Paper III
Paper III
Subject:
Computer
Applications
and
NBCD/
Computer
Applications
Ser Section Sub-Section Topic Difficulty Question Type Question Text Option Option Option Option Correct Option Marks
1 2 3 4
1 Computer Computer Evolution of Fill in the Blanks In 1830, _____ designed an 'analytical engine' that performed calculations. Babbage 1
Applications Fundamentals Computers
VLSI Stands for __________. Very Large Scale Integration 1
Which was the first electronic digital programmable computing device ? Analytical engine Difference Engine Colossus ENIAC 3 1
EDSAC stands for __________. Electronic Delay Electronic Delay Electronic Data Electronic Data 1 1
Storage Autiomatic Storage Automatic Storage Automatic Storage Automatic
Calculator Computer Calculator Computer
EDVAC stands for __________. Electronic Discrete Electronic Discrete Electronic Data Electronic Data 2 1
Variable Automatic Variable Automatic Variable Automatic Variable Automatic
Calculator Calculator Calculator Computer
Which was the first commercial computer? Ferranti Mark 1 Analytical Engine Difference Engine Colossus 1 1
UNIAC stands for __________. Universal Automatic Universal Native Universal Native Universal Automatic 4 1
Calculator Input Automatic Input Automatic Computer
computer calculator
ENIAC stands for __________. Electronic Electronic Electronic Numerical Electronic Numerical 1 1
Numerical Numerical Integrator Automatic Integrator Automatic
Integrator And Integrator And Computer Calculator
Computer Calculator
John Mauchly and J. Presper Eckert are the inventors of __________ UNIAC ENIAC EDSAC Ferranti Mark 1 2 1
computer.
Who invented the punch card? Charles Baggage Semen Korsakov Herman Hollerith Joseph Marie 3 1
Jacquard
In the late __________, Herman Hollerith invented data storage on punched 1860 1900 1890 1880 4 1
cards that could then be read by a machine.
Which electronic components are used in First Generation Computers? Integrated circuits Vaccum Tubes VLSI ULSI Micro 2 1
Microprocessor processor
Which electronic components are used in Second Generation Computers? Transistors Integrated Circuits Vaccum Tubes VLSI Micro 1 1
processor
Which electronic components are used in Third Generation Computers? Integrated Circuits Vacuum Tubes VLSI ULSI 1 1
Microprocessor Microprocessor
Which electronic components are used in Fourth Generation Computers? Integrated Circuits Vacuum Tubes VLSI ULSI 3 1
Microprocessor Microprocessor
Which electronic components are used in Fifth Generation Computers? Integrated Circuits Vacuum Tubes VLSI ULSI 4 1
Microprocessor Microprocessor
ENIAC Computer belongs to __________. First Generation Second Generation Third Generation Fourth Generation 1 1
Computers Computers Computers Computers
VLSI Stands for __________. Very Large Storage Very Large Storage Very Large Scale Very Large Scale 3 1
Integration Integrator Integration Integrator
ULSI Stands for __________. Ultra Large Storage Ultra Large Scale Ultra Large Storage Ultra Large Scale 2 1
Integration Integration Integrator Integrator
__________ is used as a programming language in first generation FORTRAN COBOL BASIC Machine Language 4 1
computers?
FORTRAN stands for __________. For Translation Format Fork Transformation Formula Translation 4 1
Transformation
The processing speed of first generation computers was milliseconds microseconds nanoseconds picoseconds 1 1
VGA staads for Video Graphics Visual Graphics Volatile Graphics Video Graphics 1 1
Array Array Array Adapter
MICR stands for Magnetic Ink Magnetic Ink Code Magnetic Ink Cases None 1 1
Character Reader Reader Reader
Which of the following is not a class based on size? Mainframe Micro Computer Mini Computer Digital Computer 4 1
Computer
In latest generation computers, the instructions are executed Parallel only Sequentially only Both sequentially All of above 3 1
and parallel
Which of the following generation computers had expensive operation cost? First Second Third Fourth 1 1
Which of the following programming language started from the second LISP C QBASIC FORTRAN 4 1
generation?
Fifth generation computer is also known as Knowledge Very large scale Both of above None of above 1 1
information integration
processing system
Second Generation computers were developed during 1949 to 1955 1956 to 1965 1965 to 1970 1970 to 1990 2 1
Who built the world’s first electronic calculator using telephone relays, light Claude Shannon Konrard Zues George Stibits Howard H. Aiken 3 1
bulbs, and batteries ?
Which of the following is a feature of fifth-generation computers? Use of natural artificial intelligence bio-chips All of above 4 1
language
Minicomputers and microcomputers are from which generation of First Second Third Fourth 4 1
computers?
Charles Babbage is considered the father of modern computers because of his difference of his analytical his concept of input, All of above 3 1
engine engine mill and output
Which of the following have the fastest access time? Semiconductor Magnetic Disks Magnetic Tapes Compact Disks 1 1
Memories
One Word Question Which generation was based on integrated circuits Fourth 1
Who built the world’s first electronic calculator using telephone relays, light George Stibits 1
bulbs, and batteries ?
What was the name of the first computer designed by Charles Babagge? Difference Engine 1
Which test undertakes trial test of a computer or software before the Beta test 1
commercial launch ?
What is Scareware? Fake antivirus softwares 1
which programming language is used in the Third generation of computer ? C and C++ 1
What was the world's first general-purpose computer ? The Analytical Engine 1
In which year third generation computers was developed? 1965 - 1970 1
When was first generation of computers was developed ? 1946 - 1958 1
Which is ancient memory aid device used to record and document numbers, A tally stick 1
quantities or even messages?
What is the first electro-mechanical computer ? IBM Automatic Sequence Controlled Calculator (ASCC) 1
Time to access data in hard disk can be improved by increasing rotational speed 1
______________
SCSI stands for _______________________ small computer system interface 1
IDE stands for _____________________________ Integrated drive electronics 1
__________________is a successor to parallel SCSI interface on Fibre channel 1
enterprise market.
Separation of user logical memory and physical memory is ___________ Virtual memory 1
Cashe memory bridge the gap between RAM and _______ Processor 1
Bus which used to connect monitor to CPU is __________ SCSI bus 1
To extend connectivity of processor bus we use__________ PCI bus 1
Main advantage of multiple bus organization over single bus Reduction in a number of cycles for execution 1
is_______________________
ISA standard buses are used to connect_____________ Hard disk and processor 1
Missing slot covers on a computer can cause___________ Overheat 1
The DC voltage on most circuit boards is:________ 0 1
The main circuit board in the system unit is also called Motherboard 1
the:______________________
Your operating system will detect and install the appropriate device drivers Plug and play 1
for this type of device:_________________
Component of CPU which is responsible for comparing contents of two ALU 1
pieces of data is___________________________
When arithmetic, logic and control unit of a computer are combined into a Central Processing Unit 1
single unit, it is known as__________________________
Brain of a computer is called_______________________ CPU 1
The transfer rate, when the USB is operating in low-speed of operation is 1.5Mb/s 1
_________________
The high speed mode of operation of the USB was introduced by USB 2.0 1
________________
The sampling process in speaker output is a ________ process. Isochronous 1
The USB device follows _______ structure. Tree 1
The device can send a message to the host by taking part in _____ for the Polling 1
communication path.
When the USB is connected to a system, its root hub is connected to the Processor BUS 1
________
The devices connected to USB is assigned a ____ address. 7 bit 1
The initial address of a device just connected to the HUB is ________ ans:0000000 1
Fusible link PROMs are programmed by removing the desired fuse links 1
using a microscope and tweezers.
One of the advantages of DRAMs is their ability to store data without 1
needing periodic refreshment of the memory contents.
Main computer memory is usually DRAM because of high density and low 1
cost; cache memory is usually SRAM because of high speed.
Testing and troubleshooting the decoding logic will not reveal problems with 1
the memory chips and their connections to the CPU busses.
LRU stands for ___________ Low Rate Usage Least Rate Usage Least Recently Used Low Required 3 1
Usage
Because of virtual memory, the memory can be shared among processes threads instructions none of these 1 1
____________
When a program tries to access a page that is mapped in address space segementation fault fatal error occurs page fault occurs no error occurs 3 1
but not loaded in physical memory, then ____________ occurs
Effective access time is directly proportional to ____________ page-fault rate hit ratio memory access none of these 1 1
time
Computer memory in which user cannot write new information or RWM RAM ROM CMOS 3 1
instructions is
Which of the following is not a type of memory? RAM FPROM EEPROM ROM 3 1
If a RAM chip has n address input lines then it can access memory locations 2(n-1) 2(n+1) 2n 22n 3 1
upto __________
One Word Question The n-bit address is placed in the MAR 1
Which of the following control signals are selected for read and write Read and write 1
operations in a RAM?
Computers invariably use RAM for __________ High speed main memory 1
How many types of RAMs are? 2 1
Static RAM employs __________ BJT or MOS 1
Dynamic RAM employs __________ Capacitor or MOSFET 1
Which one of the following is volatile in nature? RAM 1
The magnetic core memories have been replaced by semiconductor RAMs, All of the Mentioned 1
why?
The data written in flip-flop remains stored as long as D.C. power is supplied 1
The memory capacity of a static RAM varies from 64 bit to 1 Mega bit 1
The input data bit is written into the cell by setting Both the flip-flop for 1 and resetting the flip-flop 1
When the READ/(WRITE)’ line is HIGH then the flip-flop is Unaffected 1
The flip-flop in static memory cell can be constructed using BJT or MOSFET 1
Which of the following IC is TTL based static RAM? IC 7489 1
IC 7489 is of ____________ 64 bit 1
The first practical form of Random Access Memory (RAM) was the Memory tube 1
A permanent memory, which halls data and instruction for start-up the ROM 1
computer and does not erase data after power off.
Which of the following memories must be refreshed many times per Dynamic RAM 1
second?
USB-type storage device is - Secondary 1
_________device is used to back up the data Network Drive. 1
A half byte is known as_____. nibble 1
Main memory of computer is - Internal 1
The contents of memory into blocks of the same size is called as: EEPROM 1
What is the permanent memory built into your computer called? ROM 1
With a CD you can........... read 1
RAM is a.......memory- main 1
__________ is the permanent memory built into your computer called. ROM 1
Magnetic tape is not practical for applications where data must be quickly A sequential-access medium 1
recalled because tape is __________
What is the main advantage of magnetic core memory over semiconductor Non-volatile 1
RAM memory?
Hard disc drives are considered.........storage- Non-volatile 1
Flash is ................ PROM 1
Permanent instructions that the computer uses when it is turned on and that ROM 1
cannot be changed by other instructions are contained in-
The faster, costlier and relatively small from of storage managed by Cache 1
computer system hardware
The analytical engine developed during first generation of computers used Counter wheels 1
__________ as a memory unit.
________ is used to hold ROM, RAM, CPU and expansion cards Motherboard 1
Which of the following medium is used between CPU & RAM TO speed up Cache Memory 1
the processing power of a CPU
Breaking logical memory into blocks of the same size is called as: Pages 1
When power is switched OFF, it will lost its data, such type of memory is volatile storage 1
classified as
Process of reading data from permanent store and writing it to computer's loading the data 1
main store is called
The storage element for a static RAM is the ________. flip-flop 1
Which is/are the basic refresh mode(s) for dynamic RAM Burst refresh and distributed refresh 1
One of the most important specifications on magnetic media is the data transfer rate 1
The time from the beginning of a read cycle to the point when the data 1
output is valid is called propagation delay.
Due to their ability to be easily erased and reused, magnetic memory 1
devices are widely used for RAM.
The TMS44100 4M × 1 DRAM does not have a chip select (SC) input. 1
A ROM that allows the user to program data into the chip by permanently FALSE 1
opening fusible links is the EPROM.
A write operation may also be referred to as a "fetch" operation. FALSE 1
Address multiplexing is used to reduce the number of address lines. 1
PROMs are basically the same as mask ROMs, once they have been 1
programmed.
RAM is nonvolatile. FALSE 1
Cache memory is used in high-speed systems. 1
Dynamic memories, such as the 2118 16K × 1 RAM, have to multiplex the 1
address bus.
ROM is a type of memory in which data are stored permanently or 1
semipermanently.
EEPROMS can be electrically erased and reused. 1
DRAM uses a cross-transistor configuration. 1
Main computer memory is usually DRAM because of its high density and 1
low cost; cache memory is usually SRAM because of its high speed
One of the advantages of DRAMs is their ability to store data without FALSE 1
needing periodic refreshment of the memory contents.
A typical RAM will write (store data internally) whenever the Chip Select line FALSE 1
is active and the Write Enable line is inactive.
When two or more devices try to send their own digital levels to a shared 1
data bus at the same time, bus contention will take place.
The main advantage of bipolar (TTL) memories over MOS memories is 1
speed.
Multiple choice Storage which stores or retains data after power off is called- Volatile storage Non-volatile Sequential storage Direct storage 2 1
storage
A permanent memory, which halls data and instruction for start-up the Network interface CPU RAM ROM 4 1
computer and does not erase data after power off. card
Which of the following memories must be refreshed many times per EPROM ROM static RAM Dynamic RAM 4 1
second?
USB-type storage device is - Secondary axiliary Tertiary Primary 1 1
Which of the following places the common data elements in order from Character, File, Character, Record, Character, Field, Bit, Byte, Character, 3 1
smallest to largest? Record, Field, Field, Database, Record, File, Record, Field, File,
Database, File File Database Database
Which device is used to back up the data? Floppy disk Tape Network Drive All of above 4 1
A half byte is known as_____. data bit half byte nibble 4 1
Main memory of computer is - internal External (1) and (2)both Auxiliary 1 1
The contents of memory into blocks of the same size is called as: ROM EPROM EEPROM All of above 4 1
What is the permanent memory built into your computer called? RAM ROM CPU CD-ROM 2 1
With a CD you can Write Read and Write either read or write 1 1
Read
12. RAM is a.......memory- External Auxiliary Internal Main 4 1
__________ is the permanent memory built into your computer called. ROM CPU DVD-ROM RAM 1 1
Magnetic tape is not practical for applications where data must be quickly A random-access A sequential- A read-only medium An expensive 2 1
recalled because tape is __________ medium access medium storage medium
What is the main advantage of magnetic core memory over semiconductor More compact and More economical A bit does not have Non-volatile 4 1
RAM memory? smaller to write after reading
Flash memory is also called as __________. Flash RAM Flash ROM Flash DRAM Flash DROM 1 1
A Winchester disk is a_________. Disk stack Removable Disk Flexible Disk All of above 1 1
Typical acronym of reusable optical storage will be...... CD CD-RW DVD RPM 2 1
Data gathering in computer means, they allow to use.........data. Present Input Output Store 4 1
The process to copy the software in hard disk from secondary storage Configuration Download Storage Escalation 4 1
media is called -
When we work on any document on PC, it is stored temporarily on- RAM ROM CPU Flash memory 1 1
The faster, costlier and relatively small from of storage managed by Main Memory Flash Memory Cache Disk 3 1
computer system hardware is:
The analytical engine developed during first generation of computers used RAM Floppies Cards Counter wheels 4 1
__________ as a memory unit.
Which of the following is used to hold ROM, RAM, CPU and expansion Computer bus Motherboard Cache Memory All of above 2 1
cards?
Which of the following medium is used between CPU & RAM TO speed up Virtual Memory D RAM Flash Memory Cache Memory 4 1
the processing power of a CPU?
Breaking logical memory into blocks of the same size is called as: Frames Segments Packets Pages 4 1
USB stands for- Uniform Service BusUniversal Serial Universal Sector Universe Service 2 1
Bus Buffer Bus
Which one is random access memory- RAM ROM PROM All of above 1 1
Where, data will remain intact even when the computer is turned of RAM Motherboard Secondary Storage Primary Storage 3 1
Device Device
For permanent memory in computer objects used are - Floppy disk Optical disk Hard disk All of above 4 1
Main memory works in conjunction with __________. RAM CPU Graphics Card LAN 2 1
SRAM stands for- Special Random- Supreme Random- Static Random- Stable Random- 3 1
Access Memory Access Memory Access Memory Access Memory
What is the capacity of super computers floppy disc? 400 M 500 M 600 M 700 M 2 1
Built in memory of computer is................. EROM ROM RAM PROM 2 1
FLASH is.............. Flash D-RAM S-RAM P-RAM 4 1
Virtual memory is_______. memory on the hard in RAM only necessary if a backup device for 1 1
disk that the CPU you do not have any floppy disk
uses an extended RAM in your
RAM computer
Saving data and instructions to make them readily available is the job of Storage Unit Cache Unit Input Unit Output Unit 1 1
__________
Which of the following is used to hold running program instructions? Primary Storage Virtual Storage Internal Storage Minor Devices 1 1
Which of the following is used in main memory? SRAM DRAM PRAM DDR 2 1
Which of the following are types of ROMs? SROM & DROM PROM & EPROM Only one type there PROM & EROM 2 1
is no further
classification
RAID stands for __________ Redundant array of Redundant array of Reusable Array of Reusable array of 1 1
independent disks individual disks independent disks individual disks
A non-erasable disk that stores digitized audio information is _____ CD CD-ROM DVD-R DVD-RW 1 1
One Word Question Storage which stores or retains data after power off is called- Non-volatile storage 1
A permanent memory, which halls data and instruction for start-up the ROM 1
computer and does not erase data after power off.
USB-type storage device is - Secondary 1
Which device is used to back up the data? Floppy Disk 1
Main memory of computer is - Internal 1
A nonvolatile type of memory that can be programmed and erased in flash memory 1
sectors, rather than one byte at a time is:
Memory that loses its contents when power is lost is: volatile 1
When power is supplied to the system then to maintain data with the life of CMOS 1
battery, computer BIOS contains the following
What is meant by the term RAM? Memory which both read and written 1
The two kind of main memory are primary and secondary 1
Which one is the secondary memory device ? floppy disk 1
The word 'computer' usually refers to the central processor unit plus internal memory 1
What are the two basic types of memory that your computer uses? RAM/ROM 1
What is the name given to the memory which works on time-sharing Virtual memory 1
principle to create an illusion of infinite memory space?
Which contents are lost when the computer turns off? Memory 1
How can UV erasable PROMs be recognized? small window on the chip. 1
What is the principal advantage of using address multiplexing with DRAM reduced pin count and decrease in package size 1
memory?
