Basic Computer Science
Basic Computer Science
Answer: d
Explanation: The word COMPUTER is an abbreviation for the terms “Commonly Operated
Machines Used in Technical and Educational Research”.
Answer: a
Explanation: A bit is defined as the smallest unit of data in a computer system. It is used as a
short form of Binary Digit. A bit can have only two values 0 or 1. A nibble comprises 4 bits, a
byte is a collection of 8 bits whereas KB (Kilobyte) is equal to 1024 bytes.
10. Which of the following unit is responsible for converting the data received from the user
into a computer understandable format?
a) Output Unit
b) Input Unit
c) Memory Unit
d) Arithmetic & Logic Unit
View Answer
Answer: b
Explanation: The Input Unit converts the data, which the user enters into a language that the
computer understands, i.e. it converts the data into binary format. The Output Unit is
responsible for giving the results in a user-understandable format. The Storage Unit is
responsible for storing the data after immediate results of processing whereas; the ALU is
responsible for various arithmetic and bitwise operations.
12. Which of the following is not a type of computer code?
a) EDIC
b) ASCII
c) BCD
d) EBCDIC
View Answer
Answer: a
Explanation: There is no coding scheme like EDIC. EBCDIC stands for Extended Binary Coded
Decimal Interchange Code. BCD stands for Binary Coded Decimal. ASCII stands for American
Standard Code for information interchange.
13. Which of the following part of a processor contains the hardware necessary to perform all
the operations required by a computer?
a) Controller
b) Registers
c) Cache
d) Data path
View Answer
Answer: d
Explanation: A processor is a part of the computer which does all the data manipulation and
decision making. A processor comprises of:
A data path that contains the hardware necessary to perform all the operations. A controller
tells the data path what needs to be done.
The registers act as intermediate storage for the data.
15. Which of the following device use positional notation to represent a decimal number?
a) Pascaline
b) Abacus
c) Computer
d) Calculator
View Answer
Answer: b
Explanation: Abacus was used to do arithmetic calculations around 2500 years ago. Pascaline
was the pascal’s calculator by Blaise Pascal invented for doing laborious calculations.
Answer: b
18. Which of the following defines the assigned ordering among the characters used by the
computer?
a) Accumulation
b) Sorting
c) Collating Sequence
d) Unicode
View Answer
Answer: c
19. Which of the following storage is a system where a robotic arm will connect or disconnect
off-line mass storage media according to the computer operating system demands?
a) Magnetic
b) Secondary
c) Virtual
d) Tertiary
View Answer
Answer: d
Explanation: Tertiary storage is the correct option. It is used in the realms of enterprise storage
and scientific computing on large computer systems and business computer networks and is
something a typical personal computer never sees firsthand.
20. Which of the following is known as the interval between the instant a computer makes a
request for the transfer of data from a disk system to the primary storage and the instance the
operation is completed?
a) Disk utilization time
b) Drive utilization time
c) Disk access time
d) Disk arrival time
View Answer
Answer: d
Explanation: The interval is referred to as the disk arrival time. It depends on several
parameters. Generally, a computer makes a request and the operation is served.
21. Which of the following devices provides the communication between a computer and the
outer world?
a) Compact
b) I/O
c) Drivers
d) Storage
View Answer
Answer: b
22. Which of the following are the input devices that enable direct data entry into a computer
system from source documents?
a) System Access devices
b) Data acquiring devices
c) Data retrieving devices
d) Data Scanning devices
View Answer
Answer: d
Explanation: They are referred to as data scanning devices. They eliminate the need to key in
text data into the computer. It demands the high quality of input documents.
23. Which of the following is the device used for converting maps, pictures, and drawings into
digital form for storage in computers?
a) Image Scanner
b) Digitizer
c) MICR
d) Scanner
View Answer
Answer: b
A digitizer is a device used to convert analog information (like maps, drawings, and pictures)
into digital format so it can be stored and processed by a computer.
Answer: a
Explanation: Any computer that has access to the webserver is called the web client. A web
server is any computer that uses the HTTP protocol.
