You are on page 1of 20

Gagan@9855689837 2008

Gagan@9855689837
DEEP INSTITUTE OF MANGEMENT ®

Information Technology Solutions

INFORMATION TECHNOLOGY BASIC QUESTIONS

©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.


Gagan@9855689837 2008
1. Programs from the same (E) None of these
developer , sold bundled together , ANS (B)
that provide better integration
and share common features , 5. ___________ terminals
toolbars and menus are known as (formerly known as cash
registers) are often connected to
….
complex inventory and sales
(A) software suites
computer systems .
(B) integrated software packages
(A) Data
(C) software processing packages
(B) Sales
(D) personal information managers
(C) Query
(E) none of these
(D) (Point-of-sale (POS)
ANS (A)
(E) None of these
2. A data warehouse is which of
ANS (B)
the following ?
(A) Can be updated by the end 6. The OSI model is divided into
users _______ processes called layers.
(B) Contains numerous naming (A) five
conventions and formats (B) six
(C) Organized around important (C) seven
subject areas (D) eight
(D) Contains only current data (E) None of these
(E) None of these ANS (C)
ANS (C) 7. System software is the set of
3. ______________ servers programs that enables your
store and manages files for computer’s hardware devices and
network users. ______ software to work
(A) Authentication together.
(B) Main (A) management
(C) Web (B) processing
(D) File (C) utility
(E) None of these (D) application
ANS (D) (E) None of these
4. All of the following are ANS (D)
examples of real security and 8. ________ are specially
privacy risks Except _____ designed computer chips reside
(A) hackers inside other devices, such as your
(B) spam car or your electronic thermostat.
(C) viruses (A) Servers
(D) identify theft (B) Embedded computers
(C) Robotic computers

©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.


Gagan@9855689837 2008
(D) Mainframes (E) None of these
(E) None of these ANS (B)
ANS (B) 13.
13 ________ controls the way in
which the
9. The following are all computing computer
devices , except……… system functions
(A) notebook computers and provides a
(B) cellular telephones means by which
(C) digital scanners users can
(D) personal digital assistants interact with the
(E) None of these computer
ANS (C) (A) The platform
10. in a ring topology , the the (B) Application
computer in possession of the software
______ can trasmit data (C) Operating
(A) packet system
(B) data (D) The
(C) access method motherboard
(D) token (E) None of
(E) None of these these
ANS (D) ANS (C)
11. This part of operating system
manages the essential peripherals, 14. Servers are computers that provide
such as the keyboard, screen , disk resources to other computers connected
drives, and parallel and serial to a ___________
ports ____ (A) mainframe
(A) basic input/output system (B) network
(B) secondary input/output system (C) supercomputer
(C) peripheral input/output system (D) client
(D) marginal input/output system (E) None of these
(E) None of these ANS (B)
ANS (A) 15. A goal of data mining includes which
12.
12 ________ Viruses are often of the following?
transmitted by a floppy disk left (A) To explain some observed event or
in the floppy drive condition
(A) Trojan horse (B) To confirm that data exists
(B) Boot sector (C) To analyze data for expected
(C) Script relationships
(D) Logic bomb (D) To create a new data warehouse
©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.
Gagan@9855689837 2008
(E) None of these ANS ()
ANS (A) 19. A Proxy server is used for
16. URL stands for …….. which of the following?
(A) Universal Research List (A) To provide security against
(B) Universal Resource List unauthorized users
(C) Uniform Resource Locator (B) To process client requests
(D) Uniform Research Locator for web pages
(E) None of these (C) To process client requests
ANS (C) for database access
(D) To provide TCP/IP
(E) None of these
ANS (B)
17.
17 A database management system
20.
20 When data changes in multiple
(DBMS) is a …………
lists and all lists are not updated,
(A) hardware system used to create ,
this causes:
maintain and provide controlled access
(A) data redundancy
to a database
(B) information overload
(B) hardware system used to create,
(C) duplicate data
maintain, and provide uncontrolled access
(D) data inconsistency
to a database.
(E) None of these
(C) software system used to create,
ANS (D)
maintain, and provide uncontrolled access
21.
21 _____________ are words that a
to a database.
programming language has set aside for
(D) software system used to create,
its own use.
maintain, and provide controlled access
(A) Control worlds
to a database.
(B) Reserved words
(E) None of these
(C) Control structures
ANS (D)
(D) Reserved keys
18.
18 Which of the following is NOT a goal (E) None of these
of transaction processing system ? ANS (B)
(A) Capture , process and store
transactions
(B) Produce a variety of documents
related to routine business activities
(C) Reduce manual effort associated with Gagan@9855689837
processing business transactions
(D) Produce standard reports used for
management decision making
(E) None of these

©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.


