1.
__________ ensures secure transfer of data over an unsecured network, such as the Internet.
Answer: Option 'D'
In cryptography, data are sent in such a way that they look completely different from the original data. Thus, cryptography ensures secure transfer of data over an unsecured network.
2.
Which among the following is not a valid key in a relational database model?
Answer: Option 'D'
All other are valid keys except for track key.
3.
The SubSeven is an example of :
Answer: Option 'D'
SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
4.
Which of the following is not a hardware device?
Answer: Option 'C'
MS DOS is an acronym for Microsoft Disk operating system.
5.
What is a simulated experience generated by a computer called; like visiting the outer space or stepping on Moon?
Answer: Option 'B'
Virtual reality basically means 'near-reality’; it usually refers to a specific type of reality emulation which is simulated experience generated by a computer.
6.
Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
Answer: Option 'C'
Software piracy is the illegal copying, distribution, or use of software.
7.
In Computer programming API is set of subroutine definitions, protocols, and tools for building software and applications. Which among the following is an application programming interface for the programming language Java, which defines how a client may access a database?
Answer: Option 'D'
Java Database Connectivity (JDBC) is an application programming interface (API) for the programming language Java, which defines how a client may access a database. It is part of the Java Standard Edition platform, from Oracle Corporation.
8.
A vacuum tube (also called a VT, electron tube, a valve ) is a device sometimes used to amplify electronic signals. Vacuum Tubes were used in which generation of Computers?
Answer: Option 'A'
First Generation computers are characterised by the use of vacuum tubes. These vacuum tubes were used for calculation as well as storage and control. Later, magnetic tapes and magnetic drums were implemented as storage media. The first vacuum tube computer, ENIAC, was developed by US army ordinance to calculate ballistic firing tables in WWII. It had about 17 000 vacuum tubes.
9.
To allow someone else to schedule your meetings and appointments, ______ feature of Outlook is used.
Answer: Option 'D'
Delegate Access is a more advanced feature than just sharing your Outlook folders. If you want to grant additional permissions, such as allowing a delegate the ability to create e-mail messages or respond to meeting requests on your behalf, you must use Delegate Access.
10.
Which of the following forms a part of a search engine?
Answer: Option ''
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.