MS Access is an application software used for maintaining & creating
A.
Spreadsheets
B.
File
C.
Databases
D.
DBMS
4.
Which of the following is most necessary for data to useful?
A.
Availability and Integrity
B.
Integrity and Confidentiality
C.
Availability and Confidentiality
D.
Availability, Integrity and Confidentiality
5.
Which of the following testing is most common producing software?
A.
Regression Testing
B.
Black Box Testing
C.
Integration Testing
D.
Both (a) & (b)
6.
Generation of PIN in Bank ATM would require:
A.
Acquirer validates information
B.
Acquirer sends response to the acceptor
C.
Authorization request is sent to the acquirer
D.
PIN entered is encrypted
7.
Dataflow diagrams show:
A.
Relationships that link the input, processing, and output of the system (
B.
Evaluate and describe internal controls within the I process
C.
Illustrate the sequence of logical operations performed by a computer while executing a program
D.
Depict the arrangement of hardware components in a computer system
8.
Function of DMA chip is
A.
Help CPU with math functions
B.
Help CPU manage buses
C.
Help CPU manage memory
D.
Help CPU manage interface
9.
System flowcharts show;
A.
Relationships that link the input, processing, and c of the system
B.
Evaluate and describe internal controls with a process
C.
Illustrate the sequence of logical operations performed by a computer while executing a program
D.
None of these
10.
A way of hacking is when hacker sends requests to the server continuously so that the server can process none other request. Which one of the following activities help in preventing this type of Denial of Service attacks?
A.
Detailed audit trails
B.
A complete understanding of the configuration
C.
Good inter-departmental standard and emergency procedures
D.
Either (a) or (b)
11.
Law abiding employees that report the flaw found in the software to the owner are called:
A.
White hats
B.
Black hats
C.
Grey hats
D.
Either (a) or (b)
12.
A networked audio speaker is a/an
A.
Output device
B.
Input device
C.
Storage device
D.
Network resource
13.
Card reader is ________ device while card is ___________ device
A.
Input, Output
B.
Output, Output
C.
Input, Input
D.
Output, input
14.
Tape is an __________.
A.
Storage device
B.
Input device
C.
Off line equipment
D.
Either (a) or (c)
15.
Which of the following is NOT required to change if processing capabilities of computer have to be upgraded?
A.
Motherboard
B.
Cache
C.
VDU
D.
Both ('a) & (b)
16.
Which of the following is NOT a peripheral?
A.
Cable
B.
Data
C.
VDU
D.
Cache
17.
Protocol is __________.
A.
A network
B.
Networking device
C.
Logical connection
D.
Program
18.
Protocols are __________.
A.
Hardware
B.
Software
C.
Firmware
D.
Both (a) & (c)
19.
Which of the following is NOT a protocol?
A.
Application
B.
TCP
C.
IP
D.
FTP
20.
Which of the following requires two keys?
A.
Symmetric Cryptography
B.
Asymmetric Cryptography
C.
Cryptanalysis
D.
Cryptology
21.
What are the categories under which X.25 devices fall?
A.
DCE only
B.
DTE and PSEs
C.
DTE and DCE only
D.
D DTE, DCE and PSEs
22.
Processes in a Transaction Processing System are:
A.
Data Validation
B.
Data Preparation
C.
Data Entry
D.
Either (b) or (c)
23.
All decisions for a LAN are taken by
A.
The IT steering committee
B.
The top management
C.
A business analyst
D.
A project manager
24.
Why is the Penetration Testing done?
A.
To make the top management aware of the security issues
B.
To test intrusion detection and response capabilities
C.
To help in decision making process
D.
To identifying the systems to be tested
25.
__________ is a supercomputer created by networking many small computers.
A.
ASCI White
B.
Grid
C.
LAN
D.
Network Super
26.
What is common between a GSM (Global System for Mobile Communication) network and EDGE (Enhanced Data for GSM Environment) ?
A.
Both use the TDMA frame structure
B.
Both deliver a data rate of 382 Kbps
C.
Both use the same transceiver uni
D.
Both use phase shift modulation
27.
To verify the length of a number entered by an user in a numeric field, we put controls at
A.
Form Level
B.
Validation Lists
C.
Field Level
D.
Filtering Keyboard Input
28.
__ mode of E-mail access is allowed by Internet Message Access protocol.
A.
Online
B.
Offline
C.
Disconnected
D.
Both (a) & (b)
29.
One of the activities performed in the pre-contract phase of a software acquisition project is ______
A.
Identification of alternative
B.
Testing and acceptance
C.
Contract management
D.
Both (a) & (b)
30.
RAM is a __________.
A.
Storage device
B.
Software
C.
Hardware
D.
Memory
31.
FAQ is on website means __________
A.
Questions that are generally asked and put up by the developer himself.
B.
Question that users frequently asked
C.
An urgent message
D.
Both (b) & (c)
32.
"Platform" in computer world means ________
A.
Computer hardware used
B.
Operating Systems used
C.
Both of these
D.
All of these
33.
Which of the following is a newsgroup?
A.
Usenet)
B.
Newsgroup
C.
Newsgroup
D.
Either (a) or (b)
34.
Megabits per second is measurement of ________
A.
Transmission speed of modern
B.
Processing speed of computer
C.
Speed of network
D.
Either (a) or (c)
35.
MIPs is measurement for the speed of _____
A.
Network
B.
Modem
C.
Computer
D.
Either (b) or (c
36.
Which of the following is NOT a network?
A.
TCP/IP
B.
LAN
C.
PSTN
D.
Internet
37.
What is (1000)2 equal to?
A.
(10)10
B.
(10)2
C.
(8)10
D.
(8)16
38.
A collection of interrelated data with set of program to access it forms
A.
Language
B.
Array
C.
Database
D.
All applications
39.
A database that stores data as tables is called
A.
Network database
B.
Hierarchical database
C.
Relational database
D.
DBMS
40.
A database supporting one to many relationship is
A.
Network database
B.
Hierarchical database
C.
Relational database
D.
DBMS
41.
A database supporting many to many relationship is
A.
Network database
B.
Hierarchical database
C.
Relational database
D.
DBMS
42.
Most cumbersome database structure is
A.
Network database
B.
Hierarchical database
C.
Relational database
D.
DBMS
43.
Which of the following is NOT the job of DBMS?
A.
Storing files
B.
Indexing files
C.
Manipulating files
D.
Feeding files
44.
ASCII value of E is 69, then ASCII value of A will be
A.
64
B.
65
C.
70
D.
can’t say
45.
Character whose ASCII value is 97 is
A.
a
B.
z
C.
y
D.
Can’t be determined
46.
An input device _________.
A.
Takes data from computer
B.
Gives data to computer
C.
Stores information
D.
Does all the above
47.
A character that changes its value throughout the program is called _____
A.
Constants
B.
Variables
C.
Type definitions
D.
Function
48.
A module that does a specific work is called ______
A.
Constants
B.
Variables
C.
Type definitions
D.
Function
49.
A character that retains its value during program execution is ____
A.
Constants
B.
Variables
C.
Type definitions
D.
Function
50.
A program coded in programming language is __________.