Gagan@9855689837 2008
22.
22 What is the primary difference (E) None of these
between a virus and a worm? ANS (D)
(A) A worm has the ability to self- 26.
26 Granting an outside organization
propagate from an infected user’s access to internet web pages is often
computer to other computers implemented using a (n) ____
(B) A worm is usually written by a (A) extranet
cracker: Script bunnies do not have the (B) intranet
skills to develop a worm program (C) internet
(C) A virus is very harmful to the (D) hacker
computers it infects : a worm is not a (E) None of these
serious a problem ANS (A)
(D) Anti-virus software is effective in 27.
27 Which term identifies a specific
fighting viruses but not worms computer on the web and the main page
(E) None of these of the entire site
ANS () (A) URL
23.
23 ______ describe what is database (B) Web site address
fields. (C) Hyperlink
(A) Structures (D) Domain name
(B) Field markers (E) None of these
(C) Field definition ANS (A)
(D) Field names
(E) None of these 28. The code that relational database
ANS (D) management systems use to perform
their database task is referred to as …..
24.
24 You must install a (n)
(A) QBE
____________ on a network if you
(B) SQL
want to share a broadband Internet
(C) OLAP
connection.
(D) Sequel Server
(A) router
(E) None of these
(B) modem
ANS (B)
(C) node
29. Chip is a common nickname for a (n):
(D) cable
(A) transistor
(E) None of these
(B) resistor
ANS (A)
(C) integrated circuit
25. A goal of normalization is to
(D) semiconductor
__________
(E) None of these
(A) minimize the number of relationships
ANS (c)
(B) minimize the number of entities
(C) minimize the number of tables 30. The purpose of the primary key in a
(D) minimize the number of redundancy database is to:
©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.
Gagan@9855689837 2008
(A) unlock the database (C) data record
(B) provide a map of the data (D) data field
(C) uniquely identify a record (E) None of these
(D) establish constraints on database ANS (A)
operations.
(E) None of these
ANS (B)
31.
31 A _________ contains specific rules
and words that express the logical steps
of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
ANS ()

32.
32 The design of the network is called
the network:
(A) architecture
(B) server
(C) transmission no somoking…….
somoking .
(D) type
(E) None of these
ANS (A)
33. The most frequently used instructions
of a computer program are likely to be
fetched from:
(A) the hard disk 35. Personal logs or journal entries posted on the
(B) cache memory Web are known as:
(C) RAM (A) listservs
(D) registers (B) Webcasts
(C) blogs
(E) None of these
(D) subject directories
ANS (B) (E) None of these
34. The ____________ contains data ANS (C)
descriptions and defines the name, data 36. A(n) _______ uses pictures (called icons) and
type, and length of each field in the menus displayed on the screen to send commands
database. to the computer system.
(A) data dictionary (A) command – based user interface
(B) GUI
(B) data table
©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.
Gagan@9855689837 2008
(C) system utility triggered by the passage of time or on a certain
(D) API date.
(E) None of these (A) Boot-sector viruses
ANS (B) (B) Macro viruses
37. The _____ manual tells you how to use a (C) Time bombs
software program. (D) Worms
(A) documentation (E) None of these
(B) programming Ans (C)
(C) technical 43.
43 Linux is a (n) ____________ operating
(D) user system.
(E) None of these (A) open-source
ANS () (B) Microsoft
38. Which of the following is NOT a type of (C) Windows
broadband Internet connection? (D) Mac
(A) Cable (E) None of these
(B) DSL ANS (A)
(C) Dial-up 44. What is a backup?
(D) Satellite (A) Restoring the information backup
(E) None of these (B) An exact copy of a system’s information
ANS (C) (C) The ability to get a system up and running in
39. Software, such as viruses, worms and Trojan the event of a system crash or failure
horses, that has a malicious intent, is known as: (D) All of these
(A) spyware (E) None of these
(B) adware ANS (D)
(C) spam 45.
45 Which of the following places the common
(D) malware data elements in order from smallest to largest
(E) None of these (A) character, file, record, field, database
ANS (D) (B) character, record, field, database, file
40. Making a field ______ means that it cannot (C) character, field, record, file, database
be left blank. (D) Bit, byte, character, record, field, file,
(A) numeric database,
(B) required (E) None of these
(C) calculated ANS (C)
(D) validated 46.
46 The internet is ……
(E) None of these (A) a large network of networks
ANS (B) (B) an internal communication system for a
41 _________ is the process of finding errors in business
41.
software code. (C) a communication system for the Indian
(A) Debugging government
(B) Compiling (D) All of these
(C) Testing (E) None of these
(D) Running ANS (D)
(E) None pf these 47.
47 ____________ are lists of commands that
ANS (C) appear on the screen.
42. ____________ are viruses that are (A) GUIs

