Which of the following is not the External Security Threats?


Options: Front-door Threats B. Back-door Threats C. Underground Threats D. Denial of Service (DoS)

Ans:– C ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 11249 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Networks Related questions:


In LISP, the function returns the list that results after the first element is removed (the rest f the list), is
Options: car,    last,    cons,    cdr

Ans:D ,D


A medium for transferring data between two locations is called
Options: Network,    Communication channel,    Modem,    Bus

Ans:B ,B


What will be the output of the program ? #include<stdio.h> int main() { float arr[] = {12.4, 2.3, 4.5, 6.7}; printf("%d\n", sizeof(arr)/sizeof(arr[0])); return 0; }
Options: 5,    4,    6,    7

Ans:B ,B


A semijoin is which of the following?
Options: Only the joining attributes are sent from one site to another and then all of the rows are returned.,    All of the attributes are sent from one site to another and then only the required rows are returned.,    Only the joining attributes are sent from one site to another and then only the required rows are returned.,    All of the attributes are sent from one site to another and then only the required rows are returned.

Ans:C ,C


How many types of storage loops exist in magnetic bubble memory?
Options: 8,    4,    16,    2

Ans:D ,D


What is modified when changing the system start-up boot sequence?
Options: BIOS/CMOS,    CONFIG.SYS,    autoexec.bat,    COMMAND.COM

Ans:A ,A


What is the AutoComplete feature of Excel?
Options: It automatically completes abbreviated words B. It completes text entries that match an existing entry in the same column C. It completes text and numeric entries that match an existing entry in the same column D. It completes text entries that match an existing entry in the same worksheet

Ans:– B ,


The situation when in a linked list START=NULL is
Options: a. underflow b. overflow c. housefull d. saturated

Ans:- a,- a


Point out the error in the program #include<stdio.h> int main() { int i; #if A printf("Enter any number:"); scanf("%d", &i); #elif B printf("The number is odd"); return 0; }
Options: Error: unexpected end of file because there is no matching #endif,    The number is odd,    Garbage values,    None of above

Ans:A ,A


An intrinsic semiconductor has some holes in it at room temperature. What causes these holes?
Options: Doping,    Valence electrons,    Free electrons,    Thermal energy

Ans:D ,D


After upgrading your computer to a new DOS version, an older application displays the error message "Incorrect DOS version". What should you do to run this application?
Options: Use the DOS+ command,    Use the SETVER command,    Restore the old DOS version,    Contact the application's vendor support line

Ans:B ,B


What command is used to hang up a MODEM when using the "AT Command set"?
Options: ATZ,    ATD,    ATR,    ATH

Ans:D ,D


Communication ports are found on the back of microcomputers. They are used to connect the computer to _____
Options: printers,    modems,    other hardware,    All of the above

Ans:D ,D


The Data flow diagram (DFD) shows;
Options: the flow of data,    the processes,    the areas where they are stored.,    All of the above

Ans:D ,D


In serial, asynchronous transmissions, the ____ bit is used to signal the end of the character within the data frame.
Options: start,    stop,    parity,    data

Ans:B ,B


When setting up Frame Relay for point-to-point subinterfaces, which of the following must not be configured?
Options: The Frame Relay encapsulation on the physical interface,    The local DLCI on each subinterface,    An IP address on the physical interface,    The subinterface type as point-to-point

Ans:C ,C


Which of the following memory unit that processor can access more rapidly
Options:  Main Memory B.  Virtual Memory C.  Cache memory D.  Read Only Memory

Ans:– C ,


Which of the following method can insert a new slide in current presentation?
Options: a. Right click on the Slide panel and choose New Slide b. From Insert menu choose New Slide c. Click on New Slide button on toolbar d. All of above

Ans: – D , – D


. A 32 bit microprocessor has the word length equal to
Options: A) 2 byte B) 32 byte C) 4 byte D) 8 byte

Ans:C,C


. Which of the following functions is used to all the values in a numeric field?
Options: a. Num b. Count c. Sum d. Total

Ans:6 – b ,6 – b


. What is represented by the small, black square in the lower-right corner of an active cell or range?
Options: a. Copy handle b. Fill handle c. Insert handle d. Border

Ans:– b,– b


In which menu can you find features like Slide Design, Slide Layout etc.?
Options: a. Insert Menu b. Format Menu c. Tools Menu d. Slide Show Menu

Ans: – B , – B


A logical description of some portion of database that is required by a user to perform task is called as
Options: System View B. User View C. Logical View D. Data View

Ans:– B ,


What will be the output of the program? #include<stdio.h> #include<stdlib.h> int main() { union test { int i; float f; char c; }; union test *t; t = (union test *)malloc(sizeof(union test)); t->f = 10.10f; printf("%f", t->f); return 0; }
Options: 10,    Garbage value,    10.100000,    Error

