Fundamental of Computer MCQ: 1. A. 2. A. 3. A. 4. A. 5. A. 6. A
Fundamental of Computer MCQ: 1. A. 2. A. 3. A. 4. A. 5. A. 6. A
1
9.is
a combination of hardware and software that facilitates the sharing
of information between computing devices.
a. network b. peripheral c. expansion board d. digital
device
10. Coded entries which are used to gain access to a computer system are
called
a. Entry codes b. Passwords c. Security commands d. Code words
11. Which of the following statements is true?
a. Minicomputer works faster than Microcomputer
b. Microcomputer works faster than Minicomputer
c. Speed of both the computers is the same
d. The speeds of both these computers cannot be compared with the
speed of advanced
12. You organize files by storing them in
a. archives b. folders c. indexes d. lists
13. What type of resource is most likely to be a shared common
resource in a computer Network?
a. Printers b. Speakers c. Floppy disk drives d. Keyboards
14. Which device is required for the Internet connection?
a. Joystick b. Modem c. CD Drive d. NIC Card
15. What is a light pen?
a. A Mechanical Input device b. Optical input device
c. Electronic input device d. Optical output device
16. UNIVAC is
a. Universal Automatic Computer b. Universal Array Computer
c. Unique Automatic Computer d. Unvalued Automatic Computer
17. CD-ROM stands for
a. Compactable Read Only Memory b. Compact Data Read Only
Memory
c. Compactable Disk Read Only Memory d. Compact Disk Read
Only Memory
2
18. ALU is
a. Arithmetic Logic Unit b. Array Logic Unit
c. Application Logic Unit d. None of above
19. VGA is
a. Video Graphics Array b. Visual Graphics Array
c. Volatile Graphics Array d. Video Graphics Adapter
20. IBM 1401 is
a. First Generation Computer b. Second Generation Computer
c. Third Generation Computer d . Fourth Generation Computer
3
NETWORK SECURITY MCQ
1. Message ________ means that the sender and the receiver expect
privacy
A. confidentiality
B. integrity
C. authentication
D. none of the above
2. Message_____ means that the data must arrive at the receiver exactly
as sent
A. confidentiality
B. integrity
C. authentication
D. none of the above
3. Message _______ means that the receiver is ensured that the message
is coming from the intended sender, not an imposter
A. confidentiality
B. integrity
C. authentication
D. none of the above
4. ________ means that at a sender must not be able to deny sending a
message that he sent.
A. Confidentiality
B. Integrity
C. Authentication
D. Non repudiation
5. _______ means to prove the identity of the entity that tries to access
the system's resources.
A. Message authentication
B. Entity authentication
C. Message confidentiality
D. none of the above
6. A(n) _________ can be used to preserve the integrity of a
document or a message.
A. message digest
4
B. message summary
C. encrypted messaged message
D. none of the above
7. A(n) ________functions creates a message digest out of a message.
A. encryption
B. decryption
C. hash
D. none of the above
8. A hash function must trust meet ________ criteria.
A. two
B. three
C. four
D. none of the above
9. A _______ message digest is used as an MDC.
A. keyless
B. keyed
C. either (a) or (b)
D. neither (a) nor (b))
10. To authenticate the data origin, one needs a(n) ____________.
A. MDC
B. MAC
C. either (a) or (b)
D. neither (a) nor (b))
11. A ________ signature nature is included in the document; a _______
signature is a separate entity.
A. conventional; digital
B. digital; digital
C. either (a) or (b)
D. neither (a) nor (b))
12. Digital signature provides ________
A. authentication
B. non repudiation
C. both (a) and (b)
D. neither (a) nor (b))
13. Digital signature cannot provide ________ for the messages
A. integrity
B. confidentiality
C. non repudiation
D. authentication
5
14. If _________ is needed, a cryptosystem must be appllied over the
scheme
A. integrity
B. confidentiality
C. non repudiation
D. authentication
15. A digital signature needs a(n)_________ system
A. symmetric-key
B. asymmetric-key
C. either (a) or (b)
D. neither (a) nor (b))
16. A witness used in entity authentication is _______________
A. something known
B. something possessed
C. something inherent
D. all of the above
A) Kernel services
B) Library services
2. The system of generally ran one job at a time. These were called
single stream batch Processing.
A) 40's
B) 50's
C) 60's
D) 70's
7
A) First
B) Second
C) Third
D) Fourth
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
A) Long-term scheduling
B) Medium-term scheduling
C) Short-term scheduling
7. With a page is brought into main memory only when the reference
is made to a location On that page.
A) Demand paging
B) Main paging
C) Pre paging
D) Post paging
A) Paging method
9
B) Segmentation method
D) None of these
A) Multilithic kernel
B) Monolithic kernel
C) Micro kernel
D) Macro kernel
A) Multilithic kernel
B) Monolithic kernel
C) Micro kernel
D) Macro kernel
A) File management
10
B) Low-level memory management
C) Inter-process communication
A) Mutual exclusion
C) Circular waits
D) No preemption
11
14. The methods or algorithms which are used to increase the
performance of disk storage sub-system are called.............
A) Disk performing
B) Disk scheduling
C) Disk storing
D) Disk extending
15. Is the time required to move the disk arm to the required track.
A) Seek time
B) Rotational delay
C) Latency time
D) Access time
A) SCAN
B) C-SCAN
C) N-Step SCAN
D) Both A and B
17. Policy selects the disk I/O request that requires the least movement of
the disk arm from its current position.
12
A) FSCAN
B) SSTF
C) SCAN
D) C-SCAN
A) Multithreading
B) Multiprocessing
C) Multi executing
D) Bi-threading
A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-True
D) i-False, ii-False
13
20. Is a special type of programming language used to provide
instructions to the monitor simple batch processing schema.
SQL MCQS
1. What is SQL Server?
a) SQL Server is a relational database management system
b) SQL Server is software whose main purpose is to store and retrieve
data
c) SQL Server is a highly secure server and does not allow any database
file manipulation during execution
d) All of the mentioned
2. When was the first version of Microsoft SQL Server released?
a) 1991
b) 1990
c) 1988
d) 1983
3. Which of the following is a free database software running free SQL
Server technology?
a) SQL Server Web
b) SQL Server Enterprise
c) SQL Server Workgroup
14
d) SQL Server Express
4. Which of the following companies originally worked together to create
and market the first version of SQL Server?
a) Sybase
b) Ashton-Tate
c) Microsoft
d) All of the Mentioned
5. What is the Codename for SQL Server 2012?
a) Katmai
b) Denali
c) Hekaton
d) Kilimanjaro
6. Which was the first version of SQL Server to introduce in-memory
capability?
a) SQL Server 2005
b) SQL Server 2008
c) SQL Server 2012
d) SQL Server 2014
7. Which of the following data type is not present in SQL Server?
a) geography
b) hierarchyid
c) boolean
d) bit
8. Which database is used by SQL Server Agent for scheduling alerts and
jobs, and recording operators?
a) temp
b) model
c) msdb
d) master
9. SQL Server has mainly how many types of views?
a) four
b) three
c) one
d) two
10. Which of the following is not a SQL Server
INFORMATION_SCHEMA view?
a) sys.dm_exec_connections
15
b) INFORMATION_SCHEMA.KEY_COLUMN_USAGE
c) INFORMATION_SCHEMA.DOMAIN_CONSTRAINTS
d) INFORMATION_SCHEMA.CONSTRAINT_TABLE_USAGE
11. Which of the following joins are SQL server default?
a) Inner
b) Equi
c) Outer
d) None of the Mentioned
12. Which of the following is not a class of constraint in SQL Server?
a) UNIQUE
b) NOT NULL
c) CHECK
d) NULL
13. Which of the reasons will force you to use the XML data model in
SQL Server?
a) Order is inherent in your data
b) Your data is sparse or you do not know the structure of the data
c) Your data represents containment hierarchy
d) All of the Mentioned
14. What is the hybrid model in SQL Server?
a) Using XML with views
b) Using XML with triggers
c) Combination of relational and XML data type columns
d) Combination of relational and non relational data type columns
15. Which of the following feature of SQL Server was used before XML
technology for semi structured data?
a) In memory database
b) Stored Procedure
c) Dynamic management views
d) None of the mentioned
16. Which of the following language is used for procedural flow in SQL
Server?
a) Control-of-flow language
b) Flow language
c) Control language
d) None of the mentioned
17. Exception handling is possible in SQL Server using _____________
a) FINAL
b) FINALLY
16
c) THROW
d) All of the mentioned
18. Which of the following stored procedure is already defined in SQL
Server?
a) System defined Procedure
b) CLR Stored Procedure
c) Extended Procedure
d) User Defined Stored Procedure
19. DML triggers in SQL Server is applicable to _____________
a) Update
b) Delete
c) Insert
d) All of the mentioned
20. User defined function in SQL Server can return ____________
a) Result set
b) Scalar value
c) Set of values
d) All of the mentioned
17