COMPUTER -SYSTEM MAINTENANCE
1:-What are the active devices of I generation computer A:-Vacuum tubes B:-Transister C:-Integrated Circuits D:-Microprocessor Ans: A
2:-Which of the following is not a language translator A:-Assembler B:-Interpreter C:-Compiler D:-Application Ans: D
3:-Choose the correct HTML tag to make the text bold: A:-<b> B:-<bold> C:-<strong> D:-Both (A) and (B) Ans: D
4:-Which one of the following is a volatile memory? A:-ROM B:-RAM C:-EPROM D:-EEPROM Ans: B
5:-Which of the following is an extension of image file? A:-exe B:-txt Cr-Jpeg D:-doc Ans: C
6:-The term "Pentium" relates to A:-Operating system B:-Microprocessor C:-Hard disk D:-Output device Ans: B
7:-Which of the following is not a flavor of Linux? A:-Redhat B:-Ubuntu C:-Suse D:-OS/2 Ans: D
8:-Which of the following is used to keep a process running in background even after the user logout from shell? A:-bg B:-hup C:-& D:-nohup Ans: D
9:-On successful execution, fork returns _ to parent process
A:-0
B:- 1
C:-Child process id
D:-Parent process id
Ans: C
10:-Which of the following is used to display the content of a file in octal format? A:-cat B:-oct C:-od D:-octal Ans: C
11:-_____is the concatenation operator in PHP
A:-.(dot)
B:-+
C:-=
D:-"
Ans: A
12:-Default return type of a function is
A:-null B:-void C:-int D:-float
Ans: C
13:-Which of the following is the last character of a string
A:-\0 B:-\n C:-\t D:-none of these
Ans: A
14:-Name of an array returns ______
A:-First element of the array B:-Size of the array C:-Number of elements of the array D:-Base address of the array
Ans: D
15:-______ is a built-in JavaScript function which can be used to execute another function after a given time interval.
A:-Timeout( )
B:-Time|nterval( )
C:-setTimeout( )
D:-All of the above
Ans: C
16:-A dynamic web page is
A:-Displayed the same every time
B:-Generated on demand by a program on a request from browser
C:-Both (A) and (B)
D:-None of the above
Ans: B
17:-Which of the following is NOT TRUE about PHP?
A:-PHP can be used to develop web applications
B:-PHP makes a website dynamic
C:-PHP applications cannot be compiled
D:-PHP cannot be embedded into HTML
Ans: D
18:-What is the return value of malloc()?
A:-size of the allocated memory B:-base address of the allocated memory
C:-1 if memory allocation is success D:-none of these
Ans: B
19:-Which of the following header file must be included to use dynamic memory allocation functions?
A:-dos.h
B:-stdio.h
C:-stdlib.h
D:-memory.h
Ans: C
20:-CSS is an acronym for
A:-Cascading Style Sheet B:-Cascading Style System C:-Cascading server Sheet D:-None of the above
Ans: A
21:-Which of the following statements is TRUE about JavaScript?
A:-JavaScript is designed to add style to HTML pages
B:-JavaScript is designed to add interactivity to HTML pages
C:-JavaScript is used to perform server side scripting operations
D:-None of the Above
Ans: B
22:-Information on basic system configuration is stored in
A:-BIOS
B:-CMOS
C:-CONFIG.SYS
D:-ROM
Ans: B
23:-Where do PC store CMOS settings?
A:-RAM B:-Flash ROM C:-South bridge D:-NVRAM
Ans: B
24:-How can you remove a CMOS password?
A:-Flash the BIOS B:-Change the system clock to 00/00/0000
C:-Sent it back to factory D:-Remove jumper on the mother board Ans: D
25:-Power-on self-test checks all of the flowing except A:-CPU B:-Memory C:-Modem D:-Video Ans: C
26:-Which of the following is a special database that holds key information about your system including the device drivers?
A:-BOOT.INI B:-CONFIG.SYS C:-SYSTEM.INI D:-Registry
Ans: D
27:-IDE cables have how many pins?
