1. Malicious access is called
a. Unauthorized reading of data
b. Unauthorized modification of data
c. Unauthorized destruction of data
d. All the above
2. When you work on a document on PC, where is the document temporarily stored
a. ROM
b. RAM
c. CPU
d. CD-ROM
e. Flash memory
3. Ctrl, Shift and Alt are called ---- keys
a. Modifier
b. Function
c. Alphanumeric
d. Adjustment
e. Specifier
4. Files deleted from the hard disk are sent to
a. Memory
b. Recycle bin
c. Secondary memory
d. Motherboard
5. IEEE 802.5 standard is used for
a. Ethernet
b. LIC
c. Token bus
d. Token ring
6. In which of the following topologies, and there are devices in a network, each device has n-1 parts for cables
a. Mesh
b. Star
c. Ring
d. Bus
7. A notice on the screen that informs you of a problem is called
a. Frame
b. Window
c. Dialog box
d. Message
e. Monitor
8. VDU is used as a(n)
a. Input device
b. Output device
c. Processing device
d. Storage units
e. Control unit
9. Which of the following items is not used in local area network (LAN)
a. Computer
b. Modem
c. Printer
d. Cable
e. Connector
10. WWW is based on which of the following modes
a. Local server
b. Client server
c. 3-tier
d. 2-tier
ANSWERS
[dropshadowbox align="none" effect="lifted-both" width="500px" height="" background_color="#ffffff" border_width="1" border_color="#dddddd" ]1.(d) 2.(b) 3.(d) 4.( b) 5.(d) 6.(a) 7.(d) 8.(b) 9.(b) 10.(b)[/dropshadowbox]
Comment Policy : We invite you to comment on our posts, as long as they are respectful, to the point and approving. We do not perform pre-moderation of comments. However, in order to keep this site clean and useful, we reserve the right to remove any comment that is not in accordance with our Comment Policy.