What is the Demilitarized Zone?


Options: The area between firewall & connection to an external network B. The area between ISP to Military area             C. The area surrounded by secured servers D. The area surrounded by the Military

Ans:– A ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 18800 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Networks Related questions:


A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?
Options: 8000 B frame,    80,000 B frame,    8 x 105 bit frame,    10,000 B frame

Ans:D ,D


Which of the following refers to a cursor type where changes of any type and from any source are visible?
Options: Forward only,    Static,    Keyset,    Dynamic

Ans:D ,D


. What are the requirements for the solution to critical section problem?
Options: a. Mutual Exclusion b. Progress c. Bounded Waiting d. All of Above

Ans:5 – d ,5 – d


Banker's algorithm for resource allocation deals with
Options: deadlock prevention,    deadlock avoidance,    deadlock recovery,    mutual exclusion

Ans:B ,B


Time during which a job is processed by the computer is
Options: Delay time,    Real time,    Execution time,    Down time

Ans:C ,C


Which of the following have people traditionally done better than computers?
Options: recognizing relative importance,    finding similarities,    resolving ambiguity,    All of the above

Ans:D ,D


What will be the output of the program? #include<stdio.h> int main() { float fval=7.29; printf("%d\n", (int)fval); return 0; }
Options: 0,    0.0,    7.0,    7

Ans:D ,D


Point out the error in the following program. #include<stdio.h> #include<stdlib.h> int main() { char *ptr; *ptr = (char)malloc(30); strcpy(ptr, "RAM"); printf("%s", ptr); free(ptr); return 0; }
Options: Error: in strcpy() statement.,    Error: in *ptr = (char)malloc(30);,    Error: in free(ptr);,    No error

Ans:B ,B


. Which area in an Excel window allows entering values and formulas?
Options: a. Title Bar b. Menu Bar c. Formula Bar d. Standard Tool Bar

Ans:– c,– c


The output of a thermocouple is:
Options: a capacitance,    a resistance,    a current,    a voltage

Ans:D ,D


. The _____ is a special toolbar that displays a series of names, each of which represents a list of commands that can be used to perform tasks.
Options: a. scroll bar b. status bar c. title bar d. menu bar

Ans: – D , – D


Which one of the following statements most accurately describes the nature of inductive reactance?
Options: Inductive reactance is an opposition to current flow in dc circuits,    Inductive reactance is an opposition to current flow in ac circuits,    Inductive reactance is another term for counter emf,    Inductive reactance is a force that tends to overcome the effects of counter emf

Ans:B ,B


Which facilitates data processing capabilities at the location of the end-user.
Options: DTP,    EDT,    DDP,    FAX

Ans:C ,C


Which protocol has been standardised by the International Standards Organisation.
Options: ISAM,    ISO,    LISP,    CALL

Ans:B ,B


What is invoked via HTTP on the Web server computer when it responds to requests from a user's Web browser?
Options: A Java application,    A Java applet,    A Java servlet,    None of the above is correct.

Ans:C ,C


A small film-plate which is used for microfilming the output from a microcomputer screen is called
Options: microfilm,    microfiche,    film card,    COM

Ans:B,B


Which of the following is still useful for adding numbers?
Options: EDSAC,    ENIAC,    Abacus,    UNIVAC

Ans:C,(Canswer


What is Hypertext Transfer Protocol (HTTP)?
Options: The protocol to copy files between computers,    The transfer protocol to transfer Web pages to a browser,    The database access protocol for SQL statements,    The hardware/software protocol that limits access to company data

Ans:B ,B


. A 32 bit microprocessor has the word length equal to
Options: A) 2 byte B) 32 byte C) 4 byte D) 8 byte

Ans:C,C


. In the Field List of a table, the primary key appears _______________.
Options: a. bold b. italicized c. underlined d. with key icon

Ans:6 – d ,6 – d


Which of the following languages is more suited to a structured program?
Options: PL/1,    FORTRAN,    BASIC,    PASCAL

Ans:D ,D


Which technique enables the designer to mold and shape, rather than construct on object using a series of lines?
Options: Solid modeling,    Wire-frame modeling,    Surface modeling,    FEM (Finite Element Modeling)

Ans:A ,A


"Parity" errors usually indicate bad memory.
Options: True,    False,    ,    

Ans:A ,A


In which year were chips used inside the computer for the first time?
Options: 1964,    1975,    1977,    1981

Ans:B,B


_____ attempt to provide the same judgmental advice that human experts such as doctors provide.
Options: ES,    AI,    KBS,    RAND

