Which of the following is not the External Security Threats?


Options: Front-door Threats B. Back-door Threats C. Underground Threats D. Denial of Service (DoS)

Ans:– C ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 12342 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Networks Related questions:


What was originally called the "imitation game" by its creator?
Options: The Turing Test,    LISP,    The Logic Theorist,    Cybernetics

Ans:A ,A


An information processor includes
Options: the data base and the model base,    the central processing unit,    incoming data and outgoing information,    incoming data, the central processing unit, the model base, outgoing information, and the data base

Ans:D ,D


Most PCs give a single beep on bootup to indicate they are ok hardware wise. You boot your PC and don
Options: system board,    RAM,    speaker,    power supply

Ans:E ,C


. Which was the world’s first microcomputer that used Intel 80386 microprocessor chip?
Options: A) IBM PS/2 B) HP-9830 C) DeskPro-386 D) IBM-360

Ans:5-C,5-C


The CPU chip used in a computer is partially made out of
Options: silica,    carbon,    copper,    gold

Ans:A ,A


What is the short cut key to open Font dialog box?
Options:  A) Ctrl + F, B) Alt + Ctrl + F, C) Ctrl + D, D) Ctrl + Shift + D,

Ans:-C,-C


What will the SWAP macro in the following program be expanded to on preprocessing? will the code compile? #include<stdio.h> #define SWAP(a, b, c)(c t; t=a, a=b, b=t) int main() { int x=10, y=20; SWAP(x, y, int); printf("%d %d\n", x, y); return 0; }
Options: It compiles,    Compiles with an warning,    Not compile,    Compiles and print nothing

Ans:C ,C


On a class B network, how many subnets are available with a subnet mask of 248?
Options: 2,    6,    30,    62

Ans:C ,C


You have a system that periodically locks up. You have ruled out software, and now suspect that it is hardware. What should you do first that could help you narrow it down to the component at fault?
Options: rotate the RAM,    replace the RAM,    replace the level 2 cache SIMM,    disable the CPU cache in CMOS

Ans:D ,D


Which of the following command is used to create a Linux installation boot floppy?
Options: mkboot disk,    bootfp disk,    ww and rawwrite,    dd and rawrite

Ans:D ,D


What will be the output of the program? #include<stdio.h> #define MESS junk int main() { printf("MESS\n"); return 0; }
Options: junk,    MESS,    Error,    Nothing will print

Ans:B ,B


What do you call the chart that shows the proportions of how one or more data elements relate to another data element?
Options: XY Chart B. Line Chart C. Pie Chart D. Column Chart

Ans:– C ,


You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?
Options: show access-lists,    show interface Ethernet 0,    show ip access-lists,    show ip interface Ethernet 0

Ans:D ,D


Declare the following statement? "A pointer to a function which receives an int pointer and returns float pointer".
Options: float *(ptr)*int;,    float *(*ptr)(int),    float *(*ptr)(int*),    float (*ptr)(int)

Ans:C ,C


A certain Professor at the Stanford University coined the word 'artificial intelligence' in 1956 at a conference held at Dartmouth college. Can you name the Professor?
Options: David Levy,    John McCarthy,    Joseph Weizenbaum,    Hans Berliner

Ans:B ,B


. Word length of a Personal Computer is ___
Options: A) 4 bits B) 8 bits C) 16 bits D) 64 bits

Ans:B,B


Example of non-numerical data is
Options: Employee address,    Examination score,    Bank balance,    All of the above

Ans:A ,A


In OLE DB, which of the following represents characteristics of the recordset abstraction?
Options: Properties,    Collections,    Methods,    Abstractions

Ans:A ,A


Expert Ease was developed under the direction of:
Options: John McCarthy,    Donald Michie,    Lofti Zadeh,    Alan Turing

Ans:B ,B


. Com in Latin is

Options: A) intensifying prefix B) intensifying suffix C) a term that means to reckon D) None of above

Ans:A,A


In LISP, the function evaluates both <variable> and <object> is
Options: set,    setq,    add,    eva

Ans:A ,A


The channel in the data communication model can be
Options: postal mail service,    telephone lines,    radio signals,    All of the above

Ans:D ,D


The first mechanical calculating machine was made by
Options: William Oughtred,    Gottfried Leibnitz,    Blaise Pascal,    Charles Babbage

Ans:C ,C


. Which statement is valid about magnetic tape?
Options: A) It is a plastic ribbon B) It is coated on both sides with iron oxide C) It can be erased and reused D) All of above

Ans:9-D,9-D


. The _____ Smart Tag launches Microsoft Outlook to schedule an appointment or display a calendar.
Options: a. Date b. Time c. Calendar d. Appointment

