mahendras

Subscribe Mahendras Youtube Channel | Join Mahendras Telegram Channel | Like Mahendras Facebook Page | Online Admission | Download Mahendras App

Now Subscribe for Free videos

Subscribe Now

Computer Knowledge : 23.07.2015

Bankers Guru
1. Artifact based authentication method includes___

(1) Machine readable badges

(2) Electronic smart cards

(3) Both 1 and 2

(4) Vault cards

(5) None of these

Ans. (3) Artifact based authentication method includes Machine readable badges and Electronic smart cards.

2. What is the memory from 1K-640K called?

(1) Extended memory

(2) Normal memory

(3) Low memory

(4) Conventional memory

(5) None of these

Ans. (4) The memory from 1K-640K called Conventional memory.

3. Which of the following is a variation of frequency division multiplexing (FDM)?

(1) Time Division Multiplexing (TDM)

(2) Pulse Code Multiplexing (PCM)

(3) Wave length Division Multiplexing (WDM)

(4) All the above

(5) None of these

Ans. (3) Wave length Division Multiplexing (WDM)

4. Race condition occur in which flip-flop?

(1) RS flip-flop

(2) JK flip-flop

(3) D flip-flop

(4) T flip-flop

(5) None of these

Ans. (1) Race condition occur in RS flip-flop.

5. Denial of Service (DoS) is _______.

(1) a firewall technique for blocking access to certain logical ports.

(2) an act of bombarding a server with high volumes of false requests.

(3) the malicious destruction of data by accessing the host's FAT table.

(4) a policy of withholding service from users who abuse the Internet.

(5) None of these

Ans. (2) Denial of Service (DoS) is an act of bombarding a server with high volumes of false requests.

6. ____________ is a process that permits multiple computers to use the same IP address and hide their actual IP addresses from the Internet.

(1) Routing

(2) Network address translation (NAT)

(3) Signature referencing

(4) Packet filtering

(5) IP filtering

Ans. (2) Network address translation is a process that permits multiple computers to use the same IP address and hide their actual IP addresses from the Internet.

7. Dynamic addressing makes it more difficult for hackers to find likely victims because _______.

(1) the ISP assigns counterfeit IP addresses.

(2) the IP address is protected by a firewall.

(3) the ISP hides the IP addresses for computers on their network.

(4) the IP address changes each time a user logs on to their ISP.

(5) None of these

Ans. (4) IP address changes each time a user logs on to their ISP.

8. A macro virus is a virus that _______.

(1) does not rely on a host file.

(2) is attached to a document file.

(3) loads into memory when the computer first starts.

(4) provides access to macros on the computer.

(5) None of these

Ans. (2) A macro virus is a virus that is attached to a document file.

9. ____________ computing is an efficient way of linking many computers together, when they are not otherwise in use, to utilize their capacity to perform complex calculations.

(1) Remote

(2) Grid

(3) Functional

(4) Automated

(5) Manual

Ans. (2) Grid computing is an efficient way of linking many computers together, when they are not otherwise in use, to utilize their capacity to perform complex calculations.

10. Which of the following features would be more likely to be found in tablet computers than in other mobile computing devices?

(1) Wireless ports

(2) Internet access

(3) Disk storage

(4) Handwriting recognition

(5) USB port

Ans. (4) Handwriting recognition found in tablet computers than in other mobile computing devices.

Copyright © 2023 www.mahendraguru.com All Right Reserved by Mahendra Educational Pvt . Ltd.