Q1. A ___________________________ handles an organization's day-to-day accounting needs; keeping a verifiable record of every transaction involving money, including purchases, sales, and payroll payments.
(a) Online transaction processing system (OLTP)
(b) Financial support system (FSS)
(c) Decision support system (DSS)
(d) Business processing system (BPS)
(e) None of these
Q2. What term is used to identify people coming together from various geographical locations to complete some task online?
(a) I-team
(b) Virtual team
(c) Online work group
(d) Distributed team
(e) None of these
Q3. What type of technology allows you to verbally speak with someone over the Internet?
(a) Wiki
(b) Social network
(c) E-phone
(d) VoIP
(e) None of these
Q4. What is it called when you are rerouted from your requested internet site to another, undesired site?
(a) Phishing
(b) Pharming
(c) Redirecting
(d) Hijacking
(e) None of these
Q5. What kind of server converts IP addresses to domain names?
(a) DNS
(b) MNS
(c) UTP
(d) RTP
(e) None of these
Q6. What is an e-mail attachment?
(a) A receipt sent by the recipient
(b) A separate document from another program sent along with an e-mail message
(c) A malicious parasite that feeds off of you messages and destroys the contents
(d) A list of CC and BCC recipients
(e) None of these
Q7. What is the slowest transmission medium?
(a) Twisted pair wire
(b) Coaxial cable
(c) Fiber optic cable
(d) Wireless
(e) None of these
Q8. Which of the following is Open Source Software?
(a) Windows
(b) Linux
(c) IOS
(d) Adobe Photoshop
(e) None of these
Q9. Verizon Communications on July 2016, announced plans to acquire Yahoo for $4.8 billion in cash.Yahoo (www.yahoo.com) is a _________.
(a) Website for Consumers
(b) Portal
(c) Organization that allocates web addresses
(d) Super Computer
(e) None of these
Q10.Primary key is a ______?
(a) Common key
(b) Unique key
(c) Input key
(d) Output key
(e) None of these
Q11.What is GIS stands for?
(a) Geological Information System
(b) Genetics Information Systems
(c) Geographic Information Systems
(d) Gene Information systems
(e) None of these
Q12.Who among the following has coined The term ‘Multimedia‘ ?
(a) Bob Goldstein
(b) Tay Vaughan
(c) NASA
(d) Mc Graw Hills
(e) None of these
Q13.What is the full form of SIM?
(a) Station Identity Module
(b) System Identity Module
(c) Subscriber Identity Module
(d) Subscriber Trunk Dialling
(e) None of these
Q14.What is the meaning of OSI, in terms of computers?
(a) Open Software Interrelation
(b) Open System Interrelation
(c) Open System Interconnection
(d) Open Software Interconnection
(e) None of these
Q15.Verification of a Login name and password is known as________.
(a) Configuration
(b) Accessibility
(c) Authentication
(d) Logging in
(e) None of these
Solutions
S1. Ans.(a)
Sol.OLTP systems are used for order entry, financial transactions, customer relationship management (CRM) and retail sales.OLTP is characterized by a large number of short on-line transactions (INSERT, UPDATE, DELETE).
S2. Ans.(b)
Sol.Virtual teams are a great way to enable teamwork in situations where people are not sitting in the same physical office at the same time.Such teams are used more and more by companies and other organizations to cut travel, relocation, real estate, and other business costs.
S3. Ans.(d)
Sol.VOIP is an acronym for Voice Over Internet Protocol, or in more common terms phone service over the Internet.
If you have a reasonable quality Internet connection you can get phone service delivered through your Internet connection instead of from your local phone company.
S4. Ans.(b)
Sol.Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent.
S5. Ans.(a)
Sol.The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities.
S6. Ans.(b)
Sol.An attachment can be a picture, a word document, a movie, a sound file, an excel document, or any other file that requires another program to open it. Gmail imposes a limit of 25MB per file, which is on the generous side.
S7. Ans.(a)
Sol.Twisted pair wire is the most widely used but slowest medium for telecommunication. It consists of copper wires that are twisted into pairs. The transmission speed ranges from 2 million bits per second to 10 billion bits per second.
S8. Ans.(b)
Sol.Linux is can be used for various purposes i.e Web Serving(Nearly 60% of all websites on the Internet are run using an Open Source program named "Apache."), Networking, Databases, Scientific computing.
S9. Ans.(b)
Sol.A Web portal is most often a specially designed website that brings information together from diverse sources in a uniform way.
S10. Ans.(b)
Sol.The UNIQUE constraint uniquely identifies each record in a database table. The UNIQUE and PRIMARY KEY constraints both provide a guarantee for uniqueness for a column or set of columns.
S11. Ans.(c)
Sol.A geographic information system (GIS) is a computer system for capturing, storing, checking, and displaying data related to positions on Earth's surface.
S12. Ans.(a)
Sol.Multimedia is content that uses a combination of different content forms such as text, audio, images, animations, video and interactive content.
S13. Ans.(c)
Sol.The first SIM card was developed in 1991 by Munich smart card maker Giesecke & Devrient, who sold the first 300 SIM cards to the Finnish wireless network operator Radiolinja.A subscriber identity module is a removable smart card for mobile phones. SIM cards store the required information to identify the mobile device.
S14. Ans.(c)
Sol.OSI (Open Systems Interconnection) is a reference model for how applications can communicate over a network.
S15. Ans.(c)
Sol.Authentication is a process in which the credentials provided are compared to those on file in a database of authorized users' information on a local operating system or within an authentication server. If the credentials match, the process is completed and the user is granted authorization for access.

No comments:
Post a Comment