web Standard ANSWER: B

A co-processor A. Is relatively easy to support in software B. Causes all processor to function equally C. Works with any application D. Is quite common in modern computer ANSWER: A

A Microsoft Windows is ..... a(n) A. Operating system B. Graphic program C. Word Processing D. Database program ANSWER: A

Which of the following is program group? A. Accessories B. Paint

C. Word D. All of above ANSWER: A

Which is not application software? A. Windows NT B. Page Maker C. WinWord XP D. Photoshop ANSWER: A

The ..... program compresses large files into a smaller file A. WinZip B. WinShrink C. WinStyle D. None of above ANSWER: A

Which of the following is an example of a real time operating system? A. Lynx B. MS DOS C. Windows XP D. Process Control ANSWER: D

Which of the following operating system does not implement the multitasking truly? A. Windows 98 B. Windows NT C. Windows XP D. MS DOS ANSWER: D

Which of the following windows version support 64 bit processor? A. Windows 98 B. Windows 2000 C. Windows XP D. Windows 95 ANSWER: A

Which of the following Operating System does not implement multitasking truly? A. Windows 98 B. Windows NT C. Windows XP

D. MS DOS ANSWER: D

What p-rogram runs first after computer is booted and loading GUI? A. Desktop Manager B. File Manager C. Windows Explorer D. Authentication

ANSWER: D

Which of the following operating system do you choose to implement a client server network? A. MS DOS B. Windows C. Windows 98 D. Windows 2000 ANSWER: D

Which of the following Operating systems is better for implementing a Client- Server network A. MS DOS B. Windows 95 C. Windows 98 D. Windows 2000 ANSWER: D

My Computer was introduced from A. Windows 3.1 B. Windows 3.11 C. Windows 95 D. Windows 98 ANSWER:D

Which of the following Windows do not have Start button A. Windows Vista B. Windows 7 C. Windows 8 D. None of above ANSWER: C

Which is the latest version of MS Windows? A. Windows 2007 B. Windows 8.1 C. Windows 2008 D. Windows 7

ANSWER: C

Which operating system doesn't support networking between computers? A. Windows 3.1 B. Windows 95 C. Windows 2000 D. Windows NT ANSWER: B

Which Operating System doesn't support networking between computers? A. Windows 3.1 B. Windows 95 C. Windows 2000 D. Windows NT ANSWER: A

Which of the following does not support more than one program at a time? A. DOS B. Linux C. Windows D. Unix ANSWER: A

Which of the following is not an operating system? A. DOS B. Linux C. Windows D. Oracle ANSWER: A

Linux is a(n) ... operating system A. Open source B. Microsoft C. Windows D. Mac ANSWER: A

Which operating system can you give smallest file name? A. Ps/2 B. Dos C. Windows D. Windows NT ANSWER: B

Which one is not operating system? A. P11

B. OS/2 C. Windows D. Unix ANSWER: A

Which of the following is not a multitasking operating system? A. Windows B. Linux C. Win NT D. DOS ANSWER: D

You should choose Sleep option when A. The computer is tired after working for the whole day B. You are leaving for a very short time and want to resume you work shortly C. When computer gets hanged frequently. Let it sleep for some time D. You finish working and going to bed ANSWER: B

The .... displays the name of every computer user on the computer A. Wish list screen B. Command screen C. Welcome screen D. None of the above ANSWER: C

The category of software most appropriate for controlling the design and layout of complex document like newsletters and brochure is: A. Word processing B. Computer aided design C. Web page authoring D. Desktop publishing ANSWER: A

Which one is not a system tool? A. Backup B. Disk defragment C. Virus scanning D. All of the above ANSWER: C

The memory which allocates space for DOS and application is called A. Expanded memory B. Cache memory C. Virtual memory D. Conventional memory

ANSWER: D

The operating system creates ... from the physical computer A. Virtual space B. Virtual computer C. Virtual device D. None ANSWER: B

The operating system creates _____ from the physical computer A. Virtual space B. Virtual computers C. Virtual device D. None ANSWER: B

Which menu bar selection would you access to open file? A. Option B. Help C. View D. None of above ANSWER: D

Which mode loads minimal set of drivers when starting Windows? A. Safe Mode B. Normal Mode C. VGA Mode D. Network Support Mode ANSWER: A

Which of the following are loaded in safe mode? A. Keyboard driver B. Mouse driver C. VGA drive D. All of above ANSWER: D

A .... is a named location on a disk where files are stored A. Folder B. Pod C. Version D. None of the above ANSWER: A

Which command is used to see the version of operating system? A. B. Version C. Ver D. None of the above ANSWER: C

102. Which type of command requires additional files to perform specific operations? A. Internal commands B. External commands C. Valuable commands D. Primary commands ANSWER: B

Which of the following is system software? A. Operating system B. Compiler C. Utilities D. All of the above ANSWER: D

A user-interface that is easy to use is considered to be A. User-happy B. User-simple C. User-friendly D. None of the above ANSWER

A ....is a flash memory storage device that plugins into a USB port A. USB snap drive B. USB flash drive C. USB memory maker drive D. None of above ANSWER

The ....is the drive containing the files to be copied A. Source drive B. Destination drive C. USB drive D. None of the above ANSWER

The number of character contained in primary name (DOS)? A Up to 8 characters B. 3 characters C. Up to 10 characters D. None of the above ANSWER

Which one of the following is not a multitasking operating system? A. DOS B. Windows C. Unix D. Linux ANSWER

The most recent version of MAC OS is based on the ... operating system A. Windows B. Linux C. Unix D. CMOS ANSWER

The ... operating system was initially created in the early 1970s at AT and T's Bell Labs A. Linux B. DOS C. Unix D. GNU ANSWER

Which command is used to undelete a bunch of files with extension .doc that you have just deleted? A. Undelete B. Undelete/all C. Undelete *.doc D. All of above ANSWER

Which command is used to display the contents of the text file of DOS? A. Copy con B. Copy C. Type D. Dir ANSWER

In Windows, start button is used to A. Run applications

B. Device setting C. Turn off the system D. All of above ANSWER

Which of the following is an essential file of a MS-DOS boot disk? A. COMMAND.COM B. START.COM C. .COM D. VER.COM ANSWER

Which one is true for unconditional disk formatting? A. Destroys every byte of data on a disk by overwriting it with with blank spaces B. Do not check/scan surface after format C. Transfer system files after format D. All of above ANSWER

Once text has been to the , you can .....that text into another document A. B. Copy C. Transfer D. None of the above ANSWER

What is the function of radio button? A. To select multiple option B. To select single option C. To select all option D. All of above ANSWER

The Banker's algorithm is used A. to rectify deadlock B. to detect deadlock C. to prevent deadlock D. to slove deadlock ANSWER

The primary purpose of an operating system is: A. To make the most efficient use of the computer hardware B. To allow people to use the computer, C. To keep systems programmers employed D. To make computers easier to use

ANSWER

The primary purpose of an operating system is a ... A. To make the most efficient use of computer hardware B. To allow people to use the computer C. To keep system programmer employed D. To make computer easier to use ANSWER

You can use manage window A. To check status of files in the print queue B. To cancel the print job C. To interrupt printing D. All of the above ANSWER

Which of the following operating system reads and reacts in actual time? A. Quick Response System B. Real Time System C. Time Sharing System D. Batch Processing System ANSWER

All of the following are TRUE regarding virtual memory EXCEPT A. Any amount of RAM can be allocated to virtual memory B. The setting for the amount of hard disk drive space to allocate virtual memory can be manually change C. This temporary storage is called the swap file or page file D. Virtual memory is the physical space o the hard drive ANSWER

The essential difference between an operating system like Linux and one like Windows is that A. Windows can run with an Intel processor, whereas Linux cannot B. Linux is a proprietary whereas Windows is not C. There are multiple versions of Linux, but only one version of Windows D. Any programmer can modify Linux code which is not permitted with Windows ANSWER

What is dispatch latency? A. The time taken by the dispatcher to stop one process and start another B. The time taken by the processor to write a file into disk C. The whole time taken by all processor D. None of Above

A page fault occurs when

A. the Deadlock happens B. the Segmentation starts C. the page is found in the memory D. the page is not found in the memory ANSWER

Whenever you a directory from one location to another A. All files inside the directory are moved B. All the subdirectory inside that directory are moved C. The directory is moved the source file is not moved D. Both a and b ANSWER

The Basic Input Output System (BIOS) resides in A. RAM B. ROM C. The CPU D. Memory Cache

ANSWER

Which of the following does not occur during the power-on-selftest (POST)? A. The scandisk utility begins to run B. The video card and video memory are tested D. The BIOS identification process occurs D. Memory chip are checked to ensure that they are working properly ANSWER

The maximum size of a write file is limited to only A. Name of the file B. Extension of the file C. The amount of memory in your computer D. All of above ANSWER

Which of the following is drop down list? A. List B. Combo box C. Text area D. None ANSWER

Recently deleted files are stored in A. Recycle bin B. Desktop C. Taskbar

D. My computer ANSWER

Which components appear in the initial Windows start up display? A. Dialog boxes B. Start menu C. Taskbar D. All of above

A small part of taskbar that has icons of background running applications is A. Start button B. Quick launch C. Task bar D. System tray

An operating system version designed for use with a media center PC is Microsoft Windows XP A. Home edition B. Media center edition C. Tablet PC edition D. None of above ANSWER

An operating system version designed for use with a tablet PC is Microsoft Windows XP A. Home edition B. Media center edition C. Tablet PC edition D. None of the above ANSWER

The date and time displays on A. Taskbar B. Status bar C. System tray D. Launch pad ANSWER

.... runs on a computer hardware and serves as a platform for other system to run on A. Operating system B. Application system C. System software D. All of above

ANSWER

Which runs on computer hardware and serve as platform for other software to run on? A. Operating System B. Application Software C. System Software D. All ANSWER

... is the program run on a computer when the computer boots up A. System software B. Operating system C. System operations D. None

Which is the first program run on a computer when the computer boots up? A. System software B. Operating system C. System operations D None ANSWER

The ....contains commands associated with the My Computer window A. Standard menu B. Start menu C. System menu D. None of the above

ANSWER

Which standard govern parallel communications? A. RS232 B. RS-232a C. CAT 5 D. IEEE 1284 ANSWER: D

In laser printer technology, what happens during the conditioning stage? A. The corona wire places a uniform positive charge on the paper B. A uniform negative charge is placed on the photosensitive drum C. A uniform negative charge is placed on the toner D. All of the above ANSWER: B

What product is used to clean smudged keys on a keyboard?

