mahendras

Subscribe Mahendras Youtube Channel | Join Mahendras Telegram Channel | Like Mahendras Facebook Page | Online Admission | Download Mahendras App

Now Subscribe for Free videos

Subscribe Now

Computer Knowledge : 29.07.2015

Bankers Guru
Computer Knowledge

1. The overall description of a database is called______:

(1) Data definition

(2) Data manipulation

(3) Data integrity

(4) Database schema

(5) None of these

Ans. (4) The overall description of a database is called Database schema.


2. Which is proper subset designed to support ‘views’ belonging to different classes of users in order to hide or protect information?

(1) Schema

(2) Subschema

(3) Non-schema

(4) None-subschema

(5) None of these

Ans. (2) Sub schema is proper subset designed to support ‘views’ belonging to different classes of users in order to hide or protect information.


3. Who interact with the system without writing a program?

(1) Naïve users

(2) Casual users

(3) Sophisticated user

(4) All of these

(5) None of these

Ans (3) Sophisticated Users -- These people interact with the system without writing programs.


4. The performance of a data communication network depends on ........................

(1) The number of users

(2) The transmission media

(3) The hardware and software

(4) All of the above

(5) None of these

Ans. (4) The performance of a data communication network depends on all given options.


5. Viruses are network ................... issue.

(1) Performance

(2) Reliability

(3) Security

(4) Management

(5) None of these

Ans. (3) Viruses are network security issue.


6. The information to be communicated in a data communication system is the ....................

(1) Medium

(2) Protocol

(3) Message

(4) Transmission

(5) Topology

Ans. (3) The information to be communicated in a data communication system is the Message.


7. ..................... is the division of one task among multiple computers.

(1) Distributed Processing

(2) Distributed Messaging

(3) Distributed Telephony

(4) Electronic Messaging

(5) None of these

Ans. (1) Distributed Processing is the division of one task among multiple computers.


8. Which topology requires a central controller or hub?

(1) Mesh

(2) Star

(3) Bus

(4) Ring

(5) Router

Ans. (2) Star topology requires a central controller or hub.


9. ____________ is a process that permits multiple computers to use the same IP address and hide their actual IP addresses from the Internet.

(1) Routing

(2) Network address translation (NAT)

(3) Signature referencing

(4) Packet filtering

(5) None of these

Ans. (2) NAT is a process that permits multiple computers to use the same IP address and hide their actual IP addresses from the Internet.


10. Dynamic addressing makes it more difficult for hackers to find likely victims because ______.

(1) the ISP assigns counterfeit IP addresses.

(2) the IP address is protected by a firewall.

(3) the ISP hides the IP addresses for computers on their network.

(4) the IP address changes each time a user logs on to their ISP.

(5) None of these

Ans. (4) Dynamic addressing makes it more difficult for hackers to find likely victims because the IP address changes each time a user logs on to their ISP





Copyright © 2023 www.mahendraguru.com All Right Reserved by Mahendra Educational Pvt . Ltd.