NETWORKING MCQS

All of the following are examples of real security and privacy risks EXCEPT                           ?

A. hackers
B. Spam
C. Viruses
D. identity theft
Correct answer is: B. Spam

Where does most data go first with in a computer memory hierarchy ?

A. RAM
B. ROM
C. BIOS
D. CACHE
Correct answer is: A. RAM

A DVD is an example of a (n)                        ?

A. hard disk
B. optical disc
C. output device
D. solid-state storage device
Correct answer is: B. optical disc

Which of the following contains permanent data and gets updated during the processing of transactions?

A. Operating System File
B. Transaction file
C. Software File
D. Master file
Correct answer is: D. Master file

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a                             ?

A. Trojan horse.
B. Virus.
C. Time bomb.
D. Time- related bomb sequence.
Correct answer is: B. Virus.

which one is Digital device, select from the choices below?

A. Digital Clock
B. Automobile speed meter
C. Clock with a dial and two
D. All of them
Correct answer is: A. Digital Clock

To prevent the loss of data during power failures, use a(n)                             ?

A. Encryption
B. Surge
C. Firewall
D. UPS
Correct answer is: D. UPS

A CPU contains                        ?

A. a card reader and a printing device
B. an analytical engine and a control unit
C. a control
D. an
Correct answer is: C. a control

Touch Screen is                        ?

A. Input device
B. Output
C. Both A & B
D. None of
Correct answer is: C. Both A & B

UNIVAC is                        ?

A. Universal Automatic
B. Universal Array
C. Unique Automatic
D. Unvalued Automatic
Correct answer is: A. Universal Automatic

Scroll to Top