Computer and IT Quiz SET 4

Question 1. Which one of the following is a part of Infotech terminology?

(A) Protocol

(B) Login

(C) Archie

(D) All of these

View Answer

(D) All of these

Question 2. A computer virus is _________.

(A) A computer program that can replicate itself

(B) A virus that affects health of human being

(C) Both of the above

(D) None of the above

View Answer

(A) A computer program that can replicate itself

Question 3. A set of rules that governs data communication is called ________.

(A) Protocols

(B) Standards

(C) RFCS

(D) None of these

View Answer

(A) Protocols

Question 4. A computer virus is a _________.

(A) Destructive program

(B) Utility program

(C) Firewall

(D) None of the above

View Answer

(A) Destructive program

Question 5. In Cyber Law terminology ‘DOS’ means _________.

(A) Denial of Service

(B) Disk Operating System

(C) Distant Operator Service

(D) None of the above

View Answer

(A) Denial of Service

Question 6. Computer virus means _________.

(A) A new virus

(B) Plague virus

(C) Destructive program

(D) Hardware of computer

View Answer

(C) Destructive program

Question 7. In the context of computer security, crackers are also known as _________.

(A) black hat hackers

(B) white hat hackers

(C) elite hackers

(D) script kiddie

View Answer

(A) black hat hackers

Question 8. A program that has the capability to infect other program and make copies of itself and spread into
other programs is called _________.

(A) Worm

(B) Virus

(C) Trojan

(D) None of these

View Answer

(B) Virus

Question 9. Junk e-mail is also called _________.

(A) Spoof

(B) Spool

(C) Sniffer script

(D) Spam

View Answer

(D) Spam

Question 10. Firewall is used in Communication Network/System for protection from _________.

(A) Unauthorized attack

(B) Data driven attack

(C) Fire attack

(D) Virus attack

View Answer

(A) Unauthorized attack

Question 11. The word ‘Spam’ is related to which of the following subject?

(A) Computer

(B) Art

(C) Music

(D) Sports

View Answer

(A) Computer

Question 12. American television and Telegraph has developed such computer procedure which gives multi-user
environment, it is called _________.

(A) V.G.A.

(B) Unix

(C) V.L.S.I.

(D) U.T.A.

View Answer

(B) Unix

Question 13. Sending an identical e-mail message repeatedly to a particular address by any abuser is called __________.

(A) E-mail Spoofing

(B) E-mail Spamming

(C) E-mail Bombing

(D) None of the above

View Answer

(C) E-mail Bombing

Question 14. ‘Windows-3’ a popular windowing environment was released by Microsoft in the year __________.

(A) 1985

(B) 2000

(C) 1995

(D) 1990

View Answer

(D) 1990

Question 15. DuckDuckGo is a __________.

(A) search engine

(B) web browser

(C) virus

(D) news website

View Answer

(A) search engine

Question 16. Windows operating system was developed by _________.

(A) Microsoft

(B) I.B.M.

(C) A.T.&T.

(D) H.P.

View Answer

(A) Microsoft

Question 17. Yahoo, Google and MSN are ________.

(A) Internet sites

(B) Computer brands

(C) Watches manufactured in Switzerland

(D) Rings of Saturn

View Answer

(A) Internet sites

Question 18. Windows Software has been developed by _________.

(A) I.B.M.

(B) Apple Corporation

(C) WIPRO

(D) Microsoft

View Answer

(D) Microsoft

Question 19. Which web browser was developed by Google?

(A) Internet Explorer

(B) Firefox

(C) Safari

(D) Chrome

View Answer

(D) Chrome

Question 20. Which of the following is an Operating System?

(A) UNIX

(B) JAVA

(C) ORACLE

(D) MS-Office

View Answer

(A) UNIX

Question 21. Which of the following is not a Web browser?

(A) Opera

(B) Google Apps

(C) Vivaldi

(D) Mozilla Firefox

View Answer

(B) Google Apps

Question 22. In microwave oven, the microwave tube used is _________.

(A) A combination of klystron and magnetron tubes

(B) Klystron tube

(C) Magnetron tube

(D) Travelling wave tube

View Answer

(C) Magnetron tube

Question 23. Wi MAX is related to which one of the following? 

(A) Biotechnology

(B) Space technology

(C) Missile technology

(D) Communication technology

View Answer

(D) Communication technology

Question 24. The memory of the computer is measured by _________.

(A) Bits

(B) Ohms

(C) Amperes

(D) Volts

View Answer

(A) Bits

Question 25. Which one of the following is not a computer term?

(A) ANALOGUE

(B) BINARY CODE

(C) SIM

(D) MODE

View Answer

(C) SIM

Question 26. Binary numbers are __________.

(A) 0 and 1

(B) 0 and 10

(C) 1 and 10

(D) 1 and 100

View Answer

(A) 0 and 1

Question 27. Computer virus is a _______.

(A)Fungus

(B) Bacterium

(C) IC7344

(D) Software program

View Answer

(D) Software program

Question 28. In a Binary Code 7 is written as _________.

(A) 110

(B) 111

(C) 101

(D) 100

View Answer

(B) 111

Question 29. What is the virus that spreads in computer? 

(A) Hardware

(B) Computer program

(C) Ant

(D) System software

View Answer

(B) Computer program

Question 30. Binary language consists of how many digits? 

(A) 2

(B) 3

(C) 4

(D) 16

View Answer

(A) 2