26. Which of the following package allows individuals to use personal computers for storing and
retrieving their personal information?
a) Personal assistance package
b) Graphics package
c) Spreadsheet package
d) Animation package
View Answer
Answer: a
27. Which of the following is created when a user opens an account in the computer system?
a) SFD
b) MFD
c) Subdirectory
d) RFD
View Answer
Answer: c
Explanation of Options:
a) SFD (System File Directory) – This is not commonly associated with user account
creation; it's more related to system-level file structures.
b) MFD (Master File Directory) – This is the top-level directory in some older operating
systems that holds information about all files and directories, not directly related to user
account creation.
d) RFD (Relative File Descriptor) – This is not a directory but rather refers to descriptors
for files, mainly used internally by systems.
28. Which of the following is a technique that marked the beginning of computer
communications?
a) User Environment
b) Batch Environment
c) Time Sharing
d) Message passing
View Answer
Answer: c
Explanation: The answer is time-sharing. In time-sharing, Users were able to interact with the
computer and could share its information processing resources.
29. Which of the following is a type of technique in which dumb terminals are connected to a
central computer system?
a) Time Sharing
b) Message passing
c) Batch environment
d) User environment
View Answer
Answer: a
Time Sharing is a technique where multiple users share a single central computer system
simultaneously.
Each user interacts through a dumb terminal (a terminal with no processing power; only
input/output capability).
The central system uses time slices to serve each user in a round-robin manner, making it
seem like they have their own dedicated machine.
30. Which of the following service allows a user to log in to another computer somewhere on
the Internet?
a) e-mail
b) UseNet
c) Telnet
d) FTP
View Answer
Answer: c
31. Which of the following is not a type of computer on the basis of operation?
a) Digital
b) Analog
c) Hybrid
d) Remote
View Answer
Answer: d
Explanation: There are three types of computers basically on the basis of operation:
Analog, Digital, and Hybrid.
32. Which of the following type of computer is mostly used for automatic operations?
a) analog
b) digital
c) hybrid
d) remote
View Answer
Answer: c
Explanation of Options:
a) Analog – Analog computers process data in a continuous form and are mainly used for
scientific and engineering applications like measuring and simulation, not primarily for
automatic operations.
b) Digital – Digital computers process discrete data (0s and 1s) and are widely used in
general computing tasks, but they are not specifically known for automatic operations
alone.
c) Hybrid – Hybrid computers combine the features of both analog and digital
computers. They are widely used in automatic operations such as industrial process
control, scientific simulations, and medical applications (e.g., ICU monitoring systems).
d) Remote – This is not a type of computer but refers to computing done from a
distance.
Answer: d
Explanation: SNARC was the first neural network computer. it was built by Minsky and Edmonds
in 1956.
6. The input machine which originated in the United States around 1880s is a ___________
a) Mouse
b) Joystick
c) Keyboard
d) Bar Code Reader
View Answer
Answer: c
Explanation:
The keyboard as an input device originated from the typewriter, which was invented in
the 1860s–1880s in the United States. Early computer keyboards were based on
typewriter designs, which is why QWERTY layouts are still common.
b) Joystick – First used in aircraft control systems around 1900s, not in 1880s.
8. 1 yottabyte = ______________
a) 1024 TB
b) 1024 EB
c) 1024 ZB
d) 1024 PB
View Answer
Answer: c
Explanation: 1 yottabyte is equal to 1024 ZB, which stands for zettabyte. Further, 1 ZB=1024 EB
(exabyte) and and 1 EB=1024PB (petabyte).
Answer: d
Explanation:
SVGA stands for Super Video Graphics Array, which is an extension of the older VGA
(Video Graphics Array) standard.
It was introduced to provide higher resolution (such as 800×600 pixels and above) and
more color depth compared to VGA.
5. The devices that used to give single or multiple colored images and drawings are
____________
a) Monitors
b) Printers
c) Plotters
d) VDUs
View Answer
Answer: c
Explanation: Plotters are the devices which are used to give colored images. They use ink pens
or ink jets for drawing. Pens of different colors and shades are used for shading and styling.
