Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 3

  • 1. A type of malicious software that is activated each time your system boots up. This malicious software difficult to detect because they are activated before your system’s Operating System has completely booted up is called _____
   A.) Phishing
   B.) Rootkits
   C.) Pharming
   D.) All of these

Answer: Option 'B'

Rootkits

  • 2. Mail from unwanted senders can be blocked by ______
   A.) e-mailing them & asking to be removed from the list
   B.) clicking the unsubscribe link
   C.) using mail filters
   D.) All of these

Answer: Option 'C'

using mail filters

  • 3. A device for changing the connection on a connector to a different configuration is ______
   A.) a converter
   B.) a component
   C.) an attachment
   D.) an adapter

Answer: Option 'D'

an adapter

  • 4. Proprietary Software is also known as ________
   A.) Closed Source Software
   B.) Open Source Software
   C.) Commercial Software
   D.) All of these

Answer: Option 'A'

Closed Source Software

  • 5. Which of these is considered intelligent CASE tool?
   A.) Workbench
   B.) Toolkit
   C.) Upper CASE
   D.) Lower CASE

Answer: Option 'A'

Workbench

  • 6. Which of the following is possible with open architecture?
   A.) Hot swapping of devices
   B.) A minimum of six new devices to be added to a computer
   C.) Users to upgrade and add new devices as they come on the market
   D.) All of these

Answer: Option 'C'

Users to upgrade and add new devices as they come on the market

  • 7. Overwhelming or saturating resources on a target system to cause a reduction of availability to legitimate users is termed as _______
   A.) Denial of Service (DoS) attack
   B.) Distributed DoS attack
   C.) Data Diddling
   D.) All of these

Answer: Option 'A'

Denial of Service (DoS) attack

  • 8. Origin of internet can be tracked from _______
   A.) Satellite networks
   B.) Radio networks
   C.) ARPANET (Advanced Research Projects Agency Network)
   D.) All of these

Answer: Option 'C'

ARPANET (Advanced Research Projects Agency Network)

  • 9. A coding language that is compatible with windows servers which is used for increased functionality on a website or to work with a database is known as _______
   A.) HTML
   B.) ASP
   C.) XML
   D.) All of these

Answer: Option 'B'

ASP

  • 10. The signal that a computer is waiting for a command from the user is _______
   A.) prompt
   B.) event
   C.) time slice
   D.) interrupt

Answer: Option 'A'

prompt

  • 11. System proposal is prepared in ____ phase of SDLC.
   A.) Conception
   B.) Initiation
   C.) Analysis
   D.) Design

Answer: Option 'B'

Initiation

  • 12. In the relational modes, cardinality is termed as _________
   A.) number of tuples
   B.) number of tables
   C.) Both (A) and (B)
   D.) All of these

Answer: Option 'A'

number of tuples

  • 13. Modifying data for fun and profit is defined as _____
   A.) Distributed DoS attack
   B.) Denial of Service (DoS) attack
   C.) Data Diddling
   D.) All of these

Answer: Option 'C'

​Data Diddling

  • 14. Internet-mediated attack accomplished by enlisting the services of many compromised systems to launch a denial of service (DoS) is termed as ______
   A.) Distributed DoS attack
   B.) Denial of Service (DoS) attack
   C.) Data Diddling
   D.) All of these

Answer: Option 'A'

Distributed DoS attack

  • 15. ______ is used by public & private enterprises to publish and share financial information with each other and industry analysts across all computer platforms & the Internet.
   A.) Extensible Markup Language (XML)
   B.) Extensible Business Reporting Language (XBRL)
   C.) Enterprise Application Integration (EAI)
   D.) All of these

Answer: Option 'B'

Extensible Business Reporting Language (XBRL)

  • 16. Which of the following memory chip is faster?
   A.) DRAM
   B.) RAM
   C.) SRAM
   D.) All of these

Answer: Option 'C'

SRAM

  • 17. Telnet is which of the following based computer protocol?
   A.) sound
   B.) image
   C.) text
   D.) All of these

Answer: Option 'C'

text

  • 18. Which one of the following is an MS-DOS external command?
   A.) COPY
   B.) FORMAT
   C.) DIR
   D.) All of these

Answer: Option 'B'

FORMAT

  • 19. The technique that extends storage capacities of main memory beyond the actual size of the main memory is called _______
   A.) switching
   B.) virtual storage
   C.) multitasking
   D.) All of these

Answer: Option 'B'

virtual storage

  • 20. _____ is one reason for problems of data integrity.
   A.) Data availability constraints
   B.) Data inconsistency
   C.) Data redundancy
   D.) All of these

Answer: Option 'C'

Data redundancy

  • 21. A reliability & flow control technique where the source sends one packet starts a timer and waits for an acknowledgment before sending a new packet is called _______
   A.) Checksum
   B.) Positive Acknowledgement Retransmission (PAR)
   C.) Routing
   D.) All of these

Answer: Option 'B'

Positive Acknowledgement Retransmission (PAR)

  • 22. Which combines efficient implementation techniques that enable them to be used in an extremely large database?
   A.) Data Mining
   B.) Data Manipulation
   C.) Data reliability
   D.) All of these

Answer: Option 'A'

Data Mining

  • 23. Which of the following is an advantage of mounting an application on the web?
   A.) the possibility of 24-hour access for users
   B.) creating a system that can extend globally
   C.) standardizing the design of the interface
   D.) All of these

Answer: Option 'A'

the possibility of 24-hour access for users

  • 24. A language reflects the way people think mathematically is known as _____
   A.) cross platform programming
   B.) functional
   C.) event driven programming
   D.) 3GL business programming

Answer: Option 'B'

functional

  • 25. Which of the following supports the process by dividing a path to peripheral devices?
   A.) Shell
   B.) Kernel
   C.) Fork
   D.) All of these

Answer: Option 'B'

Kernel

Computer Quiz Set - 3 Download Pdf