Why is a refresh cycle necessary for a dynamic RAM? The refresh cycle keeps the charge on the capacitor cells. 1
Which component is responsible for storing data and instructions? Implicit vs. Explicit memory 1
Which computer parts are responsible for data storage? Central Processing Unit (CPU) 1
What are the main components of a computer? Primary Data Storage 1
Write any one storage device? hard disk 1
What is the storage unit? Saving data and instructions to make them readily available 1
is the job of
Which memory is used to hold running program instructions? Primary Storage 1
Which is non-volatile storage? Secondary 1
What is DRAM Dynamic random access memory 1
The memory space is divided into segments of dynamic size are known as Segmentation 1
The _________ present a uniform device-access interface to the I/O Device drivers 1
subsystem, much as system calls provide a standard interface between the
application and the operating system.
A ________ is a collection of electronics that can operate a port, a bus, or a controller 1
device.
An I/O port typically consists of four registers status, control, ________ and data in, data out 1
________ registers.
The ______ register is read by the host to get input. data in 1
The ______ register is written by the host to send output data out 1
The hardware mechanism that allows a device to notify the CPU is called interrupt 1
_______
The CPU hardware has a wire called __________ that the CPU senses interrupt request line 1
after executing every instruction.
The _________ determines the cause of the interrupt, performs the interrupt handler 1
necessary processing and executes a return from the interrupt instruction to
return the CPU to the execution state prior to the interrupt.
The _________ are reserved for events such as unrecoverable memory non maskable interrupts 1
errors.
Linux uses a time-sharing algorithm ___________ to pair preemptive scheduling between multiple processes 1
The first linux kernel which supports the SMP hardware? linux 2.0 1
Which one of the following linux file system does not support journaling ext2 1
feature?
Which one of the following bootloader is not used by linux? NTLDR 1
The first process launched by the linux kernel is ___________ init process 1
Standard set of functions through which interacts with kernel is defined by system libraries 1
___________
What is Linux? multi user, multitasking 1
The ________ can be turned off by the CPU before the execution of critical maskable interrupt 1
instruction sequences that must not be interrupted.
The __________ is used by device controllers to request service. maskable interrupt 1
interrupt vector contains ____________ the memory addresses of specialized interrupt handlers 1
In rate monotonic scheduling ____________ shorter duration job has higher priority 1
The problem of priority inversion can be solved by ____________ priority inheritance protocol 1
Time duration required for scheduling dispatcher to stop one process and dispatch latency 1
start another is known as ____________
VxWorks is centered around ____________ wind microkernel 1
Inside its jacket, the floppy media is rotated at the speed of 300 RPM 1
The Double Density Double Sided disks on each side are organized with 40 tracks 1
An inverted page table keeps track of one entry per virtual page per process 1
If a deadlock is detected, the OS should always kill the process holding the 1
most resources in the deadlock.
The linker can resolves all address not resolved by the compiler 1
Since an inverted page table must be searched on each page references, it 1
is useful to organize it as a has table
1
In non-distributed systems. deadlock is rare enough that most systems just
ignore it.
an error is reported when a compiler cannot resolve an address when 1
compiling a code module
A paging scheme does not suffer from external fragmentation 1
In a base-and-bounds model, the base tells where a segment (module) is 1
loaded in memory
Virtual memory space is always bigger than physical memory space 1
A system that uses segmentation and paging just means that the pages are 1
grouped into logical statements
In Java RMI, data must be translated between the caller and the callee. 1
The medium term scheduler's job is to suspend jobs if the system is under 1
heavy load.
When a new process is forked in UNIX, it retains access ti the parent's open 1
files
In dual mode procesessing, a user process does I/O by accessing the I/O 1
device firectly
Every I/o device typically has a waiting queue associated with it 1
Kernal level threads, when blocking doing a system call, block all the 1
threads associated with that process
The kernel uses the Process Control Block to keep track of bookkeeping 1
information about processes, such as the program counter.
Multiple choice Dual mode of operating system has 1 Mode 2 Modes 3 Modes 4 Modes 2 1
Multi-processor system gives a Small system Tightly coupled Loosely coupled Both 1 and 2 2 1
system system
Logical extension of multiprogramming operating system is Time sharing Multi-tasking Single Programming Both 1 and 2 4 1
Multiprocessor system have advantage of Increased Through Extensive Operating System Both 1 and 2 1 1
put hardware
Scheduling of threads are done by Input Output Operating System Memory 3 1
Example of open source operating system is UNIX LINUX WINDOWS Both 1 and 2 4 1
Main memory of computer system is also called Non volatile Volatile Reserved Large 2 1
When many users accesses mainframes, this approach is called as Resource allocation Word Processors Dedicated resources Interface 1 1
Accessing same data from storage of computer system is provided by Serial clusters Parallel clusters Beowulf clusters Both 1 and 2 2 1
To start an I/O operation device driver loads appropriate register into? Memory Secondary Device Controller Arrays 3 1
Storage
Symmetric multiprocessing architecture of computer system uses shared Bus Memory Processors Both 1 and 2 4 1
In asymmetric clustering other machines perform operations while one Hot standby mode Standby mode Reset mode Undefined Mode 1 1
machine is in
Ability to continuously providing service proportional to level of surviving Graceful Degradation Upgradation Graceful 4 1
hardware upgradation degradation
Secondary memory of computer system is also called Non volatile Volatile Reserved Small 1 1
Environment in which programs of computer system are executed is: Operating system Nodes Clustered system Both 1 and 2 1 1
Clusters of computer system can be used more efficiently using Serialization Parallelization LAN WAN 2 1
A properly designed operating system must ensure that an incorrect (or Incorrectly Correctly both 1 and 2 None of these 1 1
malicious) program cannot cause other programs to execute
Table of pointers for interrupt to be executed contains the Interrupts Programs Addresses Compilers 3 1
User view of system depends upon the CPU Software Hardware Interface 4 1
Memories are normally classified according to their Speed Cost Indexes Both 1 and 2 4 1
SCSI system stands for Small common- Small common- Small computer small computer- 3 1
system interface system interaction system interface system interaction
One megabyte memory storage in form of bytes is equal to 1024 bytes 10242 bytes 10243 bytes 10244 bytes 2 1
Multi-processing systems of computer system are of 2 types 3 types 4 types 5 types 1 1
Clustered computer systems are normally linked via LAN WAN PAN TAN 1 1
The address of a page table in memory is pointed by Stack pointer Page table base Page registered Program counter 2 1
register
Program always runs on _____ address Logical address Absolute Address Physical address Relative address 1 1
What is a secret undocumented entry point into a program used to grant Trapdoor 1
access without normal methods of access authentication?
Comprehension 0
File System and Fill in the Blanks ________________________ is a program that manages a computer’s Operating system 1
types of OS hardware.
__________________provides a GUI for viewing and managing the file Windows Explorer 1
system.
____________contains icons that access programs, files, applications, and Desktop 1
file systems.
______________is only available in Vista. Sidebar 1
in ____________the Notification Area is referred to as the System Tray. Windows XP, 1
______________is basically Windows Explorer with a different name. Computer (My Computer in XP) 1
The processes that are residing in main memory and are ready and waiting ready queue 1
to execute are kept on a list called _____________.
The interval from the time of submission of a process to the time of turnaround time 1
completion is termed as ____________.
CPU is allocated to the process with highest priority in_________________. priority scheduling algorithm 1
In priority scheduling algorithm, when a process arrives at the ready queue, currently running process 1
its priority is compared with the priority of ____________.
Process are classified into different groups in ____________. multilevel queue scheduling algorithm 1
The initial program that is run when the computer is powered up is called bootstrap program 1
__________.
To access the services of operating system, the interface is provided by the System calls 1
___________.
By operating system, the resource management can be done via time and space division multiplexing 1
__________.
If a process fails, most operating system write the error information to a log file 1
___________.
The OS X has ____________ kernel. hybrid 1
The systems which allow only one process execution at a time, are called uniprocessing systems 1
__________.
A process stack does not contain __________. PID of child process 1
The address of the next instruction to be executed by the current process is Program counter 1
provided by the __________.
The number of processes completed per unit time is known as __________. Throughput 1
The entry of all the PCBs of the current processes is in __________. Process Table 1
A semaphore is a shared integer variable __________. that cannot drop below zero 1
Binary Semaphores are known as ______________. mutex locks 1
Process synchronization can be done on __________. both hardware and software level 1
A parent process calling __________ system call will be suspended until wait 1
children processes terminate.
Cascading termination refers to termination of all child processes before the Normally 1
parent terminates ___________.
In UNIX, each process is identified by its __________. Process Identifier 1
The child process completes execution, but the parent keeps executing, Zombie 1
then the child process is known as __________.
_________is the deadlock avoidance algorithm. banker’s algorithm 1
A problem encountered in multitasking when a process is perpetually denied starvation 1
necessary resources is called ____________.
A system program that combines the separately compiled modules of a linking loader 1
program into a form suitable for execution ______________.
An Operating System is a program that manages the_________. Computer Hardware 1
A________ is the basic unit of computer storage. bit 1
General-purpose computers run most of their programs from rewriteable Random Access Memory 1
memory, called main memory also called _________.
___________, is a technique that allows the execution of a process that is Virtual Memory 1
not completely in Memory.
The file system resides on a collection of _________. Disks 1
A ________is a software generated interupt caused either by an error or Trap 1
specific request from user.
_________ storage loses its contents when the power to the device is volatile 1
removed.
__________is used when the source CPU type is different from the target Emulation 1
CPU type.
Magnetic disks provide the bulk of secondary storage for modern computer 1
systems.
The time necessary for the desired sector to rotate to the disk head, called 1
the rational latency
Data is set of multiple choice SAN storage questions and answers focuses 1
on Filesystems.
Faster file system recovery Journaling is preferred for a 1
Password salting improves security as long as the underlying hash function 1
is invertible.
Cross-site scripting attacks require the victim’s browser to have cookies 1
enabled
The protocol shown above authenticates both the client to the server and 1
the server to
the client
The memcpy call should have been replaced by a printf call. 1
The foo function is still vulnerable to a buffer overrun attack 1
Adding bounds-checking on use of buff would have been a better change 1
than moving the buffer to the heap.
File locking is used to ensure consistency of file content. 1
It is designed to handle frequent hardware failures during operation. 1
You can paste the copied data to more than one selected cell or range. 1
"You can use the formatting toolbar buttons to apply any type of formatting 1
to the selected cell entry."
Excel does not format the entry in the formatting bar. 1
"You must first precisely select the range of cells to be named, as you will 1
not be able to redefine or modify the range before adding a name."
File type can be represented by ____________ File name File extension File identifier None of these 2 1
Mapping of file is managed by ____________ File metadata Page table base Virtual Memory File system 1 1
register
When will file system fragmentation occur? Unused space or Used space is not Unused spcae is Multiple file are non- 1 1
single file are not contiguous non-contiguous contiguous
contiguous
The systems which allow only one process execution at a time, are called Uniprogramming Uniprocessing Unitasking systems None of these 2 1
___ systems systems
A process can be terminated due to __________ Normal exit fatal error Killed by another All of above 4 1
process
A set of processes is deadlock if __________ each process is each process is all processes are None of these 1 1
blocked and will terminated trying to kill each
remain so forever other
A process stack does not contain __________ Function Local variables Return addresses PID of child process 4 1
parameters
Which system call returns the process identifier of a terminated child? Wait Exit Fork Get 1 1
The code segment that misuses its environment is called a _____________Internal thief Trojan Horse Code Stacker None of these 2 1
Which of the following is not the state of a process? New Old Waiting Running 2 1
What is a Process Control Block? Process type Data Structure A secondary storage A Block in memory 2 1
variable section
What is the degree of multiprogramming? the number of the number of the number of the number of 4 1
processes executed processes in the processes in the I/O processes in
per unit time ready queue queue memory
The initial program that is run when the computer is powered up is called boot program bootloader initializer bootstrap program 4 1
____
How does the software trigger an interrupt? Sending signals to Executing a special Executing a special Executing a special 2 1
CPU through bus operation called program called program called
system call system program interrupt trigger
program
The initial program that is run when the computer is powered up is called boot program bootloader initializer bootstrap program 4 1
____
What is an ISR? Information Service Interrupt Service Interrupt Service Information Service 3 1
Request Request Routine Routine
CPU scheduling is the basis of ___________ multiprocessor multiprogramming larger memory sized None of these 2 1
systems operating systems systems
With multiprogramming ______ is used productively. Time Space Money All of above 1 1
What are the two steps of a process execution? I/O & OS Burst CPU & I/O Burst Memory & I/O Burst OS & Memory Burst 2 1
The switching of the CPU from one process or thread to another is called process switch task switch context switch All of above 4 1
____
Scheduling is done so as to ____________ increase CPU decrease CPU keep the CPU more None of these 1 1
utilization utilization idle
What is Turn around time? the total waiting the total time spent the total time spent the total time from 4 1
time for a process in the ready queue in the running queue the completion till
to finish execution the submission of a
process
Linux uses a time-sharing algorithm ___________ to pair preemptive for tasks where both 1 and 2 None of these 1 1
scheduling between absolute priorities
multiple processes are more important
than fairness
The first linux kernel which supports the SMP hardware? linux 0.1 linux 1.0 linux 1.2 linux 2.0 4 1
Which one of the following linux file system does not support journaling Ext2 Ext3 Ext3 None of these 1 1
feature?
Which binary format is supported by linux? a.out elf both 1 and 2 None of these 3 1
Which one of the following bootloader is not used by linux? GRUB LILO NRTLDR None of these 3 1
The first process launched by the linux kernel is ___________ init process zombie process batch process boot process 1 1
What is Linux? single user, single single user, multi user, single multi user, 4 1
tasking multitasking tasking multitasking
In real time operating system ____________ all processes have a task must be process scheduling kernel is not 2 1
the same priority serviced by its can be done only required
deadline period once
The problem of priority inversion can be solved by ____________ priority inheritance priority inversion both 1 and 2 None of these 1 1
protocol protocol
A systems program such as fsck in ______ is a consistency checker. UNIX Windows Macintosh Solaris 1 1
Once the changes are written to the log, they are considered to be Committed Aborted Completed None of these 1 1
________
When an entire committed transaction is completed, ___________ it is stored in the it is removed from it is redone None of these 2 1
memory the log file
What is a circular buffer? writes to the end of overwrites older both 1 and 2 None of these 1 1
its space and then values as it goes
continues at the
beginning
In distributed system, each processor has its own ___________ Local memory Clock both 1 and 2 None of these 1 1
3. Network operating system runs on ___________ Server Every system in the both 1 and 2 None of these 1 1
network
Which routing technique is used in a distributed system? Fixed routing Virtual routing Dynamic routing All of above 4 1
Internet provides _______ for remote login. Telnet HTTP FTP RPC 1 1
Which buffer holds the output for a device? Spool Output Status Magic 1 1
A process is moved to wait queue when I/O request is made with non-blocking I/O blocking I/O asynchronous I/O synchronous I/O 2 1
__________
1. Physical memory is broken into fixed-sized blocks called ________ Frames Pages Backing Store None of these 1 1
Logical memory is broken into blocks of the same size called _________ Frames Pages Backing Store None of these 1 1
The __________ is used as an index into the page table. Frame bit Page number Page offset Frame offset 2 1
With paging there is no ________ fragmentation. Internal External either type of None of these 2 1
Smaller page tables are implemented as a set of _______ Queues Stack Counters Registers 4 1
The page table registers should be built with _______ very low speed very high speed a large memory None of these 2 1
logic logic space
One Word Question ______ is a unique tag, usually a number identifies the file within the file File Identifier 1
system.
To create a file allocate the space in file system & make an entry for new file directory 1
in _____________
File type can be represented by File extension 1
Which file is a sequence of bytes organized into blocks understandable by Object File 1
the systems Linker
What is the attached portion into a directory structure File system 1
Mapping of file is managed by ____________ File metadata 1
Mapping of network file system protocol to local file system is done by network file system 1
____________
Which one of the following explains the sequential file access method? read bytes one at a time, in order 1
Which deadlock condition where resources cannot be taken away while they No-preemptive condition 1
are being used by processes
Belady's Anomaly is also called as FIFO Anomaly 1
___________is the process of using the output of one program as an input plumbing/piping 1
to another
NOS stands for Network Operating System 1
__________commands are built-in commands that are already part of the Internal commands 1
operating system
what command will you type when you want to list down the files in a dir /w /p 1
directory, and at the same time pause after every screen output
In Linux, which is a super secure O.S system Ubuntu 1
_____________ and viruses are coded to take advantage of the weakness Malware 1
in Windows
In Ubuntu, Unity is the default _____________ graphical shel 1
Libaio is Linux Kernel _____________ Asynchronous I/O (A/O) 1
______________ is a command in Bash shell language Export 1
GUI stands for Graphical User Interface 1
_____________ is one of the different types of CPU registers in a typical Accumulators 1
operating system design.
__________________also shows which files are opened, and other I/O I/O status information 1
device state.
____________ also contains other potentially important system files that are Root partition 1
mounted during boot time
__________is one of the different attritubes for designing the file structure identifier 1
for an operating system
____________ is advantageous when accessing large amounts of Direct access 1
information.
Each endpoint of a communication is a ___________ socket 1
___________allows more operations to be run that can fit into memory at Swapping 1
one time
With _____________, a routine is not loaded until it is called dynamic loading 1
______________ refers to the address that is seen by the memory unit physical address 1
Logical address refers to the address that is generated by the __________ CPU 1
There are two types of semaphore Binary semaphores and Counting semaphores 1
_______________
What is a software program that facilitates computer hardware to The operating system 1
communicate and operate with the computer software?
Whose purpose is that a computer system performs well by managing its operating system 1
computational activities?
What is used to make a connection between two applications Socket 1
Which system is used in the case when rigid-time requirements have been Real-time system 1
placed on the operation of a processor.
What are the core and most important part of a computer operating system Kernel 1
which provides basic services for all parts of the OS
Which deadlock condition specifies that the resources involved are non- Mutual Exclusion Condition 1
sharable.
Which deadlock condition specifies that there must be a process that is Hold and Wait condition 1
holding a resource already allocated to it while waiting for an additional
resource that is currently being held by other processes?
Which deadlock conditions where resources cannot be taken away while No-preemptive condition 1
they are being used by processes?
Which deadlock condition specifies that the processes in the system form a Circular wait condition 1
circular list or a chain?
What is a basic unit of CPU utilization? Thread 1
What consists of a thread ID, program counter, register set, and a stack? Thread 1
What is a specific situation or condition where two processes are waiting for Deadlock 1
each other to complete so that they can start?