A. TMC solvent B. Silicone spray C. Denatured alcohol D. All-purpose cleaner ANSWER: D

The mouse pointer moves erratically, what is the possible cause? The mouse A. ball is dirty B. is not connected C. driver is not installed properly D. has an incorrect IRQ setting E. None of the above ANSWER: A

Oltage4s measured: A. in parallel B. in series C. after breaking the circuit D. after checking resistance E. after checking current ANSWER: A

On the 16-bit ISA bus, IRQ2 is elevated to which higher level Interrupt? A. 9 B. 11 C. 13 D. 15 E. None of the above ANSWER: A

What beep codes could indicate a system board or power supply failure? A. steady short beep B. no beep C. one long continuous beep tone D. steady long beeps E. All of the above ANSWER: E

To view any currently running Terminate Stay Resident (TSR's) programs you could type: A. Memory B. MEM C. SYS /M D. Memmaker E. None of the above ANSWER: B

Which part of the laser printer should NOT be exposed to sunlight? A. Transfer corona assembly B. PC drum C. Primary corona wire D. Toner cartridge E. None of the above ANSWER: B

After doing a low-level format, what would be the next step in configuring the hard drive in a system? A. Format DOS partition B. Install operating system C. Configure DMA channel and back-up interrupt D. Partition had disk E. None of the above ANSWER: A

Resistance is measured in ? A. Volts B. Amps C. Watts D. Ohms E. None of the above ANSWER: D

When installing a SCSI CD-ROM drive, you must set the CD-ROM SCSI adapter to: A. B0007 B. An unused SCSI address C. The same address as the SCSI device before the CD-ROM D. SCSI ID=1 E. None of the above ANSWER: B

During boot-up, the memory test: A. Is a superfluous step that should be ignored B. Checks and verifies that contiguous memory is installed C. Is an operational error D. Displays what memory is installed, but nothing else E. None of the above ANSWER: B

What is the size of the reserved memory area? A. 64 kb B. 384 kb

C. 640 kb D. 1024 kb E. None of the above ANSWER: B

What program runs first after computer is booted and loading GUI? A. Desktop Manager B. File Manager C. Windows Explorer D. Authentication ANSWER: D

Which of the following operating system do you choose to implement a client server network? A. MS DOS B. Windows C. Windows 98 D. Windows 2000 ANSWER: D

A hardware networking device used to connect two LANs or LAN segment? A, Router B. Switch C. Telephone D. Modem ANSWER: B

Which of the following tasks can you not perform remotely on a server running Windows Server 2008? A. Install roles by using Server Manager B. Install roles by using Windows PowerShell C. Connect to the remote server by using the Computer Management snap-in D. Monitor event log entries ANSWER: D

When you run Server Manager from a Windows 8 workstation using Remote Server Administration Tools, which of the following elements do not appear in the default display? A. The Dashboard B. The Local Server home page C. The All Servers home page D. The Welcome tile ANSWER: B

Which of the following statements about Type I and Type II virtualization are true? (Choose all that apply.)

A. In Type I virtualization, the hypervisor runs on top of a host OS. B. In Type I virtualization, the hypervisor runs directly on the computer hardware. C. In Type II virtualization, the hypervisor runs on top of a host OS. D. In Type II virtualization, the hypervisor runs directly on the computer hardware. ANSWER: B,C

Which of the following types of server virtualization provides the best performance for high-traffic servers in production environments? A. Type I virtualization B. Type II virtualization C. Presentation virtualization D. RemoteApp ANSWER: A

What does protocol defines? A. Protocol defines what data is communicated. B. Protocol defines how data is communicated. C. Protocol defines when data is communicated. D. All of above ANSWER: D

Which of the following Microsoft operating systems includes a license that enables you to license an unlimited number of virtual instances? A. Hyper-V Server B. Windows Server 2012 R2 Datacenter C. Windows Server 2012 R2 Standard D. Windows Server 2012 R2 Foundation ANSWER: B

When you install the Hyper-V role on a server running Windows Server 2012 R2, the instance of the OS on which you installed the role is converted to what system element? A. The hypervisor B. The Virtual Machine Monitor C. The parent partition D. A child partition ANSWER: C

Which one is a 'text editor' for Microsoft Windows? A. MS Word B. Ms Excel C. WordPad D. Notepad ANSWER : D

Which one is the default 'Word Processor' for Microsoft Windows? A. MS Word B. Ms Paint C. WordPad D. Notepad

ANSWER : C

Types of malware is? A. Caterpillars B. Worms C. Lions D. Horses ANSWER:B

Firewalls are used to ______A. virus attacks B. fire attacks C. unauthorised access D. data driven attacks ANSWER:C

Which one Not a linux distribution? A. debian B. gentoo C. open SUSE D. multicsr ANSWER:D

_____are computer programs that are designed by attackers to gain root access to your computer A. Backdoors B. Rootkits C. Malware D. Spyware ANSWER:B

Computer management steps is A. Have Protection,Before Connecting,Be Skeptical,Be Prepared B. Before Connecting,Have Protection,Be Prepared,Be Skeptical C. Before Connecting,Be Prepared,Have Protection,Be Skeptical D. Be Prepared,Before Connecting,Be Skeptical,Have Protection ANSWER:B

Antivirus software is an example of______A. business software

B. an operating system C. a security utility D. An office suite ANSWER:C

Which of the following self-replicating software that causes damages to file and system? A. Viruses B. Trojan horses C. Bots D. Worms ANSWER:D

The altering of data so that it is not usable unless the changes are undone is A. biometrics B. encryption C. ergonomics D. compression ANSWER:B

VIRUS stands for A. Very Intelligent Result Until Source B. Vital Information Resource Under Slege C. Viral Important Record User Searched D. Very Interchanged Resource Under Search ANSWER:B

______are used in DOS attacks,against targeted web sites. A. Trojan horse B. Zombie C. Worm D. Virus ANSWER:B

A strong password should contain these are A. Both uppercase and lowercase letters. B. A word that is easy to remember, such as the name of a pet. C. At least 8 characters, and a combination of letters, numbers, and characters. D. None of the mentioned ANSWER:C

What is the first boot sector virus? A. Brain B. Mind C. ELK cloner D. None of the mentioned

ANSWER:A

Which of the following retains the information it’s storing when the power to the system is turned off? A. ALU B. ROM C. RAM D. DROM ANSWER:B

Which one provide command interpreter environment? A. Kernel B. Shell C. CELL D. Hardware ANSWER:B

The taskbar located in the windows______- A. On the start menu B. At the bottom of the screen C. On the quick launch toolbar D. at the top of the screen ANSWER:B

Date and Time are available on the desktop at A. Key board B. recycle Bin C. My computer D. Task bar ANSWER:D

What is the full form of CLI? A. Command line interline B. Command line interface C. Command line interaction D. Command line interchange ANSWER:B

The computer administrative tools is called A. Control panel B. Start button C. Internet explorer D. Recycle bin ANSWER:A

Elements is used to manage files & folders is

A. Control panel B. Windows C. Window explorer D. Internet explorer ANSWER:C

Pressing and releasing the left mouse button quickly is called______A. clicking B. dropping C. pointing D. dragging ANSWER:A

Software can be removed from______A. control panel B. installer C. debugger D. linker ANSWER:A

How many ways you can save a document in Word? A. 1 B. 3 C. 2 D. All the mentioned ANSWER:B

Graphics Application in windows named is______A. Brush B. Notepad C. paint D. Fill ANSWER:C

The distance between lines in a paragraph is called______. A. Spacing B. Word Spacing C. Line Spacing D. Row Spacing ANSWER:C

Which of the following is an example of open source software? A. Adobe Photoshop B. Microsoft Word C. Libre Office D. Skype

ANSWER:C

Shortcut key used in Word select all files A. Ctrl+S B. Ctrl+Alt+Delete C. Ctrl+N D. Ctrl+A ANSWER:D

Watermark uses of word document is______A. Text B. Image C. Both A & B D. None of the mentioned ANSWER:C

Which item is printed at the TOP of each page A. Header B. Foot Note C. D. Footer ANSWER:A

Home Key helps of A. Moves the cursor beginning of the document B. Moves the cursor beginning of the paragraph C. Moves the cursor beginning of the screen D. Moves the cursor beginning of the line ANSWER:D

Shortcutkey for A. Ctrl+J B. Ctrl+F C. Ctrl+H D. Ctrl+X ANSWER:C

Not a part of main impress window is? A. Slides pane B. Workspace C. Work pane D. Task pane ANSWER:B

A tool used to put in cross-head screws. A. Phillips head screwdriver

B. Architect ruler C. Flathead screwdriver D. Ball peen hammer ANSWER: A ______is a type of tweezer. A. Diamond point B. Pointed slant C. Flathead D. Torx ANSWER: B

Which of the following is NOT a type of pliers. A. Electronic B. Pump C. Flush cutter D. Square ANSWER: D

A computer program which is designed to help people perform an activity using the computer. A. Internet B. Application C. Hardware D. Software ANSWER: B

In a computer, ALU can perform A. Addition B. Subtraction C. Multiplication D. All of the mentioned ANSWER: D

Combination of Arithmetic Logic Unit and Control Unit results in a A. Arithmetic Control Unit B. Control Processing Unit C. Central Processing Unit D. Central Control Logic Unit ANSWER: C

The two kinds of main memory in a computer are A. Primary and Secondary B. All of the mentioned C. Random and Sequential D. RAM and ROM ANSWER: B

All the parts of the computers are connected to this part and this allows all the part of the computer to work together A. Operating System B. Disk Drive C. Output Device D. Motherboard ANSWER: D

RAM is an example of secondary memory in a computer. A. True B. False ANSWER: B

Default pointing device in a laptop is called A. Mouse B. Keyboard C. Touchpad D. Tap-pad ANSWER: C

This part stores programs and other information on 2 or more disks that are located inside the computer A. Motherboard B. Hard drive C. CPU D. Operating System ANSWER: B

______keys are present on the top row of the keyboard. A. Function B. Typewriter C. Numeric D. Navigation ANSWER: A

Where is the recovery drive of a Windows stored? A. RAM B. ROM C. Hard Drive D. External Drive like a USB or DVD ANSWER: D

You suspect that your system is failing to boot because of a corrupt master boot record. Which utility is the best to fix this? A. Device Manager

B. Task Manager C. D. Automated System Restore ANSWER: C

Your PC has no video. Which of the following is LEAST likely the cause of the problem? A. Defective RAM B. Defective Microprocessor C. Loose Video Card D. Crashed Hard drive ANSWER: D

You suspect that a virus has entered your PC. What will not be affected by the virus? A. Program Files B. Boot sector C. CD in the CD-Drive D. CMOS ANSWER: D

Every video card must have a A. Control Unit B. ROM C. RAM D. All of the mentioned ANSWER: C

Which of the following should be used to extinguish a computer fire? A. Fire hose B. Class A extinguisher C. Class C extinguisher D. Silver Foam Water ANSWER: C

There is no communication between the network and the Workstation you just installed on an Ethernet LAN. What should you do first? A. Reinstall the network protocols B. Reinstall the network interface card drivers C. Verify the IP configuration on the computer D. Verify the link status on the computer’s network card ANSWER: D

If the boot-up process of a PC halts and the message - “Non-System disk or disk error.... Replace and press any key when ready” appears, the problem might be A. A non-bootable CD is in the CD-Drive and you should remove it B. The hard drive has failed and you should replace it

