Multiple Choice Question and Answer Paper of computer
Q.1 Which of
the following is not an scripting language ?
(A) HTML
(C) Postscript |
(B) XML
(D) Javascript |
Ans: C Postscript
Q.2 Which of the following is a platform free language
(A) Fortran
(C) C |
(B) Assembly
(D) Java |
Ans: D Java
Q.3 A digital signature is
(A) scanned signature
(C) encrypting information |
(B) signature in binary form
(D) handwritten signature |
Ans: C encrypting information
Q.4 Mechanism to protect private networks from outside attack is
(A) Firewall
(C) Digital signature |
(B) Antivirus
(D) Formatting |
Ans: A Firewall
Q.5 A computer system that permits multiple users to run programs at same time
(A) Real time system
(C) Time sharing system |
(B) Multi programming system
(D) Multi tasking system |
Ans: D Multi tasking system
Q.6 A computer communication technology that provides a way to interconnect
multiple computer across short distance is
Q.6 A computer communication technology that provides a way to interconnect
multiple computer across short distance is
(A) LAN
(C) WAN |
(B) MAN
(D) Wireless network |
Ans: A LAN
Q.7 Telnet is a service that runs
(A) Television on net
(C) Cable TV network |
(B) Remote program
(D) Telenext |
Ans: B Remote program
Q.8. A device that forwards data packet from one network to another is called a
(A) Bridge
(C) Hub |
(B) Switch
(D) Gateway |
Ans: B Switch
Q.9 Which of the following is the fastest media of data transfer
(A) Co-axial Cable
(C) Telephone Lines |
(B) Untwisted Wire
(D) Fibre Optic |
Ans: D Fiber Optic.
Q.10 Tool that is used to transfer data/files among computers on the
Internet
(A) FTP
(C) TCP |
(B) Archie
(D) Gopher |
Ans: C TCP
Q.11 HTML is a
(A) Programming Language
(C) Web Browser |
(B) Scripting Language
(D) Network Protocol |
Ans: B Scripting Language
Q.12 Secret-key encryption is also known as
(A) Asymmetric encryption
(C) Secret-encryption |
(B) Symmetric encryption
(D) Private encryption |
Ans: D Private encryption
Q.13 The concept of electronic cash is to execute payment by
(A) Credit Card
(C) Using computers over network |
(B) ATM Card
(D) Cheque |
Ans: C Using computers over
network.
Q.14 SMTP is a
(A) Networking Protocol
(B) Protocol used for transferring message between end user &
Mail Server
(C) Protocol used for smart card message interchange
(D) Encryption Standard
Ans: B Protocol used for transferring message between end user & Mail Server.
Q.15 Digital Signature is
(A)Scanned Signature on Computer
(B) Code number of the sender.
(C)Public Key Encryption.
(D)Software to recognize signature.
Ans: D Software to recognize signature
Q.16 Telnet is a
(A) Network of Telephones
(C) Remote Login |
(B) Television Network
(D) Remote Login. |
Ans: C Remote Login.
Q.17 The internet is
(A) Network of networks (B) Web site.
(C) Host (D) Server
Ans: A Network of networks
Q.18 An e-business that allows consumer to name their own price for products
and services is following which e-business model?
(A) B2B
(C) C2C |
(B) B2G
(D) C2B |
Ans: D C2B
Q.19 Kerberos is an encryption-based system that uses
(A) Secret key encryption
(C) Private key encryption |
(B) Public key encryption
(D) Data key encryption |
Ans: A Secret key encryption.
Q.19 The method(s) of payment for online consumers are
(A) Electronic cash
(C) Electronic checks |
(B) Credit/debit
(D) All of the above |
Ans: D All of the Above.
Q.20 DNS is
(A) The distributed hierarchical naming system
(B) The vertical naming system
(C) The horizontal naming system
(D) The client server system
Ans: C The horizontal naming system.
Q.21 A firewall is
(A) An established network performance reference point.
(B) Software or hardware used to isolate a private network from a public network.
(C) A virus that infects macros.
(D) A predefined encryption key used to encrypt and decrypt data transmissions.
Ans: B Software or hardware used to isolate a private network from a public network.
Q.22 A router
(A) Screens incoming information.
(B) Distributes information between networks
(C) Clears all viruses from a computer system
(D) Is a work virus.
Ans: B Distributes information between networks
Q.23 LDAP stands for
(A) Light weight Data Access Protocol.
(B) Light weight Directory Access Protocol.
(C) Large Data Access Protocol.
(D) Large Directory Access Protocol.
Ans: B -> Light weight Directory Access Protocol.
Q.24 E-Commerce is not suitable for
(A) Sale/Purchase of expensive jewellery and antiques.
(B) Sale/Purchase of mobile phones.
(C) Sale/Purchase of branded clothes.
(D) Online job searching.
Ans: D Online job searching
Q.25 Amazon.com comes under the following model
(A) B2B
(C) C2C |
(B) B2C
(D) C2B |
Ans: B B2C
Q.26 Hubs are present in the network
(A) to diagnose line failures, measure and manage traffic flow and simplify re
configuring of LANs.
(B) to interconnect the LAN with WANs.
(C) to interconnect the WANs with WANs.
(D) to interconnect the WANs with LANs.
Ans: B to interconnect the LAN with WANs.
Q.27 Firewalls operate by
(A)The pre-purchase phase.
(B) isolating Intranet from Extranet.
(C)Screening packets to/from the Network and provide controllable filtering of network
traffic.
(D)None of the above.
Ans: C
|
Screening packets to/from the Network and
provide controllable filtering of
network traffic. |
Q.28 The mercantile process model consists of the following pahase(s):
(A)
(B) (C) (D) |
The pre-purchase phase.
Purchase consummation phase. Post-purchase Interaction phase. All of the above. |
Ans: D All of the Above
No comments:
Post a Comment