0% found this document useful (0 votes)
30 views12 pages

Adobe Scan 28 Nov 2023

Uploaded by

tarathiru69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views12 pages

Adobe Scan 28 Nov 2023

Uploaded by

tarathiru69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

IAL

Unit
Essentials of Computer
Multiple Choice Questions
1. UNIVAC is
(a) Universal Automatic Computer
(b) Universal Array Computer
(c) Unique Automatic Computer
(d) Unvalued Automatic Computer [ aa 1
2. The basic operations performed by a computer are
(a) Arithmetic operation (b) Logical operation
(c) Storage and relative (d) All the above | d ]
3. The brain of any computer system is
(a) ALU (b) Memory
(c) CPU (d) Control unit
4. The two kinds of main memory are:
(a) Primary and secondary (b) Random and sequential
(c) ROM and RAM (d) Allof above C

5. Integrated Circuits (Ics) are related to which generation of


Computers?
(a) First generation (b) Second generation
(c) Third generation (d) Fourth generation [ c I
6. The main electronic component used in first generation
computers was
(a) Transistors (b) Vacuum Tubes and Valves
(d) None of above b 1
(c) Integrated Circuits
7. . . is a combination of hardware and software that
facilitates the sl.aring of information between computing
devices.
. (a) network (b) peripheral
(c) expansion board (d) digital device. a

8. Which device is required for the Internet connection ?


(a) Joystick (b) Modem
(c) CD Drive (d) NICCard | bb ]
9. ALUis
(a) Arithmetic Logic Unit (b) Array Logic Unit
(c) Application Logic Unit (d) None of above
10. WAN stands for
(a) Wap Area Network (b) Wide Area Network
(c) Wide Array Net
(d) Wireless Area Network b ]
11. Magnetic disk is an example of
(a) Secondary memory (b) Primary memory
(c) Main memory (d) Both (1) and (2) [ a ]
12. Computers manipulate. data in many ways, and this
manipulation is called ....
(a) upgrading (b), processing
(c) batching (d) utilizing b ]
13. What is the internet ?
(a) a single network
(b) a vast collection of different networks
(c) interconnection of local area networks
(d) none of the mentioned
14. ISP stands for
(a) Internet Security Protocol
(b) Intelligent Service Package
(c) Internet Service Provider
(d) Intelligent Service Provider C

15. What's the name of the program or service that lets you view
e-mail messages ?
(a) Web browser (b) E-mail clients
(c) E-mail id (d) Internet [ b
16. When sending an e-mail, the line describes the
contents of the message ?
(a) to (b) subject
(c) contents (d) CC [ b
17. http stands for
(a) hypertext transfer protocol
(b) hypertext transmission protocol
(c) high transfer transport protocol
(d) hyper transfer text protocol [ a ]
18. Sending an e-mail is similar to
(a) picturing an ever (b) narrating a story
(c) writing a letter
(d) creating a drawing
19. What'sconsidered the backbone' of the World Wide Web ?
(a) Uniform resource locator (URL)
(b) Hypertext mark-up language (HTML)
(c) Hypertext transfer protocol (HTTP)
(d) File transfer protocol (FTP) c

20. What is the process of transferring files from the internet to


computer memory called ?
(a) Uploading (b) Downloading
(c) Bookmarking (d) Hyperlinking b
21. To join the internet, thecomputer has to be connected to a
(a) internet architecture board
(b) internet society
(c) internet service provider
(d) none of the mentioned c

22. We access the World Wide Web using :


(a) Browsers
(b) Instant messaging applications
(c) High bandwidth
(d) Search engine [ a
23. What is the full form of WWW?
(a) World Wide Web (b) World With Web
(c) Work Wide Web (d) World Wide Wet [ a ]
24. Website is acollection of :
(a) HTML doCuments (b) Graphic files
(c) Audio and Video files (d) AIl of the above [ d
25. Which of the following is not a network ?
(a) Local Area Network (b) Wide Area Network
(c) Optical Fibre (d) All are networks [ c
26. What is the term for unsolicited e-mail ?
(a) News group (b) Use net
(c) Backbone (d) Spam [ d ]
27. A computer is a malicious code which self
replicates by copying itself to other programs.
(a) program (b) virus
(c) application (d) worm [| b
28. ..infects the master boot record and it is challenging
and acomplex task toremove this virus.
(a) Boot Sector Virus (b) Polymorphic
(c) Multipartite (d) Trojans |a
29. Which of the following usually observe each activity on the
internet of the victim, gather all information in the
background, and send it to someone else?
(a) Malware (b) Spyware
(c) Adware (d) All of the above [ b ]
?
30. Which oneof the following is a type of antivirus program
(a) Quick heal (b) Mcafee
(c) Kaspersky (d) All of the above [ d ]
31. Which one of the following refers to the technique used for
verifying the integrity of the message ?
(a) Digital signature (b) Decryption algorithm
(c) Protocol (d) Message Digest | d
32. To protect the computer system against the hacker and
on in
different kind of viruses, one must always keepP
the computer system.
(a) Antivirus (b) Firewall
(c) Vlc player (d) Script | b ]
33. Which of the following can be considered as the elements of
cyber security ?
(a) Application Security (b) Operational Security
(c) Network Security
(d) All of the above [ d
34. Hackers usually used the computer virus for
purpose.
(a) To log, monitor each and every user's stroke
(b) To gain access the sensitive information like user's Id and
Passwords