C. RAM has failed and you should remove it D. A key on the keyboard is stuck and you should replace the keyboard ANSWER: A

Which of the following can occur because of missing slot covers in a computer? A. Overheat B. Power surges C. Electromagnetic Interference D. Incomplete path for Electrostatic Discharge ANSWER: A

Which of the following standards govern parallel communications? A. RS-232 B. RS-232a C. CAT 5 D. IEEE 1284From the following choose the option which is NOT system software. A. MS Office B. Language translator C. Navigator D. Utility ANSWER: A

Installation of software in a computer means A. only copying the software in the computer B. making the software ready for execution C. downloading the software from the internet D. running a drive containing the software ANSWER: B

What part of the computer can be used on its own? A. Hardware B. Software C. Firmware D. None of the mentioned ANSWER: D

If a program is being executed, we call it a ______A. Task B. Instance C. Instruction D. Process ANSWER: D

Who takes care of running and loading programs by use of peripherals? A. Operating System B. Control System

C. Dump programs D. Function System ANSWER: A

Choose the correct statement from the following. A. Software is a collection of programs B. A program is a collection of software C. There is no relation between software and program D. Software becomes a program after installation ANSWER: A

Uninstalling an application can be done only by removing the program folder. A. True B. False ANSWER: B

System software helps the user, application software, and hardware to interact and function together. A. True B. False ANSWER: A ANSWER: D

What beep codes may indicate a system board or power supply failure? A. No beep B. Continuous beep C. Steady long beeps D. All of the mentioned ANSWER: D

What are physical ports on a computer usually referred to as? A. Buses B. Jacks C. Interfaces D. Hardware plugs ANSWER: C

Which of the following can be transferred over HDMI cable? A. Video B. Sound C. Video and Sound D. Neither Video nor Sound ANSWER: C

Which type of connector is mostly used these days to connect to network cards?

A. BNC B. 6 pin C. RJ-11 D. RJ-45 ANSWER: D

From the following choose the option which is NOT system software. A. MS Office B. Language translator C. Navigator D. Utility ANSWER: A

Installation of software in a computer means A. only copying the software in the computer B. making the software ready for execution C. downloading the software from the internet D. running a drive containing the software ANSWER: B

What part of the computer can be used on its own? A. Hardware B. Software C. Firmware D. None of the mentioned ANSWER: D

If a program is being executed, we call it a ______A. Task B. Instance C. Instruction D. Process ANSWER: D

Who takes care of running and loading programs by use of peripherals? A. Operating System B. Control System C. Dump programs D. Function System ANSWER: A

Choose the correct statement from the following. A. Software is a collection of programs B. A program is a collection of software C. There is no relation between software and program D. Software becomes a program after installation

ANSWER: A

Uninstalling an application can be done only by removing the program folder. A. True B. False ANSWER: B

System software helps the user, application software, and hardware to interact and function together. A. True B. FaFrom the following choose the option which is NOT system software. A. MS Office B. Language translator C. Navigator D. Utility ANSWER: A

Installation of software in a computer means A. only copying the software in the computer B. making the software ready for execution C. downloading the software from the internet D. running a drive containing the software ANSWER: B

What part of the computer can be used on its own? A. Hardware B. Software C. Firmware D. None of the mentioned ANSWER: D

If a program is being executed, we call it a ______A. Task B. Instance C. Instruction D. Process ANSWER: D

Who takes care of running and loading programs by use of peripherals? A. Operating System B. Control System C. Dump programs D. Function System ANSWER: A

Choose the correct statement from the following. A. Software is a collection of programs B. A program is a collection of software C. There is no relation between software and program D. Software becomes a program after installation ANSWER: A

Uninstalling an application can be done only by removing the program folder. A. True B. False ANSWER: B

System software helps the user, application software, and hardware to interact and function together. A. True B. False ANSWER: Alse ANSWER: A

Copying a process from memory to disk to allow space for other processes is A. Swapping B. Deadlock C. Demand Paging D. Page Fault ANSWER:A

Which command is used to provide access to program located in other directory? A. Tree B. Path C. Directory D. CD ANSWER:D

Which is not a System tool? A. Files B. Backup C. Scandisk D. Format ANSWER:A

Dir/W is A. Show all details of file B. Show only file name and directory name C. Shows only directory D. All of the mentioned

ANSWER:B

Which command are used to delete files on a linux? A. B. expunge C. rm D. delete ANSWER:C

Valid permission in the linux system is______A. Write B. Full control C. Modify D. Change ANSWER:A

FAT Stands for A. File Accomodation Table B. File Access Tape C. File Allocation Table D. File Activity Table ANSWER:C

Which of the following directory contains configuration files? A. /dev/ B. /etc/ C. /bin/ D. /root/ ANSWER:B

Which command will show the configuration details of a wireless connection in Linux? A. B. ipconfig C. iwconfig D. ifconfig ANSWER: C

What type of file system is used in most modern Linux Operating Systems? A. FAT32 B. FAT16 C. NTFS D. EXT4 ANSWER: D

What is the difference between touch and cat command?

A. cat command is used to create the file with content whereas touch command is used to create a file without any content. B. touch command is used to create the file with content whereas cat command is used to create a file without any content. C. cat command is used to create the folder with content whereas touch command is used to create a folder without any content. D. touch command is used to create the file with content whereas cat command is used to create a folder without any content. ANSWER: A

Which command on Debian/ubuntu based Linux platform gives root permissions for other commands? A. sudo B. grep C. aptitude D. apt-get ANSWER: A

Some software in linux is assembled using other programs in order to use.this is called: A. Creating B. Initiating C. Compiling D. Programming ANSWER: C

Linux and Windows share folders and printers via A. Lambada B. Samba C. Reggaeton D. Rumba ANSWER: B

Linux has configuration files stored in one folder.What is the folder name? A. etc B. var C. bin D. home ANSWER: A

Evaluates the bash order of evalution to determine the first instance to the given command A. type B. which-a C. which D. hash

ANSWER: A

Which will return a value of 9: A. $[[4+5]] B. echo $((4+5)) C. echo [4+5] D. echo "4+5" ANSWER: B

Syntax used to get the following permissions -rwxrw-rw- A. chmod 744 B. chmod 766 C. chmod 777 D. chmod 754 ANSWER: B

Which program provides user access to delete files in Windows OS? A. Window Manager B. Window Explorer C. Internet Explorer D. Start Menu ANSWER: B

Window task bar shows which programs are currently running on the computer A. True B. False ANSWER: A

Adding new peripherals(hardware) to your computer often requires what software to allow Windows to communicate with the new hardware? A. Application Software B. Driver C. Passenger D. Installers ANSWER: B

What program shows the user how much free space remains on their hard drive? A. Window Explorer B. Window Manager C. Internet Explorer D. Task Managment ANSWER: A

Windows displays three icons on the top right window of an application.The icon appear in the form of a dash,square, and an x.What function below occurs after clicking the square?

A. Program is Maximized B. Program is Minimized C. Program is deleted D. Program reboots ANSWER: A

Who invented spam? a) Jay Hormel in 1937 b) Jay Hormel in 1941 c) Jay Hormel in 1936 d) Jay Hormel in1950 Answer: A

What is spam? a) Spam can be defined as a relevant message sent over the internet. b) Spam can be defined as irrelevant or unsolicited messages sent over the Internet. c) none Answer: B

Who invented spam? a) Jay Hormel in 1937 b) Jay Hormel in 1941 c) Jay Hormel in 1936 d) Jay Hormel in1950 Answer: A

Is using spamming tools illegal? a) No b) Yes c) Maybe d) none Answer: B

Which of the following is not a technique used by spanners? a) Spoofing the domain b) Sending attached virus in spams c) Junk tags associated with spam-emails d) Making important deals through such emails Answer : D

Among all the routes available which route is chosen? A.Highest distance metric B.Lowest distance metric C. metric 5

D.metric 10 Answer: B

What is route restriction? A. Users are restricted to use a route B. The administrator is restricted to use a route C. only some users can access a route D.No users can access a route Answer: C

When is a gateway declared dead? A. When its too far B. When it doesn’t send any request within a given period of time C. When no response is received for a consecutive request D.If the gateway sends too many requests Answer: C What is another name for the distance metric? A. hop count B. cost C. hop count and cost D.height,hop count and cost Answer: C

What is ARP abbreviation for? A. Address route protocol B. Address resolution protocol C. Address reverse program D.Attention resolution program Answer: B

Which protocol does not provide feedback? A. TCP B.UDP C. IP D.Something else Answer: B

Which protocol do the routed daemons support? A. RIP B.RIPng C. HELLO D.ICMP Answer: A

How many account policy each domain can have ?

A. Ony one account policy B. Two account policy C. No account policy D. Something else Answer: A

Where is kerberos policy available in your windows computer? A. \Computer Configuration\Windows Settings\Security Settings\Account Policies\Kerberos Policy B. \Control panel\Security Settings\Account Policies\Kerberos Policy C. \Control panel\Account Policies\Kerberos Policy D. Something else Answer: A

There are password policy settings that control the complexity and lifetime of passwords, such as ______policy setting. A. The Passwords must meet complexity requirements B. Group Policy Management Console C. User pawssword D. Something else Answer: A

You can configure the password policy settings in the following location by using the Group Policy Management Console: A. Control panel\Password Policy B. Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy C. Control Panel\Security Settings\Password Policy D. Something Else Answer: B

What is the name of the protocol Apache uses to communicate with clients? A. The Patchy Server Protocol B. The Hypertext Transfer Protocol C. The Cloud Transfer Protocol D. The Hypertext Markup Language ANSWER: B

How many individual queries are involved in a full recursive DNS lookup? A. 1 B. 3 C. 7 D. A variable number ANSWER: D

Which command is used to identify file type? a) Type b) File c) Finfo d) Info ANSWER: B

The files of sysfs contains the information about a) devices and drivers b) memory mapping c) ports d) none of the mentioned ANSWER: A

What is the default number of files open per user process? a) 0 b) 1 c) 2 d) 3 ANSWER: D

Which among the following interacts directly with system hardware? a) Shell b) Commands c) Kernel d) Applications ANSWER: C

If DHCP snooping is configured on a LAN switch, then clients having specific ______can access the network. a) MAC address b) IP address c) Both MAC address and IP address d) None of the mentioned ANSWER: C

Expansion of FTP is ______a) Fine Transfer Protocol b) File Transfer Protocol c) First Transfer Protocol d) Fast Transfer Protocol ANSWER: B

FTP is built on _____ architecture. a) Client-server b) P2P

c) Data centric d) Service oriented ANSWER: A

FTP uses ______parallel TCP connections to transfer a file. a) 1 b) 2 c) 3 d) 4 ANSWER: B

Identify the incorrect statement regarding FTP. a) FTP stands for File Transfer Protocol b) FTP uses two parallel TCP connections c) FTP sends its control information in-band d) FTP sends exactly one file over the data connection ANSWER: C

