IMPORTANT Quiz For IA 2018 Part 2

Q1. The layer that is the closest to transmission medium.
(a) transport
(b) network
(c) data link
(d) physical
(e) None of these
Show Answer
S1. Ans. (d)
Sol. Physical layer is closest to transmission medium.
Q2. What is the function of the AutoCorrect feature across all MS Office applications?
(a) Replacing misspelled words with the correct ones while typing
(b) Replacing grammatically incorrect words with the correct ones
(c) Replacing repetitive words with the word ‘same’
(d) Replacing selected words with the word ‘auto’
(e) None of these
Show Answer
S2. Ans.(a)
Sol. The AutoCorrect feature is used to correct typo errors and miss-spelled words automatically according to the words given in the list for the AutoCorrect feature.
Q3. Which of the following is the fastest media of data transfer?
(a) Co-axial Cable
(b) Untwisted Wire
(c) Telephone Lines
(d) Fiber Optic
(e) None of these
Show Answer
S3. Ans. (d)
Sol. Fiber Optic is the fastest media of data transfer. An optical fiber (or optical fibre) is a flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair.
 
Q4. What does the LOOKUP function do?
(a) Looks up text that contain ‘UP’
(b) Used to look in a single row or column and find a value from the same position in a second row or column
(c) Finds irrelevant records
(d) All of above
(e) None of the above
Show Answer
S4. Ans.(b)
Sol.  LOOKUP function can be used when you need to look in a single row or column and find a value from the same position in a second row or column.
 
Q5. Which of the following describe router functions?
(a) Packet switching
(b) Packet filtering
(c) Internetwork communication
(d) Path selection
(e) All of the above
Show Answer
S5. Ans. (e)
Sol.  All of the given options are router functions.
 
Q6. How should you print a selected area of a worksheet, if you’ll want to print a different area next time?
(a) On the file menu, point to print area, and then click set print area.
(b) On the file menu, click print, and then click Print Selection under print settings
(c) On the view menu, click custom views, then click add
(d) All of the above
(e) None of the above
Show Answer
S6. Ans.(b)
Sol. User can select an area and then print the selected section by clicking on print selection in the print settings
Q7. What does MAN stands for?
(a) Micro area network
(b) Metropolitan area network
(c) Macro area network
(d) Mix area network
(e) None of these
Show Answer
S7. Ans. (b)
Sol. MAN is abbreviation for Metropolitan Area Network.
Q8. How long is an IPv6 address?
(a) 32 bits
(b) 128 bytes
(c) 64 bits
(d) 128 bits
(e) None of these
Show Answer
S8. Ans. (d)
Sol. IPv6 address is 128 bits long.
Q9. Which of the following gate is a complement of the X-OR gate?
(a) NOT gate
(b) NOR gate
(c) AND gate
(d) X-NOR gate
(e) None of these
Show Answer
S9. Ans.(d)
Sol. X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
Q10. By an intranet we mean:
(a) a LAN of an organization
(b) a Wide Area Network connecting all branches of an organization
(c) a corporate computer network
(d) a network connecting all computers of an organization and using the internet protocol
(e) None of these
Show Answer
S10. Ans. (d)
Sol. An intranet is a private network accessible only to an organization’s staff.
 
Q11. What is an E-mail?
(a) An Internet standard, which allow users to upload and download files
(b) An online area on which a user can converse in written form about any special subject
(c) Transmission of files and messages through computer network
(d) A real time typed conversion
(e) None of these
Show Answer
S11. Ans.(c)
Sol. Email is transmission of files and messages through computer network.
 
Q12. ___________ is a kind of cyber-attack that involves hackers taking control of a computer system and blocking access to it until a certain amount of money is paid.
(a) Network
(b) Worm
(c) Pirated Software
(d) Ransomware
(e) Encryption
Show Answer
S12. Ans.(d)
Sol. Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files unless a ransom is paid.  Wanna Decryptor, also known as WannaCry or wcry, is a specific ransomware program that locks all the data on a computer system and leaves the user with only two files: instructions on what to do next and the Wanna Decryptor program itself. When the software is opened it tells computer users that their files have been encryted, and gives instructions on how to buy it, and provides a Bitcoin address to send it to.
Q13. Of the 5 words listed below, which is the odd one out?  
(a) Applications
(b) Peripherals
(c) Programs
(d) Software
(e) Operating system
Show Answer
S13. Ans.(b)
Sol. Except for peripherals, all other options are examples of intangible instructions given to a computer to perform a specific type of task in on orderly manner.
Q14. A program embedded in a semiconductor chip during manufacture is called ____________ . 
(a) Humanware
(b) Firmware
(c) Liveware
(d) Hardware
(e) Extraware
Show Answer
S14. Ans.(b)
Sol. Firmware is a collection of permanent instructions and codes stored in a read-only memory. The firmware is usually placed by the manufactures of computers to store vital information about how computer hardware devices will communicate with each other and how programs will run on hardware devices.
Q15. Which of the following units is used to measure the speed of the processor?  
(a) Kilobytes (KB)
(b) Gigabytes (GB)
(c) Gigahertz (GHz)
(d) Kilobits (Kb)
(e) Megabytes (MB) 
Show Answer
S15. Ans.(c)
Sol. A processor speed is measured in Gigahertz (GHz).
Pin It

Leave a Reply

Your email address will not be published. Required fields are marked *