Professional Documents
Culture Documents
Event-I R1
Event-I R1
In Windows 7 the Default setting of taskbar buttons should appear as a single,
unlabeled button,for each program even when multiple windows for a program
M are open. Which option you will choose? Always combine, hide labels Combine when taksbar is full Never combine None of the above A
If you don't want to list the recently opened programs in Window Start menu.
E What is the shortest way to do using? Service.msc regedit Start Menu Properties Remove from the list option C
When user right clicks on any icon, there is one option in bold. What does it
E signify? Higher priority option Default option Fast execute option Administrative elevation option B
In the window 7 Public network profile, When password protected sharing is on,
only people who have a user account and password on this computer can acess
shared files, printer attached to this computer, and the public folders. To give
H other people access, you must turn off password protected sharing. The Statement is True The Statement False Not Possible None of the above A
M How many extra clocks can you display on the taskbar 1 2 3 4B
allowed only when moe than one LAN cards are
H Can we define more than one IPV4 Address in One PC having windows 7? Yes Not allowed present None of the above A
A task is need to run when the computer starts, whether a user is logged on or
H not in windows 7. What you will do.? Specify in Startup Specify in BatchFile Specify in TaskScheduler Specify in Boot.ini C
M What is the fucntion of f11 key in windows 7? Maximize the window Minimize the window View full screen on or off the window Open a help window C
Keep files in sync between two different Keep files in sync between two different
M What is the use of Briefcase in window 7? Location automatically Same as Folder Password protected Folder Location D
It is to hide your browsing from your employer,
your internet service provider or the websites Pages you view in this window won't appear in Any files you download or bookmarks you create will
E What is "incognito window" in Google Chrome? you visit. your browser history or search history. be removed. None of the above B
M Which command is used to display the Unix/Linux version? uname ‐r uname ‐n uname ‐t uname ‐v A
E Which command is used to print a file in linux? print ptr lpr none of the above C
Which command is used to display disk consumption of a specific directory in
M linux? du ds dd dds A
which command is used to copy files from one computer to antoher computer cp <source computer files with path> <target scp <source computer files with path> <target cp ‐‐network‐copy <source computer files with path> ftpcp <source computer files with path>
E over the network in linux? computer with path> computer with path> <target computer with path> <target computer with path> B
in Microsoft Excel the process of identifying specific rows and columns so that so
E that certain columns and rows are always visible on the screen is called freezing locking selecting fixing A
What would you need to establish if you wanted to insure that the key in one
E database table was the same as a key in another database table? Top‐level grouping Connectivity Referential integrity Field properties C
M Pictorial representation of Boolean algebra is known as Venn Diagram Flow Chart Data Flow Diagram Truth Diagram A
E Internet Protocol Version 6 does not contribute which of the following simplified IP headers more IP addresses smart browsing added security features C
Write the value of t a er execu on of the following code:
<pre> int t;
int s;
s=6;
M t=(8 * s++) % 7; </pre> 6 9 8 0 A
It is a type of server that is used to test a software, website or service in a
M production‐similar environment before being set live. We are talking of: groupware server staging server proxy server production server B
E What is meaning of docx Dra copied and xeroxed Draft extended Document extended Document copied and xeroxed C
How many times will the following loop execute :
<pre> int z = 7, sum = 0;
do
{
sum = sum + z;
z = z+2;
system.out.println(“ ”+z);
}
M while (z <=12); </pre> 2 3 4 1 B
E Which gate has only one input and only one output. NOR Gate NOT Gate OR Gate AND Gate B
……….. In an asymmetric crypto system, means a private key and its
mathematically related public key, which are so related that the public key can
M verify a digital signature created by the private key public key private key key pair all of above C
Cell E23 has a date value and you wish to place that date on an invoice prefaced
M with the text located in B15. What is the command to do that? =B15&E23 =proper(B15)&” “&text(E23,”mmmm dd, yyyy”) B15&” “&E23 =join(B15&E23) B
COBOL – a language used for business data
E Pick out the wrong definition Access time – time needed to access the output processing EDP‐ acronym for Electronic Data Processing Control unit – heart of a computer. A
Data mining uses _________ algorithms to discover patterns and regularities in
data.
M Select correct option: Computational Mathematical Statistical None of these C
It is not managed by the common language runtime and is not checked for type‐
H safety and must be used with extreme care. It is basic code managed code Both the above none of above D
It is a reference type that refers to a Shared method of a type or to an instance
M method of an object. We are talking of Function Method Delegate Variable B
.onion is a special‐use top level domain suffix .onion is a special‐use top level domain suffix
designating an anonymous hidden service designating an anonymous hidden service reachable
E .Onion sites… Does it tigger something in your mind? What is it…. reachable via the Microsoft network. Fake sites via the Tor network. Vegetable selling sites C
It is a computer security mechanism set to detect, deflect, or, in some manner,
E counteract attempts at unauthorized use of information systems. honeypot goldpot datapot infopot A
Which one is Open Source Indian Operating Syste, which is a free and open
source Linux distribution developed by the National Resource Centre for
M Free/Open Source Software (NRCFOSS) of India? UBUNTU EDUBUNTU BOSS LOUD C
You are developing a database that will contain price informa on.
