What is the most common tool used to restrict access to a computer system?

A. User logins
B. Passwords
C. Computer keys
D. Accesscontrol software
Correct answer is: B. Passwords

Collecting personal information and effectively posing as another individual is known as the crime of                             ?

A. Spooling.
B. Identity theft.
C. Spoofing.
D. Hacking.
Correct answer is: B. Identity theft.

Which of the following is not a binary number?

A. 001
B. 101
C. 202
D. 110
Correct answer is: C. 202

A device that connects to a network without the use of cables is said to be                        ?

A. Distributed
B. free
C. centralized
D. none of these
Correct answer is: D. none of these

Computers process data into information by working exclusively with                           ?

A. multimedia
B. word
C. numbers
D. characters
Correct answer is: C. numbers

Select the Odd one from the following

A. Operating
B. Interpreter
C. Compiler
D. Assembler
Correct answer is: A. Operating

On-line real time systems become popular in                               generation?

A. First
B. Second
C. Third
D. Fourth
Correct answer is: C. Third

A                            is a microprocessor -based computing device?

A. personal
B. mainframe
C. workstation
D. server
Correct answer is: A. personal

The device used to carry digital data on analogue lines is called as                    ?

A. Modem
B. Multiplexer
C. Modulator
D. Demodulator
Correct answer is: A. Modem

A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is                      ?

A. Bug
B. Vice
C. Lice
D. Worm
Correct answer is: D. Worm

Scroll to Top