6. A special request originated from some device to the CPU to acquire some of its time is called
___________
a) Disturbance
b) Attenuation
c) Interrupt
d) Noise
View Answer
Answer: c
Answer: c
3. Which of these printers is suitable for printing multi-copy forms (e.g., bills)?
a) Inkjet printer
b) Dot Matrix printer
c) Laser printer
d) Thermal printer
a) Inkjet printer
b) Drum printer
c) Laser printer
d) Thermal printer
Answer: c
Answer: d
6. The ALU gives the output of the operations and the output is stored in the ________
a) Memory Devices
b) Registers
c) Flags
d) Output Unit
View Answer
Answer: b
Explanation:
The Arithmetic Logic Unit (ALU) performs arithmetic and logical operations in the CPU.
After performing the operation, the result is temporarily stored in registers (high-speed
storage areas inside the CPU) before it is moved to memory or sent to an output device.
Answer: b
Answer: c
9. Which flag indicates the number of 1 bit that results from an operation?
a) Zero
b) Parity
c) Auxiliary
d) Carry
View Answer
Answer: b
Answer: c
1. Components that provide internal storage to the CPU are ______
a) Registers
b) Program Counters
c) Controllers
d) Internal chips
View Answer
Answer: a
b) Program Counters – A specific type of register that only stores the address of the next
instruction to be executed; it is not a general internal storage component.
c) Controllers – These control the flow of data and instructions, but they don’t store data.
Function: Stores the address of the memory location from which data needs to be
fetched or to which data needs to be written.
Role: Works closely with the memory unit during read/write operations.
5. Accumulator (AC)
Function: Stores intermediate results of arithmetic and logic operations performed by
the ALU.
Function: Contains flags that indicate the current status of the CPU or results of
operations (e.g., zero flag, carry flag, overflow flag).
Function: Used by the CPU to temporarily store data or intermediate values during
execution.
Role: Used in function calls, interrupts, and temporary storage of return addresses or
data.
Function: Used for address calculations and memory addressing in advanced CPU
architectures.
2. Saving data and instructions to make them readily available is the job of __________
a) Storage Unit
b) Cache Unit
c) Input Unit
d) Output Unit
View Answer
Answer: a
Explanation: The storage unit is responsible for storing the data. It makes the instructions
readily available for additional or initial processing whenever required. The cache is a software
component that stores data to serve the data requests in future. It can contain the result of
some earlier computations.
Answer: b
Answer: a
Answer: b
Explanation: A CD (compact disk) stores digitized audio information whereas DVD is used more
for video than audio. Once data is written on the CD-ROM, it cannot be erased. It is Read-Only
and can be read many times.
0. The first practical form of Random Access Memory was the __________
a) SSEM
b) Cathode Ray Tube
c) William’s Tube
d) Thomas’s Tube
View Answer
Answer: c
a) SSEM (Small-Scale Experimental Machine) – This was the first stored-program computer, but
not a type of memory. It used the Williams Tube for its memory.
b) Cathode Ray Tube – A CRT is the technology on which the Williams Tube was based, but by
itself, it is not RAM.
1. Which of the following was the first commercially used magnetic storage device?
a) Magnetic tape
b) Magnetic drum
c) Floppy disk
d) Hard disk
a) Tom Kilburn
b) Alan Turing
c) John von Neumann
d) Frederick Williams
a) Williams Tube
b) ROM
c) Magnetic core memory
d) Dynamic RAM
5. What was the storage capacity of the first floppy disk introduced by IBM in 1971?
a) 80 KB
b) 160 KB
c) 360 KB
d) 1.2 MB
Answer: a) 80 KB
4. In the instruction ADD A, B, the answer gets stored in ___________
a) B
b) A
c) Buffer
d) C
View Answer
Answer: b
Explanation: In any instruction of the form ADD A, B; the answer gets stored in the A register.
The format is: ADD Destination, Source.
Answer: b
Explanation: The Program counter contains the address of the next instruction which is to be
fetched by the control unit.
Answer: d
Explanation: The IR which stands for the instruction register contains the last instruction
fetched.
All the others options are registers which are used for the fetch operation.
8. Causing the CPU to step through a series of micro operations is called _________
a) Execution
b) Runtime
c) Sequencing
d) Pipelining
View Answer
Answer: c
Explanation:
Sequencing refers to the process of directing the CPU to execute a series of micro-
operations in the correct order during the execution cycle.