Name any one condition of deadlock Mutual Exclusion Condition 1
What is used to avoid deadlock? Banker's algorithm 1
Which algorithm is a deadlock-avoidance method? Banker's algorithm 1
which algorithm is named after the banking system Banker's algorithm 1
Which address is generated by CPU? Logical address 1
What is a phenomenon of memory wastage Fragmentation 1
Which phenomenon reduces the capacity and performance because space Fragmentation 1
is used inefficiently?
Which type of fragmentation occurs when we deal with the systems that Internal Fragmentation 1
have fixed-size allocation units?
Which type of fragmentation occurs when we deal with systems that have External Fragmentation 1
variable-size allocation units?
What is a process in which data is temporarily gathered to be used and spooling 1
executed by a device, program or the system?
Which process is associated with printing? spooling 1
Which commands are the built-in part of the operating system? Internal commands 1
Which commands are the separate file programs that are stored in a External commands 1
separate folder or directory?
What is a protected variable or abstract data type that is used to lock the Semaphore 1
resource being used?
Whose value indicates the status of a common resource? Semaphore 1
Name any one type of semaphore? binary Semaphores 1
Which semaphore takes only 0 and 1 as value? binary Semaphores 1
Which semaphore is used to implement mutual exclusion and synchronize binary Semaphores 1
concurrent processes?
What is termed as when increasing the number of frames allocated to a Belady's Anomaly 1
process virtual memory, the process execution is faster because fewer page
faults occur?
Belady's Anomaly is also called as? FIFO Anomaly 1
What does starvation in the operating system means? Resource management system 1
Which technique is used to avoid the starvation in resource scheduling aging technique 1
system?
Resource sharing within the process is an advantage of which Multithreaded -programming 1
programming?
What makes a process to be larger than the amount of memory allocated to Overlays 1
it?
What ensures that only important instructions and data at any given time are Overlays 1
kept in memory?
What specifies an instance of high paging activity? Thrashing 1
Whose main objective is to have a process running at all times? Multiprogramming 1
Time-Sharing system is also known as? multitasking 1
Which system can be classified as either computer-server systems or file Server system 1
server systems?
a machine is in a state known as hot standby mode where it does nothing Asymmetric clustering 1
but to monitor the active server known as?
What is the RR scheduling algorithm? RR (round-robin) scheduling algorithm 1
Which algorithm is primarily aimed for time-sharing systems? RR (round-robin) scheduling algorithm 1
In the RR-scheduling algorithm which queue is set up in such a way that the Circular queue 1
CPU scheduler goes around that queue?
Which method is especially useful when large amounts of code are needed Dynamic loading aid 1
in order to handle infrequently occurring cases such as error routines?
What allows more operations to be run that can fit into memory at one time? Swapping 1
What is based on a disk model of a file, such that it is viewed as a Direct Access method 1
numbered sequence of blocks or records?
where the operating system kernel is located? Root partition 1
What provide a standard means of representing I/O devices that may be Device drivers 1
manufactured by different companies
which type of registers are index registers and stack pointers in typical CPU registers 1
operating system design?
What provides information about which I/O devices are to be allocated for a I/O status information 1
particular process?
What allows the user to type in commands that can immediately provide Command line interface 1
results?
What is the processing of utilizing a region of fast memory for limited data Caching 1
and processes?
What acts as a translator for the low-level language? Assembler 1
Which memory is usually much efficient because of its high access speed? Cache memory 1
Which codes written using mnemonic commands are translated by the Assembly codes 1
Assembler into machine language?
What is part of a hardware mechanism that sends a notification to the CPU Interrrupts 1
when it wants to gain access to a particular resource?
What does GUI stand for Graphical User Interface 1
What provides users with an interface wherein actions can be performed by Graphical User Interface 1
interacting with icons and graphical symbols?
What allows an operating system to switch between software programs? Preemptive multitasking 1
Comprehension 0
Basics of Software Software Fill in the Blanks Software is a set of ————————— that when executed provide Instructions or Computer programs. 1
Engineering Engineering desired function and performance.
Software is a process and ——————————. Product 1
Software engineering is a —————— Discipline 1
The definition phase of software engineering includes tasks such as system Requirements analysis 1
engineering,software project planning and ————
——————— results in modification to the software to accommodate Adaptive maintenance 1
changes to its external environment.
.In Water fall model, the phases involved in the software development are Linear Order 1
organized in——
The development approach followed in prototype model is —————— Quick And Dirty 1
Structured analysis mainly depends on data flow diagrams and —————- data dictionary 1
-
An external entity is represented using ————————— in a DFD rectangle 1
——————— are often used in review meetings to focus on the reviews Checklists 1
and to ensure that no major source of errors is over looked by the
reviewers.
In object-oriented design, the modules in the design represent ——— data abstraction. 1
The three important levels of abstraction are procedural abstraction, data control abstraction 1
abstraction and ---------
The functional Independence is measured using two qualitative criteria Cohesion 1
namely, ——————— and coupling.
The weakest coupling that is most desirable is —————— Data Coupling 1
A data flow diagram is mapped into program structure using transform Transaction mapping 1
mapping and/or ———————
Comments in a program are —————————— that are meant for Textual Statement 1
program readers and are not executed.
——— helps to view the source code Browsing tools 1
—————tools helps in code creation, debugging and testing. executable code 1
————————— is also known as functional testing. Black-Box Testing 1
————— is a software measure, that provides a quantitative measure cyclomatic complexity 1
of logical complexity of a program.
Equivalence class of objects are present if the set of objects have transitive 1
relationships like —————, reflexive and symmetric.
The two categories of Integrated testing are incremental non-incremental 1
and_____________.
A___________ outlines the classes of tests to be conducted. test plan 1
_________ is mainly used for testing real-time and embedded systems. performance testing 1
In its simplest form an external computing device may access cloud data 1
services using a web browser.
Product line software development depends the reuse of existing software 1
components to provide software engineering leverage.
Agility is nothing more than the ability of a project team to respond rapidly to 1
change.
In agile software processes the highest priorities is to satisfy the customer 1
through early and continuous delivery of valuable software.
Teams with diversity in the individual team member skill sets tend to be 1
more effective than teams without this diversity.
Software engineering team structure is independent of problem complexity 1
and size of the expected software products.
Agile teams are allowed to self-organize and make their own technical 1
decisions.
In XP a metaphor is used as a device to facilitate communications among 1
customers, team members, and managers?
The first solution an analyst finds is usually the best solution. It is not cost 1
effective to consider alternatives
Project management ensures that an information system is developed at 1
minimum cost, within a specific time frame, and with acceptable quality
The most common reason for software project failure is lack of functionality 1
User stories are complete descriptions the user needs and include the non- 1
functional requirements for a software increment.
User stories are complete descriptions the user needs and include the non- 1
functional requirements for a software increment.
Non-functional requirements can be safely ignored in modern 1
It is relatively common for different customers to propose conflicting 1
requirements, each arguing that his or her version is the right one.
Multiple choice Which of the following is NOT a major phase of information engineering? Enterprise Analysis Business Area Business System Construction 3 1
Analysis Analysis
Temporal Metrics include all but the following except: Enviornmental Collateral Damage Remediation Level Report Confidence 1 1
Metrics Potential(CDP) (RL) (RC)
See Table 13-1; which methodology requires Business Entity Analysis? Process Data Object None of these 2 1
See Figure 12-17; Which subdomain is responsible for service objects such Data Human Software Hardware/Operating 1 1
as Define logical data access control and application presentation. system
According to Table 13-5; Which methodology is MOST predictable and Data Human Software Hardware/Operating 1 1
consistent: system
The _______ supports and sells the goals of the project throughout the Project Manager Sponsor Champion User 3 1
organization:
The Goal of 3NF Is to: Remove Repeating Remove Partial Remove Non- Remove non key 4 1
Groups Key Dependencies Repeating Groups dependencies
Program Code
Jenkins (2005) listed the mythical man month diagram how many interfaces 1 3 6 10 3 1
exist for a 5 person project.
All listed below are examples of stakeholders with the exception of: End user Programmer Executive Expert 2 1
Which of the following is NOT an element of a project plan: What location is when it needs to be who is to do it how it is to be 1 1
involved done by achieved
A __________ is written by the PM and the SE and used to advertise a Bidding document Project request Request for bid Request for 4 1
project to vendors to bid on. Proposal(RPF)
An important part of the maintainability is to make all which of the following Project Design Supporting material All of above 4 1
available: documentation documentation
Based on this diagram return on investment (ROI) will be reached: 1 Year 2 Years 3 Years None of these 4 1
Two methods of analyzing methodology classes are: Information systems Humphrey's Information systems None of these 3 1
methodology maturity framework methodology
framework framework and
Humphrey's maturity
framework
Boilerplate code means that the code: does vary from one is critical to does not vary from meaning not 3 1
program to another maintaining one program to changeable after it is
applications at the another accepted as
functional level complete, motivates
rather than at the users to be as
code level. complete in their
thinking as possible
A ____ test is performed for each of the smallest units of code? Regression System Integration Unit 4 1
In "FIGURE 9-24 Decomposition for Customer and Video Maintenance Rental/Return Accounting Purchasing Personnel/Payroll 1 1
Remove Repeating Groups," which processes are decomposed?
Horizontal (or Subset) Data Partitioning: Complete 'records' Data are copied in Partial 'records' or Different data are 3 1
or tuples of data are more than one tuples of data are completely stored in
stored with different location. stored in more than more than one
data in more than one location. location.Some data
one location. may be accessed by
remote sites.
In the following development project schedule what is the deliverable for the Project proposal Requirements Alpha Release system 4 1
acceptance testing phase: Spec
Which is NOT a phase of project lifecycle (PLC)? Analysis and Project InitiationSystem Retirement Preparation for 3 1
Design Software
Engineering
The Common Vulnerability Scoring System (CVSS) is an open framework Identifying and Identifying and Identifying and None of these 3 1
that addresses what issue? assessing assessing assessing
vulnerabilities vulnerabilities vulnerabilities
across many across many across many
disparate software disparate hardware disparate hardware
platforms platforms and software
platforms
A __________work product is a product that is considered complete and Baseline Change request Checklist Change Control File 1 1
that is the basis for other, current work by the project development team.
A Structured Walk-Through does not include which work product? Program code Programmer Test Plan Test design 2 1
A Structured Walk-Through does not include this work product: Program code Programmer Test Plan Test design 2 1
The video store case study in chapter 2 includes requirements for customer, Rental processing Software Hardware Networks 1 1
video and ___________.
There are five rules of scheduling; which of the following is NOT one of Eliminate Pick the right level Take a vacation Analyst/Designer 3 1
them: uncertainty of granularity Toolkit
wherever you can
The list below are useful terms in expressing requirements specifications START STOP SMART None of these 3 1
and can be abbreviated to stand for:
All listed below are examples of stakeholders with the exception of: End user Programmer Executive Expert 2 1
The _______ supports and sells the goals of the project throughout the Project Manager Sponsor Champion User 3 1
organization:
In the following development project schedule what is the deliverable for the Project proposal Requirements Alpha Release system 4 1
acceptance testing phase: Spec
The major activities of structured design are all except: Develop program Transform or Define the logical Refine and complete 3 1
specifications transaction database structure chart
analysis of DFD
Which is NOT a phase of project lifecycle (PLC)? Analysis and Project Initiation System Retirement Preparation for 3 1
Design Software
Engineering
FTR includes _________, walkthroughs inspections round-robin reviews All of above 4 1
The specific activities in structured systems analysis: Develop a context Optionally, develop Develop a structured Develop a set of 3 1
diagram a state-transition data dictionary balanced data flow
diagram if building diagrams
an on-line or real-
time application
See Figure 2: CVSS Metrics and Equations. Which values are considered Base metrics plus Temporal metrics Environmental both 2 and 3 4 1
optional when reflecting the risk posed by the vulnerability to a user's vector metrics
environment?
Jenkins (2005) stated that the critical path is defined as: It is this path that It is this path that The critical path The critical path 2 1
you can traverse in you must traverse represents the ideal represents a set of
order to reach in order to reach set of tasks to be tasks to be complete
completion of your completion of your complete for your for your project
project on time project on time project
Boilerplate code means that the code: does vary from one is critical to does not vary from meaning not 3 1
program to another maintaining one program to changeable after it is
applications at the another accepted as
functional level complete, motivates
rather than at the users to be as
code level. complete in their
thinking as possible
Project Managers must exhibit all these qualities except: Understanding Trust Budgeting Empathy 3 1
The Common Vulnerability Scoring System (CVSS) is an open framework Identifying and Identifying and Identifying and None of these 3 1
that addresses what issue? assessing assessing assessing
vulnerabilities vulnerabilities vulnerabilities
across many across many across many
disparate software disparate hardware disparate hardware
platforms platforms and software
platforms
An important part of the maintainability is to make all which of the following Project Design Supporting material All of above 4 1
available: documentation documentation
Potential distribution of the application. The specific activities in structured Develop a context Optionally, develop Develop a structured Develop a set of 3 1
systems analysis: diagram a state-transition data dictionary balanced data flow
diagram if building diagrams
an on-line or real-
time application
Horizontal (or Subset) Data Partitioning: Complete 'records' Data are copied in Partial 'records' or Different data are 3 1
or tuples of data are more than one tuples of data are completely stored in
stored with different location. stored in more than more than one
data in more than one location. location.
one location.
Which of the following is NOT a major phase of information engineering? Enterprise Analysis Business Area Business System Construction 3 1
Analysis Analysis
The Base Metrics include all the following except: Access Vector Authentication Confidentiality, Confidentiality, 3 1
Integrity, Availability Integrity, Availability
Impacts
The Data Dictionary Process Contents does not include: Process Data Process ID Constraints (e.g., Process Name 1 1
Number concurrence,
sequential with
another process,
time-out, etc.)
Two methods of analyzing methodology classes are: Information systems Humphrey's Information systems None of these 3 1
methodology maturity framework methodology
framework framework and
Humphrey's maturity
framework
Environmental Metrics include all the following except: Collateral Damage Target Security Temporal vector's 4 1
Potential(CDP) Distribution(TD) Requirements (CR,
IR, AR)
The purpose of the Sample Change Request Impact Form: Document the The PM and SE The PM and SE impacts of the 4 1
priority for the define the schedule redefine the change document
action, and the cost and cost. schedule and the the priority for the
and schedule of the cost. action, and the cost
change and schedule of the
change.
A __________work product is a product that is considered complete and Baseline Change request Checklist Change Control File 1 1
that is the basis for other, current work by the project development team.
Which of the following is NOT an element of a project plan: What location is when it needs to be who is to do it how it is to be 1 1
involved done by achieved
The results of structured design are all BUT the following: Programming Plans for testing Conversation Training and 3 1
specifications Installation
Temporal Metrics include all but the following except: Enviornmental Collateral Damage Remediation Level Report Confidence 1 1
Metrics Potential(CDP) (RL) (RC)
Software engineers are involved in these activities in which correct order: Development, Operation, Development, Operation, 1 1
operation, development, operation, development,
maintenance or retirement and maintenance and maintenance and
retirement maintenance retirement retirement
6Which goal is stated in a clear and concise manner and more likely to “To deliver the “To deliver the best “To deliver the “To deliver a sales 2 1
inspire team members to achieve it? cheapest system, in sales and cheapest system, in and marketing
the shortest time, marketing system the shortest time, system on time”
that just about gets on the market” that almost gets the
the job done” job done”
A Structured Walk-Through does not include this work product: Program code Programmer Test Plan Test design 2 1
One Word Question When elements of a module are grouped because the output of one Sequential cohesion 1
element serves as input to another and so on, it is called
In project execution and monitoring, every project is divided into multiple Milestones checklist 1
phases according to which phase of SDLC all major tasks are performed?
The rules of writing 'if-then-else', 'case-switch', 'while-until' and 'for' control Control Structure 1
flow statements are called
IEEE provides a standard as IEEE 830-1993. For which activity this Software requirement specification. 1
standard is recommended standard?
A project risk factor is considered in which model? Spiral model. 1
Which model is not suitable for large software projects but a good one for Big Bang model 1
learning and experimenting?
Activities and action was taken on the data are represented by a circle or Process 1
round-edged rectangles are called
If an application allows executing multiple instances of itself, they appear on Tabs 1
the screen as separate windows are called
Which software enables the program to adequately manipulate information? Data Structures 1
What is a legacy system? A legacy system refers to outdated application software that 1
is used instead of available upgraded versions.
Software Requirement Specification (SRS) is also known as the Black box testing 1
specification of
COCOMO stands for COnstructive COst MOdel 1
RAD Software process model stands for Rapid Application Development 1
compilers, Editors software come under which type of software? System software 1
Abbreviate the term CASE Computer Aided Software Engineering 1
FAST stands for Facilitated Application Specification Technique. 1
Software is defined as Instructions 1
CASE Tool stands for Computer Aided Software Engineering 1
What is a text-based notifier that mostly shows the context in which the user Command prompt 1
is working, and it is also generated by the software system?
Well structured design has low cohesion and high coupling arrangements No 1
Quality of the product comes under which type of measures? Indirect measures 1
Measurements can be categorized in two ways. What are those two ways? Direct and Indirect 1
Which type of DFD shows how the data flow is implemented in the system Physical DFD 1
and it is also more specific and close to the implementation
Which is the way where the CMMI process meta-model can be represented Continuous model & Staged model 1
The evaluation of metrics resulting in insight and the quality of the Interpretation 1
representation is
Abbreviate the term SRS. Software Requirement Specification 1
The measure of reliability is given by Mean Time between failure (MTBF) 1
Which model depicts the profile of the end-users of a computer system? User model 1
System software and application software are important categories of which Software 1
part?
What is a piece of programming code and performs a well-defined task? A computer program 1
Which is a process of software development which is done to improve the Software Re-engineering 1
maintainability of a software system?
Requirements analysis and software architecture is the process of? Software development 1
What finds out how practical and beneficial the software project Feasibility study 1
development will prove to the organization?
Whatare functional features which are expected by users from the proposed Functional requirements 1
software product?
What offers measures for various aspects of software process ? Software Metrics 1
Wha is a technique which is used for dividing a software system into various Modularization 1
discreet modules?
What is a measure that defines the intra-dependability among the elements Cohesion 1
of the module?
What conducts a study to know the economic, technical and operational The software analyzer 1
feasibility of the project
What is Highest abstraction level is called? Level 0 of DFD 1
What is more like to the programming language without syntax of any Pseudo Code 1
specific language ?
What is a conceptualization of problem ? Structured design / 1
What is a programming method, which uses the concepts of a mathematical functional programming 1
function ?
What proper process is followed while developing the software Quality Quality Assurance 1
Assurance vs. Quality Control?
