Créer une activité
Jouer Test
1. 
An expert system works with
A.
(a) Information
B.
(b) Data
C.
(c) Knowledge
D.
(d) Both (a) & (c)
E.
(e) None of these
2. 
The sound signal carried by telephone line is
A.
(a) Analog
B.
(b) Digital
C.
(c) Randomized
D.
(d) Customized
E.
(e) None of these
3. 
MS Access is an application software used for maintaining & creating
A.
(a) Spreadsheets
B.
(b) File
C.
(c) Databases
D.
(d) DBMS
E.
5) NONE OF THESE
4. 
Which of the following is most necessary for data to useful?
A.
(a) Availability and Integrity
B.
(b) Integrity and Confidentiality
C.
(c) Availability and Confidentiality
D.
(d) Availability, Integrity and Confidentiality
E.
5) NONE OF THESE
5. 
Which of the following testing is most common producing software?
A.
(a) Regression Testing
B.
(b) Black Box Testing
C.
(c) Integration Testing
D.
(d) Both (a) & (b)
E.
(e) None of the above
6. 
Generation of PIN in Bank ATM would require:
A.
(a) Acquirer validates information
B.
(b) Acquirer sends response to the acceptor
C.
(c) Authorization request is sent to the acquirer
D.
(d) PIN entered is encrypted(e) None of these
E.
5) NONE OF THESE
7. 
Dataflow diagrams show:
A.
(a) Relationships that link the input, processing, and output of the system
B.
(b) Evaluate and describe internal controls within the I process
C.
(c) Illustrate the sequence of logical operations performed by a computer while executing a program
D.
(d) Depict the arrangement of hardware components in a computer system
E.
5) NONE OF THESE
8. 
Function of DMA chip is
A.
(a) Help CPU with math functions
B.
(b) Help CPU manage buses
C.
(c) Help CPU manage memory
D.
(d) Help CPU manage interface
E.
(e) None of these
9. 
System flowcharts show;
A.
(a) Relationships that link the input, processing, and c of the system
B.
(b) Evaluate and describe internal controls with a process
C.
(c) Illustrate the sequence of logical operationsperformed by a computer while executing a program
D.
(d) Depict the arrangement of hardware components in computer system
E.
(e) None of these
10. 
A way of hacking is when hacker sends requests to the server continuously so that the server can process none other request. Which one of the following activities help in preventing this type of Denial of Service attacks?
A.
(a) Detailed audit trails
B.
(b) A complete understanding of the configuration
C.
(c) Good inter-departmental standard and emergency procedures
D.
(d) Either (a) or (b)
E.
(e) All of the above
11. 
Law abiding employees that report the flaw found in the software to the owner are called:
A.
(a) White hats
B.
(b) Black hats
C.
(c) Grey hats
D.
(d) Either (a) or (b)
E.
(e) All the above
12. 
A networked audio speaker is a/an
A.
(a) Output device
B.
(b) Input device
C.
(c) Storage device
D.
(d) Network resource
E.
(e) None of these
13. 
Card reader is ___ device while card is ____device.
A.
(a) Input, Output
B.
(b) Output, Output
C.
(c) Input, Input
D.
(d) Output, input
E.
(e) None of these
14. 
Tape is an __________.
A.
(a) Storage device
B.
(b) Input device
C.
(c) Off line equipment
D.
(d) Either (a) or (c)
E.
(e) All of these
15. 
Which of the following is NOT required to change if processing capabilities of computer have to be upgraded?
A.
(a) Motherboard
B.
(b) Cache
C.
(c) VDU
D.
(d) Both (a) & (b)
E.
5) NONE OF THESE
16. 
Which of the following is NOT a peripheral?
A.
(a) Cable
B.
(b) Data
C.
(c) VDU
D.
(d) Cache
E.
5) NONE OF THESE
17. 
Protocol is __________.
A.
(a) A network
B.
(b) Networking device
C.
(c) Logical connection
D.
(d) Program
E.
5) NONE OF THESE
18. 
Protocols are __________.
A.
(a) Hardware
B.
(b) Software
C.
(c) Firmware
D.
(d) Both (a) & (c)
E.
5) NONE OF THESE
19. 
Which of the following is NOT a protocol?
A.
(a) Application
B.
(b) TCP
C.
(c) IP
D.
(d) FTP
E.
5) NONE OF THESE
20. 
Which of the following requires two keys?
A.
(a) Symmetric Cryptography
B.
(b) Asymmetric Cryptography
C.
y (c) Cryptanalysis
D.
(d) Cryptology
E.
5) NONE OF THESE