Major-1 MCQS

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

DEPARTMENT OF COMPUTER SCIENCE

SRI DURGA MALLESWARA SIDDHARTHA MAHILA KALASALA


VIJAYAWADA-10
Major – 1
MCQS
UNIT V: ESSENTIALS OF COMPUTER SCIENCE

1. Servers are computers that provide resources to other computers connected to a


(A) Client
(B) Mainframe
(C) Supercomputer
(D) Network
ANSWER: D

2. A program that is used to view websites is called a


(A) Browser
(B) Web viewer
(C) Spreadsheet
(D) Word processor
ANSWER: A

3. Which of the following is not a type of broadband internet connection?


(A) Satellite
(B) DSL
(C) Dial up
(D) Cable
ANSWER: C

4. What is an ‘intranet’?
(A) Internal internet is used to transfer information internally
(B) Internal internet is used to transfer information to the outside company.
(C) Internal network designed to serve the internal formational needs of a single organization.
(D) Internal network designed to transfer information between two organizations
ANSWER: C

5. ISP stands for


(A) Internet Security Protocol
(B) Intelligent Service Package
(C) Internet Service Provider
(D) Intelligent Service Provider
ANSWER: C

6. Http stands for


(A) hypertext transfer protocol
(B) hypertet transmission protocol
(C) high transfer transport protocol
(D) hyper transfer text protocol
ANSWER: A

SDMSMK
DEPARTMENT OF COMPUTER SCIENCE

7. Packet switching was invented in?


(A) 1960s
(B) 1980s
(C) 2000s
(D) 1990s
ANSWER: A

8. DARPA stands for?


(A) Data Advanced Research Projects Agency
(B) Defense Advanced Research Product Agency
(C) Data based Advanced Research Product Agency
(D) Defense Advanced Research Projects Agency
ANSWER: D

9. Which type of topology is best suited for large businesses which must carefully control
and coordinate the operation of distributed branch outlets?
(A) Ring
(B) Local area
(C) Hierarchical
(D) Star
ANSWER: D

10. Which of the following terms define the technological advancement in the field of
computers through the ages?
(A) Growth
(B) Gradation
(C) Generation
(D) Development
Answer: C

11. EDSAC stands for ____________________________.


(A) Electronic Delay Second Automatic Calculator
(B) Electronic Delay Storage Automatic Calculator
(C) Electrical Delay System Automatic Calculator
(D) Electronic Delay System Automatic Computer
Answer: B

12. ___________________ is an example of unguided media.


(A)Coaxial cable
(B)Fiber optics
(C)Twisted pair
(D)Infrared
ANSWER: D

SDMSMK
DEPARTMENT OF COMPUTER SCIENCE

13. The application layer service that is responsible for remote login is ______________.
(A) ARP
(B) FTP
(C) Telnet
(D) DNS
ANSWER: C

14. Multiple repeaters used in satellite communication is known as ______________


(A) Stations
(B) Transponders
(C) Modulators
(D) None of the above
ANSWER: B

15. The router helps to forward the packet from one network to another network by
referring to _________ table.
(A) MAC
(B) Routing
(C) Matrix
(D) All of the above
ANSWER: B

16. _______________ is a transport layer protocols that help to deliver your email to the
destination reliably.

(A) UDP
(B) TCP
(C) SMTP
(D) POP3
ANSWER: B

17. Which of the following is layer 4 protocols of the OSI model widely used in live TV
streaming
(A) TCP
(B) UDP
(C) HTTP
(D) None of the above
ANSWER: B

18. The basic idea of the internet was developed by


(A) Bob Kahn and Vint Cerf
(B) Tim Berbers-Lee
(C) Robert Metcalfe
(D) Charles Babbage
ANSWER: A

SDMSMK
DEPARTMENT OF COMPUTER SCIENCE

19. TCP/IP stands for __________________


(A) Transmission Control Protocol and International Protocol
(B) Transport Control Protocol and Internet protocol
(C) Transmission Control Protocol and Internet protocol
(D) Transmission Configuration protocol and Internet Protocol
ANSWER: C

20. The World Wide Web (WWW) is founded by


(A) Tim Berners-Lee
(B) Bob Kahn and Vint Cerf
(C) ARPANET
(D) MIT
ANSWER: A

21. Which of the following is the process of breaking down a large network into smaller
subnets for efficient use of IP v4 address.
(A) Super netting
(B) Subnetting
(C) Logical Addressing
(D) NAT
ANSWER: B