If 5 files are transferred from server A to client B in the same session. The number of TCP connections between A and B is ______a) 5 b) 10 c) 2 d) 6 ANSWER: D

FTP server ______a) Maintains state information b) Is stateless c) Has single TCP connection for a file transfer d) Has UDP connection for file transfer ANSWER: A

The commands, from client to server, and replies, from server to client, are sent across the control connection in ______bit ASCII format. a) 8 b) 7 c) 3 d) 5

ANSWER: B

A DNS client is called ______a) DNS updater b) DNS resolver c) DNS handler

d) none of the mentioned ANSWER: B

Which of the following is an authentication method? a. Secret question b. Biometric c. Password d. All of the above ANSWER: D

Which of the following describes the first step in establishing an encrypted session using a Data Encryption Standard (DES) key? A. Key clustering B. Key compression C. Key signing D. Key exchange ANSWER: D

Which of the following is not a component of “ chain of evidence”: A. Location evidence obtained. B. Time evidence obtained. C. Who discovered the evidence. D. Identification of person who left the evidence. ANSWER:D

Which of the following entity is ultimately responsible for information security within an organization? A. IT Security Officer B. Project Managers C. Department Directors D. Senior Management ANSWER: D

What type of cryptanalytic attack where an adversary has the least amount of information to work with? A. Known-plaintext B. Ciphertext-only C. Plaintext-only D. Chosen-ciphertext ANSWER:B

Which of the following is an authentication method? a. Secret question b. Biometric

c. Password d. All of the above ANSWER: D

Which of the following describes the first step in establishing an encrypted session using a Data Encryption Standard (DES) key? A. Key clustering B. Key compression C. Key signing D. Key exchange ANSWER: D

Which of the following is not a component of “ chain of evidence” : A. Location evidence obtained. B. Time evidence obtained. C. Who discovered the evidence. D. Identification of person who left the evidence. ANSWER:D

Which of the following entity is ultimately responsible for information security within an organization? A. IT Security Officer B. Project Managers C. Department Directors D. Senior Management ANSWER: D

What type of cryptanalytic attack where an adversary has the least amount of information to work with? A. Known-plaintext B. Ciphertext-only C. Plaintext-only D. Chosen-ciphertext ANSWER:B

Servers handle requests for other domains ______A. directly B. by contacting remote DNS server C. it is not possible D. none of the mentioned ANSWER: B

If a server has no clue about where to find the address for a hostname then ______

A. server asks to the root server B. server asks to its adjcent server C. request is not processed D. none of the mentioned ANSWER: A

Which one of the following allows client to update their DNS entry as their IP address change? A. dynamic DNS B. mail transfer agent C. authoritative name server D. none of the mentioned ANSWER: A

Wildcard domain names start with ______A. @ B. * C. & D. # ANSWER: B

In a ring topology, the computer in possession of the ______can transmit data. A. Data B. Packet C. Access method D. Token ANSWER: D

How many layers are in the TCP/IP model? A. 4 layers B. 5 layers C. 7 layers D. 8 layers ANSWER: B

Which of the following topologies is not of broadcast type A. Bus B. Ring C. Star D. All of mentioned ANSWER: A

An alternate name for the completely interconnected network topology is A. Mesh B. Star C. Tree

D. Ring ANSWER: A

Network components are connected to the same cable in the ______topology. A. Mesh B. Bus C. Star D. Ring ANSWER: B

You are the new IT admin, and you need to find the network configuration. What should you use? A. ipconfig B. netchange C. ping D. nwnet ANSWER: A

This command sends a request out and expects a response, indicating that both hosts are communicating: A. ping B. ifconfig C. tracert D. lookup ANSWER: A

A network server: A. provides various shared resources to workstations and other servers on a network. B. provides various links to acces the network C. provides WAP to all the connected devices D. None ANSWER: A

______is a company that provides users with access to the internet. A. Hub B. Modem C. Internet Service Provider D. IP cnfiguration ANSWER: C

A device designed to filter and transfer IP packets between computer networks is called: A. Hub B. Modem

C. Router D. IP cnfiguration ANSWER: C

Which is not an objective of network security? A. Identification B. Lock C. Authentication D. Access control ANSWER: B

Which part of TCP/IP prepares the message for being sent and reassembles any incoming messages? A. IP B. TCP ANSWER: B

This antivirus is now called window defender on Windows 10: A.Nortan B. Avast C. Microsoft essentials D. AVG ANSWER: C

Network security protocols : A. makes sure that the security and integrity of the data are preserved over a network. B. helps to transfer files through routing C. All are true D. Helps to transfer emails ANSWER: A

______is a cryptographic network security protocol used for securing data communication over a network. A. SSL B. HTTPS C. SSH D. AVG ANSWER: C

______ensures the integrity and security of data that are passing over a network. A. Firewall B. Antivirus C. Pentesting Tools D. Network-security protocols

ANSWER: D

______is a set of conventions & rules set for communicating two or more devices residing in the same network? A. Security policies B. Protocols C. Wirelss Network D. Algorithms ANSWER: B

______is the anticipation of unauthorized access or break to computers or data by means of wireless networks. A. Wireless access B. Wireless security C. Wired Security D. Wired device apps ANSWER: B

______is the central node of 802.11 wireless operations. A. Access Points B. Protocols C. Wirelss Network D. WAP ANSWER: A

When a router needs to send a packet destined for another network, it must know the A. IP Address B. Datagram C. Medium D. Flow ANSWER: A

In network addresses, each router has two operations. A. Segments B. Blocks C. Address D. Masks ANSWER: C

Which protocol will send a message to routers if a network outage or congestion occurs? A. IP B. TCP C. ARP D. ICMP

ANSWER: D

IPV4 address is: A. 8-bit B. 16-bit C. 32-bit D. 64-bit ANSWER: C

Router operates in which physical layer of OSI Model A. Layer 1(Physical Layer) B. Layer 2(Network Layer) C. Layer 3(Transport Layer) D. Layer 7(Application Layer) ANSWER: B

______is actually a multiport repeater. It is normally used to create connections between stations in a physical star topology. A. Active Hub B. Passive Hub C. Both active and passive D. None ANSWER: A

A ______can check the MAC addresses contained in the frame. A. Hub B. Router C. Bridge D. Network ANSWER: C

In ______When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. A. Router B. Hub C. Bridge D. Network ANSWER: B

Hubs cannot filter data, so data packets are sent to all connected devices. A. True B. False ANSWER: A

______hubs which collect wiring from nodes and power supply from active hub. These hubs relay signals onto the network without cleaning and boosting them.

A. Extended B. Modular C. Active D. Passive ANSWER: D

The disadvange of using hub is: A. Consumes Bandwidth B. Slow down the system C. Replication of all the bits D. Cheapest ANSWER: A

To connect the router to the internet need a ______to the internet service provider's website. A. ISP B. MAC address C. Link D. Protocols ANSWER: B

WPS(Wi-Fi Protected Setup) is: A. It is a wireless network security standard that tries to make connections between a router and wireless devices faster and easier. B. All are true C. WPS works without the WPA Personal or WPA2 Personal security protocols. D. WPS works on wireless networks that are using the deprecated WEP security. ANSWER: A

What is the acronym given to a wireless network defined into a specific area? A. LAN B. WLAN C. WAN D. CAN ANSWER: B

In order to connect a PC to a network, the PC must have a(n): A. Network Interface Card B. ISP C. Modem D. Wireless Mouse ANSWER: A

What is the IEEE specification for wireless network? A. 802.10 B. 802.1x

C. 802.15 D. 802.11 ANSWER: D

Which type of topology is in an infrastructure wireless network? A. Mesh B. Ring C. Star D. Bus ANSWER: C

Which type of topology is in an adhoc wireless network? A. Star B. Mesh C. Bus D. Ring ANSWER: B

When troubleshooting network connectivity or application-specific issues one of the first things to check should be what ______are actually in use on your system. A. Ports B. Modes C. Connections D. Server ANSWER: A

Which of the following statement is true for Telnet: A. Telnet is a user command and an underlying TCP/IP protocol. B. Through Telnet, an administrator or another user can access someone else's computer remotely. C. With Telnet, you log on as a regular user D. All of the mentioned ANSWER: D

Once Telnet is installed in our client machine we need to: A. Start communicationn with the main host server. B. Share FS. C. Configure firewall to allow telnet service and traffic D. Unblock all the ports. ANSWER: C

Network switch is : A. Networking hardware that connects all devices together on a LAN (Local Area Network). B. Software device to redirect the data C. Both hardware and software which sends data via WAN.

D. None ANSWER: A

In wireless distribution system ______A. multiple access point are inter-connected with each other B. there is no access point C. only one access point exists D. access points are not required ANSWER: A

The wireless access points: A. provide a means for the data to travel from the wirless network to the client. B. provide a means for the data to travel from the shared network to the client. C. All are true D. Provide a means for the data to travel from the wired network to the client. ANSWER: D

Some factors to be considered while managing broadband is/are: A. Downlink and uplink speed B. Bandwidth C. All factors are contributing D. Usage of Network ANSWER: C

The command used to show several details about the path that a packet takes from the computer or device you're on to whatever destination you specify is: A. TRACERT B. IFCONFIG C. WGET D. DYNO ANSWER: A

What device provides a bridging point for different communications technologies and forwards outbound and inbound traffic on a switched network. A. WAN Switch B. LAN Switch C. Hub D. Router ANSWER: A

Which of the following is considered a standard NTFS permission? A. List Folder Contents B. Read Extended Attributes C. Create Folders/Append Data D. List Folder/Read Data Ans: A

You want a user to take ownership of a le or folder that she did not create. Which of the following groups do you not add her to? A. Administrators group B. Backup Operators group C. Creator/Owner special identity D. Server Operators group Ans: C

Which of the following statements is true of global groups? A. Global groups can include only users from within their domain. B. Global groups can include users from any domain in the tree. C. Global groups can include users from any domain in the forest. D. Global groups can include users from any domain in Active Directory Ans: A

How many processors does the 64-bit version of Windows Server 2003 Datacenter Edition support? A. 4 B. 8 C. 32 D. 64 Ans: D

Which of the following media has the largest data storage capacity? A. Zip cartridge B. CD C. DVD D. Jaz cartridge Ans: C

Which of the following backup types does not alter the archive bit on a newly created le? A. Full B. Incremental C. Symmetrical D. Differential Ans: D

Which of the following is protocols is used by Remote Desktop and Remote Assistant? A. RDP B. SMTP C. ICMP D. PPPoE

Ans: A

What is an active partition? A. A partition currently in use B. A partition being created C. A partition that an operating system can boot from D. A partition that an operating system can write to ANSWER: C

HARD Suppose that you have a the maintenance package identifies several possible field replaceable units (FRUs) that will resolve the problem. What should you do after turning the power off?

