1.Which technology is used by cell phones to access the internet?
2.Which of the following scrambles a message by applying a secret code?
3.What type of monitoring file is commonly used on and accepted from Internet sites?
4.The software that secretly collects information about the web client's internet habits?
5. Which register is used as a working area in CPU?
6. Which of the following is the valid subnet mask for class B IP Address?
7.Repeaters function in which layer?
8.Name the input device from the given options, that cannot be used to work in MS Office ?
9.Select the odd one out :
10. Name the first widespread computer virus for MS-DOS?
Cloud computing
Neural Networks
XML language
micro browser software
None of the above
2.Which of the following scrambles a message by applying a secret code?
Audits
Encryption
UPS
Firewalls
Encapsulation
3.What type of monitoring file is commonly used on and accepted from Internet sites?
Smartware
Phishes
Cookies
Trojans
None of the above
4.The software that secretly collects information about the web client's internet habits?
Detectware
Spam
Spyware
Pharming
All of the above
5. Which register is used as a working area in CPU?
Program counter
Instruction registers
Instruction decoder
Parity generator
Accumulator
6. Which of the following is the valid subnet mask for class B IP Address?
251.254.25.5
255.255.0.0
155.151.12.9
255.0.0.0
255.255.255.0
7.Repeaters function in which layer?
physical layer
data link layer
network layer
both (a) and (b)
session layer
8.Name the input device from the given options, that cannot be used to work in MS Office ?
Scanner
Mouse
Keyboard
Joy stick
All of the above
9.Select the odd one out :
Interpreter
operating system
Compiler
Assembler
both (a) and (d)
10. Name the first widespread computer virus for MS-DOS?
Brain
Handshake
Code Red
Melissa
Sasser
No comments:
Post a Comment