What does CASE stands for Computer Aided Software Engineering 1
What portrays the entire information system as one diagram ? Level 0 of DFD 1
What includes programming code, documentation and user guide? Software 1
Which command is used to create a new relation in SQL create table( , …) create relation( , new table( , …) new relation( , …) 1 1
…)
Which of the following commands do we use to delete a relation (R) from a drop table R drop relation R delete table R delete from R 1 1
database?
Which of the following commands do we use to delete all the tuples from a delete table R drop table R delete from R drop from R 3 1
relation (R)?
Which of the following logical connectives is not included in SQL? AND OR NOR NOT 4 1
The clause is used to list the attributes desired in the result of a query SELECT FROM WHERE CREATE 1 1
If the value on If the value on If the value on which If the value on which 3 1
which it is applied is which it is applied it is applied is blank it is applied is more
finite is invalid than the allowed
limit
The _____ aggregation operation adds up all the values of the attribute ADD AVG MAX SUM 4 1
The ________ comparison checker is used to check “each and every” ALL AND EVERY EACH 1 1
condition
The _________ construct returns true if the argument in the sub-query is NOT NULL NOT UNIQUE UNIQUE NULL 2 1
void of duplicates
What is the format of entering date into a database while inserting data into YYYY-MM-DD “YYYY-MM-DD” ‘YYYY-MM-DD’ “DD-MM-YYYY” 3 1
it?
Which of the following is a privilege in SQL standard? SELECT INSERT UPDATE All of above 4 1
What is the full form of OLAP? Online Application Online Application Online Analytical Online Analytical 4 1
Programming Processing programming Processing
Data that can be modelled as dimension attributes and measure attributes Mono-dimensional Multi-dimensional Measurable data Efficient data 2 1
are called ___________ data data
Which of the following is not a relational algebra function? SELECT PROJECT MANIPULATE UNION 3 1
Updating, Deleting and Inserting in relational algebra is done using the ASSIGNMENT MODIFICATION ALTERATION INCLUSION 1 1
________ operator
Which of the following is a good database management practice? Adding redundant Removing Not specifying None of these 2 1
attributes redundant primary keys
attributes
An entity set that has a primary key is called as ___________ Strong Entity set Weak Entity Set Complete Entity Set None of these 1 1
Which of the following can affect the placement of the relationship Alphabetical order The data in the Cardinality ratio None of these 3 1
attributes? attribute
Which of the following is not a feature of a good relational design? Specifying primary Specifying foreign Preserving integrity Allowing redundancy 4 1
keys keys constraints of attributes
An instance of a relation that satisfies all real world constraints is known as? Proper relation Ideal relation Perfect relation Legal relation 4 1
The process of making a normalized schema unnormalized is called as Unnormalization Denormalization Renormalization Annormalization 2 1
_________
If an attacker manages to get an application to execute an SQL query SQL attacks SQL injection SQL usage attack SQL destroyer 2 1
created by the attacker, then such attacks are called as _ attacks attack
The URL of the page that had the link that the user clicked to access the Source Linker Leaker Referrer 4 1
page is called as _____
DVD is a form of ______ storage Magnetic Storage USB Storage Tape Storage Optical Storage 4 1
Which of the following is a part of the Magnetic disk assembly? Spindle Read write head arm All of above 4 1
What is buffering? The blocks read The blocks read The blocks read None of these 2 1
from disk are from disk are from disk are
directly accessed temporarily stored organized in a
in a memory particular fashion to
cater requests.
A view whose contents are computed and stored is called as _______ Storage view Backup view Materialized view Advanced view 3 1
The problem of an update affecting the execution of a query associated with Updation problem incremental halloween problem optimization problem 3 1
the update is known as the ________ problem
The set of ________ in a precedence graph consists of all the transactions Vertices Edges Directions None of these 1 1
participating in the schedule
Which of the following is not a NoSQL database? SQL server MongoDB Cassandra None of these 1 1
Which of the following is a NoSQL Database Type? SQL Documents JSON All of above 2 1
databases
“Sharding” a database across many server instances can be achieved with LAN SAN MAN All of above 2 1
______________
Which of the following are the simplest NoSQL databases? Key-value Wide-column Document All of above 1 1
Bulk indexes may be more efficient for some kinds of content and workloads synchronous asynchronous UNIQUE None of these 2 1
in real time.
Point out the correct statement. An array with a An array with a An array with a None of these 1 1
large number of large number of small number of
elements will incur elements will incur elements will incur
greater indexing smaller indexing greater indexing
costs on insertion costs on updates costs on insertion
Which of the following is related to document that do not provide a way to Stemming Synonyms Ranking None of these 3 1
weight results?
Which of the following is related to document that provide support for Stemming Synonyms Ranking None of these 2 1
synonym or related queries in the application layer?
Which of the following is related to the parsing of document for root? Stemming Synonyms Ranking None of these 1 1
When inserts, updates and deletes have a _________ write concern, write Strong Weak Average Very strong 2 1
operations return quickly.
Which of the following operation can be optionally used for map reduce? Finally Final Static None of these 1 1
A second data center hosts one priority 0 member that cannot become Primary Write View Secondary 1 1
___________
Which of the following method returns a cursor? Find Sort Skip All of above 1 1
Which of the following key is used to denote uniqueness in the collection? _id Id id_ None of these 1 1
Which of the following functionality is used for aggregation framework? $match $project $projectmatch All of above 2 1
Which of the following pattern may provide a suitable solution for storing Child Parent Root None of these 1 1
graphs?
Which of the following pattern is more straightforward to use? Materialized Paths Array of ancestors Nested Sets None of these 2 1
Which of the following relationship uses references to describe documents One-to-One One-to-Many One-to-Many None of these 2 1
between connected data? Relationships with Relationships with Relationships with
Embedded Embedded Document
Documents Documents References
How many does collections GridFS use to store files? 1 2 3 4 2 1
Which of the collection in GridFS stores the binary chunks? Chunks Files Data Log 1 1
Which of the following checks and repairs errors and inconsistencies in data repairDatabase repairedDatabase recoverdatabase All of above 1 1
storage?
Which of the following field allows efficient retrieval of chunks? n name object 2n 1 1
Which of the following data type is depreciated? Double String Object Undefined 4 1
55. WiredTiger can compress collection data using either snappy or zlib Snappy zip lib kit 1 1
compression library.
56.Which of the following collection do not support the TTL property? compound indexes primary indexes composite indexes All of above 1 1
Which of the following parameter denotes name of the shard from which to shard tag chunk None of these 1 1
remove a tag?
Provides all the privileges of the read role. delete update readwrite None of these 3 1
Which data is mainly used for handling large volumes in NOSQL unstructured structured semi-structure All of above 1 1
Database?
Most NoSQL databases support automatic __________ meaning that you processing scalability replication All of above 3 1
get high availability and disaster recovery.
One Word Question In an object-oriented model, one object can access data of another object message 1
by passing
A view of database that appears to an application program Subschema 1
An abstraction concept for building composite object from their component Aggregation 1
object is called
A set of objects that share a common structure and a common behavior is Class 1
called
Every weak entity set can be converted into a strong entity set by adding appropriate attributes 1
Relations produced from an E-R model will always be in Third normal form 1
In ER model the details of the entities are hidden from the user. What is it Abstraction 1
called?
The file organization that provides very fast access to any arbitrary record of Hashed file 1
a file is
What is not true about a view? It is always updatable like any other table 1
In a relational database a referential integrity constraint can be specified foreign key 1
with the help of
4NF is designed to cope with Multi valued dependency 1
Which command is used to remove all rows from a table? Truncate 1
Which of the following is an aggregate function in SQL? Max 1
Which command is used to add a column to an existing table? Alter 1
Prevention of access to the database by unauthorized users is referred to Security 1
as
Cartesian product in relational algebra is a Binary operator 1
ODBC stands for Open Database Connectivity 1
In a relational model, relations are termed as Tables 1
The database schema is written in DDL 1
In the architecture of a database system what is the external level? view level 1
What is capable of understanding the Database Access Language and DBMS software 1
interpret it into actual database commands to execute them on the DB?
Which Term is defined to represent the relationships into pictorial form to E-R Models 1
make it easier for different stakeholders to understand?
What is a collection of an organized set of tables related to each other, and Relational database 1
from which data can be accessed easily?
What is the technique of organizing the data in the database? Database Normalization 1
Which process has the purpose of Eliminating redundant data and ensuring Normalization 1
data dependencies?
Which term is a systematic approach of decomposing tables to eliminate Normalization 1
data redundancy(repetition) and undesirable characteristics like Insertion,
Update and Deletion Anomalies?
Which term is a multi-step process that puts data into tabular form, Database Normalization 1
removing duplicated data from the relation tables?
Which term is says system to hide certain details of how data is stored and Data abstraction 1
created and maintained complexity should be hidden from database users?
Which term can be defined as the process of hiding the complexity of data & Data abstraction 1
representing the data which needs to be shown to the user?
Which term is the exploration and analysis of large quantities of data to Data mining 1
discover valid, novel, potentially useful and ultimately understandable
patterns in data?
Which term as features like prediction, identification, classification, and Data mining 1
optimization?
What is an open-source DBMS which is built, supported and distributed by MySQL 1
MySQL AB?
What data mining is also known as? Knowledge Discovery in Databases 1
Which database server is reliable, fast and very easy to use? MySQL 1
Which tables are present in memory and they are used for high-speed HEAP 1
storage on a temporary basis?
What is the default port for MySQL Server? 3306 1
Which software is portable GUI with command prompt and also MySQL 1
administered using MySQL Query browser?
What is a string object used to specify a set of predefined values and that ENUM 1
can be used during table creation in MySQL?
In which term floating-point numbers are stored with eight place accuracy FLOAT 1
and as four bytes?
In which term floating-point numbers are stored with accuracy 18 places and DOUBLE 1
as eight bytes?
Which software is database management systems (DBMS) and is designed SQL Server 1
by Microsoft?
Which software has the objective of capturing and analyzing data and SQL Server 1
managing the definition, querying, creation, updating, and administration of
the database?
Which software provides cross-platform support, a wide range of interfaces MySQL 1
for application programming?
What does DDL stand for? Data Definition Language Data Control Language 1
What is the syntax for concatenating tables in MySQL? CONCAT (string 1, string 2, string 3) 1
What is the limit of indexed columns that can be created for a table? 16 1
What are the different types of strings used in database columns in MySQL? SET, BLOB, VARCHAR, TEXT, ENUM, and CHAR. 1
How can a user get the current SQL version? SELECT VERSION (); 1
Is there an object-oriented version of MySQL library functions? Yes. MySQLi and interfaced in PHP. 1
What does DML stand for? Data Manipulation Language 1
Can you use MySQL with a Linux operating system? Yes. 1
What does DCL stand for Data control language 1
When the data disk is full and overloaded, we create a soft link and which .frm and the .idb files 1
file is to be moved into that link location?
What is an object which can have instances or occurrences that should be An entity 1
capable of being uniquely identified?
Which system is a single-user database, it does not support E.F.Codd rules DBMS 1
and does not allow a relationship between tables?
Use mysqldump To Create A Copy Of The Database? mysqldump -h mysqlhost -u username -p mydatabasename 1
> dbdump.sql
What is a single column or multiple columns defined to have unique values A primary key 1
that can be used as row identifications?
What is a single column or multiple columns defined to have values that can A foreign key . 1
be mapped to a primary key in another table?
Whatis a single column or multiple columns defined to have values pre- An index . 1
sorted to speed up data retrieval speed?
What does SQL stand for? Structured Query Language 1
The cost of conveying message, picture or voice over a large distance in a Small 1
communication system should be --------------
In any communication system, the message should be safe and -------------- Secure 1
should reach to the person for whom it is meant.
PCs connected with --------------can also be used for education, Modem 1
entertainment, etc.
sending a message and receiving a response has always been -------------- Necessity 1
for the proper functioning of a business or administration.
Eavesdropping is not possible in…-------------- fiber optics 1
Coaxial cables can be used for………------------ Both in telephone and cable TV networks 1
Data networks for the efficiency of communication reasons, uses--------------. Full-duplex transmission 1
The meaning of a digital channel means that the channel is -----------. Carrying digital data. 1
Data networks for the efficiency of communication reasons, uses-------------- Full-duplex transmission 1
Frequency range of human voice and audible to human ears is usually in 100MHz to 400 MHz 1
the range of--------------…--------------
Fiber optics communication system uses--------------. Full-duplex 1
In satellite communication, up-link frequency and down-link frequencies are interference can be avoided 1
different because……--------------
Higher the band width, the--------------……….is the efficiency response in a Higher 1
stereo system.
STP and --------------…can be used for both Analog and digital data UTP 1
transmission
A balanced modulator can be used to generate-------------- PSK 1
Microwave links are generally preferred o coaxial cable for television Of their greater bandwidth 1
transmission because……--------------
When useful bandwidth of medium exceeds the required bandwidth of Frequency Division Multiplexing 1
signals to be transmitted we use --------------….
The optical fiber transmission there exists --------------repeater spacing. Higher 1
During transmission, the distortion of the signal depends on -------------- Frequency of the signal 1
Both station can transmit and receive data simultaneously in Half duplex 1
mode
Data communications are transfer of data through some linear medium 1
Mode in which each station can send and receive data but not at same time 1
is called Simplex
Word Tele means Near 1
In mesh topology, devices are connected via Multipoint link 1
Performance, reliability and security are criteria of Efficient network 1
Which of the following statements is incorrect? teleprocessing Multiplexers are a half-duplex line is batch processing is 4 1
combing designed to accept a communication the preferred
telecommunication data from several line in which data processing mode for
and DP techniques I/O devices and can move in two telecommunication
in online activities. transmit a unified directions, but not operations.
stream of data on the same time.
one communication
line.
The interactive transmission of data within a time sharing system may be Simplex line Half duplex lines Full duplex line bi-flex lines 2 1
best suited to…..
Teleprinters…. are used for printing offer both high- have a printer for are same as 3 1
at remote locations, speed operation output and a teletypes
not for input and a variety of keyboard for input
formatting controls
Which of the following is an example of a bounded medium? Coaxial cable wave guide fiber optic cable All of above 4 1
Coaxial cable has conductors with…. A common axis Equal resistance the same diameter None of these 1 1
The area of coverage of a satellite radio beam is called its…. Beam width Circular Footprint Identity 3 1
Polarization
The amount of uncertainty in a system of the symbol is called. Bandwidth Entropy Loss Quantum 2 1
Buffering is…. the process of a method to reduce storage of data a method to reduce 1 1
temporarily storing cross-talks within the the routing overhead
the data to allow for transmitting medium
small variation in until the receiver is
device speeds. ready to receive
What is the main difference between synchronous and asynchronous band width required pulse height is clocking is derived clocking is mixed 3 1
transmission? is different. different. from the data in with data in
synchronous asynchronous
transmission. transmission.
The transmission signal coding method for T, the carrier is called….. NRZ Bipolar Manchester Binary 2 1
In a synchronous modem, the digital-to-analog converter sends a signal to Transmission line Modulator Terminal Equalizer 4 1
the……
Which section of a synchronous modem contains the scrambler? Terminal Section Receiver Section Control section Transmission 4 1
section
The synchronous modems are more expensive than the asynchronous they must contain production volume they must operate They are larger 1 1
modems because…. clock recovery is larger on a larger
circuits bandwidth
The receive equalizer reduces delay distortions using a….. Difference engine tapped delay lines Descrambler gear shift 2 1
How much power (approximately) a light-emitting diode can couple into an 1 Picowatt 100 Microwatts 10 Milliwatts 10 Watts 2 1
optical fiber?
Avalanche photodiode receiver can detect bits of transmitted data by 1 Photon 100 Photons 10 Photons 200 Photons 4 1
receiving.
The loss in signal power as light travels down the fiber is called. Propagation Attenuation Scattering Absorption 2 1
Multiple repeaters in communication satellites are called. Detector Modulator Transponders Stations 3 1
how many bits per symbol are used in the Baudot code? 5 7 8 9 1 1
While transmitting odd-parity coded symbols, the number of zeros in each Odd Even Unknown None of these 3 1
symbol is….
Which of the following transmission systems provides the highest data rate Digital PBX Computer Bus LAN Voiceband modem 2 1
to an individual device?
One important characteristic of LAN is… Parallel low cast access for unlimited expansion application 4 1
transmission low bandwidth independent
channel interfaces
Which of the following is possible in a token passing bus network? unlimited number of Unlimited distance In-service expansion Multiple time- 3 1
station divisions channels
Which of the following is not a characteristic of the hub architecture of Arc Directionalized Alternative routing Zero insertion loss RIM port isolation 2 1
net? transmission amplifier
A group of packets from a source through an X.25 packet system to sink. arrive in the same arrive in the same arrive in the same None of these 3 1
order sent for VC, order sent for PVC, order sent for both
but not for PVC but not for VC VC and PVC
How many OSI layers are covered in the X.25 standard? Three four two seven 1 1
A protocol is a rule governing a time sequence of events that must take Between peers across an interface between non-peers None of these 1 1
place.
Layer one of the OSI model is……. Physical Layer Link layer Transport layer network layer 1 1
Establishing a virtual connection is functionally equivalent to …… physically connecting a virtual placing a telephone None of these 3 1
connecting a DTE memory call prior to a
and DCE conversation
What is the main purpose of a data link content monitor? measurement of bit Determine the type Determine the type Detect problems in 4 1
error rate. of switching used in of transmission used protocols.
a data link. in a data link.
Protocol converters are …… same as same as TDMs ususlly not operated usually operated in 3 1
multiplexers in pairs pairs
Satellite transponders contain …. a receiver and a device that devices that All of above 1 1
transmitter echoes the transform the
designed to relay radiation without message sent from
microwave change from one one location on
transmission from point on earth to earth to a different
one point on earth another code for
to another transmission to
another location
Satellite transponders. use a higher use lower use a single are devices that 1 1
frequency for frequency frequency for echo the radiation
reception of reception of reception and without
radiation from earth radiation from earth transmission from
stations and lower stations and higher one point on earth to
frequency for frequency for another
transmission to transmission to
earth stations earth stations.
What frequency range is most affected by fog and precipitation? 4GHz to 6GHz 6GHz to 10GHz above 10GHz 2GHz to 4GHz 3 1
In OSI network architecture, the routing is performed by …. A data link layer Network layer Transport layer Session layer 2 1
In OSI network architecture, the dialogue control, and token management A data link layer Network layer Transport layer Session layer 4 1
are responsibilities of …...
