1.
Identify false statement
Correct Answer
C. You can increase free space of disk by sending files in recycle bin
2.
If the displayed system time and date is wrong, you can reset it using
Correct Answer
D. Control panel
Explanation
The control panel is the correct answer because it is a feature in most operating systems that allows users to manage and customize various system settings, including the date and time. By accessing the control panel, users can easily reset the system time and date if it is displayed incorrectly.
3.
You should save your computer from?
Correct Answer
D. All of the above
Explanation
It is important to save your computer from viruses, time bombs, and worms as they can cause significant damage to your system. Viruses are malicious software programs that can replicate themselves and infect other files, while time bombs are designed to activate at a specific time or date, causing harm to your computer. Worms are self-replicating malware that can spread across networks and cause damage. Therefore, saving your computer from all of these threats is essential to protect your data and ensure the proper functioning of your system.
4.
A Microsoft Windows is ….. a(n)
Correct Answer
A. Operating system
Explanation
The correct answer is "Operating system" because Microsoft Windows is a widely used operating system that provides a platform for running computer programs and managing hardware devices. It provides a user-friendly interface, file management system, and various utilities to perform tasks such as running applications, accessing the internet, managing files, and controlling hardware devices.
5.
Which is not application software?
Correct Answer
A. Windows NT
Explanation
Windows NT is not considered application software because it is an operating system. Application software refers to programs that are designed to perform specific tasks or applications, such as Page Maker, WinWord XP, and Photoshop. Windows NT, on the other hand, is an operating system that provides the platform for running application software and managing computer resources.
6.
The …................ program compresses large files into a smaller file
Correct Answer
B. WinZip
Explanation
WinZip is a program that is commonly used to compress large files into smaller files. It is a popular file compression utility that allows users to reduce the size of files, making them easier to store, send, and share. By compressing files with WinZip, users can save disk space and transfer files more quickly over the internet.
7.
Which of the following operating system does not implement the multitasking truly?
Correct Answer
D. MS DOS
Explanation
MS DOS does not implement true multitasking. Unlike the other operating systems listed, MS DOS is a single-tasking operating system, meaning it can only execute one task at a time. It does not have the capability to run multiple programs simultaneously or efficiently share system resources among different tasks.
8.
Disk scheduling includes deciding
Correct Answer
B. Order in which disk access requests must be serviced
Explanation
Disk scheduling involves determining the order in which disk access requests should be serviced. This means deciding the sequence in which the pending disk requests should be executed in order to optimize the disk's performance and minimize the access time. By efficiently organizing the order of disk accesses, disk scheduling algorithms aim to reduce the average seek time and enhance overall system efficiency. Therefore, the correct answer is "order in which disk access requests must be serviced."
9.
Memory protection is normally done by
Correct Answer
A. The processor and the associated hardware
Explanation
Memory protection is a crucial aspect of computer systems to prevent unauthorized access or modification of memory. The responsibility of memory protection lies with the processor and the associated hardware. The hardware implements mechanisms like memory management units (MMUs) and access control lists (ACLs) to ensure that each process can only access its allocated memory and cannot interfere with other processes' memory. The processor enforces these protections by checking memory access requests against the defined permissions. The operating system, compiler, and user program may play a role in configuring these protections, but the actual implementation and enforcement are done by the processor and associated hardware.
10.
What is the access point (AP) in wireless LAN?
Correct Answer
A. Device that allows wireless devices to connect to a wired network
Explanation
The access point (AP) in a wireless LAN is a device that allows wireless devices to connect to a wired network. It acts as a bridge between the wireless devices and the wired network, enabling communication between them. The AP receives data from the wireless devices and forwards it to the wired network, and vice versa. This allows wireless devices to access resources and services on the wired network, such as the internet or shared files.
11.
In wireless ad-hoc network
Correct Answer
A. Access point is not required
Explanation
In a wireless ad-hoc network, an access point is not required because this type of network is decentralized and does not rely on a central access point for communication. Instead, all nodes in the network can directly communicate with each other, forming a self-configuring network without the need for an access point. This allows for more flexibility and scalability in the network, as nodes can easily join or leave the network without disrupting the overall connectivity.
12.
In wireless distribution system
Correct Answer
A. Multiple access point are inter-connected with each other
Explanation
The correct answer is that in a wireless distribution system, multiple access points are interconnected with each other. This means that there are multiple access points spread out in a network, and they are connected to each other to provide seamless wireless coverage and connectivity. This allows for better coverage and capacity in a larger area, as well as improved network performance and reliability.
13.
What is WPA?
Correct Answer
B. Wi-fi protected access
Explanation
WPA stands for Wi-Fi Protected Access. It is a security protocol designed to secure wireless computer networks. WPA provides stronger encryption and authentication methods compared to its predecessor, WEP (Wired Equivalent Privacy), making it more secure against unauthorized access and data breaches. By using WPA, users can ensure the confidentiality and integrity of their wireless communications, protecting their sensitive information from potential attackers.
14.