©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.


Gagan@9855689837 2008
(B) Icons (E) None of these
(C) Menus Ans : (B)
(D) Windows
(E) None of these 2. IT stands for—
ANS (C) (A) information Technology
48.
48 Which of the following statements is FALSE (B) integrated Technology
concerning file names? (C) intelligent Technology
(A) Files may share the same name or the same (D) interesting Technology
extension but not both (E) None of these
(B) Every file in the same folder must have a Ans : (A)
unique name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.) 3. Which of the following refers to the fastest,
followed by the file name biggest and most expensive computers ?
(E) None of these (A) Personal Computers
ANS (D) (B) Supercomputers
(C) Laptops
49. Verification of a login name and password is
(D) Notebooks
known as:
(E) None of these
(A) configuration
Ans : (B)
(B) accessibility
(C) authentication
(D) logging in 4. A collection of related information sorted and
(E) None of these dealt with as a unit is a—
ANS (C) (A) disk
50. Which of the following would most likely NOT (B) data
be a symptom of a virus? (C) file
(A) Existing program files and icons disappear. (D) floppy
(B) The CD-ROM stops functioning. (E) None of these
(C) The Web browser opens to an unusual home Ans : (C)
page.
(D) Odd messages or images are displayed on the 5. The process of a computer receiving
screen. information from a server on the Internet is
(E) None of these known as—
ANS (B) (A) pulling
(B) pushing
(C) downloading
(D) transferring
New questions……… (E) None of these
Ans : (C)
1. A keyboard is this kind of device—
(A) black 6. Which part of the computer helps to store
(B) input information ?
(C) output (A) Disk drive
(D) word Processing (B) Keyboard
(C) Monitor
©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.
Gagan@9855689837 2008
(D) Printer
(E) None of these
Ans : (A)

©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.


Gagan@9855689837 2008

©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.