A. Replace the indicated parts, one at a time in the recommended sequence, until the problem is resolved; return unused FRUs to stock B. Replace all of the indicated FRUs at once and return the machine to the customer if the problem is resolved C. Follow the same procedure as in ays replace the system board first if it is on the list of possible FRUs If multiple FRUs are indicated, then software is the most likely source of the problem D. None of the above ANSWER: Option A

Your customer tells you the print quality of their dot matrix printer is light then dark. Which of the following could cause the problem. A. Paper slippage B. Improper ribbon advancement C. Paper thickness D. Head position E. None of the above ANSWER: B

The 34-pin connection on an I/O card is for? A. Floppy drive B. SCSI drive C. IDE drive D. Zip drive E. None of the above ANSWER: A

The terms "red book", "yellow book", and "orange book" refer to: A. SCSI B. ide

C. floppy drive technology D. CD-ROM standards E. All of the above ANSWER: D

On the 16-bit ISA bus, IRQ2 is elevated to which higher level Interrupt? A. 9 B. 11 C. 13 D. 15 E. None of the above ANSWER: A

After doing a low-level format, what would be the next step in configuring the hard drive in a system? A. Format DOS partition B. Install operating system C. Configure DMA channel and back-up interrupt D. Partition had disk E. None of the above ANSWER: A

During the fusing process, toner is: A. dry pressed into the paper B. electrically bonded to the paper C. melted into the paper D. glued to the paper E. high pressure sprayed onto the paper ANSWER: E

My Computer was introduced from A. Windows 3.1 B. Windows 3.11 C. Windows 95 D. Windows 98 ANSWER: C

Which of the following Windows do not have Start button A. Windows Vista B. Windows 7 C. Windows 8 D. None of above ANSWER: C

... is the layer of a computer system between the hardware and the user program A. Operating environment B. Operating system C. System environment D. None of these ANSWER: B

Which is the layer of a computer system between the hardware and the user program A. Operating environment B. Operating system C. System environment D. None ANSWER: B

When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called A. Bootstrap B. Power on self test (POST) C. System configuration D. Kernel loading ANSWER: B

The operating system is the most common type of .... Software A. Communication B. Application C. System D. Word processing software ANSWER: C

Which of the following is/are external commands? A. Edit B. Label C. Sys D. All of above ANSWER: D

Which is not an external command? A. Edit B. XCOPY C. Sys D. None of the above ANSWER: D

Which of the following is not essential to shut down your computer?

A. Save all opened files B. Close all running applications C. Switch off monitor D. Cut off the power supply ANSWER: C

What is Dr. Watson? A. IT Expert B. Diagnosis tool C. Surgeon D. None ANSWER: B

The command allows you to create logical drive A. B. Path C. Subst D. Batch ANSWER: C

The command used to create logical drive for specific location of disk A. Fdisk B. Format C. Subst D. All of the above ANSWER: C

You can move a window to a different position on your screen by dragging it by its A. Move handle B. C. Status bar D. Title bar ANSWER: A

A bar that inform you the available options in your computer, opened applications, background running applications and can be used to switch between applications quickly is A. Menu bar B. Tool bar C. Status bar D. Task bar ANSWER: D

Which components appear in the initial windows start up display? A. Dialog box

B. Task bar C. Start menu D. All of the above ANSWER A

Taskbar is used for A. Navigation program B. Switching between program C. Start a program D. All of above ANSWER: B

To install the new font A. Start -> setting -> control panel -> font B. Start -> setting -> control panel -> font -> install new font C. Start -> control panel -> font -> install new font D. Start -> setting -> font ANSWER: D

When a peripheral device needs immediate attention from the operating system, it generates a(n) A. Interrupt B. Spool C. Stack D. Page file ANSWER: B

Underlined text, such as text and folder names is referred to as A. Hyperlink B. Menu C. Source drive D. None of these ANSWER: C

Which of the following is suitable after you install new drivers? A. Shut Down B. Restart C. Sleep D. Hibernate ANSWER: B

Windows displays various options to shutdown. Which is suitable at the end of day? A. Shut Down B. Restart

C. Sleep D. Hibernate ANSWER: B

Which of the following shutdown method is often called Warm Boot? A. Shut Down B. Restart C. Sleep D. Hibernate ANSWER: D

______is most often done after fixing a problem, adding a new program or making configuration change A. Shut Down B. Restart C. Sleep D. Hibernate ANSWER: D

___ is a compromise mode between Shut Down and Sleep mode because it does not consume power and remembers the current state of your desktop A. Shut Down B. Restart C. Sleep D. Hibernate ANSWER: B

You should choose this mode if you don't know how long you won't use your computer but want to have the same desktop state when you resume A. Shut Down B. Restart C. Sleep D. Hibernate ANSWER: A

The category of operating system that you most likely have running on your PDA computer is a .... Operating system A. Real time B. Single user, single task C. Single user, multitask D. Multiuser, multitask ANSWER: D

Running multiple programs at the same time is called: A. Multitasking

B. Foreground tasking C. Single tasking D. Symmetric ANSWER: B

What is the meaning of "Hibernate" in Windows XP/Windows 7? A. Restart the Computer in safe mode B. Restart the Computer in hibernate mode C. Shutdown the Computer terminating all the running applications D. Shutdown the Computer without closing the running applications ANSWER: B

The function of Dir/W is A. Show all details of file B. Show only file name and directory name C. Shows only directory D. All of the above ANSWER: B

Page stealing A. Is a sign of an efficient system B. Is taking page frame from other working sets C. Should be the turning goal D. Is taking layer disk space for page in page out ANSWER: D

What do you mean by dialog box? A. Interactive message box B. Group of options C. Set of controls D. All of the above ANSWER: A

Dial up connection allows you to A. Connect ISP B. Internet C. Server D. All of above ANSWER: C

To properly Windows A. Click the stop button on the desktop B. Click the exit button on the desktop C. Select shut down from Start menu D. None of above

ANSWER: A

Which is not a system tool? A. Folder B. Backup C. Scandisk D. Format ANSWER: A

A utility that can be used to minimize the number of fragmented files and enhance the speed A. Disk space B. Defrag C. Scandisk D. Double space ANSWER: B

To change the volume label A. Vol B. Label C. Scandisk D. None ANSWER: B

Which of the following is a disk compression tools? A. Drive space B. Defragmenter C. Scandisk D. None of the above ANSWER: A

To save your computer from viruses you will do A. Install antivirus software and run it B. Make physical safe for the removal disk C. Scan the removable disk before using it D. All of the above ANSWER: A

How can you optimize performance of your computer? A. Delete unused files B. Defrag disk C. Scan for virus D. All of above ANSWER: D

Scandisk A. Checks the disk B. Give information about disk C. Run from DOS mode D. All of the above ANSWER: D

Recently used application file list appears in the Windows operating system A. Setting menu B. Documents menu C. Run dialog box D. Programs menu ANSWER: B

Batch file is used to A. Run program B. Show the contents C. run commands automatically D. All of above ANSWER: C

.... are specially designed computer chips that reside inside other devices, such as your car or electric thermostat A. Server B. Embedded computer C. Robotic computer D. Mainframes ANSWER: B

What do you type at the DOS command prompt to return back to Windows A. Command B. Exit C. Quit D. Return ANSWER: B

The question mark (?) indicates in file searching A. A single character B. A group of character C. Questions D. None of above ANSWER: A

Save operation means

A. Put data into processor B. Put data into internal memory C. Put data into secondary storage D. Put data into monitor ANSWER: C

CAD software is most likely to be used by A. Web designer B. Engineers C. Project Manager D. Magazine Editor ANSWER: B

A spooler is a A. Location in memory that maintains the contents of documents until it prints out B. Queue of print job that are waiting to print C. Program that coordinates the print job that are waiting to process D. Message sent from the printer to the operating system when a print job is completed ANSWER: C

The problem with ...file is that they slow your computer's Operation A. Fragmented B. Formatted C. Program D. All of above ANSWER: A

User action such as keystroke or mouse click are referred to as A. Interrupt B. Tasks C. Processes D. Event ANSWER: D

Which is not internal command? A. Doskey B. Verify C. Print D. Find ANSWER: D

What is the method of handling deadlocks? A. Use a protocol to ensure that the system will never enter a deadlock state.

B. Allow the system to enter the deadlock state and then . C. Pretend that deadlocks never occur in the system. D. All of the Above ANSWERD

To delete a file without allowing it to store in recycle bin A. Press Delete key B. Press Shift + Delete key C. Press Ctrl + Delete key D. Press Alt + Delete key ANSWER: A

Operating system is a .... A. System software B. Application software C. Presentation software D. Database software ANSWER: A

To display a shortcut menu for an object you use A. Click the object B. Right click the object C. Point the object and press Ctrl+P D. Touch the object on the screen with your finger ANSWER: B

Which of the following separates primary file and extension is A. Dot B. Period C. Point D. All of the above ANSWER: D

In Microsoft windows, the graphical pattern on the desktop used as background for windows is A. Icons B. Wall paper C. Picture D. Background ANSWER: D

Which one is used for making presentation file from Microsoft Office package A. MS Outlook B. MS Excel C. MS Word D. MS Powerpoint

ANSWER : D

______folder contains the recently viewed Web pages content A. Explorer B. History C. Temporary Internet Files D. Windows ANSWER : C

Which of the following does not support more than one program at a time? A. DOS B. Linux C. Windows D. Unix ANSWER: A

Which of the following is not an operating system? A. DOS B. Linux C. Windows D. Oracle ANSWER: D

Which of the following tasks can you not perform remotely on a server running Windows Server 2008? A. Install roles by using Server Manager B. Install roles by using Windows PowerShell C. Connect to the remote server by using the Computer Management snap-in D. Monitor event log entries ANSWER: D

When you run Server Manager from a Windows 8 workstation using Remote Server Administration Tools, which of the following elements do not appear in the default display? A. The Dashboard B. The Local Server home page C. The All Servers home page D. The Welcome tile ANSWER: B

Which of the following statements about Type I and Type II virtualization are true? (Choose all that apply.) A. In Type I virtualization, the hypervisor runs on top of a host OS. B. In Type I virtualization, the hypervisor runs directly on the computer hardware. C. In Type II virtualization, the hypervisor runs on top of a host OS. D. In Type II virtualization, the hypervisor runs directly on the computer hardware.