MCQ MIME stands for
Correct Answer
B. Multipurpose Internet Mail Extensions
Explanation
MIME stands for Multipurpose Internet Mail Extensions. It is a standard that allows email messages to include various types of multimedia content, such as images, audio, and video. This extension is used to define the format of email messages and attachments, ensuring that different email clients can properly interpret and display the content.
15.
TCP/IP is a:
Correct Answer
C. Protocol
Explanation
The correct answer is "Protocol" because TCP/IP is a set of protocols that govern how data is transmitted over a network. It stands for Transmission Control Protocol/Internet Protocol and is used for communication between devices on the internet. TCP handles the transmission of data, while IP handles the addressing and routing of data packets. TCP/IP is not a network hardware or software, but rather a protocol that allows different hardware and software to communicate with each other.
16.
TCP/IP mainly used for:
Correct Answer
D. All of these
Explanation
TCP/IP is a protocol suite that is used for various purposes, including file transfer, email, and remote login service. It provides a reliable and efficient way to transfer files between computers, allows for the sending and receiving of emails, and enables remote login to access and control remote computers. Therefore, the correct answer is "All of these" as TCP/IP is used for all the mentioned purposes.
17.
USB stands for:
Correct Answer
D. Universal Serial Bus
Explanation
USB stands for Universal Serial Bus. It is a common interface used for connecting computer peripherals such as keyboards, mice, printers, and storage devices to a computer. The term "universal" signifies its widespread adoption and compatibility across different devices and operating systems. "Serial" refers to the method of data transfer, where data is transmitted one bit at a time, and "bus" refers to the shared communication pathway that allows multiple devices to connect to a computer simultaneously.
18.
In HTTPS ‘S’ is stands for:
Correct Answer
B. Secured
Explanation
The 'S' in HTTPS stands for "Secured". HTTPS is a protocol used to secure the communication between a web browser and a website. It encrypts the data transmitted between the two, ensuring that it cannot be intercepted or tampered with by unauthorized parties. By using HTTPS, sensitive information such as passwords, credit card details, and personal data can be transmitted securely over the internet.
19.
Email stands for:
Correct Answer
B. Electronic mail
Explanation
The correct answer for this question is "Electronic mail" because email is an abbreviation for electronic mail. It is a method of exchanging digital messages between individuals or groups using electronic devices. The term "electronic mail" accurately describes the process of sending and receiving messages electronically, making it the most suitable option among the given choices.
20.
In computer security, ……………………. means that computer system assets can be modified only by authorized parities.
Correct Answer
B. Integrity
Explanation
Integrity in computer security refers to the assurance that computer system assets can only be modified by authorized parties. This means that the data and information within the system remain accurate, complete, and unaltered. Maintaining integrity ensures that unauthorized individuals cannot tamper with or modify the system, protecting its reliability and trustworthiness.
21.
WPA2 is used for security in
Correct Answer
C. Wi-fi
Explanation
WPA2 is a security protocol that is specifically designed for Wi-Fi networks. It provides encryption and authentication to ensure the confidentiality and integrity of data transmitted over Wi-Fi connections. Ethernet and Bluetooth use different security protocols, such as Ethernet using wired security protocols and Bluetooth using Bluetooth security protocols. Therefore, WPA2 is not used for security in Ethernet or Bluetooth networks. Hence, the correct answer is Wi-Fi.
22.
Extensible authentication protocol is authentication framework frequently used in
Correct Answer
B. Wireless networks
Explanation
The correct answer is "wireless networks" because the Extensible Authentication Protocol (EAP) is commonly used in wireless networks to provide a secure method of authentication for devices connecting to the network. EAP allows for various authentication methods to be used, such as passwords, digital certificates, or smart cards, making it a flexible and widely adopted framework for wireless network authentication.
23.
Pretty good privacy (PGP) is used in
Correct Answer
B. Email security
Explanation
PGP (Pretty Good Privacy) is a widely used encryption program that provides cryptographic privacy and authentication for data communication. It is specifically designed for securing email communication by encrypting the content of the email and ensuring that only the intended recipient can decrypt and read the message. PGP uses a combination of symmetric-key and public-key cryptography to achieve this level of security. Therefore, the correct answer is email security.
24.
What can a firewall protect against?
Correct Answer
B. Unauthenticated interactive logins from the "outside" world
Explanation
A firewall can protect against unauthenticated interactive logins from the "outside" world. This means that it can prevent unauthorized access to a network or system by blocking attempts to log in from external sources that have not been properly authenticated. By doing so, a firewall helps to ensure that only authorized users are able to access the network or system, enhancing security and protecting against potential threats or attacks.
25.
Which of the following is system software?
Correct Answer
A. Operating system
Explanation
The correct answer is "Operating system" because it is a type of system software that manages computer hardware and software resources, provides common services for computer programs, and allows users to interact with the computer. Compilers are not system software, but rather application software that translates high-level programming languages into machine language. Utilities can be both system software and application software, depending on their specific functionality. However, the question specifically asks for a system software, so the correct answer is the operating system.