DIGITAL NEPAL69
NOS stands
for______________?
A. Node operating
system
B. Non-open software
C. Network Operating system
D. Non-operating software
_______________are
system software to facilitate editing of text and data?
A. MS Word
B. Editors
C. PowerPoint
D. MS publisher
Computers, combine
both measuring and counting, are called________________?
A. Analog
B. Digital
C. Hybrid
D. All of these
In world today, most
of the computers are_____________?
A. Digital
B. Hybrid
C. Analog
D. Complex
physical structure
of computer is called____________?
A. Software
B. Hardware
C. Human ware
D. All of these
In which type of
computer, data are represented as discrete signals?
A. Analog computer
B. Digital computer
C. both
D. Hybrid Computer
‘C’ in CPU
denotes___________?
A. Central
B. Common
C. Convenient
D. Computer
E. None of these
Which of the
following uses a handheld operating system?
A. supercomputer
B. personal computer
C. Laptop
D. PDA
To display the
contents of a folder in Windows Explorer you should:
A. click on it
B. collapse it
C. name it
D. give it a password
E. None of these
The CPU comprises of
Control, Memory and_______________units?
A. Microprocessor
B. Arithmetic/Logic
C. Output
D. ROM
_________computer
are of large size?
A. Micro
B. Mainframe
C. Super
D. Mini
Note book,
laptop,palm,hand-held computers are coming under the category of__________computer?
A. Digital computer
B. Mainframe computer
C. Portable computer
D. Hybrid computer
Touch Screen
is___________?
A. Input device
B. Output device
C. Both A & B above
D. None of these
____________are used
for plotting graphs and design on papers?
A. Trackball
B. Joystick
C. Light pen
D. Plotters
_______________are
specific to users’ needs?
A. System software
B. Application software
C. Assemblers
D. Compilers
“MAN” stands
for_______________?
A. Maximum Area
Network
B. Minimum Area Network
C. Main Area Network
D. Metropolitan Area Network
Which of the
following is a network topology?
A. LAN
B. WAN
C. MAN
D. BUS
VOIP stands
for___________?
A. Voice over IP
B. Video over IP
C. Viruses over IP
D. Virtual over IP
LAN stands
for______________?
A. Limited Area
Network
B. Logical Area Network
C. Local Area Network
D. Large Area Network
_____________are set
of rules and procedures to control the data transmission over the internet?
A. IP address
B. Domains
C. Protocol
D. Gateway
Hardware or software
designed to guard against unauthorized access to a computer network is known as
a(n)___________?
A. Hacker-proof
program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall
The scrambling of
code is known as___________?
A. Encryption
B. a firewall
C. Scrambling
D. Password proofing
To prevent the loss
of data during power failures, use a(n)_____________?
A. Encryption program
B. Surge protector
C. Firewall
D. UPS
__________is defined
as any crime completed through the use of computer technology?
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
___________refers to
electronic trespassing or criminal hacking?
A. Cracking
B. Jacking
C. Spoofing
D. Smarming
The first electronic
computer was developed by____________?
A. J.V. Attansoff
B. Bill Gates
C. Simur Cray
D. Winton Serf
_____________computers
operates essentially by counting?
A. Portable computer
B. Hybrid computer
C. Analog computer
D. Digital computer
____________computer
is small general purpose micro computer, but larger than portable computer?
A. Hybrid
B. Digital
C. Desktop
D. Laptop
Cathode Ray Tube is
a form of__________?
A. Keyboard
B. Mouse
C. Monitor
D. Mother board
____________computer
is a medium sized computer?
A. Micro
B. Mainframe
C. Super
D. Mini
Malicious software
is known as____________?
A. Badware.
B. Malware.
C. Maliciousware.
D. Illegalware
A program that
performs a useful task while simultaneously allowing destructive acts is a___________?
A. Worm.
B. Trojan horse.
C. Virus.
D. Macro virus
An intentionally
disruptive program that spreads from program to program or from disk to disk is
known as a_____________?
A. Trojan horse.
B. Virus.
C. Time bomb.
D. Time-related bomb sequence.
In 1999, the Melissa
virus was a widely publicised:____________?
A. E-mail virus.
B. Macro virus.
C. Trojan horse.
D. Time bomb.
What type of virus
uses computer hosts to reproduce itself?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
The thing that
eventually terminates a worm virus is a lack of:
A. Memory or disk
space.
B. Time.
C. CD drives space.
D. CD-RW.
When a logic bomb is
activated by a time-related event, it is known as a____________?
A. Time-related bomb
sequence.
B. Virus.
C. Time bomb.
D. Trojan horse.
What is the name of
an application program that gathers user information and sends it to someone
through the Internet?
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
____________is the
measurement of things such as fingerprints and retinal scans used for security
access?
A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery
What is the most
common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Which of the
following does not store data permanently?
A. ROM
B. RAM
C. Floppy Disk
D. Hard Disk
Which of the
following is the smallest storage?
A. Megabyte
B. Gigabyte
C. Terabyte
D. None of these
Which of the
following contains permanent data and gets updated during the processing of
transactions?
A. Operating System
File
B. Transaction file
C. Software File
D. Master file
A modem is connected
to_____________?
A. a telephone line
B. a keyboard
C. a printer
D. a monitor
Large transaction
processing systems in automated organisations use___________?
A. Online processing
B. Batch Processing
C. Once-a-day Processing
D. End-of-day processing
Which of the
following is not a storage medium?
A. Hard disk
B. Flash drive
C. DVD
D. scanner
The computer
abbreviation KB usually means____________?
A. Key Block
B. Kernel Boot
C. Kilo Byte
D. Kit Bit
The typical computer
criminal is a(n)____________?
A. Young hacker.
B. Trusted employee with no criminal record.
C. Trusted employee with a long, but unknown criminal record.
D. Overseas young cracker.
The common name for
the crime of stealing passwords is____________?
A. Jacking.
B. Identity theft.
C. Spoofing.
D. Hacking.
Collecting personal
information and effectively posing as another individual is known as the crime
of_____________?
A. Spooling.
B. Identity theft.
C. Spoofing.
D. Hacking.