0

Information & Technology

Description: This test covers topics from IT section of Paper I of UGC NET.
Number of Questions: 15
Created by:
Tags: IT Information and Communication Technology
Attempted 0/15 Correct 0 Score 0

Which of the following is a command line interpreter?

  1. Windows 95

  2. Android

  3. Apple Lisa

  4. UNIX shell

  5. Windows XP


Correct Option: D
Explanation:

A program that implements such a text interface is often called a command-line interpreter. UNIX shell is a command line interpreter.

Which of the following is a Java application launched from a webpage?

  1. Swing

  2. OLE

  3. JDBC

  4. JVM

  5. Applet


Correct Option: E
Explanation:

A Java applet is a small application written in Java, and delivered to users in the form of bytecode. The user launches the Java applet from a webpage.

Which software engineering discipline aims at assuring that software fully satisfies all the expected requirements?

  1. Software testing

  2. Software verification

  3. Software designing

  4. Software quality control

  5. Feasibility study


Correct Option: B
Explanation:

Software verification is a discipline of software engineering whose goal is to assure that software fully satisfies all the expected requirements.

Which of these is used for interfacing between networks with different topologies?

  1. Gateways

  2. Utility computing

  3. Router

  4. Bridge

  5. Switch


Correct Option: A
Explanation:

A Gateway is a network node equipped for interfacing with another network that uses different protocols.

What is generally referred to as a network within an organization?

  1. LAN

  2. Intranet

  3. Internet

  4. WAN

  5. Subnet


Correct Option: B
Explanation:

An intranet is a computer network that uses Internet Protocol technology to share information, operational systems, or computing services within an organization. This term is used in contrast to internet, a network between organizations, and instead refers to a network within an organization

What is the practice of linking two or more computing devices together for the purpose of sharing data called?

  1. Interfacing

  2. Assembling

  3. Pairing

  4. Networking

  5. Interoperability


Correct Option: D
Explanation:

Networking is the practice of linking two or more computing devices together for the purpose of sharing data.

Which of the following is a device for connecting multiple Ethernet devices?

  1. Router

  2. Gateway

  3. Hub

  4. Bridge

  5. Coax


Correct Option: C
Explanation:

An Ethernet hub, active hub, network hub, repeater hub, multiport repeater or hub is a device for connecting multiple Ethernet devices together and making them act as a single network segment.

In which of the following LAN topologies is each node connected by exactly two nodes?

  1. Mesh

  2. Ring

  3. Bus

  4. Star

  5. Tree


Correct Option: B
Explanation:

A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring.

How is a computer identified on Internet?

  1. IP Address

  2. Machine Address

  3. Home Address

  4. Service Provider Address

  5. Connection Address


Correct Option: A
Explanation:

A computer is identified on Internet through its IP address.

Which of these is a basic building block of a digital circuit?

  1. Bit

  2. Byte

  3. Logic gate

  4. Flip-flop

  5. RAM


Correct Option: C
Explanation:

A logic gate is an idealized or physical device implementing a Boolean function, that is, it performs a logical operation on one or more logical inputs, and produces a single logical output. It is the basic unit of any digital circuit.

Which of these is a hardware or software based network security system?

  1. Firewall

  2. Virus

  3. Worm

  4. Trozan

  5. Spam


Correct Option: A
Explanation:

a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on a rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.

Which of these systems provides information that organizations require to manage themselves efficiently and effectively?

  1. Office Automation System

  2. Business rules

  3. DAS

  4. DSS

  5. MIS


Correct Option: E
Explanation:

A management information system (MIS) provides information that organizations require to manage themselves efficiently and effectively.Management information systems are typically computer systems used for managing five primary components: 1.) Hardware, 2.) Software, 3.) Data (information for decision making), 4.) Procedures (design,development and documentation), and 5.) People (individuals, groups, or organizations).

Which of the follwing fields is defined as "the study and design of intelligent agents"?

  1. Fuzzy logic

  2. Expert system

  3. Artificial intelligence

  4. Inference engine

  5. Data mining


Correct Option: C
Explanation:

Artificial intelligence (AI) is technology and a branch of computer science that studies and develops intelligent machines and software. Major AI researchers and textbooks define the field as "the study and design of intelligent agents", where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success.

Which of the following protocols is used by local e-mail clients to retrieve e-mail from a remote server?

  1. SMTP

  2. FTP

  3. POP

  4. TELNET

  5. Gopher


Correct Option: C
Explanation:

POP (Post Office Protocol) is a protocol used by local e-mail clients to retrieve e-mail from a remote server.

Which of the follwing is a software used for writing the source code?

  1. Linker

  2. Loader

  3. Compiler

  4. Editor

  5. Assembler


Correct Option: D
Explanation:

A source code editor is a text editor program designed specifically for editing source code of computer programs by programmers.

- Hide questions