Вы находитесь на странице: 1из 4

1.Which one of the following protocol is not used in internet?

d) none of the mentioned.

2. IPv6 addressed have a size of


c) 128 bits

3.full form www


a)world wide web

4. Which one of the following protocol is used in internet?


a) HTTP

5.Internet is an example of which type of network?


b)WAN

6.In which year NSFNET was created?


d)1980

7.In 1969 which network was created?


c)ARPA

8. What is the full form of ISP?.


c) Internet service provider.

9. What is browser?
c) A browser is software that allows display of webpages in your computer

10. What is the full form E mail?


a)electronic mail

11. Processed data is called ………………..


B) Information
12.…………….. is a utility to capture a continuous record of server activity and
provide auditing capability.

B) SQL server service manager.

13. Data items grouped together for storage purposes are called a
A) Record

14. …………. contains data assisting day to day activities of the organization.
B) Operational database

15. ………………… approach reduces time and effort required for design and
lesser risk in database management.
C) Multiple databases

16. HSAM stands for ……….


A) Hierarchic Sequential Access Method

17. SQL server stores index information in the ………… system table
D) Sys indexes

18. Full form of DBMS

B) Database management system


d) An entity should not have attributes.

19. Which of the following is not a logical database structure?


A) Chain

20. ……………. is a preferred method for enforcing data integrity


A) Constraints

21. How many types of software?


b)2

22. Which one of the following example of application software?


a) Photoshop

23. Which one of the following is the example of system software?


d) Windows

24. What is the name of life cycle model


d) waterfall model

25. The purpose of this phase of software development is to translate the


software design into______?
a) Source code

26. Correcting errors that were not discovered during the development phase.
This is called____?
a)coding and testing

27. In computer security,…….… means that computer system assets can be


modified only by authorized parities.

B) Integrity

28. In computer security, …………………….. means that the information in a


computer system only be accessible for reading by authorized parities.
A) Confidentiality

29. What is the shortcut command to change windows password of your


compuer?
A) Ctrl+alt+delete

30. A farewells is a combination of?


B) Hardware and software
31. People who access the computer of other without their knowledge are
known as.
C) Crackers and Hackers

32. How to protect your computer from virus attack.


D) Antivirus

33. Which of the following malicious program do not replicate automatically?


A) Trojan Horse

34. …………… is the illegal copying, distribution, or use of software without


permission of it’s owner.
C) Software piracy

35. State whether true of false.


i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
C) True, True

36. A ………….. is a program that can infect other programs by modifying


them, the modification includes a copy of the virus program, which can go on
to infect other program

B) Virus

Вам также может понравиться