1.
Which one of the following is an architecture paradigms?
1 out of 50
3.
The header length of an IPv6 datagram is ___________
3 out of 50
4.
Data communication system spanning states, countries, or the whole world is ________
4 out of 50
5.
The attacker using a network of compromised devices is known as _____________
5 out of 50
6.
Which one of the following is not a higher –layer SSL protocol?
6 out of 50
7.
Which layer in the IEEE 802.11 protocol stack has the function of flow control and error control?
7 out of 50
8.
Which of the following is a type of cyber attack?
8 out of 50
9.
The virus hides itself from getting detected by ______ different ways.
9 out of 50
10.
Spyware collects user’s personal data & spreads it to______________ data-firms, or its creator.
10 out of 50
11.
Users might invite some bogus virus in his/her system by clicking the ____________
11 out of 50
12.
Which of the following is created when a user opens an account in the computer system?
12 out of 50
14.
Which command is used for displaying the contents of a file in Unix?
14 out of 50
15.
Which of the following is an example of a PaaS cloud service?
15 out of 50
16.
Which command is used to bring the background process to forground?
16 out of 50
17.
In vi editor, the key combination CTRL+f
17 out of 50
18.
Which among the following interacts directly with system hardware?
18 out of 50
19.
In a timeshare operating system, when the time slot assigned to a process is completed, the process switches from the current state to?
19 out of 50
20.
Which of the following can improve the performance of an AI agent?
20 out of 50
21.
TCP process may not write and read data at the same speed. So we need __________ for storage.
21 out of 50
22.
Traffic in a VPN is NOT ____________
22 out of 50
23.
Application developer has permission to decide the following on transport layer side
23 out of 50
24.
Which one of the following is not used to generate dynamic web pages?
24 out of 50
25.
IPv6 does not use _________ type of address.
25 out of 50
26.
In TDM, slots are further divided into __________
26 out of 50
27.
Which of the following is a form of DoS attack?
27 out of 50
29.
With respect to IEEE 802.11 Wireless LAN, MSDU stands for-
29 out of 50
30.
Father of ‘C’ programming language
30 out of 50
31.
Which of the following is NOT a hardware of a computer?
31 out of 50
32.
Which is the part of the computer system that one can physically touch?
32 out of 50
33.
COBOL is widely used in applications
33 out of 50
34.
The central processing unit consists of
34 out of 50
35.
A ………. is an electronic device that process data, converting it into information.
35 out of 50
36.
The device used to carry digital data on analog lines is called as
36 out of 50
37.
Which of the following was not used in first generation computers?
37 out of 50
38.
IC chips used in computers are usually made of:
38 out of 50
40.
The computer keyboard in English normally uses
40 out of 50
41.
Which of the following is not an example of an Operating System?
41 out of 50
42.
Information travels between components on the mother board through
42 out of 50
43.
In this generation, transistors replaced vacuum tubes
43 out of 50
44.
One Gigabyte is approximately equal is:
44 out of 50
45.
The 16 bit Microprocessor means that it has
45 out of 50
46.
One trillionth of a second is
46 out of 50
47.
Compact discs, (according to the original CD specifications) hold how many minutes of music?
47 out of 50
48.
Best Quality graphics is produced by
48 out of 50
49.
The —– is the administrative section of the computer system.
49 out of 50
50.
Which of the following is not an input device?
50 out of 50