Gagan@9855689837 2008
………………is the process of carrying out commands. (E) None of these
7. ………………is
(A) Fetching Ans : (B)
(B) Storing
(C) Executing 12. An error is also known as—as—
(D) Decoding (A) bug
(E) None of these (B) debug
Ans : (C) (C) cursor
(D) icon
8. The role of a………
………generally is to determine a
a………generally (E)
(E) None of these
buyer’
buyer’s needs and match it to the correct Ans : (A)
hardware and software.
(A) computer Scientist 13. Arithmetic Operations—
Operations—
(B) computer sales representative (A) involve matching one data item to another to
(C) computer consultant determine if the first item is greater than, equal
(D) corporate trainer to, or less than the other item
(E) None of these (B) sort data items according to standard,
Ans : (B) predefined criteria in ascending
ascending order or
descending order
9. Which of the following groups consist of only (C) use conditions with operators such as AND, OR
output devices ? and NOT
(A) Scanner, Printer, Monitor (D) include addition, subtraction, multiplication and
(B) Keyboard, Printer, Monitor division
(C) Mouse, Printer, Monitor (E) None of these
(D) Plotter, Printer, Monitor Ans : (D)
(E) None of these
Ans : (D) 14. Sending an ee- to——
-mail is similar to
(A) picturing an event
10. The rectangular area of the screen that (B) narrating a story
displays a program, data, and/or information is (C) writing a letter
a— (D) creating a drawing
(A) title bar (E) None of these
(B) button Ans : (C)
(C) dialog box
(D) window 16. Microsoft Word is an example of— of—
(E) None of these (A) an operating system
Ans : (D) (B) a processing device
(C) application software
11. A(n)………
………contains commands that can be
A(n)………contains (D) an input device
selected. (E) None of these
(A) pointer Ans : (B)
(B) menu
(C) icon 18. Any data or instruction
instruction entered into the
(D) button memory of a computer is considered as—
as—
(A) storage
©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.
Gagan@9855689837 2008
(B) output (C) Telephone
(C) input (D) All of these
(D) information (E) None of these
(E) None of these Ans : (A)
Ans : (A)
1. The _____ states that a foreign key must
19. Which part of the computer displays the work either match a primary key value in another
done ? relation or it must be null.
(A) RAM
(B) printer (a) entity integrity rule
(C) monitor
(D) ROM
(b) referential integrity constraint
(E) None of these
Ans : (C)
(c) action assertion
22. A series of instructions that tells a computer
what to do and how to do it is called a— (d) composite attribute
(A) program
(B) command (e) None of these
(C) user response
(D) processor 2. An applet __________
(E) None of these
Ans : (A)
(a) is an interpreted program that runs on the
client
24. Which is the part of a computer that one can
touch and feel ?
(A) Hardware (b) tracks the number of visitors to a Website
(B) Software
(C) Programs (c) is a compiled program that usually runs on the
(D) Output client
(E) None of these
Ans : (A) (d) collects data from visitors to a Website

27. Processing involves— (e) None of these


(A) inputting data into a computer system
(B) transforming input into output 3. A _____ sometimes called a boot sector virus,
(C) displaying output in a useful manner executes when a computer boots up because it
(D) providing relevant answers resides in the boot sector of a floppy disk or the
(E) None of these master boot record of a hard disk.
Ans : (B)
(a) system virus
34. ………can be done through digital Banking ?
(A) Mobile phone
(b) Trojan horse virus
(B) Internet
©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.
Gagan@9855689837 2008
(c) file virus (d) Physical

(d) macro virus (e) All of these

(e) None of these 7. Which of the following does not describe a data
warehouse?
4. Which error detection method uses one’s (a) Subject-oriented
complement arithmetic?
(b) Integrated
(a) Simply parity check
(c) Time-variant
(b) Checksum
(d) Updateable
(c) Two-dimensional parity check
(e) None of these
(d) CRC
8. Which of the following is true ?
(e) None of these (a) Logical design is software-dependent

5. A result of a computer virus can not lead to (b) In a distributed database, database is stored
___. in one physical location
(a) Disk Crash
(c) Conceptual design translates the logical design
(b) Mother Board Crash into internal model

(c) Corruption of program (d) Logical design is software independent

(d) Deletion of files (e) None of these

(e) None of these 9. A range check _____

6. The network interface card of LAN is related to (a) ensures that only the correct data type is
following layer of OSI Model- entered into a field

(a) Transport (b) verifies that all required data is present

(b) Network (c) determines whether a number is within a


specified limit
(c) Data Link
(d) tests if the data in two or more associated
fields is logical
©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.
Gagan@9855689837 2008
(e) None of these 13. A table of bits in which each row represents
the distinct values of a key?
10. The total set of interlinked hypertext
documents worldwide is- (a) Join index

(a) HTTP (b) Bitmap index

(b) Browser (c) B + Tree

(c) WWW (d) Hierarchical index

(d) B2B (e) None of these

(e) None of these 14. The degree of detail that should be


incorporated into a database depends on what?
11. With the object-oriented (OO) approach, an
object encapsulates, or_____.a programmer. (a) Data integrity

(a) carries out, the details of an object for (b) The type of database

(b) hides, the details of an object from (c) The user’s perspective

(c) reveals, the details of an object to (d) The business practices and policies

(d) extends, the details of an object beyond (e) None of these

(e) None of these 15. The ___.converts digital signals to analog


signals for the purpose of transmitting data over
12. Every computer connected to an intranet or telephone lines.
extranet must have a distinct_____
(a) Modem
(a) firewall
(b) Router
(b) proxy server
(c) Gateway
(c) IP address
(d) Bridge
(d) domain name
(e) All of these
(e) None of these

©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.