A:-24 B:-32 C:-40 D:-64 Ans: C
28:-Which controller support an external CD drive? A:-ESDI B:-MFM C:-SCSI D:-ARLL Ans: C
29:-Which of the following describes a fragmented hard disk? A:-Fi|es are corrupted B:-C|usters of data are damaged C:-Storage media is damaged D:-Fi|es are not stored in consecutive clusters Ans: D
30:-A 16 bit address bus can generate _ addresses. A:-65536 B:-32768 C:-32767 D:-None of these Ans: A
31:-The size of registers of 8086 microprocessor. A:-12 bits B:-8 bits C:-16 bits D:-32 bits Ans: C
32:-|f there is a carry from lowest nibble during addition, _ flag is set. A:-Carry flag B:-Overflow Flag C:-Auxiliary carry D:-Sign flag Ans: C
33:-The number of address and data lines of 8086
A:-8 and 8 B:-16 and 16 C:-20 and 16 D:-16 and 20
Ans: C
34:-Which directory contains configuration files in linux?
A:-/bin/ B:-/etc/ C:-/root/ D:-/dev/
Ans: B
35:-On successful completion, fork() returns _ to the parent process. A:-0 B:-1 C:--1 D:-Process ID of child process Ans: D
36:-Marquee is a tag in HTML used to: A:-Mark the list of items to maintain in queue B:-Mark the text so that it is hidden in browser C:-Display text with scrolling effect D:-None of the Above Ans: C
37:-Default storage class of a variable declaration is _ A:-auto B:-extern C:-static D:-register Ans: A
38:-Fast access to data items available in a database file can be provided through A:-|ndex file B:-data file C:-data dictionary D:-metadata file Ans: C
39:-The term _ is used to refer to a row in a table A:-fie|ds B:-attributes C:-Tup|e D:-none of these Ans: C
40:-Which one of the follow is not a RDBMS? A:-Foxpro B:-Orac|e
C:-Mysql D:-Sq| server Ans: A
41:-Which one of the following is used to create a virtual relation for storing a query? A:-view B:-function C:-procedure D:-tab|e Ans: A
42:-which one of the following option clause is used with view to reject the tuples that do not satisfy the "where condition"? A:-with B:-with check C:-check D:-none of these Ans: B
43:-When using Foreign Key, the _ of one relation is referenced in another relation A:-Foreign Key B:-Primary Key C:-Check constraint D:-None of these Ans: B
44:-_ is the preferred method for enforcing data integrity A:-Constraints B:-Triggers C:-Cursors D:-Stored Procedure Ans: A
45:-What values does the count(*)function ignore? A:-nu|| values B:-Integer C:-character D:-none of these Ans: A
46:-The _ statement is used in SQL for authorization A:-implement B:-revoke C:-grant D:-none of these Ans: C
47:-_ is executed when a table is modified A:-procedure B:-function C:-trigger D:-none of these Ans: C
48:-Which of the following command is used to delete a particular column in a relation?
A:-DELETE B:-ALTER C:-UPDATE D:-DROP
Ans: B
49:-A transaction completes its execution is said to be
A:-Saved B:-Rolled C:-Committed D:-Loaded
Ans: C
50:-The language used in application program to request for data from DBMS is
A:-DDL B:-DML C:-DCL D:-all of these
Ans: B
2:-Which of the following is not a language translator A:-Assembler B:-Interpreter C:-Compiler D:-Application Ans: D
3:-Choose the correct HTML tag to make the text bold: A:-<b> B:-<bold> C:-<strong> D:-Both (A) and (B) Ans: D
4:-Which one of the following is a volatile memory? A:-ROM B:-RAM C:-EPROM D:-EEPROM Ans: B
5:-Which of the following is an extension of image file? A:-exe B:-txt Cr-Jpeg D:-doc Ans: C
6:-The term "Pentium" relates to A:-Operating system B:-Microprocessor C:-Hard disk D:-Output device Ans: B
7:-Which of the following is not a flavor of Linux? A:-Redhat B:-Ubuntu C:-Suse D:-OS/2 Ans: D
8:-Which of the following is used to keep a process running in background even after the user logout from shell? A:-bg B:-hup C:-& D:-nohup Ans: D
9:-On successful execution, fork returns _ to parent process
A:-0
B:- 1
C:-Child process id
D:-Parent process id
Ans: C
10:-Which of the following is used to display the content of a file in octal format? A:-cat B:-oct C:-od D:-octal Ans: C
11:-_____is the concatenation operator in PHP
A:-.(dot)
B:-+
C:-=
D:-"
Ans: A
12:-Default return type of a function is
A:-null B:-void C:-int D:-float
Ans: C
13:-Which of the following is the last character of a string
A:-\0 B:-\n C:-\t D:-none of these
Ans: A
14:-Name of an array returns ______
A:-First element of the array B:-Size of the array C:-Number of elements of the array D:-Base address of the array
Ans: D
15:-______ is a built-in JavaScript function which can be used to execute another function after a given time interval.