22. Which of the following is not true regarding the IP v6 address?


(A) Address length is 128 bits
(B) Supports anycast addressing
(C) It is the permanent solution for the rapid depletion of IP v4 address
(D) IP v6 is represented in decimal format.
ANSWER: D

23. Which of the following uses UDP as the transport protocol?


(A) TFTP
(B) DNS
(C) Telnet
(D) SMTP
ANSWER: D

24.________________ is a popular techniques used in LAN switches to break down single


broadcast domain into multiple broadcast domain.
(A) NAT
(B) Logical Addressing
(C) VLAN
(D) None of the above
ANSWER: C

SDMSMK
DEPARTMENT OF COMPUTER SCIENCE

25. The following statement is not true about the router-


(A) The router maintains a routing table to forward packets from source to destination.
(B) It works at layer 3 of the OSI model.
(C) It has multiple broadcast domains.
(D) None of the above
ANSWER: D

26. Which of the following is a technique to send multiple signals for a single
communication channel?
(A) Multiplexing
(B) Compression
(C) Digitizing
(D) De-multiplexing
ANSWER: A

27. Which of the following services uses both TCP and UDP connection?
(A) FTP
(B) Telnet
(C)DNS
(D)SMTP
ANSWER: D

28. Match the following generation of computers with the technology used in that
generation.
Generations Technology used
1.1st Generation I. Microprocessors
2.2nd Generation II. Vaccum Tubes
3.3rd Generation III. Integrated Circuits
4.4th Generation IV. Transistors
(A) 1.II 2.IV 3.I 4.III
(B) 1.II 2.IV 3.III 4.I
(C) 1.II 2.I 3.IV 4.III
(D) 1.I 2.II 3.III 4.IV
(E) None of these
Answer B : 1.II 2.IV 3.III 4.I

29. Arrange the following different types of computer networks in an ascending order on
the basis of geographical area implied.
(A) MAN
(B) WAN
(C) LAN
Choose the correct answer from the options given below:
(A) (C), (B), (A)
(B) (A), (C), (B)
(C) (C), (A), (B)
(D) (B), (A), (C)
Answer: C : (C), (A), (B)

SDMSMK
DEPARTMENT OF COMPUTER SCIENCE

30. Match the following.


Term Meaning
1. ISP (a) Online Journal
2. FORUM (b) Internet Service Provider
3. BLOG (c) Online discussion site
4. SOCIAL NETWORK (d) A type of computing service
5. CLOUD COMPUTING (e) Online community

Choose the correct answer


(A) 1-e,2-c,3-b,4-a,5-d
(B) 1-b,2-c,3-a,4-e,5-d
(C) 1-a,2-b,3-c,4-d,5-e
(D) 1-d,2-c,3-a,4-b,5-e
(E) 1-b,2-e,3-c,4-a,5-b
Answer:B

31.Who among the following is the father of internet?


(A) Vint Cerf
(B) Charles Babbage
(C) Mark Anderson
(D) Charles Victor
Answer: A.

32.The word Internet is derived from two words


(A) Interface and networks
(B) Inter communication and networks
(C) Internal and networks
(D) Inter connection and networks
Answer: D

33.Many email systems use ______ protocol to send messages from one server to another
server.
(A) HTTP
(B) ARP
(C) ICMP
(D) SMTP
Answer: D

34.What is the default Port Number used by HTTP?


(A) 89
(B) 80
(C) 21
(D) 23
Answer: B

SDMSMK
DEPARTMENT OF COMPUTER SCIENCE

35.Mechanism that is used to convert domain name into IP address is known as _________.
(A) URL
(B) DNS
(C)FTP
(D)HTTP
Answer: B

36.A collection of hyperlinked documents on the internet forms the?


