Computers In Management

21. Malicious programs that damages your computer is called

  1. Virus
  2. Bacteria
  3. Bugs
  4. Worms
Correct answer: (A)
Virus

22. The floppy discs comes in two sizes they are

  1. 3.5 inch & 5.25 inch
  2. 2 inch and 3.5 inch
  3. 2 inch and 4.25 inch
  4. 2.5 inch and 5.5 inch
Correct answer: (A)
3.5 inch & 5.25 inch

23. URL stands for

  1. Ultimate Resource Locator
  2. Uniform Resource Locator
  3. Uniform Retrieval Language
  4. Ultimate Retrieval Language
Correct answer: (B)
Uniform Resource Locator

24. A database structures that treats files as tables is

  1. Relational Database
  2. Hierarchal Database
  3. Network Database
  4. Data Dictionary
Correct answer: (A)
Relational Database

25. Which of the following file formats is used for art work

  1. GIF
  2. JPEG
  3. PNG
  4. MPEG
Correct answer: (B)
JPEG

26. Which of the following topology is least affected by addition or removal of a node

  1. Star
  2. Ring
  3. Mesh
  4. Bus
Correct answer: (C)
Mesh

27. Which of the following is essentially not a pre-requisite of E-commerce

  1. A Web Site
  2. A shopping Cart Programme to list the products or services and a way to collect purchases information
  3. To have a printer
  4. A method to get the funds in bank account
Correct answer: (C)
To have a printer

28. Which of the following is not a domain name

  1. .sys
  2. .gov
  3. .com
  4. .org
Correct answer: (A)
.sys

29. Data Elements of related type are grouped into

  1. Title
  2. String
  3. Record
  4. File
Correct answer: (C)
Record

30. What is the method of safeguard used for the safeguarding highly confidential information such as Corporate data or credit card information is being transmitted across the Internet

  1. Cryptography
  2. Antiviral package
  3. Firewalls & Proxy Servers
  4. Digital Certificates
Correct answer: (D)
Digital Certificates
Page 3 of 20