Computer Objective Question 2
1) In a ring topology, the computer in possessions of the ---------- can transmit data .
- Packet
- Data
- Access method
- Token
- None of these
2) This part of operating system manages the essential peripherals, such as the keyboard, screen, disk drives and parallel and serial ports
- Basic input/output system
- Secondary input/ output system
- Peripheral input/output system
- Marginal input/ output system
- None of the above
Ans:- (A) Basic input/output system
3) These type of viruses are often transmitted by a floppy disk left in the floppy drive
- Trojan horse
- Boot sector
- Script
- Logic bomb
- None of these
4) It controls the way in which the computer system functions and provides a way by which users can interact win the computer ?
- The platform
- Application software
- Operating system
- The motherboard
- None of these
Ans:-(C) Operating system
5) Servers are computers that provide resouses to other computers connected to a
- Mainframe
- Network
- Supercomputer
- Client
- None of these
6) A goal of data mining includes which of the following ?
- To explain some observed event or condition
- To confirm, that data exist
- To analyze data for expected relationships
- None of these
Ans:- (A) To explain some observed event or condition
7) URL stands for
- Universal research list
- Universal resource list
- Uniform resource locator
- Uniform research locator
- None of these
Ans:- (C) Uniform resource locator
8) A database management system (DBMS) is a
- Hardware system used to create, maintain and provide controlled access to a database
- Hardware system used to create, maintain, and provide uncontrolled access to a database
- Software system used to create, maintain, and provide uncontrolled access to a database
- Software system used to create, maintain, and provide controlled access to a database
- None of these
Ans:- (D)Software system used to create, maintain, and provide controlled access to a database
9) Which of the following is NOT a goal of transaction processing system ?
- Capture, process and store transaction
- Produce a variety of documents related to routine business activities
- Reduce manual effort associated with processing business transactions
- Produce standard reports used for management decision making
- None of these
Ans:- (B) Produce a variety of documents related to routine business activities
10) A proxy server s used for which of the following ?
- To provided security against unauthorised users
- To process client requests for web pages
- To process client requests for database access
- To provided TCP/IP
- None of these
Ans:- (D) To provided TCP/IP
11) When data changes in multiple lists and all lists are not updated, this causes
- Data redundancy
- Information overload
- Duplicate data
- Data inconsistency
- None of the above
Ans:-(D) Data inconsistency
12) Words that a programming language has set aside for its own use
- Control worlds
- Reserved words
- Control structures
- Reserved key
- None of these
13) What is the primary difference between a virus and a worm?
- A worm has the ability to self – propagate form and infected user’s computer too other computers
- A worm is usually written by a cracker : script business do not have the skills to develop a worm program
- Anti –virus software is effective in fighting viruses but not worms
- None of these
Ans:- (C) Anti –virus software is effective in fighting viruses but not worms
14) It describe what is database fields
- Structure
- Field markers
- Field definition
- Field names
- Name of these
15) You must install this on a network if you want to share a broadband internet connection.
- Router
- Modem
- Node
- Cable
- None of these
|