The standard ASCII …. is version II of the has 128 is a subset of the 8- is used only in the 2 1
ASC standard characters, bit EBCDIC code United States and
including 32 control Canada
characters
Fibre-optic cables operate at frequencies near……. 20 MHz 200 MHz 2 GHz 800 THz 4 1
HF ratio waves follow how many basic paths on leaving the transmitter? two four one Many 1 1
Digital cellular radio systems…… expand the number allow multiple allow multiple extend transmission 3 1
of cells. subscribers to subscribers to share distance of
share the use of the use of a subscribers within a
cells. common channel cell.
within a cell
Transmission of binary signals require…… less bandwidth than more bandwidth same bandwidth as a Licence from the 2 1
analog than analog analog FAA
The standard first-level digital multiplex system in the United States 2.048 Mbps 44.736 Mbps 1.544 Mbps 9600 Mbps 3 1
operates at……
RS-232, RS-449, RS-530, V-24, and X-21 are examples of? standards for standards for two methods of error standards for end- 2 1
various types of interfaces between detection and to-end performance
transmission terminals and correction of data
channels modems communication
systems
V.42 defines…. compatibility with a method of data two methods of error compatibility with 3 1
MNP Class 5 data storage detection and MNP Class 7
compression correction enhanced data
compression
A smart modem can. detect transmission correctly answer accept commands None of these 3 1
errors and correct multiple choice from the terminals
them automatically quizzes Via Rs-232 interface
Extended command sets supported by modern modems. are standardized. are prefixed with use different can be counted on 3 1
the letter E. commands to to provide a high-
control many speed data transfer
advanced modem capability without
features requiring flow control
Binary codes are sometimes transformed in modems into. Hexadecimal Huffman codes Gray codes Complemetary 3 1
codes
A Western Electric 201 modem operates with a carrier frequency of…. 1000 Hz 1200 Hz 1800 Hz 600 Hz 3 1
If a modem packs six bits into each signal change and operates at 14,400 2400 bps 4800 bps 9600 bps 14 400 bps 4 1
bps, it can result in a maximum throughput of.
Multiplexing is…. the process of a technique that mailing letters at the the capability to 2 1
increasing enables more than Post Office share frequency by
bandwidth on a one data source to time
channel share the use of a
common line
When the amplitude of pulses is varied to represent analog information, the PCM PWM PAM PPM 3 1
method is called.
The D4 framing pattern contains a sequence of …. 24 bits 4 terminals and 8 8 terminals and 4 12 bits 4 1
framing bits. framing bits
The residual error rate is the….. number of bit errors probability that one probability that one signal to noise ratio 2 1
per twenty-four or more errors will or more errors will divided by the ratio
hours of continuous be undetected be detected when of energy per bit to
operation on an when an error an error detection noise per hertz
asynchronous line detection scheme mechanism is used
is used
Which layer os international standard organization OSI model is responsible physical layer data link layer transport layer network layer 2 1
for creating and recognizing frame boundaries?
If digital data rate of 9600 bps is encoded using 8-level phase shift keying 1200 bauds 3200 bauds 4800 bauds 9600 bauds 2 1
(PSK) method, the modulation rate is….
The path or channels over which information moves from one location to lines Remote Modems File Transfer 1 1
another make-up is called. Computers
One Word Question The key distinction is that in a distributed system, a collection of MIDDLEWARE 1
independent computers appears to its users as a single coherent system is
called?
Telephone calls between employees may be carried by the computer IP TELEPHONY OR VOICE OVER IP(VoIP). 1
network instead of by the phone company where internet technology is
used, this technology is called?
Which are made up of nodes that gather and wirelessly relay information Sensor networks 1
they sense about the state of the physical world
what lets remote workers see and interact with a graphical computer screen. Desktop sharing 1
Which networks are called to be used to join the individual networks at VPNs (Virtual Private Networks) 1
different sites into one extended network?
Web application 1
In which the server generates Web pages based on its database in Point-to-point 1
response to client requests that may update the database
which links connect individual pairs of machines. unicasting 1
Point-to-point transmission with exactly one sender and exactly one receiver broadcasting 1
is sometimes called
When a packet with its code is transmitted, it is received and processed by LAN 1
every machine on the network. This mode of operation is called
which network is a privately owned network that operates within and nearby WiFi 1
a single building like a home, office or factory
There is a standard for wireless LANs called IEEE 802.11, popularly known Ethernet 1
as
The topology of many wired LANs is built from point-to-point links. IEEE Internet service provider 1
802.3, popularly called
what is full form ISP routing algorithm. 1
the network makes the decision as to which path to use is called the protocol 1
when you or your computer places a telephone call, the switching MAC (Medium Access Control) sublayer 1
equipment within the telephone system seeks out a physical path from your
telephone to the receiver’s telephone. This technique is called
The protocols used to determine who goes next on a multiaccess channel Multiple Access with Collision Avoidance 1
belong to a sublayer of the data link layer called the
what is MACA A network . A network . 1
What is a set of devices connected by physical media links? What is Link 1
recursively is a connection of two or more nodes by a physical link or two or
more networks connected by one or more nodes?
When two or more computers are connected by physical media then that Nodes 1
physical media is called?
When two or more computers are connected by a physical media then the Router or Gateway 1
connected computer at the link end is called as?
When a node that is connected to two or more networks is commonly Point-point link. 1
called?
If the physical links are limited to a pair of nodes it is said to be? Multiple Access. 1
If the physical links are shared by more than two nodes, it is said to be? Distributed processing 1
Name the factors that affect the performance of the network? a. Frequency of failure, b. Recovery time of a network after 1
a failure
Name the factors that affect the reliability of the network? a. Unauthorized Access, b. Viruses 1
Name the factors that affect the security of the network? A protocol 1
What is a set of rules that govern all aspects of information communication? Protocols 1
Which layer links the network support layers and user support layers? Physical layer 1
Which layer coordinates the functions required to transmit a bitstream over Data Link Layer 1
a physical medium?
Which layer transforms the physical layer, a raw transmission facility, to a Network Layer 1
reliable link and is responsible for node-node delivery?
Which layer is responsible for the source-to-destination delivery of packet Transport Layer 1
possibly across multiple networks (links)?
Which layer is responsible for the source-to-destination delivery of the entire Session layer 1
message?
Which layer is the network dialog Controller? Presentation layer 1
Which layer is concerned with the syntax and semantics of the information Application Layer 1
exchanged between two systems?
Which layer enables the user, whether human or software, to access the Nodes and Links. 1
network?
What are the two classes of hardware building blocks? File transfer, access and Management (FTAM) 1
What does FTAM stand for? Terrestrial microwave , Satellite Communication 1
What are the unguided media of Transmission media? Single-Bit error 1
What is termed as in a single-bit error, only one bit in the data unit has The Presentation layer 1
changed?
Which layer is concerned with the syntax and semantics of the information The Application Layer 1
exchanged between two systems?
Which layer provides user interfaces and support for services such as e- Error Detection 1
mail, shared database management and other types of distributed
information services?
What uses the concept of redundancy, which means adding extra bits for Redundancy. 1
detecting errors at the destination?
The concept of including extra information in the transmission solely for Longitudinal Redundancy Check (LRC) 1
comparison. This technique is called?
What does LRC stand for? Burst Error 1
What is termed as where two or more bits in the data have changed? Forward error correction 1
What is the process in which the receiver tries to guess the message by Retransmission 1
using redundant bits.?
What is a technique in which the receiver detects the occurrence of an error Bit stuffing 1
and asks the sender to resend the message?
What is the process of adding one extra 0 whenever five consecutive Is Broadcasting 1
follow a 0 in the data so that the receiver does not mistake the pattern
0111110 for a flag?
If the message is sent to all the m nodes in the network it is called? Stop-and-Wait ARQ 1
What is carried out in error correction by keeping a copy of the sent frame Subnet 1
and retransmitting the frame when the timer expires
what is termed for a section of large networks usually separated by a bridge Vertical Redundancy Check (VRC) 1
or router?
What does VRC stand for NETBIOS 1
Which programming interface that allows I/O requests to be sent to and Media Access Control (MAC) 1
received from a remote computer?
Which address is usually stored in ROM on the network adapter card and is Gateway 1
unique?
Which device operates at the upper levels of the OSI model? Mesh networks 1
Which network in which there are multiple network links between computers OSPF 1
to provide multiple paths for data to travel?
Comprehension 0
ISO/OSI Network Fill in the Blanks The OSI model has _______ layers 7 1
model, Network
Components and
Network
Standards
TCP/IP model does not have ______ layer but OSI model have this layer session layer 1
Communication channel is shared by all the machines on the network in broadcast network 1
True or False First three digits of the DNIC (Data Network Identification Code) identify the 1
country
VLAN breaks up broadcast domains in a layer 3 switch internetwork. 1
Main reason the OSI model was created is to communicate with different 1
networks
12 collision domains are created when you segment a network with a 12- 1
port switch
TCP protocol does Ping use 1
802.1Q and ISL protocols are used to configure trunking on a switch 1
The format of ARP tables is the same from one operating system to another. 1
The command used to view IP information on a Windows workstation is 1
ipconfig.
All protocols are routable. 1
ICMP (Internet Control Message Protocol) reports on the success or failure 1
of data delivery.
A serial backbone is the simplest kind of backbone. 1
The most popular method for connecting nodes on a network is circuit 1
switching.
Modern Ethernet networks are based on the star topology. 1
It is best to perform connectivity tests on a computer connected to a live 1
network.
Advances in NIC technology are making this hardware smarter than ever. 1
In a star topology, a single connection failure will halt all traffic between all 1
sites.
In CIDR, conventional network class distinctions do not exist. 1
IMAP4 servers require less storage space and usually more processing 1
resources than POP servers do.
The MIME standard replaces SMTP. 1
On a network using TCP/IP, some nodes may use multiple IP addresses. 1
Which of the following is an example of a bounded medium? coaxial cable wave guide fiber optic cable all of these 4 1
Coaxial cable has conductors with…. a common axis equal resistance the same diameter none of these 1 1
The area of coverage of a satellite radio beam is called its…. beam width circular polarization footprint identity 3 1
The amount of uncertainty in a system of the symbol is called. bandwidth entropy loss quantum 2 1
Buffering is…. the process of a method to reduce storage of data a method to reduce 1 1
temporarily storing cross-talks within the the routing overhead
the data to allow for transmitting medium
small variation in until the receiver is
device speeds. ready to receive
What is the main difference between synchronous and asynchronous band width required pulse height is clocking is derived clocking is mixed 3 1
transmission? is different. different. from the data in with data in
synchronous asynchronous
transmission. transmission.
The transmission signal coding method for T, the carrier is called….. NRZ Bipolar Manchester Binary 2 1
The synchronous modems are more expensive than the asynchronous they must contain production volume they must operate They are larger 1 1
modems because…. clock recovery is larger on a larger
circuits bandwidth
Which of the following is not a software firewall? Windows Firewall Outpost Firewall Endian Firewall Linksys Firewal 4 1
Pro
A firewall protects which of the following attacks? Windows Firewall Outpost Firewall Endian Firewall Linksys Firewal 3 1
Pro
Which of these comes under the advantage of Circuit-level gateway Phishing Dumpster diving Denial of Service Shoulder surfing 1 1
firewalls? (DoS)
Which of these comes under the advantage of Circuit-level gateway They maintain They are light- They’re expensive They preserve IP 3 1
firewalls? anonymity and also weight yet efficient address privacy yet
inexpensive expensive
Which of the following is a disadvantage of Circuit-level gateway firewalls? They’re expensive They’re complex in They do not filter They’re complex to 3 1
architecture individual packets setup
Stateful Multilayer Inspection firewall cannot perform which of the following? Filter network layer Check for Scans for illicit data Evaluate packets at 3 1
packets legitimate session packets at the application lager
presentation layer
A proxy firewall filters at the Physical layer Application layer Data link layer Network layer 2 1
A packet.filter firewall filters at the Application or Data link layer Physical Layer Network or transport 4 1
transport layer
A firewall is a ______security system: etwork File Program None of These 1 1
A firewall is a network security system ______based that controls incoming Hardware Software Both hardware or None of These 3 1
and outgoing network traffic based on a set of rules: software
Which among the following is correct: A firewall is a Firewalls can be Both of Above None of these 3 1
system designed to implemented in
prevent both hardware and
unauthorized software or a
access to or from a combination of
private network. both.
Firewalls are frequently used to prevent unauthorized internet users from Intranets Extranets Both of Above None of These 1 1
accessing private networks connected to the internet especially ____:
Firewalls are used to protect: Home Networks Corporate Both of Above None of These 3 1
Networks
If you have more than one computer connected in the home, it is important Hardware Software HTML None of These 1 1
to protect every computer. You should have a ____firewall (such as a
router) to protect your network:
____intercepts all messages entering and leaving the network. The Circuit Level Proxy Server Packet Filter None of These 2 1
_____effectively hides the true network addresses: Gateway
Which among the following is correct characteristics about proxy server: A proxy server may A proxy server is a It performs its tasks All of the Above 4 1
act as a firewall by gateway from one or functions as a
responding to input network to another proxy on behalf of
packets in the for a specific the network user;
manner of an network
application while application
blocking other
packets.
Application layer firewalls works on the application level of the ____stack TCP IP Both of Above None of These 3 1
(i.e. all browser traffic or all telnet or FTP traffic) and may intercept all
packets travelling to or from an application:
What layer in the TCP/IP stack is equivalent to the Transport layer of the Application Host-to-Host Internet Network Access 2 1
OSI model?
Which class of IP address provides a maximum of only 254 host addresses Class A Class B Class C Class D 3 1
per network ID?
If you use either Telnet or FTP, which is the highest layer you are using to Application Presentation Session Transport 1 1
transmit data?
Which of the following is the decimal and hexadecimal equivalents of the 155, 0x9B 157, 0x9D 159, 0x9F 185, 0xB9 2 1
binary number 10011101?
Which layer 4 protocol is used for a Telnet connection? IP TCP TCP/IP UDP 2 1
Port number 80 is TCP SMTP HTTP none of these 3 1
Port number 21 is TCP SMTP HTTP FTP 4 1
Port number 554 is HTTPS HTTP HTP TCP 1 1
128 bit IP version IPv4 IPv3 IPv6 IP 3 1
No of bits in IPv4 28 16 8 32 4 1
Connection less oriented protocol TCP TCP/IP HTTP UDP 4 1
Connection oriented protocol TCP TCP/IP HTTP UDP 1 1
Which principle works in DHCP DORA DoS DDoS none of these 1 1
12.0.0.1 is example of Class A Class B Public IP Private IP 3 1
192.168.2.3 is example of Class B Class C Public IP Private IP 4 1
In ISO which layer concern with packet Physical Data link Network Transport 3 1
Application layer protocol TCP SMTP HTTP FTP 3 1
Port number 25 is for TCP TCP/IP HTTP UDP 1 1
Which is built on client server architecture TCP SMTP HTTP FTP 4 1
Which layer offers end to end services Session Application Transport Network 2 1
Technique used in TDM division time multipication Multiplexing none of these 3 1
When a Topology is called Hybrid only one topology only two topologies combination of two none of these 3 1
or more topologies
Name the protocol used in transport layer UDP & TCP TCP/IP HTTP All of these 1 1
Which ISO layer has 4 layers UDP & TCP TCP/IP HTTP All of these 2 1
IP Range of 192-223 is Class A Class B Class C Class D 3 1
The Internet model consists of layers 3 5 7 8 2 1
The process to process delivery of the entire message is the responsibility network transport application physical 2 1
of the _____layer
The _______layer is the layer closet to the transmission mediem physical Data link Network Transport 1 1
Mail Services are available to network users through the ___________layer data link Physical Transport Application 4 1
The ______layer lies between the network layer and the application layer Physical Data link Transport None of These 3 1
Which of the following condition is used to transmit two packets over a Collision 1
medium at the same time?
What are the most commonly used transmission speeds in BPS used in 9600 1
data communication?
What is the default subnet mask for a class C network? 255.255.255.0 1
Which of the following is used for modulation and demodulation? modem 1
How many hosts are attached to each of the local area networks at your 254 1
site?
Which of the following TCP/IP protocol is used for transferring electronic SMTP 1
mail messages from one machine to another?
Which of the following device is used to connect two systems, especially if repeater 1
the systems use different protocols?
A distributed network configuration in which all data/information pass star network 1
through a central computer is
A remote batch-processing operation in which data is solely input to a simplex lines 1
central computer would require a:
If you get both local and remote echoes, every character you type will twice 1
appear on the screen
What part of 192.168.10.51 is the Network ID, assuming a default subnet 192.68.10 1
mask?
The slowest transmission speeds are those of twisted-pair wire 1
A noiseless 3 kHz Channel transmits bits with binary level signals. What is 6 kbps 1
the maximum data rate?
What can greatly reduce TCP/IP configuration problems? DHCP Sserver 1
Nowadays computers all over the world can talk to each other. Which is one Modem 1
of the special accessories essential for this purpose?
The average execution time of the power monitor process should be less 1ms 1
than
The transparency that enables multiple instances of resources to be used, is Replication transparency 1
called
A paradigm of multiple autonomous computers, having a private memory, Distributed computing 1
communicating through a computer network, is known as
Cloud computing and web service platforms are focused on applications like HTC 1
Type of architecture that is considered responsible for the success of? n-tier architecture 1
application servers are said to be
A global system of interconnected computer networks is known as Internet 1
CPS stands for Cyber-physical system 1
Grid and cloud platforms are regarded as Utility service providers 1
Connections that grows exponentially into a new dynamic network of Dynamic 1
networks, is known as
In the grid computing model, servers or personal computers run Independently 1
An architecture that moves the client's query to a middle-tier so that Three-tier architecture 1
stateless clients can be used is called
Routing, IP Addressing and Path determination are the main responsibilities Network Layer 1
of Which layer
Which Layer is Responsible for Framing, Error detection, CRC and Physical Data Link Layer 1
Addressing
Multiplexing and De-Multiplexing is responsible for which layer Transport Layer 1
Segmentation and Re-assembly is responsible for which layer Transport Layer 1
Flow Control is responsible for which layer Transport Layer 1
Error Correction is responsible for which layer Transport Layer 1
Connection Establishment is responsible for which layer Transport Layer 1
Sequencing is responsible for which layer Transport Layer 1
Acknowledgment is responsible for which layer Transport Layer 1
3-way Handshake is responsible for which layer Transport Layer 1
Which control provides error detection, using Ethernet trailer field frame Logical Link 1
check sequence (FCS).
