Computer Science Quiz

Q61. A cloud environment available via the internet to any one willing to pay is
(a) Public cloud
(b) Remote cloud
(c) Hybrid cloud
(d) Private cloud

Q62. Which RAID level represents an Error - correcting codes (ECC) can be used directly in disk arrays by striping bytes across disks
(a) RAID level1
(b) RAID level2
(c) RAID level3
(d) RAID level5

Q63. A file that records information about every HTTP request processed by the server
(a) Web Server Log
(b) Message Log
(c) Directory Log
(d) Access Log

Q64. The process of preventing or inhibiting the normal use or management of communication facilities is called as
(a) Masquerade
(b) Replay
(c) Denial of service
(d) Blocking

Q65. The Digital Signature Standard (DSS) makes use of _____ algorithm
(a) Super Hash Algorithm
(b) Secure Hash Algorithm
(c) Signature Hack Algorithm
(d) Signature Hide Algorithm

Q66. The universal logic gates are
(a) AND, OR and NOT
(b) EXOR and OR
(c) AND and OR
(d) NAND and NOR

Q67. Special type of table, which can only be accessed and updated by the database system itself is called
(a) Data Storage
(b) Data Dictionary
(c) DBMS
(d) Tuples

Q68. Num Lock + * is the shortcut keys in File explorer to
(a) Display all subfolders under the selected folder
(b) Change the size and appearance of file and folder icons
(c) Open the Properties dialog box for the selected item
(d) Select the address bar

Q69. A bootstrap is
(a) A memory device
(b) A program to start up a computer
(c) Hardware of computer used to check memory
(d) An assembler

Q70. CentOS and Ubuntu is an example of
(a) Types of Computers
(b) Application software
(c) Operating systems
(d) Network software

Q71. Who is the founder of Pascal programming language
(a) Grace Hopper
(b) Niklaus Wirth
(c) Thomas E. Kurtz
(d) Michael J. Carey

Q72. Bandwidth refers to which of the following
(a) The amount of information a peer-to-peer network can store
(b) Conversion rate of analog signals to digital signals and vice versa
(c) The cost of cable required to implement LAN or WAN in an area
(d) The amount of information a communication medium can transfer in a given time

Q73. .tmp extension usually refers to what kind of files
(a) System file
(b) Archieve file
(c) Image file
(d) Temorary file

Q74. Where do we find Insert Endnote in MS Word
(a) File Menu
(b) References Menu
(c) Mailings Menu
(d) Design Menu

Q75. Which of the following acronyms is normally used to describe unsolicited junk e-mails
(a) CRAM
(b) DRAM
(c) JAM
(d) SPAM

1 2 3 4 5 6 7 8 9 10 11 12