• Loading of Operating System in Personal Computer is called?
    1. Processing
    2. Installation
    3. Booting
    4. None of these

  • Parallel Port is called?
    1. Male Connector
    2. Female Connector
    3. Joint Connector
    4. None of these

  • In Computer, Bus is set of?
    1. Circuits
    2. Wires
    3. Registers
    4. Bulbs

  • Which is known as temporary memory?
    1. ROM
    2. Hard Disk
    3. Registers
    4. Circuits

  • Which mechanism is used by the computer virus ‘worm’ to duplicate itself?
    1. Swap
    2. Spawn
    3. Increment
    4. Swarm

  • Temporary storage place for information in a computer is called:
    1. Back Up
    2. Buffer
    3. Binary file
    4. Data recorder

  • Which is the largest hardware company of computers?
    1. Microsoft
    2. Dell
    3. HP
    4. My Space

  • in RAM memory, DDR stands for ?
    1. Double sided RIMM
    2. Double data rate
    3. Digital data rate
    4. Dynamic data rate

  • How many pins in DDR3 Memory?
    1. 240
    2. 128
    3. 195
    4. 228

  • Which protocol is used to automatically assign TCP/IP configuration information?
    1. DNS
    2. DHCP
    3. NetBIOS
    4. NetLink

  • In database table, what does a column represent?
    1. Attributes
    2. Index
    3. Entity
    4. Relation

  • The unit of measurement of a word length is?
    1. Metre
    2. Byte
    3. Bits
    4. Millimetre

  • _________ is a type of computing that performs computation, storage and even applications as a service across a network.
    1. Cloud Computing
    2. Distributed Computing
    3. Parallel Computing
    4. Virtual Computing

  • Programs that duplicate the functionality of one system on another system is known as
    1. Emulators
    2. Simulators
    3. Evaluators
    4. PCB

  • Cache memory works on the principle of ___________ .
    1. Locality of data
    2. Locality of reference
    3. Locality of Memory
    4. Locality of Memory and refer

  • Money transfer through mobile is called
    1. IFSC
    2. IMPS
    3. ATM
    4. IFS

  • Which algorithm is used to decide the path to transfer the packets from source to destination?
    1. Routing
    2. Selecting
    3. Pathing
    4. Directing

  • In the following list of devices, which device is used in datalink layer?
    1. Repeaters
    2. Routers
    3. Application gateway
    4. Bridge

  • _________ changes each time it is installed to avoid detection by antivirus software.
    1. Polymorphic virus
    2. Worm
    3. Logic bomb
    4. Trojan horse

  • In which mode can the computers that are associated send frames directly to each other?
    1. Adhoc mode
    2. Infrastructure mode
    3. Structured mode
    4. Anonymous mode

  • The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as __________ .
    1. Access control
    2. Congestion
    3. Error propagation
    4. Deadlock

  • Related to computers, what is ‘Wetware’ ?
    1. Computer programs
    2. Circuitory
    3. Human brain
    4. Chemical storage devices

  • In the memory hierarchy the fastest memory is?
    1. Cache
    2. SRAM
    3. Registers
    4. DRAM

  • In IT networking, which of the following device is used in physical layer?
    1. Repeater
    2. Router
    3. Transport Gateway
    4. Bridge

  • In IT terminology failure in the kernel is called as:
    1. Crash
    2. Crash dump
    3. Dump
    4. kernel error