0

Computer Applications

Description: This test covers topics related to computer aptitude.
Number of Questions: 15
Created by:
Tags: Computer Aptitude Computer Knowledge
Attempted 0/15 Correct 0 Score 0

Which of the following is not a scripting language?

  1. PostScript

  2. AppleScript

  3. JavaScript

  4. Tcl

  5. Perl


Correct Option: A
Explanation:

PostScript (PS) is a computer language for creating vector graphics. It is a dynamically typed, concatenative programming language.

Which of the following languages is platform independent?

  1. C

  2. Fortran

  3. BASIC

  4. JAVA

  5. COBOL


Correct Option: D
Explanation:

Java is a general-purpose, concurrent, class-based, object-oriented computer programming language that is specifically designed to have as few implementation dependencies as possible. It is intended to let application developers write once, run anywhere (WORA), meaning that code that runs on one platform does not need to be recompiled to run on another.

Which of the following best describes telnet?

  1. Network of televisions

  2. Network of telephones

  3. Network of computers connected over telephones

  4. Remote login

  5. Downloading files from internet


Correct Option: D
Explanation:

Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

Which of the following is the best description of the Internet?

  1. Network of computers

  2. Network of networks

  3. Collection of websites

  4. A group of servers

  5. A group of hosts


Correct Option: B
Explanation:

The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.

What type of system is DNS?

  1. A horizontal naming system

  2. A vertical naming system

  3. A hierarchical distributed naming system

  4. A client server system

  5. A networking system


Correct Option: C
Explanation:

The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities

Which of the following is not a desirable property of a database transaction?

  1. Atomicity

  2. Consistency

  3. Isolation

  4. Durability

  5. Concurrency


Correct Option: E
Explanation:

Concurrency means several users access the database at the same time.It is not desirable as it can leave the database in inconsistent state.Concurrency control ensures that correct results for concurrent operations are generated, while getting those results as quickly as possible.

What does the term 'Grayware' refer to?

  1. Applications that enhance the performance of computers

  2. Applications that have a gray user interface

  3. Applications that negatively affect the performance of computers

  4. Computer games

  5. Antivirus


Correct Option: C
Explanation:

Grayware (or greyware) is a general term that refers to applications or files that are not directly classified as malware (like worms or trojan horses), but can still negatively affect the performance of computers and involve significant security risks.

In database theory, what is a virtual table called?

  1. Abstraction layer

  2. View

  3. Database engine

  4. Database trigger

  5. Relation


Correct Option: B
Explanation:

A view is the result set of a stored query — or map-and-reduce functions — on the data, which the database users can query just as they would a persistent database collection object. This pre-established query command is kept in the database dictionary. Unlike ordinary base tables in a relational database, a view does not form part of the physical schema: as a result set, it is a virtual table computed or collated from data in the database, dynamically when access to that view is requested.

What does CIDR stand for?

  1. Classful Inter-Domain Routing

  2. Caseless Inter-Domain Routing

  3. Classless Inter-Domain Routing

  4. Classless Intra-Domain Routing

  5. Classful Intra-Domain Routing


Correct Option: C
Explanation:

CIDR stands for Classless Inter-Domain Routing. CIDR was designed to permit repartitioning of any address space so that smaller or larger blocks of addresses could be allocated to users.

Which of the following is an application that captures data packets used primarily for malicious activities?

  1. Password cracking

  2. Packet sniffer

  3. Spoofing attack

  4. Rootkit

  5. Trojan horse


Correct Option: B
Explanation:

A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.

A database administrator's responsibilities does not include which of the following tasks?

  1. Maintaining archived data

  2. Installing the database server and application tools

  3. Modifying the database structure as per the requirement

  4. Marketting the software

  5. Enrolling users and maintaining system security


Correct Option: D
Explanation:

Marketting the software is not a responsibility of the DBA rather it is the responsibility of the marketting team.

Which of the following is a computer network administration utility used to test the reachability of a host on an IP network?

  1. HTTP

  2. FTP

  3. Telnet

  4. Ping

  5. Finger


Correct Option: D
Explanation:

Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.

In the context of relational databases, which of the following is used to establish and enforce a link between the data in two tables?

  1. Compound key

  2. Primary key

  3. Foreign key

  4. Alternate key

  5. Natural key


Correct Option: C
Explanation:

A foreign key is a field (or collection of fields) in one table that uniquely identifies a row of another table. In other words, a foreign key is a column or a combination of columns that is used to establish and enforce a link between the data in two tables.

Which of the following protocols is used by web browsers when they connect to servers on the World Wide Web?

  1. SMTP

  2. TCP

  3. UDP

  4. POP

  5. ISP


Correct Option: B
Explanation:

The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer.Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another.

EPROM can be erased by exposing it to what type of rays?

  1. X-rays

  2. Microwaves

  3. Ultraviolet rays

  4. Visible light

  5. Gamma radiations


Correct Option: C
Explanation:

Once programmed, an EPROM can be erased by exposing it to strong ultraviolet light source (such as from a mercury-vapor light). EPROMs are easily recognizable by the transparent fused quartz window in the top of the package, through which the silicon chip is visible, and which permits exposure to UV light during erasing.

- Hide questions