Ans:6 – a ,6 – a


Which is a device that changes information into digital form?
Options: Modem,    Digitizer,    Mouse,    Light pen

Ans:B,(Banswer


. Which of the following is not a valid Data Type in MS Access?
Options: a. Memo b. Picture c. Currency d. AutoNumber

Ans:– b,– b


The extract process is which of the following?
Options: Capturing all of the data contained in various operational systems,    Capturing a subset of the data contained in various operational systems,    Capturing all of the data contained in various decision support systems,    Capturing a subset of the data contained in various decision support systems

Ans:B ,B


In which addressing mode, the effective address of the operand is generated by adding a constant value to the contents of register?
Options: absolute mode,    indirect mode,    immediate mode,    index mode

Ans:D ,D


. Cascade update option
Options: a. Means do not change the value in the primary key field if that record has related records in another table b. Means change all the related records in child tables if the record in parent table is changed c. Both of above d. None of above

Ans:3 – c ,3 – c


Needing to using more complicated SQL in database applications is a(n) ________ of normalization.
Options: advantage,    disadvantage,    either an advantage or disadvantage,    neither an advantage nor disadvantage

Ans:B ,B


Doubling the diameter of the coil in an inductor:
Options: multiplies the value of inductance by two,    reduces the value of inductance by one-half,    reduces the value of inductance by one-fourth,    multiplies the value of inductance by four

Ans:A ,A


Which of the following is the user programmed semiconductor memory?
Options: SRAM,    DRAM,    EPROM,    All of the above

Ans:C,C


40. When the same word is used in multiple locations or a word is used that was not quite appropriate, a thesaurus can be used to look up a (n) _____ or a word similar in meaning.
Options: a. synonym b. homonym c. antonym d. metronym

Ans:– A ,– A


    While working with Ms-Dos which command transfers a specific file from one disk to another?
Options: a.    Copy b.    Diskcopy c.    Time d.    Rename

Ans:.c,Correct Answer: a. Copy


Which of the following are unary operators in C? 1. ! 2. sizeof 3. ~ 4. &&
Options: 1, 2,    1, 3,    2, 4,    1, 2, 3

Ans:D ,D


A _____ is a brief message to an operator that describes what data are to be entered.
Options: prompt,    passwords,    MIS,    Tactical

Ans:A ,A


Part of a program where the shared memory is accessed and which should be executed invisibly, is called
Options: semaphores,    directory,    critical section,    mutual exclusion

Ans:C ,C


Which of the following is not a part of Slide Design
Options: a. Design Template b. Color Scheme c. Animation Scheme d. Slide Layout

Ans: – D , – D


The physical components of a computer system is
Options: Human ware,    Firm ware,    Hardware,    Software

Ans:C ,C


Which of the structure is correct? 1 : struct book { char name[10]; float price; int pages; }; 2 : struct aa { char name[10]; float price; int pages; } 3 : struct aa { char name[10]; float price; int pages; }
Options: 1,    2,    3,    All of above

Ans:A ,A


. Cursor is a ____
Options: A) Pixel B) Thin blinking line C) Pointing device D) None of these

Ans:B,B


. _____ formatting is the process of changing the way letters, numbers, punctuation marks, and symbols appear on the screen and in print.
Options: a. Document b. Character c. Paragraph d. Object

Ans:– B,– B


. If you press …., the cell accepts your typing as its contents.
Options: a. Enter b. Ctrl + Enter c. TAB d. Insert

Ans:– a,– a


The SQL keyword(s) ________ is used with wildcards.
Options: LIKE only,    IN only,    NOT IN only,    IN and NOT IN

Ans:A ,A


. You can open the consolidate dialog box byt choosing Consolidate from the ….. menu.
Options: a. Insert b. Format c. Tools d. Data

Ans:– d,– d


Which of the following statements are FALSE about the below code? int main(int ac, char *av[]) { }
Options: ac contains count of arguments supplied at command-line,    av[] contains addresses of arguments supplied at a command line,    In place of ac and av, argc and argv should be used.,    The variables ac and av are always local to main()

Ans:C ,C


RFM analysis uses customers' purchasing patterns to ________ .
Options: record transactions,    analyze and rank customers,    predict future sales using regression techniques,    perform OLAP

Ans:B ,B


A Compiler is ____
Options:  a combination of computer hardware B.  a program which translates from one high-level language to another C.  a program which translates from one high-level to a machine level language D.  None of these

Ans:– C ,


Which of following provides reliable communication?
Options: TCP B. IP C. UDP D. All of the above

Ans:– A ,

www.000webhost.com