(A) World Wide Web (WWW)
(B) E-mail system
(C) Mailing list
(D) Hypertext mark-up language
Answer: A

37. The location of a resource on the internet is given by its?


(A) Protocol
(B) URL
(C) E-mail address
(D) ICQ
Answer: B

38. The domain, which is used to map an address to a name is called_____________


(A) Generic Domain
(B) Inverse Domain
(C) Super Domain
(D) Sub Domain
Answer: B

39. The ethical and social issues of information systems are becoming more important these
days because of the increased
1) Use of the internet
2) Use of learning new technology
3) monitoring of employees in the institutions
4) cost of information systems
5) use of interconnected information systems
Select the correct answer from the options given below.
(A) (1) and (5)
(B) (1) and (2)
(C) (2) and (3)
(D) (4) and (5)

Answer: A

SDMSMK
DEPARTMENT OF COMPUTER SCIENCE

40.___________ is the term used in computer security to protect the data from being
modified by the unauthorized user.
(A) Integrity
(B) Authentication
(C) Confidentiality
(D) Availability

Answer: A

41.Which of the following is correct in connection with the password policy?


(A) Usually, password length must be more than 8 characters
(B) Password must contain upper case, lower case, numbers, and special characters
(C) There should be different passwords for different login accounts.
(D) All of the above
Answer: D

42.Given below are two statements: One is labelled as Assertion (A) and the other is
labelled as Reason (R):

Assertion (A): Internet is one of the popular services offered on the World Wide Web (WWW).
Reason (R): The WWW is the universe of network - accessible information.
In the light of the above statements, choose the correct answer from the options given below:

(A) Both (A) and (R) are true and (R) is the correct explanation of (A)
(B) Both (A) and (R) are true but (R) is NOT the correct explanation of (A)
(C) (A) is true but (R) is false
(D) (A) is false but (R) is true
Answer: D

43.Which of the following statements are true?


i) Domain name is a part of URL.
ii) URL made up of four parts
iii) The relative URL is a part of Absolute URL.
iv) URL doesn’t contain any protocol
Options:
(A) i & ii
(B) ii
(C) i, ii & iii
(D) i, ii & iv
Answer: B

44. The term “Cyberspace” was coined by ____________.


(A) William Gibson
(B) Andrew Tannenbaum
(C) Richard Stallman
(D) Scott Fahlman
Answer: A
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE

45._______ is the practice and precautions taken to protect valuable information from
unauthorised access, recording, disclosure or destruction.
(A) Network Security
(B) Database Security
(C) Information Security
(D) Physical Security
Answer: C

46. Match List I with List II:


List I List II
(Computer Terms) (Description)
(a) HTML (I) Semantic Web
(b) Web 2.0 (II) Use of Internet to make phone calls
(c) Web 3.0 (III) Language used to create web pages
(d) VOIP (IV) Collaborative web
Choose the correct answer from the options given below:

(A) (a) - (III), (b) - (IV), (c) - (I), (d) - (II)


(B) (a) - (III), (b) - (I), (c) - (IV), (d) - (II)
(C) (a) - (II), (b) - (IV), (c) - (I), (Dd - (III)
(D) (a) - (IV), (b) - (III), (c) - (I), (d) - (II)
Answer: A

47. Compromising confidential information comes under _________


(A) Bug
(B) Threat
(C) Vulnerability
(D) Attack
Answer: B

48. Lack of access control policy is a _____________


(A) Bug
(B) Threat
(C) Vulnerability
(D) Attack
Answer: C

49.Possible threat to any information cannot be ________________


(A) Reduced
(B) Transferred
(C) Protected
(D) Ignored
Answer: D

SDMSMK
DEPARTMENT OF COMPUTER SCIENCE

50. Which of the following does not help to protect your computer from external threats?
(A) System Restore
(B) Internet Security
(C) Firewall
(D) Antivirus software
Answer: A

51.State whether True or False: Data encryption is primarily used to ensure confidentiality.
(A) True
(B) False
(C) Cannot be interpreted
(D) None
Answer: A

52.Which software is mainly used to help users detect viruses and avoid them?
(A) Antivirus
(B) Adware
(C) Malware
(D) None of the above
Answer: A

53.What kind of attack involves the attacker tricking the victim into performing actions or
revealing confidential information through manipulation?
(A) Phishing
(B) Identity Fraud
(C) Social Engineering
(D) Credential Stuffing
Answer: C

54.In a ransomware attack, the attacker demands a ransom usually in the form of:
(A) Gold
(B) Company Shares
(C) Cryptocurrency
(D) Property
Answer: C

55.What is the primary purpose of privacy settings and controls?


