

MCQOPTIONS
Saved Bookmarks
This section includes 30 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Fundamentals knowledge and support exam preparation. Choose a topic below to get started.
1. |
A program that copies itself. |
A. | Worm |
B. | Virus |
C. | Trojan |
D. | Bomb |
Answer» B. Virus | |
2. |
An attack in which the site is not capable of answering valid request. |
A. | Smurfing |
B. | Denial of service |
C. | E-mail bombing |
D. | Ping storm |
Answer» C. E-mail bombing | |
3. |
Attack in which a user creates a packet that appears to be something else. |
A. | Smurfing |
B. | Trojan |
C. | E-mail bombing |
D. | Spoofing |
Answer» E. | |
4. |
A technique in which a program attacks a network by exploiting IP broadcast addressing operations. |
A. | Smurfing |
B. | Denial of service |
C. | E-mail bombing |
D. | Ping storm |
Answer» B. Denial of service | |
5. |
These ciphers replace a character or characters with a different character or characters, based on some key. |
A. | Polyalphabetic substitution based |
B. | Transposition-based |
C. | Substitution based |
D. | Mono alphabetic substitution based |
Answer» E. | |
6. |
Triple-DES has ______ keys. |
A. | 1 |
B. | 2 |
C. | 5 |
D. | 4 |
Answer» C. 5 | |
7. |
An attack in which the user receives unwanted amount of e-mails. |
A. | Smurfing |
B. | Denial of service |
C. | E-mail bombing |
D. | Ping storm |
Answer» D. Ping storm | |
8. |
An algorithm in encryption is called _____________ |
A. | Algorithm |
B. | Procedure |
C. | Cipher |
D. | Module |
Answer» D. Module | |
9. |
A small program that changes the way a computer operates. |
A. | Worm |
B. | Trojan |
C. | Bomb |
D. | Virus |
Answer» E. | |
10. |
The information that gets transformed in encryption is ____________ |
A. | Plain text |
B. | Parallel text |
C. | Encrypted text |
D. | Decrypted text |
Answer» B. Parallel text | |
11. |
Security features that control that can access resources in the OS. |
A. | Authentication |
B. | Identification |
C. | Validation |
D. | Access control |
Answer» E. | |
12. |
A ________ is tested to ensure that information properly flows into and out of the system. |
A. | module interface |
B. | local data structure |
C. | boundary conditions |
D. | paths |
Answer» B. local data structure | |
13. |
A testing strategy that tests the application in the context of an entire system. |
A. | System |
B. | Validation |
C. | Unit |
D. | Gray box |
Answer» B. Validation | |
14. |
A planned program if work that requires a definitive amount of time, effort and planning to complete. |
A. | Problem |
B. | Project |
C. | Process |
D. | Program |
Answer» C. Process | |
15. |
An individual who plans and directs the work. |
A. | Stakeholder |
B. | Project manager |
C. | Team leader |
D. | Programmer |
Answer» C. Team leader | |
16. |
A _______ can be recorded using a normal light source. |
A. | Holograph |
B. | Photography |
C. | Holography |
D. | Photograph |
Answer» E. | |
17. |
Methodology in which project management processes were step-by step. |
A. | Incremental |
B. | Waterfall |
C. | Spiral |
D. | Prototyping |
Answer» C. Spiral | |
18. |
An electronic document that establishes your credentials when you are performing transactions. |
A. | Digital code |
B. | OTP |
C. | |
D. | Digital certificate |
Answer» E. | |
19. |
AR is interactive in real-time. |
A. | True |
B. | False |
Answer» B. False | |
20. |
SLAM stands for? |
A. | Simultaneous localization and mapping |
B. | System localization and mapping |
C. | Simultaneous localization and maintenance |
D. | System localization and maintenance |
Answer» B. System localization and mapping | |
21. |
A ______________________ is a display device, worn on head as a part of helmet that has a small display optic. |
A. | HD |
B. | MD |
C. | HMD |
D. | ARD |
Answer» D. ARD | |
22. |
Technologies that completely involve a user inside a synthetic environment. |
A. | AR |
B. | VR |
C. | AI |
D. | ML |
Answer» C. AI | |
23. |
A technique that enables light field which is generally the product of a light source scattered off objects. |
A. | AES |
B. | Holography |
C. | Cryptography |
D. | Gyrography |
Answer» C. Cryptography | |
24. |
Technologies that allow the user to see the real world, with virtual objects composited in the real world. |
A. | AR |
B. | VR |
C. | AI |
D. | SR |
Answer» B. VR | |
25. |
Wearable computing device in the form of computerized eyeglasses. |
A. | HMD |
B. | Helmets |
C. | Smart Glasses |
D. | VR Glasses |
Answer» D. VR Glasses | |
26. |
A field of technology that deals with a combination of real world and the data generated from computer. |
A. | ML |
B. | AI |
C. | AR |
D. | IoT |
Answer» D. IoT | |
27. |
Encryption standard that is selected by the US government to replace DES. |
A. | AES |
B. | BES |
C. | CES |
D. | DES |
Answer» B. BES | |
28. |
A programming technique in which the focus is on doing things. |
A. | object oriented |
B. | procedural |
C. | logical |
D. | structural |
Answer» C. logical | |
29. |
A basic unit of object-oriented programming. |
A. | module |
B. | block |
C. | object |
D. | token |
Answer» D. token | |
30. |
A procedural programming follows ___________ approach. |
A. | top-down |
B. | bottom-up |
C. | left-right |
D. | right-left |
Answer» B. bottom-up | |