Which of the following is not the External Security Threats?


Options: Front-door Threats B. Back-door Threats C. Underground Threats D. Denial of Service (DoS)

Ans:– C ,






More Computer Networks Related questions:


Which of the following is not currently a topic in computer science?
Options: Speech recognition,    Artificial intelligence,    Thermodynamics,    Multiprocessing

Ans:C,C


Several objectives are required to achieve a successful data base management program. These are availability of data, quality of data, and
Options: compatibility of data,    transmission of data,    desirability of data,    up-to-date data

Ans:D ,D


What should the configuration register value be after you successfully complete the password recovery procedure and return the router to normal operation?
Options: 0x2100,    0x2101,    0x2102,    0x2142

Ans:C ,C


. What is the shortcut key to insert new sheet in current workbook?
Options: a. F11 b. Alt + F11 c. Ctrl + F11 d. Shift + F11

Ans:– d,– d


Which component must be vacuumed or replaced during preventative maintenance on a laser printer?
Options: Scanning mirror,    Toner cartridge,    Ozone filter,    All of the above

Ans:C ,C


How can you quickly reinstate a deleted footer placeholder in master view?
Options: a. Create a new slide master b. Re-apply the footer placeholder c. Re-apply the slide layout d. All of the above

Ans: – B , – B


. Which of the following memories allows simultaneous read and write operations?
Options: A) ROM B) RAM C) EPROM D) None of above

Ans:B,B


. What happens when dollar signs ($) are entered in a cell address? (e$B$2:$B$10)
Options: a. An absolute cell address is created. b. Cell address will change when it is copied to another cell. c. The sheet tab is changed. d. The status bar does not display the cell address.

Ans:– a,– a


The command interpreter
Options: is usually the primary user interface,    requires fixed format commands,    is menu drive,    is quite different from the SCL interpreter

Ans:A ,A


In SQL, GRANT command is used to
Options: allow user to access databases,    allow user to create databases,    grant system privileges, roles, and object privileges to uses and roles,    choose auditing for specific SQL commands

Ans:C ,C


Which of the following can be an example of a database?
Options: a. Address book of all the suppliers of a company b. Salary sheet of all the employees of a company c. Records of daily sales transactions of a company d. All of above

Ans:ndash; d,ndash; d


4. Single spacing in MS-WORD document causes ____ point line spacing?
Options: a. 10 b. 12 c. 14 d. 16

Ans: B , B


The application layer of a network
Options: establishes, maintains, and terminates virtual circuits,    defines the user's port into the network,    consists of software being run on the computer connected to the network,    All of the above

Ans:C ,C


A WATS arrangement
Options: is always less expensive than flat-rate service,    is less expensive than flat-rate service only when the number of calls is large and the duration of each is short,    is less expensive than flat-rate service only when the number of calls is small and the duration of each is long,    is never less expensive than flat-rate service

Ans:B ,B


Interprocess communication
Options: is required for all processes,    is usually done via disk drives,    is never necessary,,    allows processes to synchronize activity

Ans:D ,D


81. Which of the following option is not available in Insert >> Picture ?
Options: a. Chart b. Word Art c. Clip Art d. Graph

Ans:– D ,– D


The transmission signal coding method of TI carrier is called
Options: Bipolar,    NRZ,    Manchester,    Binary

Ans:A ,A


Which of the following fields in a student file can be used as a primary key?
Options: a. class b. Social Security Number c. GPA d. Major

Ans:.b,.b


Offline device is
Options: a device which is not connected to CPU,    a device which is connected to CPU,    a direct access storage device,    an I/O device

Ans:A ,A


When operating above its resonant frequency, a series RLC circuit has the characteristics of a:
Options: series RL circuit,    series RC circuit,    series RLC circuit operated below its resonant frequency,    purely resistive circuit

Ans:A ,A


. Which of the following is not anti-viruses software?
Options: A) NAV B) F-Prot C) Oracle D) McAfee

Ans:C,C


. To set an exception to an AutoCorrect rule, click _____ on the menu bar and then click AutoCorrect Options to display the AutoCorrect dialog box.
Options: a. Format b. Edit c. Tools d. View

Ans: – C , – C


When sharing data in Office, the ________ document is the document in which the data was first entered.
Options: source B. destination C. original D. primary

Ans:– A ,


Which of the following operations moves text from clipboard?
Options: Copy B. Paste C. Drag and Drop D. Cut

Ans:– B ,


Which command is used to sort the lines of data in a file in alphabetical order?
Options: sort,    sh,    st,    sort -r

Ans:A ,A


Which REQUIRES an anti-static bag for transport?
Options: Monitor,    Floppy disks,    Power supply,    I/O controller

Ans:D ,D


Which of the following transfers data contained on computer cards to the computer system.
Options: Card sorter,    Card reader,    Magnetic disk,    Magnetic tape

Ans:B ,B


. Background color or effects applied on a document is not visible in
Options: a. Web layout view b. Print Layout view c. Reading View d. Print Preview

Ans:– D,– D


If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default?
Options: Any available route,    RIP route,    Static route,    IGRP route

Ans:C ,C


What of the following is considered to be a pivotal event in the history of AI.
Options: 1949, Donald O, The organization of Behaviour,,    1950, Computing Machinery and Intelligence.,    1956, Dartmouth University Conference Organized by John McCarthy,    1961, Computer and Computer Sense.