What Is The Port No Of Dns And Telnet? DNS = 53, Telnet = 23 1
Which Service Use Both TCP And UDP DNS 1
What Is The Port No Of Smtp SMTP = 25 1
ISO developed a standard model of computer data communication system OSI 1
which is known as
The layer of the computer OSI model which furnishes electrical connections Physical 1
and signaling is known as
The layer of the computer OSI model which performs data compression is Physical 1
The layer of computer OSI model which is concerned with addressing and Network 1
routing is called
The layer of the computer OSI model which provides services that directly Application 1
supports user application is
CMM stands for Capability Maturity Model 1
Which series of standards is a set of documents ISO 9000 1
According to ISO 9001, the causes of a nonconforming product should be eliminated and identified 1
Consider the data given in the above question. Suppose the weights of all 1 1
unused links in the previous question are changed to 2 and the distance
vector algorithm is used again until all routing tables stabilize. How many
links will now remain unused?
For which one of the following reasons does Internet Protocol (IP) use the Prevent packets from looping indefinitely 1
time to- live (TTL) field in the IP datagram header
Every host in an IPv4 network has a 1-second resolution real-time clock with 256 1
battery backup. Each host needs to generate up to 1000 unique identifiers
per second. Assume that each host has a globally unique IPv4 address.
Design a 50-bit globally unique ID for this purpose. After what period (in
seconds) will the identifiers generated by a host wrap around?
If a Company requires 60 hosts then What is the best possible subnet 255.255.255.192 1
mask?
In class C, if the subnet mask is 255.255.255.224 then calculate a number 8 1
of subnets?
An IP datagram of size 1000 bytes arrives at a router. The router has to 13 1
forward this packet on a link whose MTU (maximum transmission unit) is
100 bytes. Assume that the size of the IP header is 20 bytes. The number of
fragments that the IP datagram will be divided into for transmission is: Note:
This question was asked as Numerical Answer Type.
The IP address __________ is used by hosts when they are being booted. 0.0.0.0 1
Consider the given network implementation scenario. For the given classful 199.10.20.225 to 199.10.20.238 1
NID 199.10.20.0/24, the requirement is to create 13 subnets. With given
details, find the range of first and last valid IP in the 15th subnet.
Comprehension 0
Internet Protocols Fill in the Blanks Firewalls can be of _______ kinds. 3 1
concepts of
firewall, cloud
technology
_________________ is the kind of firewall is connected between the device Hardware Firewall 1
and the network connecting to internet.
_________ is software that is installed using internet connection or they Software Firewall 1
come by-default with operating systems.
Firewall examines each ____________ that are entering or leaving the data packets 1
internal network.
There are ______ types of firewall. 4 1
Packet filtering firewalls are deployed on ________ routers 1
In the ______________ layer of OSI model, packet filtering firewalls are Network layer 1
implemented.
The __________ defines the packet filtering firewall rules. Access Control List 1
ACL stands for _____________ Access Control List 1
When a packet does not fulfil the ACL criteria, the packet is _________ dropped 1
Network administrators can create their own ACL rules based on _______ Address, Protocols and Packet attributes 1
________ and _______
One advantage of Packet Filtering firewall is __________ less costly 1
Packet filtering firewalls work effectively in _________ networks. smaller 1
Packet filtering firewalls are vulnerable to __________ spoofing 1
Circuit-level gateway firewalls are installed in _______ layer of OSI model. Session layer 1
_____________ gateway firewalls are deployed in application-layer of OSI Application-level Gateway Firewalls 1
model.
Application level gateway firewalls protect the network for specific application layer protocol 1
_____________
___________ firewalls are a combination of other three types of firewalls. Stateful Multilayer Inspection 1
Packet filtering firewalls are also called ____________ first generation firewalls 1
Stateful Multilayer firewalls are also called ____________ second generation firewalls 1
Application layer firewalls are also called ____________ third generation firewalls 1
PPP stands for -------------. Point-to-point protocol 1
A conversation on walkie-talkie is a ------------- data flow. Half-Duplex 1
In data communication, the interface between the source and the medium is DCE 1
called -------.
You can host Internet and Intranet websites on a Linux server by ------------- Apache server 1
To access the Web the user opens a program called a Web browser. 1
Telnet is a newsgroup. 1
Applet program does not support internet. 1
Descriptive and locative are two types of domain names. 1
We cannot use headphone and webcamera for chatting purpose. 1
The finger tells you whether or not a person is on a particular computer. 1
A firewall protects which of the following attacks? Phishing Dumpster diving Denial of Shoulder surfing 3 1
Services(DoS)
Which of these comes under the advantage of Circuit-level gateway They maintain They are light- They're expensive They preserve ip 1 1
firewalls? anonymity and also weight yet efficient address privacy yet
inexpensive expensive
Which of the following is a disadvantage of Circuit-level gateway firewalls? They are They are conmplex They do not filter They are comlex to 3 1
expensive in architecture individual packets setup
Stateful Multilayer Inspection firewall cannot perform which of the following? Filter network layer Check for Scans for illicit data Evaluate packets at 3 1
packets legitimate session packets at the application lager
presentation layer
A proxy firewall filters at the physical layer Application layer Data link layer Network layer 2 1
A packet.filter firewall filters at the Application or Data link layer Physical layer Network or 4 1
Transport Transport layer
A firewall is a ______security system: Network File Program None of these 1 1
A firewall is a network security system ______based that controls incoming Hardware Software both 1 and 2 None of these 3 1
and outgoing network traffic based on a set of rules:
Which among the following is correct: A firewall is a Firewalls can be both 1 and 2 None of these 3 1
system designed to implemented in
prevent both hardware and
unauthorized software or a
access to or from a combination of
private network. both.
Firewalls are frequently used to prevent unauthorized internet users from Intranets Extranets both 1 and 2 None of these 1 1
accessing private networks connected to the internet especially ____:
Firewalls are used to protect: Home Networks Corporate both 1 and 2 None of these 3 1
Networks
If you have more than one computer connected in the home, it is important Hardware Software HTML None of these 1 1
to protect every computer. You should have a ____firewall (such as a
router) to protect your network:
____intercepts all messages entering and leaving the network. The Circuit Level Proxy Server Packet Filter None of these 2 1
_____effectively hides the true network addresses: Gateway
Which among the following is correct characteristics about proxy server: A proxy server may A proxy server is a It performs its tasks All of above 4 1
act as a firewall by gateway from one or functions as a
responding to input network to another proxy on behalf of
packets in the for a specific the network user;
manner of an network
application while application
blocking other
packets.
Application layer firewalls works on the application level of the ____stack TCP IP both 1 and 2 None of these 3 1
(i.e. all browser traffic or all telnet or FTP traffic) and may intercept all
packets travelling to or from an application:
Which of the following services use TCP? 1. DHCP 2. SMTP 3. HTTP 4. 1 AND 2 2, 3 and 5 1, 2 and 4 1, 3 and 4 2 1
TFTP 5. FTP
What layer in the TCP/IP stack is equivalent to the Transport layer of the Application Host-to-Host Internet Network access 2 1
OSI model?
Which of the following describe the DHCP Discover message?1. It 1 only 1 and 2 3 and 4 4 only 2 1
uses FF:FF:FF:FF:FF:FF as a layer two broadcast, 2. It uses UDP as the
Transport layer protocol, 3. It uses TCP as the Transport layer protocol, 4 .It
does not use a layer two destination address.
You want to implement a mechanism that automates the IP configuration, SMTP SNMP DHCP ARP 3 1
including IP address, subnet mask, default gateway, and DNS information.
Which protocol will you use to accomplish this?
Which of the following is private IP address? 12.0.0.1 168.172.19.39 172.15.14.36 192.168.24.43 4 1
Which of the following allows a router to respond to an ARP request that is Gateway DP Reverse ARP Proxy ARP Inverse ARP (IARP) 3 1
intended for a remote host? (RARP)
The DoD model (also called the TCP/IP stack) has four layers. Which layer Application Host-to-Host Internet Network access 3 1
of the DoD model is equivalent to the Network layer of the OSI model?
Which of the following services use UDP? 1. DHCP 2. SMTP 3. SNMP 4. 1, 3 and 6 2 and 4 1, 2 and 4 All of above 1 1
FTP 5. HTTP 6. TFTP
Which class of IP address provides a maximum of only 254 host addresses Class A Class B Class C Class D 3 1
per network ID?
If you use either Telnet or FTP, which is the highest layer you are using to Application Presentation Session Transport 1 1
transmit data?
Which of the following is the decimal and hexadecimal equivalents of the 155, 0x9B 157, 0x9D 159, 0x9F 185, 0xB9 2 1
binary number 10011101?
Which statements are true regarding ICMP packets?1. They acknowledge 1 only 2 and 3 3 and 4 2, 3 and 4 3 1
receipt of a TCP segment. , 2. They guarantee datagram delivery. , 3. They
can provide hosts with information about network problems. , 4. They are
encapsulated within IP datagrams.
Which of the following are layers in the TCP/IP model?1. Application , 2. 1 and 2 1, 3 and 4 2, 3 and 5 3, 4 and 5 2 1
Session , 3. Transport , 4. Internet , 5. Data Link , 6. Physical
Which layer 4 protocol is used for a Telnet connection? IP TCP TCP/IP UDP 2 1
Which statements are true regarding ICMP packets? 1. ICMP guarantees 1 only 2 and 3 1 and 4 All of above 2 1
datagram delivery. , 2. ICMP can provide hosts with information about
network problems , 3. ICMP is encapsulated within IP datagrams. , 4. ICMP
is encapsulated within UDP datagrams.
Which of the following are TCP/IP protocols used at the Application layer of 1 and 3 1, 3 and 5 3, 4 and 5 All of above 3 1
the OSI model? 1. IP 2. TCP 3. Telnet 4. FTP 5. TFTP
What protocol is used to find the hardware address of a local device? RARP ARP IP ICMP 2 1
Which of the following protocols uses both TCP and UDP? FTP SMTP TELNET DNS 4 1
What is the address range of a Class B network address in binary? 01xxxxxx 0xxxxxxx 10xxxxxx 110xxxxx 3 1
Which of the following products have SOA management tool? HP Software and IBM Tivoli Oracle BPEL All of above 4 1
Solutions OpenView Framework Process Manager
SOA Manager Composite
Application
Manager
Point out the wrong statement. A service in SOMF An atomic service SOA describes a All of above 2 1
that is granular and can be distributed collection
very narrow in decomposed into of services
scope is referred to smaller services performing business
as an atomic that provide a process functions
service useful function
Point out the wrong statement. The massive scale Soft computing Cloud computing All of above 2 1
of cloud computing represents a real makes the long-held
systems was paradigm shift in dream of utility
enabled by the the way in which computing possible
popularization of systems are with a pay-as-you-
the Internet deployed go, infinitely
scalable, universally
available system
Which of the following is essential concept related to Cloud? Reliabiltiy Productivity Abstraction All of above 3 1
Point out the wrong statement. All applications With cloud Cloud computing is None of these 1 1
benefit from computing, you can revolutionary, even if
deployment in the start very small and the technology it is
cloud become big very built on is
fast evolutionary
Which of the following cloud concept is related to pooling and sharing of Polymorphism Abstraction Virtualization None of these 3 1
resources?
Which of the following can be identified as cloud? Web Applications Intranet Hadoop All of above 3 1
Which of the following is Cloud Platform by Amazon? Azure AWS Cloudera All of above 2 1
A hybrid cloud combines multiple clouds where those clouds retain their Public Private Community Hybrid 4 1
unique identities but are bound together as a unit.
dimension corresponds to two different states in the eight possible cloud Physical location of Ownership Security boundary None of these 4 1
forms. data
Which of the following is not a cloud stakeholder? Cloud providers Clients End users Cloud users 2 1
Which of the following is not a type of cloud? Private Public Protected Hybrid 3 1
Most of the cloud architectures are built on this type of architecture. Skeleton Grid Linear Template 2 1
What tells a firewall how to reassemble a data stream that has been divided The source routing The number in the The destination IP The header 1 1
into packets? future header’s address checksum field in
identification field the packet header
Network layer firewall works as a Frame Filter Packet Filter both 1 and 2 None of these 2 1
Network layer firewall has two sub-categories as State full firewall Bit oriented firewall Frame firewall and None of these 1 1
and stateless and byte oriented packet firewall
firewall firewall
Which of the following is / are the types of firewall? a) Packet Filtering b) Dual Homed c) Screen Host All of above 1 1
Firewall Gateway Firewall Firewall
A proxy firewall filters at? Physical layer Data link layer Network layer or Application layer c 1
Transport layer
What is the format of IP address? 32 bit 64 bit 16 bit 32 bit 4 1
Version 6 of IP address has how many bits. 64 bits 128 bits 32 bits 256 bits 2 1
How many version /s of IP’s are there? 4 versions 3 versions 2 versions 1 versions 3 1
Many desktops and operating systems include which protocol? IPv6 protocol IPv4 protocol both 1 and 2 IPv3 protocol 1 1
IANA stands for __________ Internet Assigned Internal Assigned Internet Associative Internal Associative 1 1
Numbers Authority Numbers Authority Numbers Numbers Authority
Authoritative
Which applications are designed for end-users delivered over the web ? SaaS PaaS LaaS None of these 1 1
A server that acts like this kind of node often also acts like a proxy server Gateway 1
and a firewall server.
This is a computer host or small network that functions as a neutral zone DMZ 1
between a company's private network and the outside public network
This is a private data network that makes use of the public VPN 1
telecommunication infrastructure, maintaining privacy through the use of a
tunneling protocol and security procedures.
A simple firewall might screen requests to make sure they come from Internet Protocol 1
acceptable (previously identified) domain name and ______ _____
addresses
This is a set of rules that governs what is and what is not allowed through Rule Base 1
the firewall.
This is a protocol that a proxy server can use to accept requests from client Socks 1
users in a company's network so that it can forward them across the
Internet.
This is a firewall facility that can monitor the state of active connections and Dynamic Packet Filter 1
use this information to determine which network packets to allow through
the firewall.
This the only host computer that a company allows be addressed directly Bastion Host 1
from the public network -- it is designed to screen the rest of its network
from security exposure.
which computing refers to applications and services that run on a distributed Cloud 1
network using virtualized resources.
Cloud computing is an abstraction based on the notion of pooling physical Virtual 1
resources and presenting them as a which resource.
What is the name of the Cloud Platform by Amazon? AWS 1
Which model consists of the particular types of services that you can access Service 1
on a cloud computing platform.
Location and management of the cloud’s infrastructure is known as Deployment 1
Name the computer code which will be used to implement load balancing? Apache mod_proxy_balancer 1
The Cloud Cube model is mainly used for secure collaboration. Cloud Cube 1
High encryption of data transfers is carried out preferably end-to-end, but at 128 bit Encryption 1
least for the data that is transferred over the Internet.
The service does not support backup on the Linux platform? Backblaze 1
visualization is most commonly achieved through a mapping mechanism Storage 1
where a logical storage address is translated into a physical storage
address
The image makes a copy or a clone of the entire computer system inside a System Image 1
single container such as a file.
An open standard for storing a system image OVF 1
Cloud standardized in order to appeal to the majority of its audience SLAs 1
Stateful Multilayer firewalls are also called ____________ second generation firewalls 1
Bridge devices work at which layer of the OSI model? Data link layer 1
What guarantees the integrity of data sent over the network, regardless of Transmission Control Protocol 1
the amount?
What do we need to access the web? Web Browsers 1
Which term is stated that is a global computer network providing a variety of Internet 1
information and communication facilities?
What does WWW stand for? World Wide Web 1
Which term is used to describe a chunk of IP data? Datagram or Packet 1
Which includes connections through one or more gateway computers to the Intranet 1
outside Internet?
Which access method is used by Ethernet CSMA/CD 1
How many bits is of Standard IP address? 32 bits 1
ATM, Broadband access, Frame relay, PPP, SONET there all are key WAN protocols 1
protocols of?
A group of computers and network devices connected together, usually LAN (Local Area Network) 1
within the same building are known as?
What refers to copying in/out one or more pages of the address space? Paging 1
Which applications are designed for end-users delivered over the web? SaaS 1
Which is the set of tools and services designed to make the coding and PaaS
deploying those applications quick and efficient?
Amazon machine image is a copy of which file system Root file system 1
Identity management comes under which management of cloud security management 1
computing?
What does AWS stand for? Amazon Web Services 1
What type of workloads is managed and handled by cloud architecture? Dynamic 1
In Amazon, the backup storage is maintained by which volumes by Inserting EBS volumes 1
the snapshot facility?
What does Caas stand for? Communications as a Service (CaaS) 1
Which computing is a plug-in managed by an organization which decides Utility computing 1
what type of services has to be deployed from the cloud?
Comprehension 0
Information Security Computer viruses Fill in the Blanks Memory Resident Virus hides in _____ RAM 1
________ virus affects the boot sector of a hard disk by altering the boot Boot Sector VIRUS 1
data
Virus affecting the instructions that are capable of performing series of task Macro VIRUS 1
in a single go are called _________
The virus that encrypt or encode themselves in a different way whenever Polymorphic VIRUS 1
they are executed ,making it difficult for antivirus to catch them are known
as ___________
The virus that hides in the complex codes of webpage’s are called Web Scripting Virus 1
_________
The program which appear to be useful software but will actually do damage Trojans 1
once installed are termed as _____________
A type of virus which replicates very fast without the need of host file is Worms 1
called ___________
The virus that can physically damage computer hardware like processor, No such virus is present 1
chips etc are called ______
A virus which can gather information by conducting human like activity is Bots 1
called ________
______________ will not help in keeping the computer virus free. Use of wireless internet 1
_______________ infects the master boot record and it is challenging and a Boot Sector Virus 1
complex task to remove this virus.
________________ gets installed & stays hidden in your computer’s Direct Action Virus 1
memory. It stays involved to the specific type of files which it infects.
______________ are difficult to identify as they keep on changing their type Polymorphic Virus 1
and signature.
____________ deletes all the files that it infects. Overwrite Virus 1
_____________ is also known as cavity virus. Space-filler Virus 1
Which of the below-mentioned reasons do not satisfy the reason why Protection 1
people create a computer virus?
A ___________ is a small malicious program that runs hidden on infected Trojan 1
system.
____________ works in background and steals sensitive data. Trojan 1
By gaining access to the Trojaned system the attacker can stage different Trojan 1
types of attack using that ____________ program running in the
background.