It is managed by the control unit, which ensures that instructions are carried out step by
step (fetch, decode, execute).
Answer: c
Explanation: In the hardwired control unit, the delay element method uses D-flip flop which
causes a delay. Since, in the delay element method, there must be a finite time gap between the
2 steps.
a) D flip-flop
b) JK flip-flop
c) SR flip-flop
d) T flip-flop
Answer: a) D flip-flop
Explanation: D flip-flops are widely used in shift registers because they pass the input D directly
to output Q at the clock edge, making data shifting easier.
1. Computer has a built-in system clock that emits millions of regularly spaced electric pulses
per _____ called clock cycles.
a) second
b) millisecond
c) microsecond
d) minute
View Answer
Answer: a
Answer: a
Explanation: Normally, several clock cycles are required to fetch, execute and decode a
particular program.
Installation of a device is done by the system on its own.
Answer: b
Explanation: The RISC which stands for Reduced Instruction set computer has a fixed length of
instructions. It has a small instruction set. Also has reduced references to memory to retrieve
operands.
Explanation:
RISC (Reduced Instruction Set Computer) processors have fixed-length instructions
(typically 32 bits). This simplifies instruction decoding and improves performance
because each instruction is executed in a single clock cycle (or very few cycles).
CISC (Complex Instruction Set Computer) processors, on the other hand, have variable-
length instructions, making them more complex to decode.
8. The architecture that uses a tighter coupling between the compiler and the processor is
____________
a) EPIC
b) Multi-core
c) RISC
d) CISC
View Answer
Answer: a
Explanation: EPIC stands for Explicitly parallel instruction computing. It has a tighter coupling
between the compiler and the processor. It enables the compiler to extract maximum
parallelism in the original code.
1. CPU has built-in ability to execute a particular set of machine instructions, called as
__________
a) Instruction Set
b) Registers
c) Sequence Set
d) User instructions
View Answer
Answer: a
Explanation: An instruction is any task which is to be performed by the processor. Instructions
are stored in the register. Instruction set is the set of machine instructions.
Answer: a
Explanation: Every instruction has an opcode. Additionally, it may have one or more operands
and the op code indicates the operation to be performed.
3. The length of a register is called _______
a) word limit
b) word size
c) register limit
d) register size
View Answer
Answer: b
Answer: b
Explanation: The MBR holds the contents of the accessed (read/written) memory word.
MBR stands for Memory Buffer Register.
Answer: d
Explanation: MAR or the memory address register is not a visible register. This register is user
inaccessible. It contains the address of the memory block to be read or written to.
Answer: a
Explanation: The instruction STA 16-bit address is a data transfer instruction.
STA means Store in Accumulator.
. What is correct instruction if you want the control to go to the location 2000h?
a) MOV 2000h
b) MOV A, 2000h
c) JMP 2000h
d) RET 2000h
View Answer
Answer: c
Explanation: The JMP instruction is used to move to a particular location. In 8085
microprocessor, JMP statement tells the processor to go to location 2000h (here).
Answer: a
5. Size of the ________ memory mainly depends on the size of the address bus.
a) Main
b) Virtual
c) Secondary
d) Cache
View Answer
Answer: a
Answer: a
Explanation: The secondary memory is independent of the address bus. It increases the storage
space. It is implemented in the form of magnetic storage devices.
Answer: c
Answer: c
5. Name the device that converts text information into spoken sentences.
a) Speech Sensors
b) Compact convertors
c) Speech Synthesizers
d) Voice systems
View Answer
Answer: c
speech synthesizer is a device or software that converts text information into spoken
sentences using text-to-speech (TTS) technology.
It is commonly used in assistive technologies, navigation systems, and virtual assistants (e.g.,
Siri, Alexa).
8. The process in which a file is partitioned into smaller parts and different parts are stored in
different disks is called _________
a) RAID
b) Mirroring
c) Stripping
d) RAID classification
View Answer
Answer: c
Explanation:
The correct term is actually "Striping" (not "Stripping"), which is a process where a file
or data is split into smaller blocks (stripes), and these blocks are distributed across
multiple disks in a storage array.