Gagan@9855689837 2008
16. Before a package can be used in a java 19. Firewalls are used to protect against___.
program it must be___.
(a) Unauthorized Attacks
(a) executed
(b) Virus Attacks
(b) referenced
(c) Data Driven Attacks
(c) imported
(d) Fire Attacks
(d) declared
(e) All of these
(e) None of these
20. This is a standard way for a Web server to
17. Choose the correct way to indicate that a line pass a Web user’s request to an application
in a C++ program is a comment line, that is, a line program and to receive data back to forward to
the will not be executed as an instruction___. the user-

(a) begin the line with a # sign (a) Interrupt request

(b) begin the line with double slashes (/ /) (b) Forward DNS lookup

(c) begin and end the line with double hyphens (-_-(c) Data-Link layer
)
(d) File Transfer Protocol
(d) indent the line
(e) Common gateway interface
(e) None of these
21. Three SQL, DDL, CREATE commands are__.
18. Programming language built into user
programs such as Word and Excel are known (a) Schema, Base and Table
as____
(b) Base, Table and Schema
(a) 4GLs
(c) Key, Base and Table
(b) macro languages
(d) Schema, Table and View
(c) object-oriented languages
(e) None of these
(d) visual programming languages

(e) None of these


©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.
Gagan@9855689837 2008
22. Data are ________ in client/server 25. This is a group of servers that share work
computing. and may be able to back each other up if one
server fails.
(a) never sent to the client machine
(a) Channel bank
(b) sent in very large sections to save processing
time (b) Cluster

(c) sent only upon the client’s request (c) Tiger team

(d) sent in complete copies for the client to filter (d) Serverless backup
and sort
(e) Logical unit
(e) sent from the client to the server for
processing

23. Which of the following will not eliminates the


ambiguities of a null value?
(a) Define the attribute as required

(b) Define subtypes

(c) Define each attribute as having an initial value ANSWERS


that is recognized as blank 1. (a)

(d) Define supertypes 2- (c)

(e) None of these 3- (e)

24. The____directory is mandatory for every disk. 4- (b)

(a) Root 5- (b)

(b) Base 6. (e)

(c) Sub 7- (d)

(d) Case 8- (a)

(e) None of these 9- (c)

©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.


Gagan@9855689837 2008
10- (a) 14- (b) 18- (d) 22-(c)

11. (b) 15- (a) 19- (a) 23- (d)

12- (c) 16. (c) 20- (e) 24- (c)

13- (b) 17- (b) 21. (d) 25- (b)

Unsolved questions for practise


1) When silicon chips were invented in the
1970s, what result followed?
a) Larger system units were required 5) What is a system unit?
b) Computer manufacturing moved to a) Output devices and peripherals
Australia b) Case that holds the circuit boards and
c) Cancer among computer users increased power unit
d) Desktop microcomputers were created c) IBM or MAC platform
d) Documentation: Software CD and user
manual
2) As computer technology advances, what
can we expect the future to bring?
a) Increase in speed and efficiency 6) How is the speed of the microprocessor
b) Decrease in technology careers measured?
c) Decrease of hazardous waste dumping a) Bytes, such as MB
d) Increase in the use of floppy disks b) Points, such as 12 pt.
(Note: Increase means more,
more Decrease c) Hertz, such and mHz
means less.
less ) d) Scale, such as 55%

7) RAM is . . .
3) Which system might have hundreds of a) Filename extension
terminals that send input to a cabinet-sized b) Monitor resolution
computer for processing? c) Temporary storage zone
a) Personal digital assistant Data on magnetic tape
b) Mainframe
c) Notebook computer
d) Desktop microcomputers