Ans:C ,C


The unit of a computer system that executes program, communicates with and often controls the operation of other subsystems of the computer is known as
Options: CPU,    Control Unit,    I/O unit,    Peripheral unit

Ans:A ,A


Which type of system hoard is the MOST likely candidate for processor upgrading if you want maximum performance and future compatibility?
Options: ML,    PCI,    ISA,    EISA

Ans:B ,B


A compiler is
Options: a program that places programs into memory and prepares them for execution,    a program that automate the translation of assembly language into machine language,    program that accepts a program written in a high level language and produces an object program,    is a program that appears to execute a source program as if it were machine language

Ans:C ,C


A network administrator views the output from the show ip route command. A network that is advertised by both RIP and IGRP appears in the routing table flagged as an IGRP route. Why is the RIP route to this network not used in the routing table?
Options: IGRP has a faster update timer.,    IGRP has a lower administrative distance.,    RIP has a higher metric value for that route.,    The IGRP route has fewer hops.

Ans:B ,B


What is the main reason the OSI model was created?
Options: To create a layered model larger than the DoD model.,    So application developers can change only one layer's protocols at a time.,    So different networks could communicate.,    So Cisco could use the model.

Ans:C ,C


Legacy data is which of the following?
Options: Data contained in a newly-installed system,    Data rejected during the installation of a new system,    Data contained in a file system,    Data contained by a system used prior to the installation of a new system

Ans:D ,D


What is the name given to all the programs inside the computer with makes it usable?
Options: Application software,    System software,    Firm ware,    Shareware

Ans:B ,B


A logic gate is an electronic circuit which
Options: makes logic decisions,    allows electron flow only in one direction,    works on binary algebra,    alternates between 0 and 1 values

Ans:A ,A


Can you tell what passes into and out from the computer via its ports?
Options: Data,    Bytes,    Graphics,    Pictures

Ans:B,B


The essential features of a number system are
Options: Radix,    Set of distinct counting digits,    bits,    Both (a) & (b)

Ans:D ,D


Which command is used to save the standard output in a file, as well as display it on the terminal?
Options: more,    cat,    grep,    tee

Ans:D ,D


An operating system intended for use on microprocessor based systems that support a single user is
Options: PC-DOS,    MS-DOS,    UNIX,    CP/M

Ans:D ,D


A memory that does not change its contents without external causes is known as
Options: Dynamic memory,    Static memory,    RAM,    EEPROM

Ans:B ,B


Database redesign is not terribly difficult if the:
Options: database is structured.,    database is well-designed.,    database has no data.,    database is relatively small.

Ans:C ,C


. The data recording format in most of the modern magnetic tape is
Options: A) 7-bit ASCII B) 7-bit EBCDIC C) 8-bit ASCII D) 8-bit EBCDIC

Ans:D,D


Database management systems are intended to 
Options: a. eliminate data redundancy b. establish relationship among records in different files c. manage file access D. all of the above 

Ans:D,All of above


What router command allows you to determine whether an IP access list is enabled on a particular interface?
Options: show ip port,    show access-lists,    show ip interface,    show access-lists interface

Ans:C ,C


The language used application programs to request data from the DBMS is referred to as the
Options: a. DML b. DDL c. query language d. any of the above

Ans:.a,.a


IBM's Micro Channel Architecture (MCA) specifies which type of the following bit access widths?
Options: 8 bit & 16 bit,    16 bit & 24 bit,    16 bit & 32 bit,    32 bit & 64 bit

Ans:C ,C


An operation that will increase the length of a list is
Options: Insert,    Look-up,    Modify,    All of the above

Ans:A ,A


In magnetic disks, data is organized on the platter in a concentric sets of rings called
Options: sector,    track,    head,    block

Ans:B ,B


Why does a successfully mapped network drive disappear every time you boot the computer?
Options: The computer you are connected to has moved,    You didn't click reconnect on log on,    The map statement is not in the autoexec.bat file,    The last drive was not set correctly

Ans:C ,C


. Which of the following should you do to bring a bullet back to a previous level?
Options: a. Press the shift + tab keys b. Press the shift key c. Press the enter key d. Press the tab key

Ans:7 – A ,7 – A


What digits are representative of all binary numbers?
Options: 0,    1,    Both (a) and (b),    3

Ans:C ,C


A zener regulator has an input voltage from 15 to 20 V and a load current from 5 to 20 mA. If the zener voltage is 6.8 V, what value should the series resistor have?
Options: 310 Ohm,    400 Ohm,    410 Ohm,    550 Ohm

Ans:C ,C


. Which one is not a system tool?
Options: a. Backup b. Disk defragment c. Virus scanning d. All of the above

Ans: c, c

www.000webhost.com