A:-Timeout( )
B:-Time|nterval( )
C:-setTimeout( )
D:-All of the above
Ans: C
16:-A dynamic web page is
A:-Displayed the same every time
B:-Generated on demand by a program on a request from browser
C:-Both (A) and (B)
D:-None of the above
Ans: B
17:-Which of the following is NOT TRUE about PHP?
A:-PHP can be used to develop web applications
B:-PHP makes a website dynamic
C:-PHP applications cannot be compiled
D:-PHP cannot be embedded into HTML
Ans: D
18:-What is the return value of malloc()?
A:-size of the allocated memory B:-base address of the allocated memory
C:-1 if memory allocation is success D:-none of these
Ans: B
19:-Which of the following header file must be included to use dynamic memory allocation functions?
A:-dos.h
B:-stdio.h
C:-stdlib.h
D:-memory.h
Ans: C
20:-CSS is an acronym for
A:-Cascading Style Sheet B:-Cascading Style System C:-Cascading server Sheet D:-None of the above
Ans: A
21:-Which of the following statements is TRUE about JavaScript?
A:-JavaScript is designed to add style to HTML pages
B:-JavaScript is designed to add interactivity to HTML pages
C:-JavaScript is used to perform server side scripting operations
D:-None of the Above
Ans: B
22:-Information on basic system configuration is stored in
A:-BIOS
B:-CMOS
C:-CONFIG.SYS
D:-ROM
Ans: B
23:-Where do PC store CMOS settings?
A:-RAM B:-Flash ROM C:-South bridge D:-NVRAM
Ans: B
24:-How can you remove a CMOS password?
A:-Flash the BIOS B:-Change the system clock to 00/00/0000
C:-Sent it back to factory D:-Remove jumper on the mother board Ans: D
25:-Power-on self-test checks all of the flowing except A:-CPU B:-Memory C:-Modem D:-Video Ans: C
26:-Which of the following is a special database that holds key information about your system including the device drivers?
A:-BOOT.INI B:-CONFIG.SYS C:-SYSTEM.INI D:-Registry
Ans: D
27:-IDE cables have how many pins?
A:-24 B:-32 C:-40 D:-64 Ans: C
28:-Which controller support an external CD drive? A:-ESDI B:-MFM C:-SCSI D:-ARLL Ans: C
29:-Which of the following describes a fragmented hard disk? A:-Fi|es are corrupted B:-C|usters of data are damaged C:-Storage media is damaged D:-Fi|es are not stored in consecutive clusters Ans: D
30:-A 16 bit address bus can generate _ addresses. A:-65536 B:-32768 C:-32767 D:-None of these Ans: A
31:-The size of registers of 8086 microprocessor. A:-12 bits B:-8 bits C:-16 bits D:-32 bits Ans: C
32:-|f there is a carry from lowest nibble during addition, _ flag is set. A:-Carry flag B:-Overflow Flag C:-Auxiliary carry D:-Sign flag Ans: C
33:-The number of address and data lines of 8086
A:-8 and 8 B:-16 and 16 C:-20 and 16 D:-16 and 20
Ans: C
34:-Which directory contains configuration files in linux?
A:-/bin/ B:-/etc/ C:-/root/ D:-/dev/
Ans: B
35:-On successful completion, fork() returns _ to the parent process. A:-0 B:-1 C:--1 D:-Process ID of child process Ans: D
36:-Marquee is a tag in HTML used to: A:-Mark the list of items to maintain in queue B:-Mark the text so that it is hidden in browser C:-Display text with scrolling effect D:-None of the Above Ans: C
37:-Default storage class of a variable declaration is _ A:-auto B:-extern C:-static D:-register Ans: A
38:-Fast access to data items available in a database file can be provided through A:-|ndex file B:-data file C:-data dictionary D:-metadata file Ans: C
39:-The term _ is used to refer to a row in a table A:-fie|ds B:-attributes C:-Tup|e D:-none of these Ans: C
40:-Which one of the follow is not a RDBMS? A:-Foxpro B:-Orac|e
C:-Mysql D:-Sq| server Ans: A
41:-Which one of the following is used to create a virtual relation for storing a query? A:-view B:-function C:-procedure D:-tab|e Ans: A
42:-which one of the following option clause is used with view to reject the tuples that do not satisfy the "where condition"? A:-with B:-with check C:-check D:-none of these Ans: B
43:-When using Foreign Key, the _ of one relation is referenced in another relation A:-Foreign Key B:-Primary Key C:-Check constraint D:-None of these Ans: B
44:-_ is the preferred method for enforcing data integrity A:-Constraints B:-Triggers C:-Cursors D:-Stored Procedure Ans: A
45:-What values does the count(*)function ignore? A:-nu|| values B:-Integer C:-character D:-none of these Ans: A
46:-The _ statement is used in SQL for authorization A:-implement B:-revoke C:-grant D:-none of these Ans: C
47:-_ is executed when a table is modified A:-procedure B:-function C:-trigger D:-none of these Ans: C
48:-Which of the following command is used to delete a particular column in a relation?
