<<

S. No Question A B D Answer

Independent malicious program that need not any 1 Trap doors Trojan horse Virus Worm D D host program is known as 2 Which was the first ever software GWA IIS 5.0 CERN nginx C which of the following name does not relate to 3 LIFO list Piles Push-down lists FIFO lists D stacks? 4 The error that can be pointed out by Semantic error Logic error Syntax error Internal error C Erasing magnetic Creating magnetic Attachment None of the 5 What is degauss A media media with CPU above Using SQL Server 2000, which of the following 6 symbols is used to indicate parameters in stored $ # % @ D procedures? Devices on one network can communicate with 7 File server Gateway Utility server Printer server B devices on another network via a All of the 8 Which is the feature of OOPS Polymorphism Encapsulation Inheritance D above Properties and Elements and Structure and Tables and 9 XML Schemas consist of B methods attributes data relationships A device that protects against a sudden increase in Electrical Voltage 10 Surge protector Anti-spiker B electrical power is a(n) manipulator regulator In SQL, which command(s) is(are) used to All of the 11 MODIFY USER ALTER USER CHANGE USER B enable/disable a database trigger? above Top-down Bottom-up Left-right None of the 12 E-R modelling technique is a A approach approach approach above None of the 13 To sort the results of a query use: ORDER BY SORT BY GROUP BY A above McDonalds 14 Which of these is a documented hoax virus? Alien.worm Merry Xmas Adolph A screensaver Technique that is used to send more than one call Infrared 15 Digital transmission Streaming Multiplexing D over a single line is transmission Which one of the folloiwng would you find on 16 Games Connections Chat Applications B LinkedIn

______is a form of denial of service attack in Software 17 which a hostile client repeatedly sends SYN packets Cyber Crime Memory Shaving Synflooding C Piracy to every port on the server using fake IP addresses

A USB communication device that supports data USB Wireless 18 for secure wireless communication for Wireless switch wireless hub router A network adapter notebooks users is called a

Collecting personal information and effectively 19 Spooling Spoofing Hacking Identify theft D posing a another individual is known as the of

The first digital computer built with IC Chips was IBM System / 20 IBM 7090 Apple -1 VAX-10 C known as 360 Different components of the motherboard of a PC 21 unit are linked together by sets of parallel electrical Conductors Buses Connectors Consecutive B conducting lines. What are these lines called? The displayed data over internet can be classifed 22 Static & Dynamic Graphica & Text Data & Voice None A into two types. They are Which of the following activity can be termed as 23 Soft loading Counterfieting Both (a) & (b) None D software piracy Layer which deals with the transportation of binary 24 data and defines cable & electrical specifications is Data Link Layer Physical Layer Session Layer None B known as 25 In Windows ME, what does ME stand for? Micro-Expert Millennium-Edition Multi-Expert None B Dr. EF Codd represented ______rules that a

 
 
 
 26 database must obey if it has to be considered a truly 4 8 12 7 C relational 
27 In ER diagram; relationship type is represented by Rectangle Diamond Ellipse Circle A Douglas Robert 28 First Computer Mouse was built by Robert Zawacki William English C Engelbart Downey Program or Program or Program or instruction that instruction that is instruction that is is interpreted 29 A script is a interpreted and interpreted and None B and carried out carried out by the carried out by the by the web processor directly another program server

30 Microprocessor 8085 can address location upto 32K 128K 64K 1M C In …………………. , test cases are designed using only the functional specification of the software without acceptance 31 white-box testing black-box testing system testing B any knowledge of the internal structure of the testing software. …………………… is usually relied on to detect the Regression Black-box 32 faults, in addition to the faults introduced during System testing Acceptance testing B testing testing coding phase itself. 33 Single Linked list search complexity is O(1) O(n) O(log log n) None of these B

Which one of the following in place sorting 34 Heap sort Insertion sort Quick sort Selection sort D algorithms needs the minimum number of swaps?