9. Which of the following Printers have a speed in the range of 40-300 characters per second?
a) Inkjet
b) Laser
c) Dot matrix
d) Drum
View Answer
Answer: a
Answer: b
Answer: c
Explanation: There is no blocked state in a process model. The different states are ready,
running, executing, waiting and terminated.
Answer: a
Explanation:
Answer: a
Explanation: A middleware acts as a glue between client and server parts of application. It
provides programming abstraction which means hiding all the relevant details.
Answer: a
7. A software that lies between the OS and the applications running on it.
a) Firmware
b) Middleware
c) Utility Software
d) Application Software
View Answer
Answer: b
8. A type of middleware that allows for between the built-in applications and the real-time OS?
a) Firmware
b) Database middleware
c) Portals
d) Embedded Middleware
View Answer
Answer: d
Answer: c
10. The _______ calls certain procedures on remote systems and is used to perform
synchronous or asynchronous interactions between systems.
a) Procedure
b) RPC (Remote Procedure Call)
c) Message Oriented
d) DB
View Answer
Answer: b
Explanation: It is called the RPC or the Remote Procedure Call.
1. The word ____________comes from the name of a Persian mathematician Abu Ja’far
Mohammed ibn-i Musa al Khowarizmi.
a) Flowchart
b) Flow
c) Algorithm
d) Syntax
View Answer
Answer: c
3. This characteristic often draws the line between what is feasible and what is impossible.
a) Performance
b) System Evaluation
c) Modularity
d) Reliability
View Answer
Answer: a
4. The time that depends on the input: an already sorted sequence that is easier to sort.
a) Process
b) Evaluation
c) Running
d) Input
View Answer
Answer: c
Explanation:
Running time (or execution time) of an algorithm depends on the input provided.
For example, if a sorting algorithm like Insertion Sort receives an already sorted
sequence, its running time will be significantly reduced (O(n) instead of O(n²)) because
fewer operations are needed.
8. A system wherein items are added from one and removed from the other end.
a) Stack
b) Queue
c) Linked List
d) Array
View Answer
Answer: b
Explanation: In a queue, the items are inserted from the rear end and deleted from the front
end.
Explanation:
A Queue is a linear data structure where insertion (enqueue) happens at one end (rear)
and deletion (dequeue) happens at the other end (front).
It follows the FIFO (First In, First Out) principle — the first element added is the first one
removed.
Explanation: Linear arrays are the 1-Dimensional arrays wherein only one row is present and the
items are inserted.
Answer: a
Answer: c
Explanation: Signing on is a part of special system design considerations. It does not involve a
step of execution. It involves identification, verification and authorization.
Answer: b
Explanation: Black box testing is conducted at the software interface. White box testing is
predicted on close examination of procedural details.
7. A software metric that provides a quantitative measure of the logical complexity of a
program.
a) Cyclomatic complexity
b) Index matrix
c) Quantitative complexity
d) System complexity
View Answer
Answer: a
Answer: a
Explanation: The option V(G) = E – N + 2 denotes the correct expression. Here, E is the number
of flow graph edges. N is the number of flow graph nodes.
8. A technique that allows more than one program to be ready for execution and provides the
ability to switch from one process to another.
a) multitasking
b) multiprocessing
c) multitasking
d) multiprogramming
View Answer
Answer: d
Explanation: Multiprogramming is the concept implemented for execution and provides the
ability to switch from one task to the other.
Answer: c
Explanation: A thread is a sequential flow of control within a program. Single-threaded program
can handle one task at any time.
4. Both client and server release _________ connection after a page has been transferred.
a) IP
b) TCP
c) Hyperlink
d) Network
View Answer
Answer: b
Answer: a
Answer: a
Answer: b
Explanation: A thread becomes Not Runnable when one of these events occurs:
• Its sleep method is invoked.
• The thread calls the wait method to wait for a specific condition to be satisfied.
• The thread is blocking on I/O.
A thread in Java has different states:
10. A method used to force one thread to wait for another thread to finish.
a) join()
b) connect()
c) combine()
d) concat()
View Answer
Answer: a
5. In text documents, a structure which stays the same no matter how the
document is represented.
a) Logical
b) Smart
c) Nano
d) Physical
View Answer
Answer: a
Explanation: There are two basic structures- logical and physical. A logical
structure stays the same no matter how the document is represented.
