ads


1. A passive threat to computer security is
1) Malicious Intent
2) Sabotage
3) Accident Errors
4) Espionage Agents
5) None of these

2. The Secure Electronic Transaction (SET) specification
1) is a notice issued and verified by a certifying authority, that guarantees a user or Web site tobe legitimate
2) provides private-key encryption of all data that passes between a client and a server
3) allows users to choose an encryption scheme for the data that passes between a client and a server
4) uses a public-key encryption to secure credit-card transaction systems
5) None of these

3. ________allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.
1) TCP/IP
2) Ethernet
3)WAP
4) Token ring
5) None of these

4. Which of the following does ‘DOS’ floppy disk not have?
1) A Boot Record
2) A File Allocation Table
3) A Root Directory
4) Virtual Memory
5) BIOS

5. ‘MICR’ technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition
2) Magnetic Intelligence Character Recognition
3) Magnetic Information Cable Recognition
4) Magnetic Insurance Cases Recognition
5) None of these

6. All the information collected during database development is stored in a
1) repository
2) data warehouse
3) RAD
4) CASE
5) None of these

7. The________component is used by the data analyst to create the queries that access the database.
1) data extraction
2) end-user query tool
3) end-user presentation tool
4) data store
5) None of these

8. A(n)________allows network users to share a single copy of software which resides on the network server.
1) single-user license agreement
2) network site license
3) end-user license agreement
4) business software license
5) None of these

9. A polymorphic virus
1) modifies its program code each time it attaches itself to another program or file
2) is a malicious-logic program that copies itself repeatedly in memory or on a disk drive untilno memory or disk space remains
3) is a malicious-logic program that hides within or looks like a legitimate program
4) infects a program file, but still reports the size and creation date of the original, uninfected program
5) None of these

10. Microwave transmission is used in environments where installing physical transmission medias
1) difficult or impossible and where line-of-sight transmission is unavailable
2) easy or promising and where line-of-sight transmission is unavailable
3) difficult or impossible and where line-of-sight transmission is available
4) easy or promising and where line-of-sight transmission is available
5) None of these


 
Answers:---------
  1. 1
  2. 4
  3. 3
  4. 4
  5. 1
  6. 2
  7. 2
  8. 2
  9. 1
  10. 4
ads
Share To:

IBTS INSTITUTE

India's Leading Institution for Competitive Exams in Chandigarh visit www.ibtsindia.com

Post A Comment:

0 comments so far,add yours