Ans:C ,C


What Oracle backup and recover file contains user and system data?
Options: Control file,    Datafile,    OnLine ReDo file,    Offline ReDo file

Ans:B ,B


Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question.
Options: 192.168.10.142,    192.168.10.66,    192.168.100.254,    192.168.10.143

Ans:A ,A


The 7-bit ASCII code widely used
Options: For data communication work,    In IBM mainframe models,    For coding external memory,    In large machines produced by non-IBM vendors

Ans:A ,A


Which method is used to connect a remote computer?
Options: Device,    Dialup,    Diagnostic,    Logic circuit

Ans:B,(Banswer


What is the maximum header size of an IP packet?
Options: 32 bytes B. 64 bytes C. 30 bytes D. 60 bytes

Ans:– D ,


.   The size of an organization chart object
Options: a. Is determined by the presentation design and cannot be changed b. Is determined by the presentation design but can be changed in PowerPoint c. Is dependent on the amount of text within the organization chart d. B and c

Ans:5 – D ,5 – D


If attribute A determines both attributes B and C, then it is also true that:
Options: A → B.,    B → A.,    C → A.,    (B,C) → A.

Ans:A ,A


A pointer is
Options: A keyword used to create variables,    A variable that stores address of an instruction,    A variable that stores address of other variable,    All of the above

Ans:C ,C


Computer-based traffic control systems are implemented at the _____ level of government.
Options: Local,    Top,    bottom,    Top-to-bottom

Ans:A ,A


In an absolute loading scheme, which loader function is accomplished by assembler.
Options: Reallocation,    Allocation,    Linking,    Loading

Ans:A ,A


The emitter diode is usually
Options: Forward-biased,    Reverse-biased,    Nonconducting,    Operating in the breakdwon region

Ans:A ,A


Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?
Options: two pass assembler,    load-and-go assembler,    macroprocessor,    compiler

Ans:B ,B


Which of the following command is used to count just the number of lines contained in a file?
Options: wc -l,    wc -c,    wc -w,    wc -r

Ans:A ,A


Excel displays the current cell address in the ……….
Options: Formula bar B. Status Bar C. Name Box D. Title Bar

Ans:– C ,


Can you combine the following two statements into one? char *p; p = (char*) malloc(100);
Options: char p = *malloc(100);,    char *p = (char) malloc(100);,    char *p = (char*)malloc(100);,    char *p = (char *)(malloc*)(100);

Ans:C ,C


What could cause a fixed disk error?
Options: No-CD installed,    Bad RAM,    Slow processor,    Incorrect CMOS settings

Ans:D ,D


Which programming language is based on Algol 60.
Options: PILOT,    SNOBOL,    ADA,    SIMULA

Ans:D ,D


A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals. Differential PCM with 4 bit relative signal value is used. Then how many bits per second are actually sent?
Options: 32 Kbps,    64 Kbps,    8 Kbps,    128 Kbps.

Ans:A ,A


What will be the output of the program ? #include<stdio.h> int main() { static int arr[] = {0, 1, 2, 3, 4}; int *p[] = {arr, arr+1, arr+2, arr+3, arr+4}; int **ptr=p; ptr++; printf("%d, %d, %d\n", ptr-p, *ptr-arr, **ptr); *ptr++; printf("%d, %d, %d\n", ptr-p, *ptr-arr, **ptr); *++ptr; printf("%d, %d, %d\n", ptr-p, *ptr-arr, **ptr); ++*ptr; printf("%d, %d, %d\n", ptr-p, *ptr-arr, **ptr); return 0; }
Options: 0, 0, 0 1, 1, 1 2, 2, 2 3, 3, 3,    1, 1, 2 2, 2, 3 3, 3, 4 4, 4, 1,    1, 1, 1 2, 2, 2 3, 3, 3 3, 4, 4,    0, 1, 2 1, 2, 3 2, 3, 4 3, 4, 5

Ans:C ,C


First CAD system called AutoCAD for the PCs was announced in the year 1982. Can you tell who announced it?
Options: Intel Corpn.,    Rolta India Ltd.,    Autodesk Inc,    AT & T Corp.

Ans:C ,C

www.000webhost.com