Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

www.gradeup.

co

1
www.gradeup.co

1.Each Excel file is called a workbook 7.Which of the following is used with
because of ____. databases?
A. It can contain text and data A. Data mining
B. It can be modified B. EDI
C. It can contain many sheets including C. Credit cards
worksheets and chart sheets D. All of the above
D. You have to work hard to create it E. None of the these
E. None of these
8.The type of computers used by large
2.Which protocol provides e-mail facility organizations for critical
among different hosts? applications where a large number of
A. FTP transactions need to be processed are
B. SMTP called
C. TELNET A. Mainframe computer
D. SNMP B. Mini-computer
E. None of these C. Microcomputer
D. PDA
3.When data changes in multiple lists and E. None of these
all lists are not updated, this causes
_____. 9.Which of the following is used by the
A. data redundancy browser to connect to the location of the
B. information overload Internet resources?
C. duplicate data A. DOC
D. data inconsistency B. XML
E. None of these C. HTML
D. URL
4.Which of the following search engines E. None of these
continuously sends out that starts on a
homepage of a server and pursue all links 10._______is the process of dividing the
stepwise ? disk into tracks and sectors.
A. Spiders A. Tracking
B. Packets B. Formatting
C. Cookies C. Crashing
D. asPaddle D. Allotting
E. None of these E. None of these

5.What kind of Protocol is used to provide 11.The physical arrangement of elements


Internet access from mobile? on a page is referred to as a document’s
A. TCP/IP _____.
B. ISD A. features
C. WAP B. format
D. HTTP C. pagination
E. None of these D. grid
E. None of these
6.One or more defects or problems that
prevent the software from working as 12.What is a person called who uses a
intended or working at all is a(n)____. computer to cause harm to people or
A. Bug destroy critical systems?
B. Boot A. Cyberterrorist
C. Programming language B. Black-hat hacker
D. Fuzzy logic C. Cyber Cracker
E. None of these D. Hacktivist
E. None of these

2
www.gradeup.co

B. Maximize duplication of data to ensure


13.The secret code that restricts entry to reliability in
some programs______. C. Make it of uniform size
A. password D. Allow addition of data
B. passport E. None of these
C. entry-code
D. access-code 18.A network geometric arrangement in
E. None of these which a single connecting line is shared
14.A connection from one HTML by a number of nodes is called_____.
document to another HTML document is A. Car Topology
called____. B. Bus Topology
A. Hyper Link C. Truck Topology
B. Connecting Link D. All of the above
C. Icon E. None of these
D. All of these
E. None of these 19.By viewing the properties of the local
hard disk of a computer, the user can find
15.________is the science and art of out____.
transforming messages to make them A. The amount of space that has been
secure and immune to attacks. used up and the remaining free space on
A. Cryptography the disk.
B. Cryptoanalysis B. The name of the user viewing the
C. Cryptology properties of the disk.
D. cryptoanarchy C. Nothing useful to the user.
E. Cryptoanalytics D. The number of programs available in
the computer.
16.The ____ component is used by the E. None of these
data analyst to create the queries that
access the database. 20.Inventor of C++ is ______.
A. Data extraction A. Martin Cooper
B. End-user query tool B. Vint Cerf
C. End-user presentation tool C. Charles Babbage
D. Data store D. Bjarne Stroustrup
E. None of these E. None of these

17.Normalization is a process of
restructuring a relation to______.
A. Minimize duplication of data in a
database

3
www.gradeup.co

###ANSWERS###
1. Ans. C. data set and transform it into an
Each Excel file is called a workbook understandable structure for further use.
because it can contain many sheets 8. Ans. A.
including worksheets and chart sheets. Mainframe computers are computers
2. Ans. B. used primarily by large
Simple Mail Transfer Protocol (SMTP) organizations for critical applications,
is an Internet standard for electronic bulk data processing such as census,
mail (email) transmission. First defined industry and consumer statistics,
by RFC 821 in 1982, it was last updated enterprise resource planning and
in 2008 with the Extended SMTP transaction processing, etc.
additions by RFC 5321—which is the 9. Ans. D.
protocol in widespread use today. SMTP URL is an acronym for Uniform
by default uses TCP port 25. Resource Locator and is a reference to
3. Ans. D. a resource on the Internet.
• Data inconsistency is a A URL has two
condition that occurs between files main components: Protocol identifier:
when similar data is kept in For the URL https://gradeup.co, the
different formats in two different protocol identifier is http. Resource
files, or when matching of data name: For the URL https://gradeup.co,
must be done between files. the resource name is gradeup.co
• As a result of the data 10. Ans. B.
inconsistency, these files duplicate • Disk formatting is the process of
some data such as addresses and preparing a data storage device
names, compromising data such as a hard disk drive, solid-
integrity. state drive, floppy disk or USB
4. Ans. A. flash drive for initial use.
A programme that automatically fetches • In some cases, the formatting
Web pages. Spiders are used to feed operation may also create one or
pages to search engines. It’s called a more new file systems.
spider because it crawls over the Web 11. Ans. B.
another term for these programmes is The physical arrangement of elements on
Web Crawler. a page is referred to as a
5. Ans. C. document’s format .
WAP(Wireless Application Protocol) is Note:- A document file format is a text or
a technical standard for accessing binary file format for storing documents
information over a mobile wireless on a storage media, especially for use by
network. computers.
6. Ans. A. 12. Ans. A.
A software bug is an error, flaw, failure Cyberterrorism is the act of Internet
or fault in a computer program or system terrorism in terrorist activities, including
that causes it to produce an incorrect or acts of deliberate, large-scale disruption
unexpected result, or to behave in of computer networks, especially of
unintended ways. personal computers attached to the
7. Ans. A. Internet, by the means of tools such as
Data mining is the computational process computer viruses.
of discovering patterns in large data sets 13. Ans. A.
involving methods at the intersection of A password is the secret code that
artificial intelligence, machine learning, restricts entry to some programs. It is a
statistics, and database systems. without spaced sequence of characters
Note: The overall goal of the data mining used to determine that a computer
process is to extract information from a user requesting access to a computer
system is really that particular user.

4
www.gradeup.co

14. Ans. A.
In computing, a hyperlink is a reference
to data that the reader can directly
follow either by clicking or by hovering.
Note:- A hyperlink points to a whole
document or to a specific element within
a document. Hypertext is text with
hyperlinks.
15. Ans. A.
Cryptographyis the science of providing
security for information. It has been used
historically as a means of providing
secure communication between
individuals, government agencies
and military forces. Today,
cryptography is a cornerstone of the
modern security technologies used to
protect information and resources on
both open and closed networks.
16. Ans. B.
End user query tool performs data
retrievals data analysis and data mining
tasks using the data in the data store and
business data analysis models. This
component is used by the data analyst to
create the queries that access the
database.
17. Ans. A.
Normalization is the process of
restructuring the logical data model of a
database to eliminate redundancy,
organize data efficiently and reduce
repeating data and to reduce the
potential for anomalies during data
operations.
18. Ans. B.
Bus Topology is the simplest
of network topologies. All the nodes
are connected to the single cable by the
help of interface connectors.
This central cable is the backbone
of the network and is known as Bus.
19. Ans. A.
By viewing the properties of the local hard
disk of a computer, the user can find out
both the used amount of space and the
remaining free space on the disk.
20. Ans. D.
Danish computer scientist Bjarne
Stroustrup invented and developed
widely used C++ programming
language.

5
www.gradeup.co

You might also like