35 Who invented the Graphical User Interface(GUI) ? Apple Bell Labs Windows Xerox D What is the transfer rate of a standard USB 2.0 36 480 Mbit/s 100 Mbit/s 1 Gbit/s 250 Mbit/s A Device? 37 While we're on the subject of USB, who invented it? Apple AMD Samsung Intel D

An internetworking protocol that provides virtual None of the 38 X.25 X.400 X.75 C circuit service across multiple X.25 protocol, is above The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI model. A 39 number of standards were agreed upon during that 802.2 802.3 802.4 802.5 B time. Which of the following is the standard for Ethernet? Who is considered to be the "father" of artificial John 40 Fisher Ada Allen Newell Alan Turning D intelligence? McCarthy The conference that launched the AI revolution in 41 Stanford Dartmouth New York Harvard B 1956 was held at? deadlock mutual 42 Banker's algorithm for resource allocation deals with deadlock avoidance deadlock prevention A recovery exclusion interconnecting connecting a Connecting a a number of number of Nonel of the 43 Daisy chain is a device for number of devices devices to a B controllers to a above to a controller number of device controllers An unwanted An directing An email warning An email email that the recipient to the recipient of a advertyising a installs a virus 44 Which one fo the following best describes ? enter personal A department on the details on a fake store recipeint's computer wi-fi protected wired protected wired process wi-fi process 45 What is WPA? A access access access access

 
 
 
 46 Information Technology Act in India was amended in 2000 2004 2008 2010 C 
a security hole, inserted at security hole in None of the 47 What is a trap door in a program? programming time a type of antivirus A a network above in the system for later use The Caesar cipher is a ______cipher that has a key None of the 48 transposition additive shift C of 3. above Which of the following is independent malicious 49 Trap doors Trojan horse Worm Virus C program that need not any host program? Protocol that has flow control, but not error control Selective-Repeat 50 Simplest Go-Back-N ARQ Stop-and-Wait D is ARQ
 
 
 
 51 SONET sends ______frames per second. 1000 2000 4000 8000 D 
a string of a string of 63 None of the 52 The root of the DNS tree is ______. an empty string C characters characters above 53 ______uses thin coaxial cable. 10Base5 10Base2 10Base-T 10Base-F B 54 Which topology requires a multipoint connection? Mesh Star Bus Ring C Which agency developed standards for physical 55 connection interfaces and electronic signaling ITU-T EIA ISO ANSI B specifications? ______refers to the physical or logical arrangement Mode of None of the 56 Data flow Topology B of a network? operation above Which one of the following is not a layer of Application Critical 57 Kernel Shell D ? program selection 58 What is the extension of font file? .ttf .mdb .fft .txt A Terminate and Stay Take Status Token Set 59 What is TSR in operating system? Test Status Request B Resident program Request Ready Which of the following is characteristic of an resource memory 60 error recovery All the above D operating system? management management What is the initial value of the semaphore to allow
 
 
 
 61 only one of the many processes to enter their critical 8 1 16 0 B section? 
What scheduling algorithm allows processes that are preemptive non-preemptive 62 FIFO FCFS A logical runnable to be temporarily suspended? scheduling scheduling Read the input Specify, to the from the slow- operating system, Allocate the None of the 63 Job Control Language (JCL) statements are used to speed card reader the beginning and B CPU to a job above to the high-speed end of a job in a magnetic disk batch

Computation Tree Computation Computation 64 Expand CTL? Common Tree Logic B Logic Text Logic Transfer Logic A station in a network forwards incoming packets by None of the 65 placing them on its shortest output queue. What Static routing Hot potato routing Delta routing B Above routing algorithm is being used? How many digits of the DNIC (Data Network None of the 66 First Three First Four First Five A Identification Code) identify the country Above