9. The placement of information within a cell at the left edge, right edge, or
centered is :
a) Indentation
b) Placement
c) Identification
d) Alignment
View Answer
Answer: d
Explanation: The correct option is Alignment. The left, right and center
positioning is defined by the alignment.
10. Object=_________+relationships.
a) data
b) attributes
c) entity
d) constraints
View Answer
Answer: c
5. The ______level helps application programs hide the details of data types.
a) physical
b) logical
c) user
d) view
View Answer
Answer: d
Explanation: The application programs hide details of datatypes. Views can also
hide information for security purposes.
Answer: d
Explanation: It is referred to as phase modulation. When there is a change in
amplitude, it is referred to as amplitude modulation.
Answer: b
Explanation:
Each signal gets a specific time interval for transmission, and these
intervals repeat cyclically.
7. An example of FDM:
a) broadcast radio
b) telephone
c) machines
d) semi-duplex
View Answer
Answer: a
Answer: d
Explanation: Multiplexing is a modulation technique that improves channel
bandwidth utilization.
Answer: b
Answer: c
4. A term that refers to the way in which the nodes of a network are linked
together.
a) network
b) topology
c) connection
d) interconnectivity
View Answer
Answer: b
Answer: c
Answer: b
Explanation: A peer-to-peer WAN topology is a relatively simple way of
interconnecting a small number of sites. It has the least-cost solution for WANs
that contain a small number of internetworked locations.
Answer: c
Explanation: The correct option is Daisy chain. This simple approach uses ports
on existing hubs for interconnecting the hubs.
10. A piece of information which is sent along with the data to the source
computer.
a) data
b) module
c) token
d) element
View Answer
Answer: c
Answer: b
Explanation: Distributed configuration has many systems connected, and
messages, programs, etc are transmitted between cooperating computer
systems.
Answer: b
They operate at all layers of the OSI model, performing protocol conversion if
needed.
Switches → Connect devices within the same network (LAN), using the same
protocol.
Routers → Connect different networks, but they must use the same
protocol (e.g., IP).
Bridges → Connect two LAN segments using the same protocol (e.g.,
Ethernet to Ethernet).
Answer: b
Explanation: A two-tiered topology is a modified version of the basic star
topology. Rather than single concentrator routers, two or more routers are used.
Gateways → Can operate at all layers, used for protocol conversion, not
specifically a Layer 3 device.
Answer: a
Answer: a
5. In HTML, the tags that tell the browser how to display the page.
a) markup
b) style
c) body
d) head
View Answer
Answer: a
Answer: c
Explanation: The head segment contains a generic info about the document.
The head section must come before the body section in an HTML document.
Answer: b
Answer: c
10. The _________ attribute specifies the web page to be placed in the frame
initially.
a) name
b) src
c) cols
d) rows
View Answer
Answer: b
Answer: b
Answer: b
Answer: d
5. IN stands for?
a) Input
b) InterNet
c) Intelligent Network
d) IntraNet
View Answer
Answer: c
Answer: a
Explanation: PDU stands for Protocol Data Unit. It is transmitted as a single unit
to other units in a computer network.
Answer: c
Answer: c
Answer: b
Explanation: Execution of several activities at the same time is referred to as
parallel processing. Like, Two multiplications at the same time on 2 different
processes.
Multiprogramming:
Multiple programs are kept in memory and the CPU switches between them
when one is waiting for I/O, maximizing CPU usage.
Keep the CPU busy by running another program when the first one is waiting
for I/O.
✅ Multitasking:
A single CPU quickly switches between tasks, giving the user an illusion of
simultaneous execution for better responsiveness.
✅ Multiprocessing:
Two or more CPUs (or cores) execute multiple tasks truly in parallel at the same
time for high performance.
Answer: d
Explanation: Concurrency is the term used for the same. When several things are accessed
simultaneously, the job is said to be concurrent.