Trojan creators do not look for _______________ Securing systems with such programs 1
Which of them is not a proper way of getting into the system Official product sites 1
Which of the following port is not used by Trojans MP 1
Trojans do not do one of the following. What is that Protecting Data 1
Some Trojans carry __________ with them to encrypt the data and ask for Ransomware 1
ransom.
Once activated, ___________ can enable ____________to spy on the trojans, cyber-criminals 1
victim, steal their sensitive information & gain backdoor access to the
system.
Trojans can not ______________ self-replicate 1
A _______________ provides malicious users remote control over the Backdoor Trojan 1
targeted computer.
_______________ programs are specially designed for stealing your Trojan-Banker 1
account data for online banking systems, e-payment services & credit/debit
cards.
______________ perform automated DoS (Denial of Service) attacks on a DDoS-Trojan 1
targeted web address.
Trojan-Downloader is a special type of trojans which can download & install Malicious 1
new versions of ________ programs.
____________ work in background & keeps on downloading other Trojan-Downloader 1
malicious programs when the system is online.
True or False When you include multiple addresses in a message, you should separate 1
each address with a period
You cannot format text in an e-mail message. 1
You must include a subject in any mail message you compose. 1
Linux is an operating system. 1
Sharing of executable files in LAN is not possible. 1
LANs are arranged in star, bus, or ring configurations. 1
When you print a message, it is automatically deleted from your Inbox 1
Which malicious program cannot do anything until actions are taken to Trojan Horse Worm Virus Bots 3 1
activate the file attached by the malware.
The attack that focuses on capturing small packets from the network Phishing Eaves dropping Scams Exploits 2 1
transmitted by other computers and reading the data content in search of
any type of information is ____
What are the types of malware? Caterpillars Worms lions Horses 2 1
Which of the following is not a stand-alone program Trojan worm Virus spyware 3 1
Which of the following is a program capable of continually replicating with virus Trojan horse Rootkit Worms 1 1
little or no user intervention
What are the examples of malware spreads social network pirated software Removable media All of the Above 4 1
Which one is not a computer virus? Trojan horse logic bomb Mcafee redlof 3 1
Another name of free computer software is Encrypted software copy protected Public domain shareware 3 1
software software
When computer virus starts to impact the data, it is known as virus infection virus spreading data losing shutting down 1 1
computer virus program is usually hidden in a operating system application disk driver both 1 and 2 4 1
program
Another name of computer antivirus is vaccine worm Trojan Horse DES 1 1
What is Trend Micro It is virus program It is anti-virus It is just a program none of these 2 1
software
What is the name of the viruses that fool a user into downloading and/or Worm Cracker Keylogger Trojan Horses 4 1
executing them by pretending to be useful applications?
How does a Le-Hard virus come into existence? Software Hardware Command.com Friday 13 3 1
What is the virus that spread in computer? it is system it is computer it is windows tool it is hardware 3 1
software program
What kind of attempts is made by individuals to obtain confidential Phishing scams computer viruses spyware scams none of these 1 1
information from a person by falsifying their identity?
Delayed payload of some viruses is also called as Bomb Time Antivirus none of these 1 1
What is the first boot sector virus? Mind Brain ELK cloner none of these 2 1
The acronym of Worm in a computer system is Write only read only Write once read Write once read Write only Read 3 1
memory Many Memory
To Debug the system means Find the correct Find and install find and correct Find the correct 3 1
software correct system errors on system hardware
which of the following is associated with error detector Odd parity bit Even parity bit Both 1 & 2 none of these 3 1
An error in software or hardware is called a bug. What is the alternative computer
slug jargon for it? glitch leech squid 2 1
A honey pot is an example of what type of software intrusion detector virus Encryption Security-audititing 1 1
Which of the following is not anti-viruses software NAV F-Prot Oracle McAfee 3 1
Backup of the source data can be created on the same device on another device at some other All of the Above 4 1
locations
There are _________ types of computer virus. 5 7 10 12 3 1
Which of the following is not a type of virus boot sector polymorphic multipiratite trojans 2 1
A computer ________ is a malicious code which self-replicates by copying Program virus application Worms 2 1
itself to other programs.
Which of them is not an ideal way of spreading the virus infected website Emails Official Antivirus USBs 3 1
CDs
In which year Apple II virus came into existence 1979 1980 1981 1982 3 1
In mid 1981, The virus for Apple computers with the name _______ came Apple I Apple II Apple III Apple virus 2 1
into existence
The virus hides itself from getting detected by ______ different ways. 2 3 4 5 2 1
_______________ infects the master boot record and it is challenging and Boot sector Virus polymorphic multipiratite Trojans 1 1
a complex task to remove this virus.
Boot sector Virus polymorphic multipiratite Direct Action Virus 4 1
________________ gets installed & stays hidden in your computer’s
memory. It stays involved to the specific type of files which it infects.
Direct Action Virus is also known as ___________ Non-resident virus Boot sector Virus polymorphic multipiratite 1 1
_________ infects the executables as well as the boot sectors Non-resident virus Boot sector Virus polymorphic multipiratite 4 1
________ are difficult to identify as they keep on changing their type and Non-resident virus Boot sector Virus polymorphic multipiratite 3 1
signature
________ deletes all the files that it infects Non-resident virus Over-write virus polymorphic multipiratite 2 1
___________ is also known as cavity virus Non-resident virus Over-write virus polymorphic Space-filler virus 4 1
Which of the below-mentioned reasons do not satisfy the reason why Research purpose Pranks identity theft Protection 4 1
people create a computer virus?
A _________ is a small malicious program that runs hidden on infected virus trojan shareware Adware 2 1
system
_______ works in background and steals sensitive data virus shareware Trojan Adware 3 1
By gaining access to the Trojaned system the attacker can stage different Trojan Virus Antivirus Anti-malware 1 1
types of attack using that ____________ program running in the
background.
Trojan creators do not look for _______________ Credit card Confidential data Important Securing systems 4 1
Information documents with such programs
Which of them is not a proper way of getting into the system IM Attachments Official product sites Un-trusted sites, 3 1
freeware and pirated
software
Which of the following port is not used by trojans UDP TCP SMTP MP 4 1
Trojans do not do one of the following. What is that ? Deleting Data Protecting Data Modifying Data Copying Data 2 1
Once activated, ___________ can enable ____________to spy on the virus, cyber- malware, trojans, cyber- virus, penetration 3 1
victim, steal their sensitive information & gain backdoor access to the criminals penetration testers criminals testers
system.
Trojans can not ______________ Steal data Self-replicate Steal financial steal login 2 1
information creadentials
A_______ provides malicious users remote control over the targeted DDoS-Trojan Backdoor Trojan Trojan-Banker Trojan-downloader 2 1
computer
_______________ programs are specially designed for stealing your DDoS-Trojan Backdoor Trojan Trojan-Banker Trojan-downloader 3 1
account data for online banking systems, e-payment services & credit/debit
cards.
______________ perform automated DoS (Denial of Service) attacks on a DDoS-Trojan Backdoor Trojan Trojan-Banker Trojan-downloader 1 1
targeted web address.
____________ work in background & keeps on downloading other DDoS-Trojan Backdoor Trojan Trojan-Banker Trojan-downloader 4 1
malicious programs when the system is online.
A/an ___________ is a program that steals your logins & passwords for IM-trojans Backdoor Trojan Trojan-downlaoder Ransom-trojan 1 1
instant messaging applications.
_____________ can modify data on your system – so that your system IM-trojans Backdoor Trojan Trojan-downlaoder Ransom-trojan 4 1
doesn’t run correctly or you can no longer access specific data, or it may
even ask for ransom in order to give your access.
The ______________ can cost you money, by sending text messages from IM-trojans Backdoor Trojan SMS Trojan Ransom-trojan 3 1
your mobile phone numbers.
A ___________ is a method in which a computer security mechanism is Front-door backdoor Clickjacking key-logging 2 1
bypassed untraceable for accessing the computer or its information.
A _________________ may be a hidden part of a program, a separate crypter virus backdoor key-logger 3 1
infected program a Trojan in disguise of an executable or code in the
firmware of any system’s hardware.
One word Questions Which of the following is not a type of virus? Trojans 1
According to the CIA Triad, which of the below-mentioned element is not Authenticity 1
considered in the triad?
One common way to maintain data availability is ? Data backup 1
A firewall protects which of the following attacks? Denial of Service (DoS) 1
Packet filtering firewalls are deployed on ? routers 1
When a packet does not fulfil the ACL criteria, the packet is ? dropped 1
Sniffing is also known as ? wiretapping 1
What is “Trend Micro”? It is anti-virus software 1
What is the name of the viruses that fool a user into downloading and/or Trojan horses 1
executing them by pretending to be useful applications?
The virus that spread in application software is called as Macro virus 1
How does a Le-Hard virus come into existence? Command.Com 1
What is the virus that spread in computer? It is a computer program 1
What kind of attempts is made by individuals to obtain confidential Phishing scams 1
information from a person by falsifying their identity?
When does the time bomb occur? During a particular data or time 1
Delayed payload of some viruses is also called as Bomb 1
What is the first boot sector virus? Brain 1
What is the name of first computer virus? Creeper 1
The difference between a virus and a self-replicating program which is like a Worm 1
virus is that rather than creating copies of itself on only one system it
propagate through computer network.
What is anti-virus? It is a program code 1
What is a type of program designed to prevent and detect unwanted Anti-spyware Program 1
spyware program ?
what tries to identify useless or dangerous messages for you ? Anti-spam software . 1
What are basic function of an anti-Virus ? Scanning 1
Integrity Checking
Interception
In which year Apple II virus came into existence? 1981 1
In mid-1981, the 1st virus for Apple computers came into existence.What Apple II 1
was the name ?
What infects the master boot record and it is challenging and a complex Boot Sector Virus 1
task to remove this virus.
Which gets installed & stays hidden in your computer’s memory. It stays Direct Action Virus 1
involved to the specific type of files which it infects is called.
Direct Action Virus is also known as ? Non-resident virus 1
What infects the executables as well as the boot sectors ? Multipartite Virus 1
What are difficult to identify as they keep on changing their type and Polymorphic Virus 1
signature.
Which deletes all the files that it infects ? Overwrite Virus 1
which is also known as cavity virus. Space-filler Virus 1
How many types of computer virus exists ? 10 1
Name a small malicious program that runs hidden on infected system. Trojan 1
Name the programs are specially designed for stealing your account data Trojan-Banker 1
for online banking systems, e-payment services & credit/debit cards.
Who perform automated DoS (Denial of Service) attacks on a targeted web DDoS-Trojan 1
address.
Name the attack tries to formulate a web resource occupied or busy its DoS attack 1
users by flooding the URL of the victim with unlimited requests than the
server can handle.
During a DoS attack, what will be either dawdling down or entirely the regular traffic on the target website 1
interrupted?
Which attack is made to overkill the targeted server’s bandwidth and other DoS attack 1
resources of the target website.
DDoS stands for ? Distributed Denial of Service 1
What are unwanted software intended to pitch advertisements upon the Adware 1
user’s screen, most often within a web browser.
What is PUP ? Potentially Unwanted Programs 1
Once adware hijacks your system, what will be effect ? It might perform different kinds of superfluous tasks. 1
Which functions may be intended to analyze a victim’s location & what The adware’s 1
different Internet sites he/she is visiting,also sell your browsing behaviour &
information to 3rd parties.
In how many ways Malicious adware may sneak into your system ? 2 (Two) 1
Which attack is the exploitation of the web-session & its mechanism that is Session Hacking 1
usually managed with a session token?
Comprehension 0
Infosec Monitoring Fill in the blanks _______ is the practice and precautions taken to protect valuable Information Security 1
information from unauthorised access, recording, disclosure or destruction.
_____ platforms are used for safety and protection of information in the Cloud workload protection 1
cloud.
The full form of EDR is _______ Endpoint Detection and response 1
_______ technology is used for analyzing and monitoring traffic in network Network traffic analysis (NTA) 1
and information flow.
Compromising confidential information comes under _________ Threat 1
_________ framework made cracking of vulnerabilities easy like point and Metasploit 1
click.
__________ is a popular tool used for discovering networks as well as in Nmap 1
security auditing.
Wireshark is a ____________ tool. network protocol analysis 1
Aircrack-ng is used for ____________ Wi-Fi attacks 1
_____________ is a popular IP address and port scanner. Angry IP Scanner 1
_______________ is a popular tool used for network analysis in EtterPeak 1
multiprotocol diverse network.
____________ scans TCP ports and resolves different hostnames. SuperScan 1
Baza was the first virus to infect win 95 win 98 unix win NT 1 1
symantec company developed a antivirus called quick heal norton symantec None of these 2 1
staog is the first virus to infect win 95 win 98 linux win NT 3 1
To hide malicious activity on a network, we use SQL server Proxy server Proxy chain Windows server 2 1
In NTA, A stands for activity application availability analysis 4 1
In MITM, First M stands for Man Machine Middle None of these 1 1
In XSS, X stands for Xray Xmachine cross all of these 3 1
In DDoS, D before Dos stands for dynamic Distributed Digital none of these 2 1
SSL stands for Secure socket layer system secure secure system layer system socket layer 1 1
layer
SSH stands for secure socket shell system secure secure socket shell system socket shell 3 1
shell
what is ZEUS trojan virus worm malware 1 1
Locky is which malware ransomware virus worm firmware 1 1
Which one is the network protocol analysis wireshark hyper V HTTP TCP 1 1
metaspoilt is firmware ransomware framework software 3 1
superscan scans virus worm trojan TCP ports 4 1
What is LC4 password recovery auditing tool Both 1 & 2 None of these 3 1
Angry IP scanner is IP address scanner port scanner Both 1 & 2 None of these 3 1
webinspect is a web application assessment security tool port scanner tool IP address tool all of these 1 1
one word questions What is the practice and precautions taken to protect valuable information Information Security 1
from unauthorised access, recording, disclosure or destruction.
How vulnerability to information security is done? without deleting data, disposal of storage media 1
Which platforms are used for safety and protection of information in the Cloud workload protection platforms 1
cloud.
Which information security technology is used for avoiding browser-based Remote browser access 1
hacking?
what is full form of EDR? Endpoint Detection and response 1
Which technology is used for analyzing and monitoring traffic in network and Network traffic analysis (NTA) 1
information flow.
Compromising confidential information comes under _________. Threat 1
Officers of the rank of _______ & above and equivalent civilian officers are Captain 1
eligible for laptops
Administative Approval of the __________ as the CFA is mandatory for VCNS 1
procurement of fresh / new laptops
the procurement and issue of laptops for discharge of official work to Defence Secretary 1
elligible officers could be progressed only with specific approval
of_____________
The cost of laptop including standard software (OS, Office suite and AV 80000 1
software should not exceed Rs __________ inclusive of all taxes as per
policy - 01/18
The laptops procurred are permitted to be used for _____________ and Internet and Intranet 1
_________
The laptops used for internet should be installed with ________ NAVIOS 1
Units Directorates under IHQMOD forwarded cases for procurement of APSO to DIT 1
laptops (NEW and Replacement), post approval of _________ to
___________ for technical vetting and further processing
USB ports should not be enabled on more than __________% of total pc's 2 1
in a unit
________ is to be used only for transfer of data not storage of data Sdrive 1
The laptop will have service life of six years as per policy - 01/18 1
Particulars of officer along with designation for whom the laptop is proposed 1
is to be send for new procurement of laptop
Budgetary quotation from GEM/ vendor is to be attached for new 1
procurement of laptop
The laptops used for internet should be installed with NAV-IOS 1
All Cases of procurement of laptops (New and Replacement) are to be 1
forwarded to CITOs
Post Administrative approval of VCNS on Buying new laptop commands are 1
to initiate the procurement action under delegated financial powers as per
DFPDS/ NSP-2014
Officers holding Laptops has the liberty to get the device insured at his 1
personal cost
SFTC enables multiple user logging in a server 1
PLL and certificete Ownership is to be forwded to authority on purchasing of 1
new laptops
A rugged laptop is not designed to reliably operate in harsh usage 1
conditions such as strong vibrations , extreme temperatures, wet or dusty
environments
The High End servers are provided Rack Mounted only 1
SENIC Guard is an application that allows usage of USB ports to Sdrive 1
alone.