1001011111001110010000110 
1001100 67 The octal number 234 is equal to Binary number B pre> e> 0
01
What type of connector is used to plug a telephone 68 RJ-11 RJ-45 RJ-10 COM1 A line into a modem? Margin that is Margin that is Margin that is Margin that is added to the added to the left added to the added to right 69 What is gutter margin when we use MS Office? outside of the B margin when binding side of page margin when page when printing when printing printing printing Cyclimatic Graph based None of the 70 White box testing method does not have Loop Testing C Complexity testing above The ability of an OS to run more than one Object Oriented Multi-use 71 Multitasking Time sharing A application at a time is called Programming DHCP is a technique DHCP is a DHCP enables a NIC DHCP enables a NIC whereby IP routing Which of the following definitions correctly to determine the to determine the IP addresses are protocol run 72 describes the Dynamic Host Configuration Protocol C MAC address for a address for a given assigned by routers (DHCP)? given IP address MAC address centrally by a within a server to each network host. Which of the following registers is used to keep track Memory address Memory data Instruction Program 73 of address of the memory location where the next D register register register counter instruction is located? 74 The view of total database content is Conceptual view. Internal view. External view. Physical View. A What is the range of the numbers which can be 75 -127 to +127 -128 to +128 -128 to +127 -127 to +128 C stored in an eight bit register ? In memory management , a technique called as 76 paging, physical memory is broken into fixed-sized Pages Frames Blocks Segments B blocks called Computers that control processes, accept data in a 77 Data traffic pattern Data highway Infitine loop Feedback loop D continous….. A device for changing the connection on a connector 78 A converter A component An attachment An adapter D to a different configuration The method of Internet access that requires a phone Digital Fiber Optic 79 line, but offers faster access speeds than dial-up is Cable access Satellite access Subscriber D Service the ______Connection Line (DSL) Physical security is concerned with protecting computer hardware from human tampering and 80 natural disasters and ______security is Data Cyber Internet Metaphysical A concerned with protecting software from unauthorized tampering or damage Where you are likely to find an embedded operating On a desktop On a 81 On a networked PC On a PDA C system? operating system mainframe Human beings are referred to a Homo Sapiens, Hybrid Mainframe 82 Analog Computer Digital Computer C which device is called Silico Sapiens Computer Computer Computer is free from tiresome and boredom. We 83 Accuracy Diligence Versatility None B call it Before a disk drive can access any sector record, a computer program has to provide the record's disk 84 Track number Sector number Surface number All of above D address. What information does this address specify? 85 A set of flip flops integrated together is called Counter Adder Register None of above C 86 1 nibble equals to 1 bit 2 bits 4 bits 8 bits C Manual 87 Daisy wheel printer is a type of Matrix printer Impact printer Laser printer B printer 88 Which of these is considered intelligent CASE tool Workbench Toolkit Upper CASE Lower CASE A Data availability Data 89 ______is one reason for problems of data integrity Data inconsistency None of above A constraints redundancy Malicious modification or destruction of data such as 90 Super Zapping Vandalism None B changing information on Web sites is called Resource Which one of the following is a cryptographic Transport Layer Explicit Congestion Reservation Data Link 91 A protocol used to secure http concession? Security Notification Notification Layer (R&N) The script will output Data that can extracted from The @active data warehouse architecture includes At least one data Near real-time 93 numerous internal All of above D which of the following? mart updates and external sources A snowflake schema is which of the following types 94 Fact Dimension Helper All of above D of tables? all of the 95 A procedure that calls itself is called reverse polish illegal call recursive C above Natural language processing is divided into the two symbolic and algorithmic and understanding None of the 96 C subfields are numeric heuristic and generation above

Object modules generated by assemblers that 97 contain unresolved external references are resolved operating system loader compiler linker D for two or more object modules by a/an

A relationship between processes such that each has some part (critical section) which must not be multiprogramm 98 semaphore mutual exclusion multitasking B executed while the critical section of another is ing being executed, is known as For how many processes which are sharing common

 
 
 
 99 data, the Dekker's algorithm implements mutual 1 2 3 4 B exclusion? 
is the recorded history can be used to is used to make back- An audit trail of operations restore lost All of the above B 100 up copies performed on a file information