Answer: b
Answer: a
8. The measure of the “effort” needed to maintain efficiency while adding processors.
a) Maintainablity
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer
Answer: c
9. The rate at which the problem size need to be increased to maintain efficiency.
a) Isoeffciency
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer
Answer: a
Answer: d
Explanation: The RMI (Remote Method Invocation) is an API that provides a mechanism to
create distributed applications
3. A typical _________ program creates some remote objects, makes references to these
objects accessible, and waits for clients to invoke methods on these objects.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer
Answer: a
5. The ___________ layer, which provides the interface that client and server application
objects use to interact with each other.
a) Increasing
b) Count
c) Bit
d) Stub/skeleton
View Answer
Answer: d
Answer: d
Answer: a
Answer: c
7. CHAP stands for?
a) Challenge Handshake authentication protocol
b) Challenge Hardware authentication protocol
c) Circuit Hardware authentication protocol
d) Circuit Handshake authentication protocol
View Answer
Answer: a
It uses a three-way handshake process to verify the identity of the client without sending the
password in plain text.
Answer: a
Explanation: WTLS is Wireless Transport Security Layer. It provides security between the mobile
device and the WAP gateway to internet.
2. The protocol designed to make the security of wireless LAN as good as that of wired LAN.
a) WTLS
b) WEP (Wired Equivalent privacy
c) RSN
d) WP
View Answer
Answer: b
Explanation: WEP stands for Wired Equivalent Privacy
Worm → Self-replicating program that spreads over networks without attaching to files.
Bomb (Logic Bomb) → Malicious code triggered by specific conditions (e.g., date/time).
Answer: a
Security professionals use honeypots to study attacker behavior and improve defenses.
Answer: c
Explanation: The answer is Trojan horse. Trojan horse is a code that is present in a program that
appears harmless.
11. Attack in which a user creates a packet that appears to be something else.
a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing
View Answer
Answer: d
Answer: a
Explanation: Smurfing is a technique in which a program attacks a network by exploiting IP
broadcast addressing operations.
The attacker sends ICMP Echo Request (ping) packets to a network's broadcast address,
spoofing the victim's IP address.
All devices on the network respond to the ping request, sending replies to the victim.
Answer: b
3. A stage in which individual components are integrated and ensured that they are error-free to
meet customer requirements.
a) Coding
b) Testing
c) Design
d) Implementation
View Answer
Answer: b
5. The customer requirements are broken down into logical modules for ease of
_______________
a) inheritance
b) design
c) editing
d) implementation
View Answer
Answer: d
6. What do you call a technical person who is capable of understanding the basic requirements?
a) team leader
b) analyst
c) engineer
d) stakeholder
View Answer
Answer: b
Explanation: The person is called an analyst. An analyst is a software engineering who is
responsible for requirements gathering.
Answer: b
2. Incremental Model
The project is divided into small parts (increments) and delivered one by one.
Each increment adds more features until the final system is complete.
Combines Waterfall and Prototyping, adding a strong focus on risk analysis in each
cycle.
The development process goes in loops (spirals), improving the product at each
iteration.
✅ 4. Prototyping Model
Answer: a
Explanation: Abstraction is a concept that involves hiding the details and giving only the
necessary information to the user. It increases the power of a programming language.
2. Polymorphism
Definition: Ability of an object to take many forms; same function name can behave
differently for different objects.
4. Class
Definition: A blueprint for creating objects in OOP, containing attributes (fields) and
behaviors (methods).
4. This concept allows routines to use data again at different times.
a) Abstraction
b) Polymorphism
c) Inheritance
d) Implementation
View Answer
Answer: b
Explanation: Polymorphism is a concept in OOP wherein different functions can be used
again at different times.
6. A concept that combines data and functions into a single unit called class.
a) inheritance
b) encapsulation
c) polymorphism
d) abstraction
View Answer
Answer: b
Explanation: Encapsulation enables the important concept of data hiding possible. It
combines data and functions into a single unit.
Encapsulation is an OOP concept that bundles data (variables) and methods (functions)
that operate on that data into a single unit, usually a class.
It also hides the internal state of an object and only exposes controlled access (using
getters and setters).
Answer: a
Explanation: A procedural programming follows top-down approach. The main focus is on
the functions. It has a lot of global variable.
The program is divided into functions or procedures, and execution happens step by step.