A:-DELETE B:-ALTER C:-UPDATE D:-DROP
Ans: B
49:-A transaction completes its execution is said to be
A:-Saved B:-Rolled C:-Committed D:-Loaded
Ans: C
50:-The language used in application program to request for data from DBMS is
A:-DDL B:-DML C:-DCL D:-all of these
Ans: B
51:-Which of the following is NOT related to GOP?
A:-Encapsulation B:-Data Abstraction C:-Data Hiding D:-Data Dictionary
Ans: D
52:-In a class defined using an Object Oriented Programming language:
A:-All data and functions should be public to maximise flexibility and ease of use
B:-Nearly all data should be private and most functions should be public
C:-Nearly all data should be public and most functions should be private
D:-All data must be private, but functions are neither private nor public
Ans: B
53:-Which among the following is an Object-Oriented Programming language? A:-Java B:-Simula 67 C:-Smalltalk D:-All the above Ans: D
54:-_ are the basic run times entities in an object-oriented system. A:-Objects B:-Classes C:-Functions D:-All the above Ans: A
55:-Operator Overloading A:-Defines a new meaning to an existing operator B:-Enab|es operators to work with objects C:-|mplements polymorphism D:-A|| of the above Ans: D
56:-Virtual function in C++ implements _ A:-Inheritance B:-Polymorphism C:-Data hiding D:-None of the above Ans: B
57:-Mu|tip|e inheritance can be achieved in Java using _ A:-Applets B:-Serv|ets C:-Interface D:-Swing Ans: C
58:-Which of the following statements is TRUE about constructors? A:-Constructors are automatically invoked when objects of the class are created B:-Constructors can be overloaded C:-The return type of constructors is void ( ) D:-Both (A) and (B) Ans: D
59:-Wrapping up of data and associated functions into one single unit is called A:-Abstraction B:-Encapsulation C:-Data Hiding D:-Polymorphism Ans: B
60:-Which among the following OOP feature promotes code reusability? A:-Data Hiding B:-Polymorphism C:-Inheritance D:-Late Binding Ans: C
61:-Private members of a class are accessible to: A:-Member functions of that class B:-Friend functions of that class C:-All functions in the program D:-Both (A) and (B) Ans: D
62:-A class which is not used to create objects, but is designed to act as a base class to be inherited by other classes is called: A:-Abstract class B:-Virtua| base class C:-Temp|ate class D:-None of the above Ans: A
63:-Which of the following programs in UNIX helps us to configure a machine as a proxy server? A:-Apache B:-Poff C:-Synaptic D:-Squid Ans: D
64:-The maximum number of class A networks possible according to the IPv4 addressing scheme is: A:-32 B:-64 C:-126 D:-256 Ans: C
65:-172.0.14.87 is a Class _ address A:-Class A B:-Class B C:-Class C D:-Class D
Ans: B
66:-In IPv6 address is a _ bit address A:-32 B:-64 C:-128 D:-256 Ans: C
67:-How fast can CAT 6 cable transfer data? A:-Upto 10 Mbps B:-Upto 100 Mbps C:-Upto 1 Gbps D:-Upto 10 Gbps Ans: D
68:-The number of half duplex links required to connect five computers in mesh topology is: A:-25 B:-20 C:-10 D:-15 Ans: B
69:-A network device that connects dissimilar networks by providing the translation from one set of protocols to another is:
A:-Switch
B:-Router
C:-Gateway
D:-Modem
Ans: C
70:-Which among the following protocols is used for translating from IP address to MAC address? A:-ICMP B:-ARP C:-RARP D:-IGRP Ans: B
71:-The input and output ports of a router perform the _ layer functions: A:-Physical and Data link B:-Network C:-Both (A) and (B) D:-None of the above Ans: A
72:-Transport Layer is responsible for _ delivery of data: A:-Node to node B:-Process to process C:-Hop to hop D:-A|| of the above Ans: B
73:-A firewall is used in a network to: A:-Prevent fire in a network B:-To scan for viruses in files C:-Prevent unauthorized access to the network D:-None of the above Ans: C
74:-The maximum number of active devices in a Piconet is: A:-4 B:-6 C:-7 D:-8 Ans: D
75:-Which of the following is a private network? A:-LAN B:-WAN C:-MAN D:-None of the above Ans: A