Ans:A ,A


What will be the output of the program? #include<stdio.h> #define MAX(a, b) (a > b ? a : b) int main() { int x; x = MAX(3+2, 2+7); printf("%d\n", x); return 0; }
Options: 8,    9,    6,    5

Ans:B ,B


. A bookmark is an item or location in document that you identify as a name for future reference. Which of the following task is accomplish by using bookmarks?
Options: a. to add anchors in web page b. to mark the ending of a paragraph of document c. to quickly jump to specific location in document d. to add hyperlinks in webpage

Ans: – C , – C


Sometime data are gathered over a period of time and collected into a group before entering them into a computer for processing. What type of processing is it called?
Options: Interactive processing,    Sequential processing,    Batch processing,    Group processing

Ans:A ,A


The technique of assigning a memory address to each I/O device in the SAM system is called:
Options: wired I/O,    I/O mapping,    dedicated I/O,    memory-mapped I/O

Ans:D ,D


Which of the following systems implementation approaches should be used if you want to run the old system and the new system at the same time for a specified period?
Options: direct,    pilot,    parallel,    phased

Ans:C ,C


In simplex transmission
Options: Data format is simple,    Data transmission is one way,    Data can be transmitted to small distances only,    All of the above

Ans:B ,B


. In a datasheet, what does each column represent?
Options: a. Record b. Field c. Database d. Table

Ans:– b,– b


. Comments put in cells are called …..
Options: a. Smart Tip b. Cell Tip c. Web Tip d. Soft Tip

Ans:– b,– b


In Cisco's Unified Wireless Solution, what is the split-MAC architecture?
Options: The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains.,    The split-MAC architecture allows the splitting of 802.11 protocol packets between the AP and the controller to allow processing by both devices.,    The split-MAC architecture uses MAC addresses on the wireless network and IP addresses on the wired network.,    The split-MAC architecture uses MAC addresses to create a forward/filter table and break up broadcast domains.

Ans:B ,B


Which 8-bit chip was used in many of Tandy's TRS-80 computers?
Options: Z-8000,    Motorola 6809,    Z-8088,    Z-80

Ans:D ,D


. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?

Options: A) Memory address register B) Memory data register C) Instruction register D) Program counter

Ans:D,D


Error rate is
Options: an error-detecting code based on a summation operation performed on the bits to be checked.,    a check bit appended to an array of binary digits to make the sum of all the binary digits.,    a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected.,    the ratio of the number of data units in error to the total number of data units

Ans:D ,D


Which of the following is not a communication command.
Options: write,    mesg,    mail,    grep

Ans:D ,D


What lets you to create new presentation by selecting ready-made font color and graphics effects?
Options: a. Presentation Template b. Master Slide c. Design Template d. Animation Scheme

Ans: – C , – C


During the maintenance phase
Options: System requirements are established,    System analysis is carried out,    Programs are tested,    All of the above

Ans:E ,E


. Which tool is used to generate printout of a table’s structure?
Options: a. Analyzer b. Designer c. Documenter d. Generator

Ans:– c,– c


You suspect a virus has entered your computer. What will not be affected by the virus?
Options: CMOS,    Boot sector,    Floppy disks,    Program files

Ans:A ,A


Which hardware component controls serial port communications?
Options: ROM BIOS,    CPU,    DMA823,    UART 16550

Ans:D ,D


How will you free the memory allocated by the following program? #include<stdio.h> #include<stdlib.h> #define MAXROW 3 #define MAXCOL 4 int main() { int **p, i, j; p = (int **) malloc(MAXROW * sizeof(int*)); return 0; }
Options: memfree(int p);,    dealloc(p);,    malloc(p, 0);,    free(p);

Ans:D ,D


Resolution of externally defined symbols is performed by
Options: Linker,    Loader,    Compiler,    Assembler

Ans:A ,A


The first mechanical calculator was invented in
Options: 1958,    1647,    1658,    1972

Ans:B ,B


The vice-president of information has primary responsibility for
Options: recognizing information needs,    preparing an MIS study proposal,    setting MIS objectives,    establishing MIS constraints

Ans:B ,B


Which option is used with cmp command to give a detailed list of the byte number and the differing bytes in octal for each character that differs in both the files?
Options: -l,    -d,    -r,    -b

Ans:A ,A


User views are included as part of which schema?
Options: Internal,    Conceptual,    External,    None of the above.

Ans:C ,C


The transistorized computer circuits were introduced in the
Options: First generation,    Second generation,    Third generation,    Fourth generation

Ans:B,B

www.000webhost.com