ANSWER: B, C

Which of the following types of server virtualization provides the best performance for high-traffic servers in production environments? A. Type I virtualization B. Type II virtualization C. Presentation virtualization D. RemoteApp ANSWER: A

What does protocol defines? A. Protocol defines what data is communicated. B. Protocol defines how data is communicated. C. Protocol defines when data is communicated. D. All of above ANSWER: D

Which of the following Microsoft operating systems includes a license that enables you to license an unlimited number of virtual instances? A. Hyper-V Server B. Windows Server 2012 R2 Datacenter C. Windows Server 2012 R2 Standard D. Windows Server 2012 R2 Foundation ANSWER: B

When you install the Hyper-V role on a server running Windows Server 2012 R2, the instance of the OS on which you installed the role is converted to what system element? A. The hypervisor B. The Virtual Machine Monitor C. The parent partition D. A child partition ANSWER: C

Which one is a 'text editor' for Microsoft Windows? A. MS Word B. Ms Excel C. WordPad D. Notepad ANSWER : D

Which one is the default 'Word Processor' for Microsoft Windows? A. MS Word B. Ms Paint C. WordPad D. Notepad

ANSWER : C

From what location are the 1st computer instructions available on boot up? A. ROM BIOS B. CPU C. boot.ini D. CONFIG.SYS E. None of the above ANSWER : A

From What location are the 1st computer instructions available on boot up? A. ROM BIOS B. CPU C. Boot.ini D. CONFIG.SYS ANSWER: A

What could cause a fixed disk error. A. No-CD installed B. Bad ram C. Slow processor D. Incorrect CMOS settings ANSWER: D

Missing slot covers on a computer can cause? A. Over heat B. Power surges C. EMI. D. Incomplete path for ESD ANSWER: A

With respect to a network interface card, the term 10/100 refers to A. Protocol speed B. A fiber speed C. Megabits per seconds D. Minimum and maximum server speed ANSWER: C

Which Motherboard form factor uses one 20 pin connector A. ATX B. AT C. BABY AT D. All of the above ANSWER: A

A hard disk is divided into tracks which are further subdivided into:

A. Clusters B. Sectors C. Vectors D. Heads ANSWER: B

A wrist grounding strap contains which of the following: A. Surge protector B. Capacitor C. Voltmeter D. Resistor ANSWER: D

ESD would cause the most damage to which component? A. Power supply B. Expansion board C. Monitor D. Keyboard E. None of the above ANSWER: B

Most PCs give a single beep on bootup to indicate they are ok hardware wise. You boot your PC and don't get a beep. What should you check first? A. system board B. RAM C. microprocessor D. power supply E. speaker ANSWER: E

Which peripheral port provides the FASTEST throughput to laser printers? A. RS-232 B. SCSI C. Parallel D. Serial E. None of the above ANSWER: C

If there are multiple recycle bin for a hard disk A. You can set different size for each recycle bin B. You can choose which recycle bin to use to store your deleted files C. You can make any one of them default recycle bin D. None of above ANSWER: A

Identify false statement

A. You can find deleted files in recycle bin B. You can restore any files in recycle bin if you ever need C. You can increase free space of disk by sending files in recycle bin D. You can right click and choose Empty Recycle Bin to clean it at once ANSWER: C

If the displayed system time and date is wrong, you can reset it using A. Write B. Calendar C. Write file D. Control panel ANSWER: D

You should save a computer from? A. Viruses B. Time bombs C. Worms D. All of the above ANSWER: D

World Wide Web is being standard by A. Worldwide corporation B. W3C C. World Wide Consortium D. World Wide Web Standard ANSWER: B

A co-processor A. Is relatively easy to support in software B. Causes all processor to function equally C. Works with any application D. Is quite common in modern computer ANSWER: A

A Microsoft Windows is a(n) A. Operating system B. Graphic program C. Word Processing D. Database program ANSWER: A

Which of the following is program group? A. Accessories B. Paint C. Word

D. All of above ANSWER: A

Which is not application software? A. Windows NT B. Page Maker C. WinWord XP D. Photoshop ANSWER: A

The ...... program compresses large files into a smaller file A. WinZip B. WinShrink C. WinStyle D. None of above ANSWER: A

Which of the following is an example of a real time operating system? A. Lynx B. MS DOS C. Windows XP D. Process Control ANSWER: D

Which of the following operating system does not implement the multitasking truly? A. Windows 98 B. Windows NT C. Windows XP D. MS DOS ANSWER: D

Identify the network hardware of a home network A. Access Point B. NIC Card C. Analog Modem D. FireWire ANSWER: B

Which of the following is not a network hardware? A. Network Switch B. Bridge C. Print Server D. Network Interface Card ANSWER: C

The two kinds of input devices – direct input and indirect input devices are classified based on A. Whether the data conversion is involved or not B. Whether the data is acquired from a device directly connected to CPU or through network C. Whether the data is directly input or retrieved from disk D. Whether the data is input with or without human intervention ANSWER: B

Set of programs which consist of full set of documentations is termed as A. database packages B. file packages C. bus packages D. software packages ANSWER: D

What is the meaning of Bandwidth in Network? A. Transmission capacity of a communication channels B. Connected Computers in the Network C. Class of IP used in Network D. None of Above ANSWER: A

ADSL is the abbreviation of A. Asymmetric Dual Subscriber Line B. Asymmetric Digital System Line C. Asymmetric Dual System Line D. Asymmetric Digital Subscriber Line ANSWER: D

What is the use of Bridge in Network? A. to connect LANs B. to separate LANs C. to control Network Speed D. All of the above ANSWER: A

Router operates in which layer of OSI Reference Model? A. Layer 1 (Physical Layer) B. Layer 3 (Network Layer) C. Layer 4 (Transport Layer) D. Layer 7 (Application Layer) ANSWER: B

Which of the following is not the Section Break Option? A. Next Page

B. Previous Page C. Odd Page D. Even Page ANSWER: C

What is a Document Outline View? A. A preview in a full screen B. A preview with margins C. A View with a margins and gutter D. A view with a structure of heading at various levels ANSWER: A

What is the use of Document Map? A. to quickly format the document B. to quickly print required page C. to quickly navigate the document D. to quickly correct spelling mistakes ANSWER: C

What is the shortcut key to display field codes? A. Alt + F9 B. Ctrl + F9 C. Shift + F9 D. Space + F9 ANSWER: B

What is the shortcut key to show font dialog box? A. Ctrl + D B. Ctrl + Shift + F C. Ctrl + Shift + P D. All of the above ANSWER: B

How to remove all character formats? A. Shift + Spacebar B. Shift + Enter C. Ctrl + Spacebar D. Ctrl + Enter ANSWER: C

Which of the following is true regarding page Orientation of a Document? A. Page Orientation can be change at any time B. Page Orientation of document determines by printer C. Page Orientation must be set before start typing

D. Page Orientation of a document cannot be changed. ANSWER: A

Which of the following is Page Orientation? A. Landscape B. Portrait C. Gutter D. Only A & B ANSWER: D

Which of the following is NOT a type of a screwdriver? A. Slotted B. Phillips C. Hex D. Diamond ANSWER: D

Wire strippers remove what from wires? A. Magnetism B. Excess wire C. Insulation D. Oil ANSWER: C

TPI stands for A. Tongs passing increments B. Triangle penetrating increments C. Teeth per inch D. Tangible penetrating instruments ANSWER: C

Which of the following is NOT a trait of modern computers A. Speed B. Accuracy C. Intelligence D. Reliability ANSWER: C The operations of the arithmetic unit and the control unit in a computer are controlled by A. ALU itself B. Control Unit itself C. Applications D. Memory Unit ANSWER: B

The programs and data currently being processed by CPU is stored in

A. Mass Memory B. RAM C. PROM D. Non-volatile Memory ANSWER: B

Which of the following controls the process of interaction between the user and the computer? A. User interface B. Screensaver C. Platform D. Language translator ANSWER: A

What characteristic of read-only memory (ROM) makes it useful? A. ROM information can be easily updated. B. Data in ROM is non-volatile, that is, it remains there even without electrical power. C. ROM provides very large amounts of inexpensive data storage. D. ROM chips are easily swapped between different brands of computers ANSWER: B

A light-sensitive device that converts drawing, printed text or other images into digital form is A. Keyboard B. Scanner C. Plotter D. OMR ANSWER: B

Which of the following groups consists of only input devices? A. Mouse, Keyboard, Monitor B. Mouse, Scanner, Printer C. Joystick, Keyboard, Plotter D. Mouse, KeyboWhat are physical ports on a computer usually referred to as? A. Buses B. Jacks C. Interfaces D. Hardware plugs ANSWER: C

Which of the following can be transferred over HDMI cable? A. Video B. Sound C. Video and Sound D. Neither Video nor Sound ANSWER: C

Which type of connector is mostly used these days to connect to network cards?What are physical ports on a computer usually referred to as? A. Buses B. Jacks C. Interfaces D. Hardware plugs ANSWER: C

Which of the following can be transferred over HDMI cable? A. Video B. Sound C. Video and Sound D. Neither Video nor Sound ANSWER: CWhat are physical ports on a computer usually referred to as? A. Buses B. Jacks C. Interfaces D. Hardware plugs ANSWER: C

Which of the following can be transferred over HDMI cable? A. Video B. Sound C. Video and Sound D. Neither Video nor Sound ANSWER: C

Which type of connector is mostly used these days to connect to network cards? A. BNC B. 6 pinWhat are physical ports on a computer usually referred to as? A. Buses B. Jacks C. Interfaces D. Hardware plugs ANSWER: C

Which of the following can be transferred over HDMI cable? A. Video B. Sound C. Video and Sound D. Neither Video nor Sound ANSWER: C

Which type of connector is mostly used these days to connect to network cards? A. BNC

B. 6 pin C. RJ-11 D. RJ-45 ANSWER: D C. RJ-11 D. RJ-45 ANSWER: D

Which type of connector is mostly used these days to connect to network cards? A. BNC B. 6 pin C. RJ-11 D. RJ-45 ANSWER: D A. BNC B. 6 pin C. RJ-11 D. RJ-45 ANSWER: Dard, Scanner ANSWER: D

A joystick is primarily used to/for A. Computer Gaming B. Control sound on screen C. Enter text D. Draw pictures ANSWER: A

Which of the following is not hardware? A. Mouse B. Motherboard C. Printer D. Java ANSWER: D

What is GPF? A. A hard drive with insufficient space B. Part of the Microsoft General Procedures Windows Format toolkit C. A Windows General Protection Fault D. None of the mentioned ANSWER: C

If the Windows system resources drop below 60%, the system is likely to A. Overheat B. Crash

C. Run optimally if it has an Intel chip D. Anti-virus systems start runningWhat are physical ports on a computer usually referred to as? A. Buses B. Jacks C. Interfaces D. Hardware plugs ANSWER: C

Which of the following can be transferred over HDMI cable? A. Video B. Sound C. Video and Sound D. Neither Video nor Sound ANSWER: C

Which type of connector is mostly used these days to connect to network cards? A. BNC B. 6 pin C. RJ-11 D. RJ-45 ANSWER: D ANSWER: B

The ______loads the applications when Windows open A. AUTOEXEC.BAT B. WIN.INI C. SYSTEM.INIWhat are physical ports on a computer usually referred to as? A. Buses B. Jacks C. Interfaces D. Hardware plugs ANSWER: C

Which of the following can be transferred over HDMI cable? A. Video B. Sound C. Video and Sound D. Neither Video nor Sound ANSWER: CWhat are physical ports on a computer usually referred to as? A. Buses B. Jacks C. Interfaces D. Hardware plugs ANSWER: C

Which of the following can be transferred over HDMI cable? A. Video B. Sound C. Video and Sound D. Neither Video nor Sound ANSWER: C