76:-The IEEE standard for Wireless LAN is: A:-|EEE 802.3 B:-|EEE 802.4 C:-|EEE 802.11 D:-|EEE 802.7 Ans: C
77:-A protocol that allows non-ASCII messages to be sent through e-mails: A:-M|ME B:-|MAP C:-POP3 D:-SMTP Ans: A
78:-A sniffer is A:-A protocol B:-A virus C:-A program that monitors and analyzes network traffic D:-None of the above Ans: C
79:-Providing, managing and maintaining hardware, software, content integrity, security and reliable high speed connection for a website is called:
A:-Web hosting B:-Web Browsing C:-Web Crawling D:-Navigation Ans: A
80:-The system that helps users to identify host computers in a network by their names instead of their IP addresses is: A:-TCP B:-DNS C:-PPP D:-ARP Ans: B
81:-A computer virus that copies itself to the beginning of the hard disk, where it is automatically executed when the system is turned ON is called A:-Worm B:-Trojan Horse C:-Boot sector virus D:-None of the above Ans: C
82:-What is a trap door in a program? A:-A security hole inserted while writing the program, which is intended for later use B:-An error in the program C:-Security hole in a network D:-None of the above Ans: A
83:-Honeypot is an example for A:-Security auditing software B:-Intrusion detection software C:-Encryption software D:-Virus Ans: B
84:-Which feature of cloud computing allows the service to change in size or volume in order to meet user's needs? A:-Scalability B:-Security C:-Virtualization D:-Cost savings Ans: A
85:-DoS is the acronym for A:-Denia| of Security B:-De|ivery of Service C:-Denia| of Service D:-De|ivery of Security Ans: C
86:-Which among the following is NOT a web browser? A:-Microsoft Edge B:-Goog|e Chrome C:-Mozilla Firefox D:-None of the above Ans: D
87:-URL stands for _ A:-Universa| Resource Locator B:-Uniform Resource Locator C:-Unified Resource Locator D:-Universa| Route Locator Ans: A
88:-What should be the first tag in any HTML document? A:-<head> B:-<tit|e> C:-<document>
D:-<html> Ans: D
89:-Domain names used by commercial establishments usually have the suffix _ A:-.com B:-.org C:-.ac.in D:-.gov.in Ans: A
A:-Encapsulation B:-Data Abstraction C:-Data Hiding D:-Data Dictionary
Ans: D
52:-In a class defined using an Object Oriented Programming language:
A:-All data and functions should be public to maximise flexibility and ease of use
B:-Nearly all data should be private and most functions should be public
C:-Nearly all data should be public and most functions should be private
D:-All data must be private, but functions are neither private nor public
Ans: B
53:-Which among the following is an Object-Oriented Programming language? A:-Java B:-Simula 67 C:-Smalltalk D:-All the above Ans: D
54:-_ are the basic run times entities in an object-oriented system. A:-Objects B:-Classes C:-Functions D:-All the above Ans: A
55:-Operator Overloading A:-Defines a new meaning to an existing operator B:-Enab|es operators to work with objects C:-|mplements polymorphism D:-A|| of the above Ans: D
56:-Virtual function in C++ implements _ A:-Inheritance B:-Polymorphism C:-Data hiding D:-None of the above Ans: B
57:-Mu|tip|e inheritance can be achieved in Java using _ A:-Applets B:-Serv|ets C:-Interface D:-Swing Ans: C
58:-Which of the following statements is TRUE about constructors? A:-Constructors are automatically invoked when objects of the class are created B:-Constructors can be overloaded C:-The return type of constructors is void ( ) D:-Both (A) and (B) Ans: D
59:-Wrapping up of data and associated functions into one single unit is called A:-Abstraction B:-Encapsulation C:-Data Hiding D:-Polymorphism Ans: B
60:-Which among the following OOP feature promotes code reusability? A:-Data Hiding B:-Polymorphism C:-Inheritance D:-Late Binding Ans: C
61:-Private members of a class are accessible to: A:-Member functions of that class B:-Friend functions of that class C:-All functions in the program D:-Both (A) and (B) Ans: D