(A) Increase network speed
(B) Reduce storage space
(C) Maintain user privacy
(D) Improve interface design
Answer: C

56.What does IT Act 2000 and the Digital Personal Data Protection Bill 2023 pertain to?
(A) Cloud Computing
(B) Cybersecurity
(C)Data Privacy
(D) E-commerce
Answer: C
SDMSMK
DEPARTMENT OF COMPUTER SCIENCE

57.What type of firewall operates as an intermediary between two systems?


(A) Packet-Filtering Firewall
(B) Stateful Inspection Firewall
(C) Proxy Firewall
(D) Next-Generation Firewall
Answer: C

58.Which type of attack involves using stolen account credentials to gain unauthorized
access to user accounts?
(A) Phishing Attacks
(B) Social Engineering
(C) Credential Stuffing
(D) Ransomware Attacks
Answer: C

59.What is the term for a form of cyberattack in which attackers impersonate legitimate
organizations to trick victims into revealing sensitive information?
(A) Man-in-the-Middle Attacks
(B) Phishing Attacks
(C) Social Engineering
(D) Credential Stuffing
Answer: B

60.Which type of attack involves infecting the victim's system with malware that encrypts
their files, then demanding a ransom to decrypt them?
(A) Advanced Persistent Threats (APTs)
(B) Phishing Attacks
(C) Ransomware Attacks
(D) Credential Stuffing
Answer: C

61.Which privacy aspect empowers users to safeguard their personal information and
maintain their privacy?
(A) Understanding the Significance of Privacy
(B) Protecting Personal Information
(C) Securing Confidential Data
(D) Using Privacy Settings and Controls
Answer: D

62. Which of the following is a programs that copy themselves throughout a computer or
network?
(A). Worms
(B). Trojans
(C). Viruses
(D). Rootkits
Answer: C

SDMSMK
DEPARTMENT OF COMPUTER SCIENCE
63.Which mechanism used to encrypt and decrypt data.?
(A) Cryptography
(B) Algorithm
(C) Data flow
(D) Social Engineering
Answer: A

64.Code Red is a type of ________


(A) An Antivirus Program
(B) A photo editing software
(C) A computer virus
(D) A video editing software
Answer: C

65.Which one of the following is also referred to as malicious software?


(A) Maliciousware
(B) Badware
(C) Ilegalware
(D) Malware
Answer : D

66. The plain text encrypts to different cipher text with different keys
(A) True
(B) False
(C) Cannot be interpreted
(D) None
Answer : A

67.Which type of text is transformed with the help of a cipher algorithm?


(A) Transformed text
(B) Complex text
(C) Scalar text
(D) Plain text
Answer : D

68.Which type of the following malware does not replicate or clone them self's through
infection?
(A) Rootkits
(B) Trojans
(C) Worms
(D) Viruses
Answer : B

SDMSMK
DEPARTMENT OF COMPUTER SCIENCE

69.Programs that come into a computer system disguised as something else,are called
(A) Trojan horses
(B) Viruses
(C) Web bugs
(D) Zombies
Answer:A
70.Match the following:
A. Packet Filtering firewall I. Spyware
B. Stateful Multilayer Inspection firewall II. Phishing
C. Key logger III. Less costly
D. Cyber crime IV. complex internal architecture
A. A-III ,B-IV,C-I,D-II
B. A-II ,B-IV,C-III,D-I
C. A-I ,B-II,C-IV,D-III
D. A-III ,B-II,C-IV,D-I
Answer:A
71.When sensitive data falls into the hands of someone who is unauthorised person, it is
called as
(A) Data breach
(B) Data access
(C) Data control
(D) None of the above mentioned
Answer:A

72.Information privacy, Individual privacy and communication privacy is the three main
pillars of
(A) Digital Integrity
(B) Digital protection
(C) Digital secrecy
(D) Digital privacy
Answer: D

73.To protect the computer system against the hacker and different kind of viruses, one
must always keep on in the computer system.
(A) Antivirus
(B) Firewall
(C) Vlc player
(D) Script
Answer:B

SDMSMK
DEPARTMENT OF COMPUTER SCIENCE

74.Which of the following are famous and common cyber-attacks used by hackers to
infiltrate the user's system?
(A) Firewall
(B) Malware & Malvertising
(C) Phishing and Password attacks
(D) All of the above
Answer:B & C

75.When was the first computer virus created?


(A) 1970
(B) 1971
(C) 1972
(D) 1969
Answer: B

SDMSMK

You might also like