Major-1 MCQS
Major-1 MCQS
Major-1 MCQS
4. What is an ‘intranet’?
(A) Internal internet is used to transfer information internally
(B) Internal internet is used to transfer information to the outside company.
(C) Internal network designed to serve the internal formational needs of a single organization.
(D) Internal network designed to transfer information between two organizations
ANSWER: C
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE
9. Which type of topology is best suited for large businesses which must carefully control
and coordinate the operation of distributed branch outlets?
(A) Ring
(B) Local area
(C) Hierarchical
(D) Star
ANSWER: D
10. Which of the following terms define the technological advancement in the field of
computers through the ages?
(A) Growth
(B) Gradation
(C) Generation
(D) Development
Answer: C
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE
13. The application layer service that is responsible for remote login is ______________.
(A) ARP
(B) FTP
(C) Telnet
(D) DNS
ANSWER: C
15. The router helps to forward the packet from one network to another network by
referring to _________ table.
(A) MAC
(B) Routing
(C) Matrix
(D) All of the above
ANSWER: B
16. _______________ is a transport layer protocols that help to deliver your email to the
destination reliably.
(A) UDP
(B) TCP
(C) SMTP
(D) POP3
ANSWER: B
17. Which of the following is layer 4 protocols of the OSI model widely used in live TV
streaming
(A) TCP
(B) UDP
(C) HTTP
(D) None of the above
ANSWER: B
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE
21. Which of the following is the process of breaking down a large network into smaller
subnets for efficient use of IP v4 address.
(A) Super netting
(B) Subnetting
(C) Logical Addressing
(D) NAT
ANSWER: B
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE
26. Which of the following is a technique to send multiple signals for a single
communication channel?
(A) Multiplexing
(B) Compression
(C) Digitizing
(D) De-multiplexing
ANSWER: A
27. Which of the following services uses both TCP and UDP connection?
(A) FTP
(B) Telnet
(C)DNS
(D)SMTP
ANSWER: D
28. Match the following generation of computers with the technology used in that
generation.
Generations Technology used
1.1st Generation I. Microprocessors
2.2nd Generation II. Vaccum Tubes
3.3rd Generation III. Integrated Circuits
4.4th Generation IV. Transistors
(A) 1.II 2.IV 3.I 4.III
(B) 1.II 2.IV 3.III 4.I
(C) 1.II 2.I 3.IV 4.III
(D) 1.I 2.II 3.III 4.IV
(E) None of these
Answer B : 1.II 2.IV 3.III 4.I
29. Arrange the following different types of computer networks in an ascending order on
the basis of geographical area implied.
(A) MAN
(B) WAN
(C) LAN
Choose the correct answer from the options given below:
(A) (C), (B), (A)
(B) (A), (C), (B)
(C) (C), (A), (B)
(D) (B), (A), (C)
Answer: C : (C), (A), (B)
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE
33.Many email systems use ______ protocol to send messages from one server to another
server.
(A) HTTP
(B) ARP
(C) ICMP
(D) SMTP
Answer: D
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE
35.Mechanism that is used to convert domain name into IP address is known as _________.
(A) URL
(B) DNS
(C)FTP
(D)HTTP
Answer: B
39. The ethical and social issues of information systems are becoming more important these
days because of the increased
1) Use of the internet
2) Use of learning new technology
3) monitoring of employees in the institutions
4) cost of information systems
5) use of interconnected information systems
Select the correct answer from the options given below.
(A) (1) and (5)
(B) (1) and (2)
(C) (2) and (3)
(D) (4) and (5)
Answer: A
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE
40.___________ is the term used in computer security to protect the data from being
modified by the unauthorized user.
(A) Integrity
(B) Authentication
(C) Confidentiality
(D) Availability
Answer: A
42.Given below are two statements: One is labelled as Assertion (A) and the other is
labelled as Reason (R):
Assertion (A): Internet is one of the popular services offered on the World Wide Web (WWW).
Reason (R): The WWW is the universe of network - accessible information.
In the light of the above statements, choose the correct answer from the options given below:
(A) Both (A) and (R) are true and (R) is the correct explanation of (A)
(B) Both (A) and (R) are true but (R) is NOT the correct explanation of (A)
(C) (A) is true but (R) is false
(D) (A) is false but (R) is true
Answer: D
45._______ is the practice and precautions taken to protect valuable information from
unauthorised access, recording, disclosure or destruction.