Which type of connector is mostly used these days to connect to network cards?What are physical ports on a computer usually referred to as? A. Buses B. Jacks C. Interfaces D. Hardware plugs ANSWER: C

Which of the following can be transferred over HDMI cable? A. Video B. Sound C. Video and Sound D. Neither Video nor Sound ANSWER: C

Which type of connector is mostly used these days to connect to network cards? A. BNC B. 6 pin C. RJ-11 D. RJ-45 ANSWER: D A. BNC B. 6 pin C. RJ-11 D. RJ-45 ANSWER: D

Which type of connector is mostly used these days to connect to network cards? A. BNC B. 6 pin C. RJ-11 D. RJ-45 ANSWER: D D. None of the mentioned ANSWER: B

How do you know the right direction of plugging in an unscreened flat ribbon cable into a connector? A. The red line in the cable goes to the highest pin number

B. The colored line in the cable goes to the first pin C. The colored line in the cable goes to the last pin D. It can be connected in any way. ANSWER: B

What do you do if you see the message “Invalid media device” on a computer after installing a new hard drive? A. Replace the new hard drive B. Format the new hard drive C. Partition the new hard drive D. Install the OS ANSWER: B

What should be the first action when Windows reports that your hard drive is developing bad sectors? A. Replace the hard drive B. Run secclean from DOS C. Run defrag on the hard drive D. Run Scandisk with the thorough option ANSWER: D

Which of the following is the best way to prevent damaging your PC from static electricity? A. Wear an Electrostatic Discharge(ESD) wrist strap B. Wear leather or rubber-soled shoes C. Periodically touch a safe ground spot on the PC to discharge yourself D. Place your PC on a rubber mat ANSWER: A

To test the serial and parallel ports on your computer, which of the following tools might be used? A. High Volt probe B. Cable Scanner C. Oscilloscope D. Loopbacks (Wrap Plugs) ANSWER: D

How can the CMOS be cleared, including the password? A. Unplug the PC B. Unplug the PC and remove the CMOS battery C. Run a CMOS command from the command line D. It is not possible ANSWER: B

What could result in a fixed disk error? A. No CD-Drive installed

B. Bad RAM C. Incorrect CMOS settings D. Bad ROM ANSWER: C

What is the bus architecture used by SATA cables? A. Parallel B. Serial C. Depends on the chipset used D. Multiplexed ANSWER: B

How many pins does a PS/2 connector have? A. 5 B. 9 C. 12 D. 6 ANSWER: D

How many pins are there in the USB-C Connector? A. 12 B. 24 C. 16 D. 20 ANSWER: B

Which System Software acts as a link between the hardware and the software on a computer? A. Operating System B. Device drivers C. Utility Software D. Firmware ANSWER: A

The software can be installed on a computer by (i) Simply copying the software into a folder on the computer (ii) Running an installation procedure to make the software executable A. Only (i) B. Only (ii) C. Neither (i) nor (ii) D. Both (i) and (ii) ANSWER: D

The supermarket near your house has installed a new inventory management system. What type of software is that? A. Operating System

B. Communications Software C. System Software D. Database Software ANSWER: D

Choose the correct pair from the following. A. Application Software - Low-Level Software B. System Software - High-Level Software C. System Software - Low-Level Software D. Middleware - High-Level Software ANSWER: C

Which type of software are Device Drivers? A. Application Software B. Utility Software C. System Software D. These are a type of hardware ANSWER: C

Select the correct statement about application software (i) First, the user deals with system software and then deals with application software. (ii) It is programmed for simple as well as complex tasks. (iii) It can only be installed on a computer. (iv) It can be a single program or a group of small programs that are referred to as an application suite. A. All the above statements are correct B. Only (i), (ii), and (iv) C. Only (i), (ii), and (iii) D. Only (i) and (ii) ANSWER: B

Which of the following is NOT a function performed by application software? A. Managing Information B. Manipulating Data C. Calculating figures D. Memory Management ANSWER: D

Which command is used to view processes running in the background in linux? A. ls B. bg C. jobs D. dmsg ANSWER:C

mv command used for which purpose? A. Renaming a file B. Move the file to different directory. C. None of the mentioned D. Both A and B ANSWER:D

Which command are using view Hidden files? A. ls -a B. ls -l C. ls -h D. Is -k ANSWER:A create file in Linux which linux command are you using? A. touch B. cat C. echo D. All of the mentioned ANSWER:D

Which command is used to change password of linux system? A. password B. pass C. change -p D. passwd ANSWER:D

Which of the following command is used to print the login shell of an user? A. echo $SHELL B. echo $LSHELL C. echo $LOGIN D. None of the mentioned ANSWER:A

Which of the following command is used delete the directory? A. Deltree/f B. Erase *.* C. Deltree *.* D. *.*/p ANSWER:D

We can change the thickness of a line from ______A. Line width B. Line Height C. Line Thick

D. Line Style ANSWER:D

Color and pattern used to fill a closed shape is called______A. Shapes B. Word C. Fill Style D. Fill Back ANSWER: C

Which of the following is program group? A. Accessories B. paint C. Word D. All the mentioned ANSWER:A

Maximum number of lines you can set for a drop cap in Word? A. 15 B. 20 C. 10 D. Undefined ANSWER:C

Open office writer is not compatible with these extension? A. txt B. doc C. sxw D. csv ANSWER:D

List of files are waiting to be printed on printer is called A. print list B. print stack C. print queue D. print line ANSWER:C

Zip files are______A. Compressed Files B. Fragmented File C. Deleted Files D. Save Files ANSWER:A

Which of the following command is used to copy files and Directories

A. copy B. rm C. cpy D. ANSWER:D

All device files are stored in which directory in Linux A. /dev B. /usr C. /etc D. None of the mentioned ANSWER: A

Home directory represented by a ______symbol. A. # B. ~ C. ! D. $ ANSWER:B

Which of the command will be used to delete all the files from the current directory ? A. rm ? B. rm ?* C. rm [*1 D. rm * ANSWER:D

Which module gives control of the CPU to the process selected by the short-term scheduler? A. dispatcher B. interrupt C. schedule D. None of the mentioned ANSWER:A

Firewall is______A. A program that protects against viruses. B. A wall that is reinforced and cannot catch on fire. C. A filter for an internet connection that monitors outgoing and incoming activity. D. None of the mentioned ANSWER:C

Maintaining the security of important data is known as A. data backup B. data protection C. data locking

D. data securing ANSWER:A which of the following attacks firewall protects is? A. Phishing B. Dumpster diving C. Denial of Service (DoS) D. Shoulder surfing ANSWER:C

Do not satisfy the reason why people create a computer virus ? A. Protection B. Identity theft C. Pranks D. Research purpose ANSWER:A

How to set the environmental variable in Linux? A. grep i NAME=VALUE B. grep NAME=VALUE C. export NAME=VALUE D. env NAME=VALUE ANSWER: C

If you want to execute the file name demo.sh in linux, what command will you use ? A. chmod -x sh demo B. chmod +x demo.sh C. chmod +x sh demo.sh D. chmod +x sh demo ANSWER: C

When is it mandatory to use a antivirus on linux machine? A. While updating the softwares in linux B. For Upgrading linux versions C. When running linux based fileserver/mailserver D. While executing the linux commands in shell ANSWER: C

How to find a word hello in a welcome.txt file using linux command? A. grep welcome.txt find "hello" B. grep "hello" welcome.txt C. grep --find "hello" welcome.txt D. find "hello" welcome.txt ANSWER: B

What is the period character of the hidden file ssh in linux?

A. .ssh B. _ssh C. ssh. D. All of the mentioned ANSWER: A

What is the following command used to check the IP Address of the machine using command prompt? A. ipcheck B. ipaddress C. ipaddr D. ipconfig ANSWER: D

How to check how long the windows machine was running in windows machine? A. System time in Administration Tab B. System up time in Administration Tab C. System wakeup time in Performance Tab D. System up time in Performance Tab ANSWER: D

Which of the following statement is incorrect in windows? A. MSI is used only with installers B. MSI files cannot be used with installers C. MSI & EXE can be executed with installers D. Something else ANSWER: A

______command is used to check the connection between a local computer and other computer device? A. check B. ping C. connect D. search ANSWER: B

How large can a FAT32 partition be? A. 4 GB B. 100 GB C. 2 TB D. 16 Exabytes ANSWER: C

Which file system allows security to the file level? A. FAT16 B. FAT32

C. NTFS D. NTSF ANSWER: C

Which of the following is not a type of SCSI device? A. Hard disk B. CD-ROM C. Network card D. Scanner ANSWER: C

How many devices exist in an EIDE chain? A. 1 B. 2 C. 3 D. 4 ANSWER: D

How many bits are there in the Ethernet address? A. 16 bits B. 32 bits C. 48 bits D. 64 bits ANSWER: C

Geometric arrangement of devices on the network is called A. Protocols B. Topology C. Trailer D. LAN ANSWER: B

Which type of network would use phone lines? A. Wireless B. WAN C. LAN D. WWAN ANSWER: B

Which of the following is not a network device? A. Router B. Modem C. Bridge D. Switch ANSWER: B

Servers are other computer which provide resources to other computer connected by

A. Super computer B. Mainframe C. Network D. Client ANSWER: C

Which of the following refers to a small, single-site network? A. RAM B. DSL C. USB D. PAN ANSWER: D

The computer is experiencing a network problem. The first thing you do is determine that the Broadcom Ethernet NIC is working by checking Device Manager. This is also known as... A. Verify the physical connectivity B. Verify the ip configuration C. Verify the network adapter D. Verify the network connectivity ANSWER: C

After confirming drivers, plugging in cable, checking ipconfig (and fixing any issue) you go to test your connection through the PING command. All tests GOOD. This is also known as... A. Verify the physical connectivity B. Verify the ip configuration C. Verify the network adapter D. Verify the network connectivity ANSWER: D

You are given a laptop that "has no internet" - it's older and likely running Windows Xp/Vista. What is the MOST likely issue? A. All B. doesnot support wifi capabilities C. Wireless switch is off D. bad password ANSWER: C

There are two PC's with the IP addresses of 200.11.10.22 and 202.22.9.0 respectively.The PC will be able to: A. communicate via bridge B. communicate via swith

C. communicate via hub D. communicate via router ANSWER: D

What does a router do with a packet that it does not have a destination network for? A. Drops the packet B. Sends it to the serial port C. Forward the packet to the next hop D. Send it backs to the same interfae it was recieved ANSWER: A

When extending an existing wireless network, if additional access points must be installed, the design issues of overlap, redundancy, and ______must also be considered. A. Operating Range B. Data Transfer C. Capacity D. Roaming ANSWER: D

Hardware required to create a wired LAN is: A. NIC,Switch,Router,Transmission Media B. WAP,NIC,Router,Hub C. Router,Hub,NIC D. NIC,Router,Switch,Hub ANSWER: A

Which of the following holds true for bridges: A. bridges are simple and significant and reduce the amount of network traffic on a segment. B. Bridges doesnot isolate a busy network from a not-so-busy one. C. A bridge functions by keeping data and forwarding to all the devices. D. All are true ANSWER: A