62:-A class which is not used to create objects, but is designed to act as a base class to be inherited by other classes is called: A:-Abstract class B:-Virtua| base class C:-Temp|ate class D:-None of the above Ans: A
63:-Which of the following programs in UNIX helps us to configure a machine as a proxy server? A:-Apache B:-Poff C:-Synaptic D:-Squid Ans: D
64:-The maximum number of class A networks possible according to the IPv4 addressing scheme is: A:-32 B:-64 C:-126 D:-256 Ans: C
65:-172.0.14.87 is a Class _ address A:-Class A B:-Class B C:-Class C D:-Class D
Ans: B
66:-In IPv6 address is a _ bit address A:-32 B:-64 C:-128 D:-256 Ans: C
67:-How fast can CAT 6 cable transfer data? A:-Upto 10 Mbps B:-Upto 100 Mbps C:-Upto 1 Gbps D:-Upto 10 Gbps Ans: D
68:-The number of half duplex links required to connect five computers in mesh topology is: A:-25 B:-20 C:-10 D:-15 Ans: B
69:-A network device that connects dissimilar networks by providing the translation from one set of protocols to another is:
A:-Switch
B:-Router
C:-Gateway
D:-Modem
Ans: C
70:-Which among the following protocols is used for translating from IP address to MAC address? A:-ICMP B:-ARP C:-RARP D:-IGRP Ans: B
71:-The input and output ports of a router perform the _ layer functions: A:-Physical and Data link B:-Network C:-Both (A) and (B) D:-None of the above Ans: A
72:-Transport Layer is responsible for _ delivery of data: A:-Node to node B:-Process to process C:-Hop to hop D:-A|| of the above Ans: B
73:-A firewall is used in a network to: A:-Prevent fire in a network B:-To scan for viruses in files C:-Prevent unauthorized access to the network D:-None of the above Ans: C
74:-The maximum number of active devices in a Piconet is: A:-4 B:-6 C:-7 D:-8 Ans: D
75:-Which of the following is a private network? A:-LAN B:-WAN C:-MAN D:-None of the above Ans: A
76:-The IEEE standard for Wireless LAN is: A:-|EEE 802.3 B:-|EEE 802.4 C:-|EEE 802.11 D:-|EEE 802.7 Ans: C
77:-A protocol that allows non-ASCII messages to be sent through e-mails: A:-M|ME B:-|MAP C:-POP3 D:-SMTP Ans: A
78:-A sniffer is A:-A protocol B:-A virus C:-A program that monitors and analyzes network traffic D:-None of the above Ans: C
79:-Providing, managing and maintaining hardware, software, content integrity, security and reliable high speed connection for a website is called:
A:-Web hosting B:-Web Browsing C:-Web Crawling D:-Navigation Ans: A
80:-The system that helps users to identify host computers in a network by their names instead of their IP addresses is: A:-TCP B:-DNS C:-PPP D:-ARP Ans: B
81:-A computer virus that copies itself to the beginning of the hard disk, where it is automatically executed when the system is turned ON is called A:-Worm B:-Trojan Horse C:-Boot sector virus D:-None of the above Ans: C
82:-What is a trap door in a program? A:-A security hole inserted while writing the program, which is intended for later use B:-An error in the program C:-Security hole in a network D:-None of the above Ans: A
83:-Honeypot is an example for A:-Security auditing software B:-Intrusion detection software C:-Encryption software D:-Virus Ans: B
84:-Which feature of cloud computing allows the service to change in size or volume in order to meet user's needs? A:-Scalability B:-Security C:-Virtualization D:-Cost savings Ans: A
85:-DoS is the acronym for A:-Denia| of Security B:-De|ivery of Service C:-Denia| of Service D:-De|ivery of Security Ans: C
86:-Which among the following is NOT a web browser? A:-Microsoft Edge B:-Goog|e Chrome C:-Mozilla Firefox D:-None of the above Ans: D
87:-URL stands for _ A:-Universa| Resource Locator B:-Uniform Resource Locator C:-Unified Resource Locator D:-Universa| Route Locator Ans: A
88:-What should be the first tag in any HTML document? A:-<head> B:-<tit|e> C:-<document>
D:-<html> Ans: D
89:-Domain names used by commercial establishments usually have the suffix _ A:-.com B:-.org C:-.ac.in D:-.gov.in Ans: A
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15