1.
IPv6 does not use ______ type of address
Answer: Option 'A'
Broadcast
2.
_____is the a relatively new programming language designed by Microsoft for a wide range of enterprise applications that run on the .NET Framework.
Answer: Option 'D'
An evolution of C and C++, the C# language is simple, modern, type safe and object oriented.
3.
Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer.
Answer: Option 'A'
TCP
4.
A______is a combination of a private cloud combined with the use of public cloud services where one or several touch points exist between the environments.
Answer: Option 'A'
The goal is to combine services and data from a variety of cloud models to create a unified, automated, and well-managed computing environment.
5.
A set of instructions telling the computer what to do is called-
Answer: Option 'D'
A program is a set of instructions that govern functioning of a computer.
6.
____ cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture.
Answer: Option 'A'
Unlike public clouds, which deliver services to multiple organizations, a private cloud is dedicated to a single organization.
7.
An attempt to make a computer resource unavailable to its intended users is called
Answer: Option 'A'
denial-of-service attack
8.
Codes consisting of light and dark marks which may be optically read, is known as_______.
Answer: Option 'B'
Barcode consist of light and dark marks which may be optically read.
9.
Which of the following is most oriented to scientific programming?
Answer: Option 'A'
FORTRAN stands for Formula Translator.
10.
All Android phones and iPhones have access to a SQL (pronounced ‘sequel’) database called_______
Answer: Option 'A'
SQLite is an in-process library that implements a self-contained, serverless, zero-configuration, transactional SQL database engine. The code for SQLite is in the public domain and is thus free for use for any purpose, commercial or private. SQLite is a compact library.
11.
Programs designed specifically to address general purpose applications and special purpose applications are called-
Answer: Option 'C'
Programs designed specifically to address general purpose applications and special purpose applications are called Application software.
12.
Firewalls are often configured to block
Answer: Option 'A'
UDP traffic
13.
A ______is an interconnected network of computers infected with malware without the user's knowledge and controlled by cybercriminals. They're typically used to send spam emails, transmit viruses and engage in other acts of cybercrime.
Answer: Option 'B'
Botnet
14.
Which of the following is used to measure the speed of the processor?
Answer: Option 'C'
The operating speed of a computer or its microprocessor, expressed in cycles per second (megahertz)
15.
____is the process of affecting the visibility of a website or a web page in a web search engine's unpaid results—often referred to as "natural", "organic", or "earned" results.
Answer: Option 'A'
SEO is short for Search Engine Optimization
16.
Which key is used to search any data in a computer?
Answer: Option 'C'
F1: Opens the help page of the working program. F2: Renames a highlighted icon or file. Alt + Ctrl + F2 and Ctrl + F2 give some more functions. F3: Search feature for many programs including web browsers.
17.
“GUI” stands for-
Answer: Option 'B'
a graphical user interface (GUI), is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators
18.
Which among the following is an important circuitry in a computer system that directs the operation of the processor?
Answer: Option 'D'
The Control Unit (CU) is digital circuitry contained within the processor that coordinates the sequence of data movements into, out of, and between a processor's many sub-units.
19.
Since viruses are only a form of software, they primarily infect
Answer: Option 'D'
In 1982, a program called "Elk Cloner" was the first personal computer virus to appear "in the wild"—that is, outside the single computer or lab where it was created. Written in 1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk.
20.
Which of the following could be digital input devices for computers?
Answer: Option 'D'
Digital camera, Microphone and scanner all are the digital input device.