Which of the following holds true in case of hub? A. In a hub, a frame is passed along or "broadcast" to every one of its ports and hub has no way of distinguishing which port a frame should be sent to. B. In a hub a frame is restricted to ports and we can distinguish which port it need to sent. C. Hub is faster than switchas as it can send or receive information just not at the same time. D. All are true ANSWER: A

What will you do if you recieve this message in your system,"One or more network protocols are missing on this computer". A. Reset sytem B. Disable 3rd Party Firewall or Security Suite C. Uninstall Network Adapters Using Device Manager D. All are true ANSWER: B

Which among the following is the least strong security encryption standard? A. WAP3 B. WAP C. WEP D. WAP2 ANSWER: C

A ______review the destination of the packet before sending. If the destination address is not on the other side of the bridge it will not transmit the data. A. Hub B. Router C. Bridge D. CAN ANSWER: C

Broadband service through DSL Provides: A. Wireline transmission technology that transmits data faster over traditional copper telephone lines already installed B. Wireless transmission technology that transmit data through cabel. C. Wireline transmission technology that transmits data through coaxial cables. D. None of the mentioned ANSWER: A

Which of the following is/are true for defining a router: A. The router is the device that connects several networks or segments to form a larger internetwork. B. The router is the device that facilitates communication within this internetwork. C. The router makes the selections about how best to send packets within the network so that they arrive at their destination. D. All statements define router. ANSWER: D

The user managegment feature in managed switches allow to: A. Give controlled access to multiple user B. Allow all users to access the network C. Partial controll over devices. D. Full controll to all the devices. ANSWER: A

What is the access point (AP) in a wireless LAN? A. device that allows wireless devices to connect to a wired network B. wireless devices itself C. both device that allows wireless devices to connect to a wired network and wireless devices itself D. all the nodes in the network ANSWER: A

Sending addess,destination address and the data are major components in A. Building a physical Network Infrastructure B. TCP/IP packet sent over ethernet C. Building MAC address D. Having connectivity with local network via router. ANSWER: B

When the ports are connected by default connections in linux server which of the statement is true? A. We need to connect the sub ports also. B. The associated port gets connected automatically. C. All the connections need to be done manually. D. Ports are blocked. ANSWER: B

Which on of the following would be considered as a way that a computer virus can enter a computer? A. Borrowed an illegel copy of software B. Running antivirus programs C. Opening an application previously installed D. Viewing a website without additional transaction ANSWER: A

Installing an unmanaged switch involves: A. All the options B. Connect an Ethernet cable from each device that will share the network connection to an open port on the switch. C. Disconnect all the devices from uplink. D. Uninstall OS ANSWER: B

The right to use a is delegated by domain name registers which are accredited by ______A. internet architecture board B. internet society C. internet research task force D. internet corporation for assigned names and numbers

ANSWER: D

The is maintained by ______A. distributed database system B. a single server C. a single computer D. none of the mentioned ANSWER: A

DHCP uses UDP port ______for sending data to the server. A. 66 B. 67 C. 68 D. 69 ANSWER: A

After obtaining the IP address, to prevent the IP conflict the client may use ______A. internet relay chat B. broader gateway protocol C. address resolution protocol D. none of the mentioned ANSWER: C

You install Windows NT Server on a computer, making the computer a backup domain controller in an existing domain. After installation, you discover that you used the wrong domain name. What should you do? A. Change the domain name by using Control Panel B. Modify the domain name in the Registry C. Reinstall Windows NT Server D. Change the domain name by using the Emergency Repair disk

Windows Naming Service (WINS) A. dynamically allocates IP addresses to client computers B. runs on Windows NT W/S C. resolves computer names to IP addresses D. Increases broadcast traffic ANSWER: C

Routers are often used to implement FIREWALLS A. True B. False C. May be D. Can't say ANSWER: A

You want to find out which users are currently using a specific directory on a Windows NT Server computer. How should you do this? A. Use Windows NT Explorer B. Use Disk Administrator C. Use Server Manager D. Use User Manager for Domains ANSWER: C

How can you use your adminsitrative rights when logged into a normal user account with normal user rights? A. dsa.msc B. dsadd.exe C. run as D. you cant. you must log into your administrator account to gain your administrative privileges. Ans: C

What tool can you use to verify that the Windows Hardware Quality Lab has approved all device drivers on your system? A. windvrs.exe B. rsdiag.exe C. sc.exe D. sigverif.exe Ans: D

Which of the following is the criterion most commonly used to lter les for backup jobs? A. Filename B. File extension C. File attributes D. File size Ans: C

What tool is used to enable Remote Desktop on a server? A. Terminal Services Manager B. Terminal Services Conguration C. System Properties in Control Panel D. Terminal Services Licensing Ans: C

Network backup devices most commonly use which drive interface? A. IDE B. SCSI C. USB D. Parallel port

Ans: B

What determines the assignment of data classifications in a mandatory access control (MAC) philosophy? A. The analysis of the users in conjunction with the audit department B. The assessment by the information security department C. The users evaluation of a particular information element D. The organizations published security policy for data classification ANSWER: D

Which of the following evidence collection method is most likely accepted in a court case? A. Provide a full system backup inventory. B. Create a file-level archive of all files. C. Provide a mirror image of the hard drive. D. Copy all files accessed at the time of the incident. ANSWER: C

Which e-mail standard relies on "Web of Trust"? A. Pretty Good Privacy (PGP) B. Privacy Enhanced Mail (PEM) C. MIME Object Security Services (MOSS) D. Secure Multipurpose Internet Mail Extensions (S/MIME) ANSWER: A

What determines the assignment of data classifications in a mandatory access control (MAC) philosophy? A. The analysis of the users in conjunction with the audit department B. The assessment by the information security department C. The users evaluation of a particular information element D. The organizations published security policy for data classification ANSWER: D

Which of the following evidence collection method is most likely accepted in a court case? A. Provide a full system backup inventory. B. Create a file-level archive of all files. C. Provide a mirror image of the hard drive. D. Copy all files accessed at the time of the incident. ANSWER: C

Which e-mail standard relies on "Web of Trust"? A. Pretty Good Privacy (PGP) B. Privacy Enhanced Mail (PEM)

C. MIME Object Security Services (MOSS) D. Secure Multipurpose Internet Mail Extensions (S/MIME) ANSWER: A

DNS database contains ______a) name server records b) hostname-to-address records c) hostname aliases d) all of the mentioned ANSWER: D

If a server has no clue about where to find the address for a hostname then ______a) server asks to the root server b) server asks to its adjcent server c) request is not processed d) none of the mentioned ANSWER: A

Which one of the following allows client to update their DNS entry as their IP address change? a) dynamic DNS b) mail transfer agent c) authoritative name server d) none of the mentioned ANSWER: A

What is /root? a) root filesystem b) home directory of the root user c) the directory which contains all the directories of the filesystem d) none of the mentioned ANSWER: B he /dev directory contains the a) device drivers b) device files c) kernel modules of device drivers d) none of the mentioned ANSWER: B

Which of the following commands would you type to see if the mail service is functioning and view a backlog of old messages? A. postfix B. traceroute C. sendmail D. mailq

ANSWER: A

Under what circumstances should a forwarding-only name server be accessible to the Internet at large? A. Rarely on never B. Almost always C. Only when your domain already has two other DNS servers on the Internet D. Only when you use BIND 8.x or later ANSWER: B

Why is it unwise to allow root to log on directly using SSH? A. Somebody with the root password but no other password could then break into the computer. B. The root password should never be sent over a network connection; allowing root logins in this way is inviting disaster. C. SSH stores all login information, including passwords, in a publicly readable file. D. When logged on using SSH, roots commands can be easily intercepted and duplicated by undesirable elements. ANSWER: A

Which of the following parameters should you definitely check and, if necessary, adjust in the [global] secton of your smb.conf file when configuring Samba? A. path B. workgroup C. comment D. write list ANSWER: A

Choose the correct password policy for windows: A. Maximum password age B. Minimum password age C. Minimum password length D. All of the mentioned Answer: D

If Maximum password age is between 1 and 999 days, the minimum password age must be______? A. Less than the maximum password age B. More than the maximum password age C. Equal to the maximum password age D. Something else Answer: A

What are the modes routing daemons operate in? A.Passive and active

B.Active C. Passive D.Passive or active Answer: D

Which protocol is supported by the gated daemons? A.BGP B.OSPF C.SNMP D.all Answer: D

In which mode dynamic routing daemons must be run? A.Passive B.active C.Static D.VIrtual Answer: A

RIP protocol is enhanced to RIPng to support what? A.IPv4 B.IPvX C.IPv6 D.IP Answer: C

What decides the number of gateways we need to configure? A.The number of networks you want to connect B.How you want to connect the networks C.The level of activity on the connected networks D.All Answer: D

When frames are not reaching their destination and the routing table indicates the correct route, what might be the problem? A. Network is failing B.Remote host or gateway C. Remote host or gateway is down D.All Answer: D

Which of the following is not a bulk emailing tool? A. Fairlogic Worldcast B. 123 Hidden sender C. YL Mail Man D. NetCut

Answer : D

What have used which crawl web pages looking for email Ids and copies them to the database? A. Caches B. Cookies C. Bots D. Spiders Answer : D Which of the following is not a proper way of how spammers get the email Ids? a) When a user registers to online services, blogs, and sites b) Databases formed by spiders fetching email Ids from different sources c) From offline form fill-up documents d) Online ad-tracking tools Answer: C There are ______types of spamming. a) 3 b) 4 c) 5 d) 6 Answer: C

If you are using a public system and you want to do a financial transaction, which method should you choose? a) Private window / Incognito mode b) Normal mode c) Install a new web browser d) Something else Answer: A

Which of the following is considered as a first web browser? a) Internet explorer b) Nexus c) Google Chrome d) none Answer: B

What's a web browser? a) A kind of spider b) A computer that stores WWW files c) A person who likes to look at websites d) A software program that allows you to access sites on the World Wide Web Answer: D

The open-source software version of Netscape is ______? a) Chrome

b) Mozilla c) Internet Explorer d) Erwise Answer: B

Main component of Hypernet software infrastructure? A. Blockchain Resource Scheduler. B. The API is based on the principle of distributed average consensus C. Hypernet operating environment D. All of the mentioned Answer: D

Hypernet ecosystem includes_____of computing power. A. Buyers and sellers B. Producer and consumer C. Company and User D. Something else Answer: A

In which mode of telnet, the client echoes the character on the screen but does not send it until a whole line is completed? A. default mode B. character mode C. server mode D. command mode Ans: A

TeamViewer.exe is a legitimate executable file developed by ______A. TeamViewer GmbH B. Dream Viewer C. BlackBerry D. None Ans: A

Hypernet builds on a ______model, also known as the Distributed Average Consensus (DAC). A. Parallel programming B. Serial Programming C. Python Programming D. Something else Answer: A