(c) To corrupt the user's data stored in the computer system


(d) All of the above | d
for.....
"TCP/IP" stands
35. The term
Contribution protocol/internet protocol
(a)Transmission protocol/internet protocol
Control
(b) Transmission protocol/internet protocol
Control
(c) Transaction protocol/internet protocol b 1
(d) Transmission Control
Fill in the Blanks
(RAM)
1. is knownas amain memory.
requires refreshing of data is
2. A memory that (Dynamic Ram)
(1 Byte)
3. A string of 8 bits is
computer that u can
4. refers to the physical parts of a
(Hardware)
see and touch.
and languages used by the computer are called
5. The program (Software)
between user and
6. is responsible for communicatiorn
computer ?
(Input device, keyboard)
(CPU) ?
7. are components of Central Processing Unit
(ALUand CU)
8. RAM is a memory. (Volatile)
9. ROM stand for (Read Only Memory)
10. is the input device that allows a user to move the
Cursor or pointer on the screen? (Mouse)
11. The four basic functions performed by the computer are
(Input, Processing, Output and Storage)
12. is defined as an attempt to steal, spy, damage or
destroy computer systems, networks, or their associated
information. (Cyber attack)
13. ....are objectives of network security.
(Confidentiality, Integrity and Availability)
Matching
Group A Group B
(I) 1. Very Large scale
Integration Ic ](a) Second Generation
2.. Vacuum Tube

Technology [d ] (b) Fifth Generation


3. Stored Program e ] (c) Fourth Generation
4. Superconductor
Technology [b ] (d) First Generation
5. Semiconductor

Technology [e ] (e) Third Generation


Group A Group B
(II) 1. Punch card | c l (a) Computer games
2. Bar code | d ] (b) Output devices
3. Joy stick | a ] (c) Hollerith Code
4. Floppy Disk b ] (d) Universal Product
Code (UPC)

5. Monitor e ] (e) VDU


Group B
Group A
(III) 1. Analytical engine
concept |e ] (a) 1969
2. ENIAC I c ] (b) 1976
3. IBM 650 | d ] (c) 1943
4. Apple I Ib ] (d) 1954
5. ARPANET | a ] (e) 1837
Group A Group B
(IV) 1. Internet |c ] (a) Standard Internet
protocol
2. IP address |d ] (b) Gives a name to the IP
address
3. ARPANET | e ] (c) Worldwide system of
computer networks
| b ](d) Unique set of 4numbers
"DUb':

4. DNS server
5. TCP/P | a ] (e) Communication among
various bodies of
government
Group A Group B
(V) 1. Web browser | c ] (a) Metropolitan Area
Network
2. Web applicatiÍn [b ] (b) Programs that allow
visitors to submit and
etrieve data

3. Javascript Ie ] (c) Software application


that allows users to
access webiste
4. DNS
[d | (d) Phonebook of Internet
5. MAN
I a ] (e) Script that helps to
access dynamic ele
ments of web page
Group A Group B
(VI) 1. Directing data I d ] (a) Encryption
packets between
devices in a network
2. Directing data Ie ] (b) Authentication
packets. within a
local network
3. Process of converting a ] (c) Ethical hacking
data into secure and
unreadable format
4. Verifying the [b ] (d) Routing
identity of a user
5. To identify [c] (e) Switching
vulnerabilities in a
system or network
Group A Group B
(VII) 1. Macro viruses [ b ] (a) Attacks and disables
anti virus applica
tions

2. Polymnorphic viruses [ c ]: (b) Written in progra


mming languages
like VBA
3. Armored viruses [d ] (c) Change their form in
order to avoid detec
tion

4. Retro virus [ a ] (d) Designed to make


detection difficult
5. Stealth virus {e ] (e) Hide from operating
system
Group A .Group B
(VIII) 1. Unauthorised | d ] (a) Denial of Service
intrusion into å (DoS)
Computer network
2. Replication of the [ c ]. (b) Cookie theft
website for stealing
money or personal
information
3. Fake hidden user | e ] (c) Phishing
interface
4. Stealing browser's | b ] (d) Hacking
cookies
5. To make the server |a ] (e) UI Redress
unavailable
Group A Group B
(IX) 1. Converting cipher | e ] (a) RSA (Rivest - Shamir
text back into plain - Adleman)
text

2. Symmetricencryption [ d ] (b) Public key


algorithm
3. Uses a pair of | c ] (c) Asymmetric
mathematically Cryptography
related keys
4. Openly shared key I b] (d) AES (Advanced
Encryption Standard)
5. Asymmetric [ a ] (e) Decryption
encryption algorithm
TRUE/ FALSE
1. A monitor displays information. (True)
2. A SD card is an output device. (False)
3. A microphone is used an input device. (True)
4. A pen drive is astorage device. (True)
5. A firewall is a type of hardware. (False)
6. TheCPU is referred as the brain of the computer. (True)
7. Aterabyte ia equal to 1 million gigabytes. (False)
8. Bluetooth allows your device to connect with another device.
(True)
9. A processor accepts your commands for the computer. (True)
10. Software that is free for trial is called shareware. (True)
11. You need not have an email address to send and receive
emails. (False)
12. ROM is volatile. (False)
13. In computer science, algorithm refers to a pictorial
representation of a solution (False)
14. A threat is a potential danger to information or systems.
(True)
15. Three types of security control are administrative controls,
technical or logical controls and physical controls. (True)
16. Availability is the term which denotes that only authorized
users are capable of accessing the information. (False)
17. Data encryption is primarily used to ensure confidentiality.
(True)
18. Steganography is the technique used to hide information
inside a picture. (True)
19. Remote browser access is used to avoid browser-based hacking.
(True)
20. Network traffic analysis is used for monitoring traffic and
analyzing network flow. (True)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy