*

.

G.K. Computer Fundamental

G.K. Computer Fundamental

Q-1 Manual data can be put into computer by ………….’

(a) Keyboard (b) MICR
(c) OCR (d) Scanner

Q-2 The ………… provides the go-ahead approval for the development of projects

(a) The project head (b) The user department head
(c) The senior management (d) All of the above

Q-3 Which not the following does not fall under the category of operations to be performed during development of software

(a) Personnel security (b) Logical access control
(c) Physical protection (d) Environmental protection

Q-4 The term ‘remote’ wrt network means

(a) A device that cannot control network functions
(b) Machine located far off
(c) Any peripheral or application located far off
(d) FEP

Q-5 Which access control mechanism does security label fit into ?

(a) Logical access control (b) Discretionary access control
(c) Physical access control (d) None of these

Q-6 A character that retains its value during program execution is …………..

(a) Constant (b) Variables
(c) Type definitions (d) Function

Q-7 All decisions for a LAN are taken by

(a) The it steering committee (b) The top management
(c) A business analyst (d) A project manager

Q-8 Generation of PIN in Bank ATM would require :

(a) Acquirer validates
(b) Acquirer sends response to the acceptor
(c) Authorizations request is sent to the acquirer
(d) PIN entered is encrypted

Q-9 …………. Are self replicating malicious code independent of the action of the user, but slow down the processor on entering a network

(a) Viruses (b) Worms
(c) Trojan Horse (d) None of the above

Q-10 Physical access to a database can be altered by which factors ?

(a) OS used by the software (b) Hiring Procedure
(c) Biometric security tools (d) Access privileges

Q-11 Which is NOT a feature of www ?

(a) Retrieving information (b) Enabling multimedia
(c) Built in hyper text capability (d) None of these

Q-12 Organization would prefer in house development of software to

(a) Ensure that development adhere to defined quality
(b) Maintain vendor relations
(c) Use the technology that is being widely used for development
(d) None of these

Q-13 Which of the following is the fastest ?

(a) Tapes (b) Hard disk
(c) Floppy disk (d) CDs

Q-14 Which of the memory is fastest ?

(a) Auxiliary` (b) Buffer
(c) Hard disk (d) Optical drive

Q-15 Which of the following cannot be shared ?

(a) Printer (b) Scanner
(c) Plotter (d) Mouse

Q-16 Which one of the following statements is true with respect to VSAT ?

(a) Usage is restricted to geographical boundaries
(b) Very high cost due to the usage of fibre optic cables
(c) Though quality of data is high, it does not support high bandwidth
(d) It operates in two frequency bands namely Ku and C

Q-17 The CPU ( Central processing unit ) has

(a) Input ,output and processing
(b) Control unit primary storage and secondary storage
(c) Control unit , arithmetic – logic unit, and primary storage
(d) None of the above

Q-18 What should be considered while division of duties in an IT environment bank ?

 (a) Nature of business operations (b) Managerial policy
(c) Organization structure with job description (d) All the above

Q-19 Which of the following is used to append a digital signature ?

(a) Public key (b) private key
(c) Digital key (d) None of these

Q-20 Computer program looking “normal” but containing harmful code is infected by

(a) Trojan Horse (b) Virus
(c) Worm (d) None of these

Q-21 Steganography is

(a) Hiding the data to make it necessarily invisible and not easily detectable
(b) Hiding the data but not necessarily making it invisible and not easily detectable
(c) Detecting and destroying the hidden data
(d) None of these

Q-22 Mark I computer was

(a) Electrical machine (b) Mechanical Machine
(c) Electronic Machine (d) None of these

Q-23 A computer faster with

(a) GUI (b) Mouse
(c) Keyboard (d) None of these

Q-24 Which of the following do you think is NOT required to develop an application for computer ?

(a) Feasibility study (b) Designing
(c) Testing (d) None of these

Q-25 The data flow diagram is for analyzing

(a) How to do a function efficiently
(b) Restrict the number of times a function can be performed
(c) Requirements of user
(d) None of these

ANSWERS:-

1. d 2. c 3. a 4. b 5. d 6. a 7. a 8. d 9. c 10. b 11. d 12. a 13. b
14. b 15. d 16. d 17. d 18. c 19. b 20. a 21. b 22. c 23. c 24. d 25. c

Reasons:

8. so that no one is able to understand it
12. In house development is company developing its own software
20 Trojan horse is software that has ‘virus hidden in it
24 All of these are required
25. These diagrams are just like flowcharts only difference is they show data movement instead of flow control in charts.

No comments:

Post a Comment

..