(A) Network Security
(B) Database Security
(C) Information Security
(D) Physical Security
Answer: C
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE
50. Which of the following does not help to protect your computer from external threats?
(A) System Restore
(B) Internet Security
(C) Firewall
(D) Antivirus software
Answer: A
51.State whether True or False: Data encryption is primarily used to ensure confidentiality.
(A) True
(B) False
(C) Cannot be interpreted
(D) None
Answer: A
52.Which software is mainly used to help users detect viruses and avoid them?
(A) Antivirus
(B) Adware
(C) Malware
(D) None of the above
Answer: A
53.What kind of attack involves the attacker tricking the victim into performing actions or
revealing confidential information through manipulation?
(A) Phishing
(B) Identity Fraud
(C) Social Engineering
(D) Credential Stuffing
Answer: C
54.In a ransomware attack, the attacker demands a ransom usually in the form of:
(A) Gold
(B) Company Shares
(C) Cryptocurrency
(D) Property
Answer: C
56.What does IT Act 2000 and the Digital Personal Data Protection Bill 2023 pertain to?
(A) Cloud Computing
(B) Cybersecurity
(C)Data Privacy
(D) E-commerce
Answer: C
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE
58.Which type of attack involves using stolen account credentials to gain unauthorized
access to user accounts?
(A) Phishing Attacks
(B) Social Engineering
(C) Credential Stuffing
(D) Ransomware Attacks
Answer: C
59.What is the term for a form of cyberattack in which attackers impersonate legitimate
organizations to trick victims into revealing sensitive information?
(A) Man-in-the-Middle Attacks
(B) Phishing Attacks
(C) Social Engineering
(D) Credential Stuffing
Answer: B
60.Which type of attack involves infecting the victim's system with malware that encrypts
their files, then demanding a ransom to decrypt them?
(A) Advanced Persistent Threats (APTs)
(B) Phishing Attacks
(C) Ransomware Attacks
(D) Credential Stuffing
Answer: C
61.Which privacy aspect empowers users to safeguard their personal information and
maintain their privacy?
(A) Understanding the Significance of Privacy
(B) Protecting Personal Information
(C) Securing Confidential Data
(D) Using Privacy Settings and Controls
Answer: D
62. Which of the following is a programs that copy themselves throughout a computer or
network?
(A). Worms
(B). Trojans
(C). Viruses
(D). Rootkits
Answer: C
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE
63.Which mechanism used to encrypt and decrypt data.?
(A) Cryptography
(B) Algorithm
(C) Data flow
(D) Social Engineering
Answer: A
66. The plain text encrypts to different cipher text with different keys
(A) True
(B) False
(C) Cannot be interpreted
(D) None
Answer : A
68.Which type of the following malware does not replicate or clone them self's through
infection?
(A) Rootkits
(B) Trojans
(C) Worms
(D) Viruses
Answer : B
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE
69.Programs that come into a computer system disguised as something else,are called
(A) Trojan horses
(B) Viruses
(C) Web bugs
(D) Zombies
Answer:A
70.Match the following:
A. Packet Filtering firewall I. Spyware
B. Stateful Multilayer Inspection firewall II. Phishing
C. Key logger III. Less costly
D. Cyber crime IV. complex internal architecture
A. A-III ,B-IV,C-I,D-II
B. A-II ,B-IV,C-III,D-I
C. A-I ,B-II,C-IV,D-III
D. A-III ,B-II,C-IV,D-I
Answer:A
71.When sensitive data falls into the hands of someone who is unauthorised person, it is
called as
(A) Data breach
(B) Data access
(C) Data control
(D) None of the above mentioned
Answer:A
72.Information privacy, Individual privacy and communication privacy is the three main
pillars of
(A) Digital Integrity
(B) Digital protection
(C) Digital secrecy
(D) Digital privacy
Answer: D
73.To protect the computer system against the hacker and different kind of viruses, one
must always keep on in the computer system.
(A) Antivirus
(B) Firewall
(C) Vlc player
(D) Script
Answer:B
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE
74.Which of the following are famous and common cyber-attacks used by hackers to
infiltrate the user's system?
(A) Firewall
(B) Malware & Malvertising
(C) Phishing and Password attacks
(D) All of the above
Answer:B & C
SDMSMK