All external interfaces are to be disabled in laptops
Five years will be the service life of laptop as per policy - 01/18 1
There are 2 parts of s-drive
IGBT is used to switch devices for online UPS for single server
NavIOS is should as a internet PC in Indian Navy
s-drive is used to transfer data within the naval networks
DIT is to keep a centeralised record of all Laptops procured at command
level
Before diposal of harddisk, hard disk is not to be degaussed
Multiple choice Naval PCs should have at least __________ no of USB Ports five threee four six 4 1
_____________ OS is to be loaded on Internet PCs Win 7 Win 10 UBUNTU NAV-IOS 4 1
switching device for online UPS for single server is MOSFET IGBT SOFT HARDWARE 1 1
Administative Approval of the __________ as the CFA is mandatory for VCNS DCNS CNS CNC 1 1
procurement of fresh / new laptops
The procurement and issue of laptops for discharge of official work to Defence Minister Defence Secreatry CNS DCNS 2 1
elligible officers could be progressed only with specific approval of
_____________
The laptop will have service life of _________ years as per policy - 01/18 Five Four Six Seven 1 1
The laptops used for internet should be installed with ________ Win 7 Win 10 UBUNTU NAV-IOS 4 1
Technical vetting of New and Replacement laptops will be carried by FMO IHQ MOD(N) Hedquarters DIT 4 1
___________
For purchasing new Laptop DIT will obtain Administrative Approval DIT CNS DCNS VCNS 4 1
of_________ on a Quartely basis
Post Administrative approval of VCNS on Buying new laptop the cases will DOA DIT DCNS VCNS 1 1
be forwarded to ______
DIT is to keep a centeralised record of all Laptops procured at FMO IHQ MOD(N)/ DIT Hedquarters VCNS 2 1
______________
All Cases of procurement of laptops (New and Replacement) are to be DCNS VCNS CITOs DIT 3 1
forwarded to _________
Who will maintain the centralised database of all LAPTOPs DIT CITO IHQ MOD(N)/ DIT Headquartes 2 1
__________ is the latest SENIC used in navy at present SENIC III SENIC II SENIC IV SENIC I 1 1
_________ is to be installed on all Computers and laptops for administrative Firefox Internet Explorer VLC SENIC GUARD 4 1
and offcial work
____________ is used to shredding of secured files Recycle Bin Shredder SENIC IV SENIC LITE 4 1
____________ is used to transfer data between naval PC to Internet PC Pendrive S Drive Hard Disk D drive 2 1
_________are to be regularly scaned for potential malware Sdrives Antivirus Sequrite Pendrive 1 1
Senic Guard/ S-Drives logs are to be presented are to be presented to audit Workup CSAT Audit Computer Audit Sdrive audit 2 1
team during_________
Only a standalone NAV-IOS pcs should be used for__________ sanitiztation file transfer Entry Exit Pendrive 1 1
In the absence of dedicated sanitization PC _____________ Pc with NAV- Windows PC LINUX PC Internet PC Server PC 3 1
IOS can be used as sanitization PC with approval
What is the name of InBuilt Anti Virus in NAV-IOS ClamAV Sequrite Macafee Norton 1 1
What is the short cut key in NAV-IOS to scan unwanted files ctrl+h ctrl+r ctrl+q ctrl+s 1 1
Sdrives will be issued on the request basis by _________ CAPO CITO DIT WESEE 2 1
Sdrive are to be centrally held with __________ and to be issued to CAPO DIT Head of CITO 3 1
individuals by name Organisation
Two associated components on loss of any IT assets are classified into Loss of Digital Loss of data and Loss of information Loss of Classified 1 1
___________ and _______ Information and Loss Of contents and Loss of
Loss of Naval Store restricted
Information
The impact assesment rules out the possibility of loss of informationthen the DFPDS 13 DFPDS 15 DFPDS 16 DFPDS 18 2 1
loss may be treated as_______
Defect of Sdrive are to be categorised as________ and ___________ Loss of Classified Hardware and Physical Damage physical and 3 1
and Loss of software Damage and Corruption of hardware damage
restricted Software
Information
Sdrives which are being detected by the device manager utility of MS Damaged Corrupted Formated Error 2 1
Window based OS, but not functioning appropriately can be considered
as___________
__________ is the properietery hardware based firewall of Indian Navy AGSB ABGS ABSD ABSG 4 1
Repairable Sdrive would be re-Customised at _________ DIT CITO IHQ MOD(N)/ DIT WESEE 4 1
Sdrive under warranty, a new Sdrive would be sought from the DIT CITO IHQ MOD(N)/ DIT OEM 4 1
One Word questions Upto how many number of users can be serve in entry level servers? 30 1
the procurement and issue of laptops for discharge of official work to Defence Secretary 1
elligible officers could be progressed only with specific approval of
What will be the service life of laptop as per policy - 01/18 Five Years 1
Who will obtain Administrative Approval of VCNS on a Quartely basis DIT 1
Post Administrative approval of VCNS on Buying new laptop commands are DFPDS/ NSP-2016 1
to initiate the procurement action under delegated financial powers as per
Which servers are meant for small datbase, workgroup applications, for Entry Level servers 1
managing small network, file servers ?
Which servers are used for controlling large networks , running of MID-level servers 1
application and as database or web servers for medium sized application ?
Which servers are provided Rack Mounted only ? The High End Servers 1
What is to be forwaded on procurement of new laptops to ITO/ CITOs/ DIT PLL and Certificete Ownership 1
Who is responsible for physical safety, acoounting and handling as well as Officer 1
security of data/ information stored in laptop handled by officer ?
what is an application that restricts usage of USB ports to Sdrive alone ? SENIC Guard. 1
Audit trails are used for receipt of sensitive input output True 1
Contigency plan are to be approved by key affected parties True 1
Security control should be able to detect unauthorised access attempts True 1
For a internet PC which operating system is required in Indian Navy Windows Java Nav-IOS none of these Nav-IOS 1
IT Steering Committee - Apex Body chaired by ACOM(IT&) CSO (Tech) VCNS COM VCNS 1
Naval IT Technical committee - IHQMoD(N) chaired by VCNS ACOM(IT&S) CSO (Tech) DIT ACOM(IT&S) 1
_____ are responsible for saving email messages as they deem All Indian Navy Individuals none of these Individuals 1
appropriate.
Max message size can be attached using outlook express/ web browser to 8MB 2MB 5MB 6MB 8MB 1
the mail is___
Max size ofa decompressed file is ________ 35MB 42MB 40MB 38MB 40MB 1
Max decompressed file count is _______ 100 105 110 115 100 1
______ is not responsible for the contents that are being sent as part of the Individuals self Indian Navy Unit Indian Navy 1
mail.
E-mail password shall not be shared even for ______ official purpose individual purpose friendly none of these official purpose 1
User shall ensure that ________software and the virus pattern files are up- OS patches anti-virus programm anti-virus 1
to-date.
Proposals for implementing ERP solutions are to be processed like any NO 21/06 NO 25/06 NO 24/06 NO 22/06 NO 21/06 1
other IT porjects iaw
ERP is available both as__ Free and open proprietary both 1 &2 none of these both 1 &2 1
source software
Features of audit is Process invocation Data deletion authentication of all of these all of these 1
clients and uses
Strong password should contain how many characters 8 to 14 8 to 12 8 14 8 to 14 1
Microsoft announced end of product support for Windows XP OS by--- 10-Apr-14 12-Apr-15 8-Apr-14 8-Apr-15 8-Apr-14 1
The development philoshophy for software applicatin is laid down in --- NO 21/06 NO 24/05 NO 21/07 NO 20/10 NO 21/06 1
NIC e-mail accounts is laid in IT policy ---- Policy 05/2015 Policy 10/2015 Policy 05/2014 Policy 20/2015 Policy 05/2015 1
NIC e-maill accounts shall be used by all personnels for ---- Official Personal both 1 &2 none of these Official Communication 1
Communication Communication
NIC e-mail accounts will be deactivated if inactive for period of --- 60 days 45 days 90 days 120 days 90 days 1
NIC e-mail account logs will be maintained for a period of --- 6 months 2 years 3 years 1 years 2 years 1
Which policy contains hosting and security of naval websites on internet --- Policy 01/2016 Policy 01/2017 Policy 02/2017 None of these Policy 01/2017 1
Design considerations consists of these aspects Compatibility Extensibility fault tolerance all of these all of these 1
Design concepts are ------ abstraction refinement both 1 &2 None of these both 1 &2 1
Examples of modelling language is -- Business process fundamental both 1 &2 None of these both 1 &2 1
modelling notation modelling concepts
Software testing depends on ---- Testing method Scope both 1 &2 None of these Testing method 1
types of white box testing-- API Testing Code Coverage Fault Injection all of these all of these 1
Method
Black box testing includes Equivalence Fuzz testing exploratory testing all of these all of these 1
partitioning
Testing levels are classified as --- Unit testing integration testing either 1 or 2 both 1 and 2 both 1 and 2 1
Categories of maintenance in ISO/ IEC 14764 are Corrective Adaptive perfective all of these all of these 1
maintenance maintenance maintenance
which documents are required to be prepared/ filled prior undertaking VA VA documentation form 1 acceptance form none of these VA documentation 1
Who notifies vulnerability and release the software patches and upgrades company OEM Vendor none of these OEM 1
One word question Virus stands for ___ Vital informantion resources under seize 1
Requirements specification for a software system is a complete description Software Requirements Specification (SRS) 1
of the behaviour of a system to be developed is known as ?
Which requirements explain what has to be done by identifying the Behavioural Requirements 1
necessary behaviour of a system ?
Which process or result of generalization by reducing the information Abstraction 1
content of a concept or an observable phenomenon is known as
What is is a computer program licensed under exclusive legal right of the Proprietary software 1
copyright holder known as
Which Web based application has been developed for navy wide updation VA application 1
of VA status and can be accessed through IT portal ?
What is provides an additional protection to web sites and web services ? A Web Application Firewall 1
_________________ whose program code can be altered are most Embedded computer systems 1
susceptible to cyber-attacks
___________ in software comprise the single largest cause Weaknesses 1
of vulnerabilities of cyber systems
_____________ should be taken into account during the procurement Software security 1
phase, and relevant security standards are to be included in the NSQRs.
________________ should take security into consideration, from the design Software architecture 1
stage itself.
Data of security classification __________ and above are to be stored in SECRET 1
encrypted manner on portable media only.
Network security in respect of large networks is handled by ___________ Security Operations Centres (SOC) 1
Personnel are not to be accorded the minimum level of access required for 1
them to carry out their duties
Automated monitoring systems and logging is not to be carried out on all 1
administrative tasks undertaken.
Civilian personnel are not to be supervised by naval personnel during the 1
period that they have access to the system
Activities undertaken by civilian personnel are to be recorded by the person 1
supervising such activities.
Unusual activity by cyber devices is to be reported and investigated to rule 1
out any malicious intent.
Human-Machine Interface are susceptible to cyber-attacks 1
Embedded computer systems whose program code can 1
be altered are most susceptible to cyber-attacks.
Embedded systems that can be accessed from outside 1
Stand-alone networks and PCs employed for machinery/ equipment control 1
can be subject to cyber-attacks.
Software security should be taken into account during the procurement 1
phase.
Use of open source systems is not to be encouraged, where possible 1
what are the requirements of physical security To protect the To protect the To prevent an All of these 4 1
components of an components of an unauthorized user
IT system from IT system from from accessing
damage theft
What are the physical security measures of cyber security Asset management Access control physical security both 1 and 2 4 1
measures
What are end-users computing devices desktops PCs laptop All of these 4 1
which of the following is not personnel security Personnel are to be To protect the Duties and None of these 2 1
accorded the components of an responsibilities of
minimum level of IT system from users accessing the
access required for damage, theft or system are to be
them to carry out destruction clearly laid down in
their duties the policies/ SOPs
what is a hardware security as per option Unauthorised To protect the both 1 &2 All of these 1 1
hardware is not to components of an
be connected to IT system from
any naval cyber damage
system
when software security should be taken into account. leasing phase procurement both 1 &2 None of these 2 1
phase
Adequate security measures need to be incorporated Hardware phase Software both hardware and none of these 2 1
during Development software life cycle
Lifecycle (SDLC)
What peripherals are to be sourced from trusted agencies/ repositories only Device drivers proprietary both 1 &2 All of these 4 1
software
when does Software to detect malware to be updated monthly yearly frequent and weekly 3 1
periodically
Official data at rest to be stored in unsecured manner secured manner not to be stored should not have 2 1
official data on any
PC
Critical data is not backedup daily regularly periodically All of these 4 1
Which security classification of data to be stored in encrypted manner Secret top secret confidential restricted 1 1
which data is not be transferred or sent through internet on internet PC Encrpyted data not Encrpyted data both 1 &2 none of these 1 1
One word question who is required to coordinate cyber security activities across the The Chief Information Security Officer of the Navy 1
Navy (CISONavy)
who provides Technical and secretarial support for the CISO Directorate of Information Warfare (DIW). 1
HRMS stands for Human Resource Management Systems 1
Adequate security measures need to be incorporated Software Development Lifecycle(SDLC) 1
during
Interface are susceptible to cyber-attacks. Human-Machine 1
What data Security deals with the official data Protection 1
Duration of backing up of critical data Regularly 1
what are the methods for deleting data in a storage media Shredding/ degaussing/ overwriting 1
Data stored on portable media should be protected using an approved cryptography system. 1
who handles Network security in respect of large network Security Operations Centres (SOC) 1
By what means network should be protected Firewalls 1
which encryption systems are not be connected to PCs those connected to Offline encryption systems 1
internet
what shd be employed at the gateways when LANs are connected to Network Address Translation (NAT) 1
internet
VA stands for Vulnerability assessment 1
which process is undertaken along with SOPs of the cyber system while Examination of cyber security policy 1
performing VA
which agencies are not suppose to undertake the vulnerability assessment Civilian Agencies 1
test of operational networks
VA process is to be repeated periodically at not intervals not exceeding 3 years 1
who will undertaken the incidents reports for cyber security incidents CIRT-NAVY 1
reported by naval units
NCIIPC stands for National Critical Information Infrastructure Protection 1
Committee
Which embedded systems are used at operational front in Indian Navy? Combat Management Systems (CMS), Fire Control 1
Systems (FCS), data-link systems and Maritime Domain
Awareness (MDA) systems
Which systems are used for machinery and equipment control systems ? Integrated Platform Management Systems (IPMS), 1
Integrated Machinery Control Systems (IMCS)
Who are responsible for issue of Standard Operating Procedures to ensure Individual units 1
implementation of system level policies ?
What is the main purpose of the cyber security policy ? to state the protection needed for the cyber system 1
In which list all hardware and software components are included ? Assets List 1
Which process yields the list of security measures (controls) that A formal Risk Management 1
are required to protect the system from cyber threats ?
Which policy comprises a set of rules applied by the owner of a cyber Acceptable Usage Policy 1
system that defines the use of system by authorized users?
What does Risk management provides in cyber system Periodic Vulnerability assessment and Computer Security 1
Audit
Where is specification laid down of how to operate in the cyber system to Standard Operating Procedures (SOPs) 1
meet higher level objectives?
Which security is accounted to protect the components of an IT system from Physical security 1
damage, theft or destruction ?
Which attacks are susceptible to Human-Machine Interface ? cyber-attacks 1
During which occasions software security is to be taken in account ? during the procurement phase, and relevant security 1
standards
Which testing of application software is to be undertaken at the induction Static and dynamic security testing 1
stage of software to eliminate potential software vulnerabilities ?
Comprehension 0
Information Fill in the blanks __________ is the process to determine the security status of information Vulenerability Assessment 1
Warfare system
RACL Stands for Router Access Control List 1
_______ is the process of identifying weakness in security configuration System Configuration Review 1
controls
________ meathod is used to discover active and responding hosts on a Network Discovery 1
network and identifying weakness
________ and _________ techniques are used for discovering devices on a Passive and Active 1
network
__________techniques use a network sniffer to monitor network traffic and Pasive 1
record the IP address of the active hosts
ICMP stand for Internet Control Message Protocol 1
_________ and __________ involves using a port scanner to identify Network port and service identification 1
network ports potentially vulnerable services
Port Scaning and Service Identification examine all _________ and TCP and UDP 1
_________ ports for open, close and filter states
Additional information gathered during port scan can assist in identifying the OS Fingerprinting 1
target OS through a process called____________
WIPDS stands for Wireless Intrusion Detection and Preventation System 1
All users are to be given specific login credentials with the aim of trace-back 1
in case of any incident
SCDA stands for Supervisory Control and Data Acquisition 1
ICS stands for Industrial Computer Systems 1
Platform Information Technology (PIT) Systems embedded computer 1
systems are not used for platform management, combat management,
machinery control, fire control etc
PIT Stands for Platform Information Technology 1
The aim of network survey is to find the number of non reachable system 1
which can be tested and to map the topology of the network
Probing for services will reveal the services that are running, which could 1
have potential vulnerabilities
Automated vulnerability scans using scanning tools is the easiest means to 1
identify system vulnerabilities that apply to common applications and
operating systems
Port Scanning is the invasive probing of ports on a live system 1
Access controls are physical and procedural measures implemented to 1
restrict access to the system to legitimate, unauthorised users
DataBase Security concerns the use of a broad range of information Copy Database Sell Database protect database Control Database 3 1
security controls to _________
SSID stands for System Set Service Set Sysytem Set Identity Service set Identity 2 1
Identifier Identifier
WIPDS stands for Wireless Intrusion Wireless Wired Intrusion Wireless Intrusion 1 1
Detection and Information Detection and Developing and
Preventation Detection and Preventation System Preventation System
System Preventation
System
Network Port and Service Identification involves using a port scanner to Worms Viruses vulnerable services Adware 3 1
identify network ports potentially __________
OWASP stands for Open Web Address Open World Open Web Open Web 4 1
Security Project Application Application Service Application Security
Security Project Project Project
____________ can occur during the time a program or process has Security Mode Privacy Mode Security Condition Race Condition 4 1
entered into a privelaged mode
RACL Stands for Read Access Router Access Router Address Router Access 2 1
Control List Control List Control List Computer List
Vulnerability assessment is the process to determine the ___________ Health System security Service 3 1
status of information system
_________ is the property that information is available only to authorised Confidentiality Integerity Security Availability 1 1
personnel and not available or disclosed to unauthorised individuals
_______ is the property that information is accurate, reliable and Confidentiality Integerity Security Availability 2 1
untampered by unauthorised personnel
__________ is the property that information and information systems are Confidentiality Integerity Security Availability 4 1
accessible to authorised personnel when needed and available for the
intended purpose of the system
__________ is defined as the probability of an adverse impact on an Weakness Cisc Risk unauthorisation 3 1
organisation as a result of a threat triggering or exploiting vulnerability
__________is the systematic process of identifying threats, vulnerabilities Weakness Cisc assessment Risk assessment Unauthorise 3 1
and risks to a cyber-system. assessment assessment
_________ should be controlled through defining legitimate connections to Data Access Internet Access Network Access Process 3 1
the system, by specifying IP and MAC addresses, ports, protocols
___________ data need to be secured through encryption both at rest and Sensitive Important Sensitive and confidential 3 1
while in transit, as far as possible. operational
All hardware and software should be introduced into the system in a OEM Factory defaults Model PATT Num 2 1
deliberate organised manner to ensure that they do not get connected
with_________
________ is to be changed prior to introduction of any programmable Default Password Admin Password User Password Default settings 1 1
components into the system
__________accounts are not permitted, for normal operation of systems Individual accounts Administrator and user accounts Designation Based 2 1
Guest accounts
What is IDS/ IPS stands for Information Intrusion Detection Intrusion Intrusion Detection 4 1
Detection and and Protecting Development and and Prevention
Prevention Systems Systems Prevention Systems Systems
UTM stands for Uniform Threat Unified Through Unified Threat Unified Threat 2 1
Management Management Management Material
Physical security measures are those that ensure the security of cyber authorised access authorised access unauthorised access unauthorised access 3 1
systems and their constituent components from _____________ and compromise and compromise and authorised
access
_________are physical and procedural measures implemented to restrict Access controls Access Denied Access Point Access entry 1 1
access to the system to legitimate, authorised users
All users are to be given specific login credentials with the aim of _______ Evaesdropping Snooping Hacking trace-back 4 1
in case of any incident
To enable trace-back post an incident, it is essential that _______ of Data logs List Passwords 2 1
administrators are preserved in a secure manner
___________ is the process of updating a system with patches and Patch Uploading Patch Updating Patch Management Patch Installing 3 1
upgrades provided by the OEM/ maintainer
Documentation pertaining to each process is to be reviewed and updated on validity and authorised access unauthorised access unauthorised access 1 1
a periodic basis in order to ensure their _______ and _________ accuracy and compromise and compromise and accuracy
Which process gathers information during port scan can assist in identifying OS Fingerprinting 1
the target OS
WIPDS stands for Wireless Intrusion Detection and Preventation System 1