Question 1. Which one of the following is a part of Infotech terminology?
(A) Protocol
(B) Login
(C) Archie
(D) All of these
Question 2. A computer virus is _________.
(A) A computer program that can replicate itself
(B) A virus that affects health of human being
(C) Both of the above
(D) None of the above
Question 3. A set of rules that governs data communication is called ________.
(A) Protocols
(B) Standards
(C) RFCS
(D) None of these
Question 4. A computer virus is a _________.
(A) Destructive program
(B) Utility program
(C) Firewall
(D) None of the above
Question 5. In Cyber Law terminology ‘DOS’ means _________.
(A) Denial of Service
(B) Disk Operating System
(C) Distant Operator Service
(D) None of the above
Question 6. Computer virus means _________.
(A) A new virus
(B) Plague virus
(C) Destructive program
(D) Hardware of computer
Question 7. In the context of computer security, crackers are also known as _________.
(A) black hat hackers
(B) white hat hackers
(C) elite hackers
(D) script kiddie
Question 8. A program that has the capability to infect other program and make copies of itself and spread into
other programs is called _________.
(A) Worm
(B) Virus
(C) Trojan
(D) None of these
Question 9. Junk e-mail is also called _________.
(A) Spoof
(B) Spool
(C) Sniffer script
(D) Spam
Question 10. Firewall is used in Communication Network/System for protection from _________.
(A) Unauthorized attack
(B) Data driven attack
(C) Fire attack
(D) Virus attack
Question 11. The word ‘Spam’ is related to which of the following subject?
(A) Computer
(B) Art
(C) Music
(D) Sports
Question 12. American television and Telegraph has developed such computer procedure which gives multi-user
environment, it is called _________.
(A) V.G.A.
(B) Unix
(C) V.L.S.I.
(D) U.T.A.
Question 13. Sending an identical e-mail message repeatedly to a particular address by any abuser is called __________.
(A) E-mail Spoofing
(B) E-mail Spamming
(C) E-mail Bombing
(D) None of the above
Question 14. ‘Windows-3’ a popular windowing environment was released by Microsoft in the year __________.
(A) 1985
(B) 2000
(C) 1995
(D) 1990
Question 15. DuckDuckGo is a __________.
(A) search engine
(B) web browser
(C) virus
(D) news website
Question 16. Windows operating system was developed by _________.
(A) Microsoft
(B) I.B.M.
(C) A.T.&T.
(D) H.P.
Question 17. Yahoo, Google and MSN are ________.
(A) Internet sites
(B) Computer brands
(C) Watches manufactured in Switzerland
(D) Rings of Saturn
Question 18. Windows Software has been developed by _________.
(A) I.B.M.
(B) Apple Corporation
(C) WIPRO
(D) Microsoft
Question 19. Which web browser was developed by Google?
(A) Internet Explorer
(B) Firefox
(C) Safari
(D) Chrome
Question 20. Which of the following is an Operating System?
(A) UNIX
(B) JAVA
(C) ORACLE
(D) MS-Office
Question 21. Which of the following is not a Web browser?
(A) Opera
(B) Google Apps
(C) Vivaldi
(D) Mozilla Firefox
Question 22. In microwave oven, the microwave tube used is _________.
(A) A combination of klystron and magnetron tubes
(B) Klystron tube
(C) Magnetron tube
(D) Travelling wave tube
Question 23. Wi MAX is related to which one of the following?
(A) Biotechnology
(B) Space technology
(C) Missile technology
(D) Communication technology
Question 24. The memory of the computer is measured by _________.
(A) Bits
(B) Ohms
(C) Amperes
(D) Volts
Question 25. Which one of the following is not a computer term?
(A) ANALOGUE
(B) BINARY CODE
(C) SIM
(D) MODE
Question 26. Binary numbers are __________.
(A) 0 and 1
(B) 0 and 10
(C) 1 and 10
(D) 1 and 100
Question 27. Computer virus is a _______.
(A)Fungus
(B) Bacterium
(C) IC7344
(D) Software program
Question 28. In a Binary Code 7 is written as _________.
(A) 110
(B) 111
(C) 101
(D) 100
Question 29. What is the virus that spreads in computer?
(A) Hardware
(B) Computer program
(C) Ant
(D) System software
Question 30. Binary language consists of how many digits?
(A) 2
(B) 3
(C) 4
(D) 16