You need to store the prices that include a fixed precision and a scale of six digits.
M Which data type should you use? Float Text Numeric Money C
Hackers often gain entry to a network be pretending to be at a legitimate
E computer. ID theft terrorism IP spoofing forging C
When an input electrical signal A=10100 is applied to a NOT gate, its output
E signal is 01011 10001 10101 00101 A
M 8421 codes is also called as. Gray code ASCII code Excess 3‐code BCD code D
<pre> Dim A as boolean = true
Dim B as boolean = False
Dim i as integer = 0
if A= true then
if B = true then
i= 1
else
i=2
endif
else
i=3
endif </pre>
M What will be result of vairable I 3 2 1 0 B
E In a Digital circuit, what is 1 'AND' 1? 0 1 2 ‐1 B
M Which of the following data sets can be categorized as Big Data FIR data of a police Station Missing Person's Reports Social Networks Data None are Big Data C
H Which is the basic principle which works behind the technology Hadoop Map Aggregate Map Reduce Aggregate Sprawl None of the above B
with reference to encryption systems what is the keyword "Nonce" generally
M refers to Randomly generated characters predefine zero index array an empty array null reference A
What is the root cause of the Blue Screen error in Windows commonly knows as
E BSOD(Blue Screen of Death) Hardware Fault Software Stack Issues Memory Dump Program errors A
M In which language are the iOS Apps developed scala clojure Objective C C++ C
M Subtract ( 1010) base 2 from ( 1101 ) base 2 using 1st complement.. (1100) base 2 (0011) base 2 (1001) base 2 (0101) base 2 B
You are able to ping sytems of other colleagues but none of them are able to do
the same, however you are connected to the same network and are using same
services such as Printers, Proxy etc. What could be the reason behind them not
M being able to ping your host Port of ICMP service is blocked in the Firewall Firewall is Configured to disallow ICMP packets Firewall is ON None of the above B
Monitor Government Officials Social Networking Monitor Citizen's Social Networking
E What is the characteristic feature of IT ACT 2000 Section 69A Monitor User Traffic to certain Traffic Block Websites profiles profiles B
E Which social network does not have ‘followers’? Instagram Google+ Facebook Twitter B
In your organization you are able to use multiple services such as FTP,MAIL
SERVER,Document Repository, Archive, Bulletin boards etc. by logging in through
a single username and password, what is the technical name provided to this
M scenario Federated Login Delegated Authentication SSO LDAP Authentication C
DrSheep is a malware which can compromise the user's currently active Twitter,
H Facebook sessions etc. which platform it generally infects Windows Linux Android iOS C
If a host inside a Network wants to communicate to a public Server,then which of
H the following type of NAT is essentially required? SNAT DNAT DSNAT None of the above A
M Microprocessor was invented by Bill gates Charles Babbage Grahm bell Marcian E Huff D
What is called when the header information of an email is altered to make
M the message appear to come from a known or trusted source Email‐Spoofing Email‐Bombing Email‐Flaming All the above A
This term is often used to describe those who attempt to break into systems or
networks in order to help the owners of the system by making them aware of
security flaws, or to perform some other altruistic activity. Many such people are
employed by computer security companies; these professionals are sometimes
M called sneakers. Groups of these people are often called tiger teams. black hat hackers white hat hacker both of above none of above B
The target server will be overload by hundreds
or even thousands of requests in the case of The target server will be overload by hundreds or even
the DoS as opposed to just one attacker in the DoS is DOS based concept. No Server is used in thousands of requests in the case of the DDoS as
M Distinguish between DoS and DDoS. case of the DDoS. DoS opposed to just one attacker in the case of the DoS. No server is used in DDoS C
It connects all the nodes to a common straight cable. All the nodes on the
network share the common bus. This topology is very reliable since a failure of
one or more nodes does not affect the bus. The disadvantages of this topology
are the need for minimum distances between nodes to avoid signal interference,
M and the loss of data caused by the simultaneous transmission by two nodes Mesh Star Ring None of the above D
M Microsoft Edge ? It is a A new Microsoft Operating System A new Microsoft office suite A new Microsoft database None of the above D
It is a term that refers specifically to a collection of websites that are publicly
visible, but hide the IP addresses of the servers that run them. Thus they can be
visited by any web user, but it is very difficult to work out who is behind the
M sites. And you cannot find these sites using search engines. Dark Web Light Web Solid Web Net Web A
M In tunnel mode IPsec protects the entire IP packet IP header IP payload None A
Extensible authentication protocol is authentication framework frequently used
M in wired local area network wireless networks wired personal area network None B
M Codename of Windows 7 Operating System is Whistler Server Vienna and Blackcomb Neptune Longhorn Monad B
M SmartArt Graphics feature is available in Office 2003 Office 2007 Office 2000 All the above B