4) Which type of computer is a compact,


portable unit?
a) Microcomputer
b) Notebook
c) Workstation
d) Card reader
©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.
Gagan@9855689837 2008
c) Trackball, mouse, microphone
d) Projector, screen, PowerPoint
8) Which of the following is pre-recorded data presentation
used to start the boot process?
a) DAT
b) RAM 14) Which types of printers would be most
c) ROM practical for home use?
d) DSL a) Image setter, dye sublimation
b) MacIntosh, IBM
c) Ink jet, laser
9) Which group of data storage units is d) Microsoft, Corel
arranged from smallest to largest (reading
from left to right)?
a) Terabyte, kilobyte, byte, bit 15) Which devices expand the basic
b) Byte, kilobyte, megabyte, gigabyte computer system, but are not a necessary
c) Byte, petabyte, gigabyte, megabyte part of it?
d) Byte, gigabyte, megabyte, kilobyte a) Peripheral
b) Surge
c) Pixel
10) Which storage medium can be write- d) Cartridge
protected?
a) Hard disc
b) Floppy disc 16) Windows, Mac OS, UNIX, and Linnux are
all examples of
c) CD-RW
d) Hard copy

11) How much data can be saved on one


compact disc?
a) Less than a Zip disc
b) About the same as 500 floppy discs
c) More than a DVD
d) It varies a lot, depending on the
computer

12) When data has been stored on this


medium, a laser light reads the file:
a) Compact Disc
b) Digital Audio Tape
c) Zip disk
d) Hard disk

13) Which group represents input devices?


a) Ink cartridge, tray, paper
b) Monitor, speakers, printer
©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.
Gagan@9855689837 2008
a) CAD
a) Microsoft products b) WordPerfect
b) Operating system software c) Excel
c) Application software d) Explorer
d) “Freeware” software

22) When a computer runs two or more


17) When using the Windows program, what software applications at the same time, it
is a menu? is called:
a) Auto-correct a) Multitasking
b) Helpful tips b) Binary
c) List of choices c) Domain
d) Warning d) Error

18) An icon is . . . 23) What is the sequence of events that


a) A small picture or symbol that occurs from the time that you turn on the
represents a program, file, or function computer to the time it is ready to accept
b) An infrared beam that provides input commands?
through mouse-clicks a) Control dialog
c) A unit of measurement used to describe b) Master launch
storage capacity c) Boot process
d) A type of encryption used to protect d) Simple
privacy while using a network.

19) Before buying a software program,


what detail should you check to be sure it
will work with your computer system?
a) Previous versions
b) Platform
c) Peripherals
d) Price

20) Which type of software accepts input


from the user and tells the computer how
to complete a specific task?
a) Operating system
b) Sector
c) Application
d) Boot

21) Which software would be best for using


formulas to make calculations?

©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.


Gagan@9855689837 2008
b) Server
c) Hard drive
24) In order for the computer to be able to d) Expansion slot
process data, the input must first be
converted to:
a) Webding symbols 29) Which of the following statements about
b) Default settings viruses and destructive programs is most
c) Binary code TRUE?
d) Digits with three decimals a) They destroy programs if copyright is
violated
b) They can lurk for months before
25) An output device allows the computer attacking
user to . . . c) As time passes, they weaken and die
a) Search a database d) Their creators intended no harm
b) Change a password
c) Save files
d) See or hear information 30) When it comes to saving files, which is
NOT possible?
a) I can organize files into folders and
26) What is good about a LAN (Local Area subfolders
Network)? b) I can move files from one folder to
a) Privacy is guaranteed another folder
b) Expensive devices can be shared by c) I can save files in more than one folder
more than one computer with one command
c) A problem with the network only d) I can delete files that I no longer need
impacts one computer
d) Passwords never expire

27) Which option links small networks


around the world together using unique IP Thank you
addresses:
a) Microsoft Corporation If you want questions for competitive
b) Customer Support exams then you can demand through my
c) Internetwork
d) State/Local Government
email id:-

gdeep95@gmail.com
28) Which type of computer links to other
computers so that data, programs, and
peripheral devices can be shared?
a) Supercomputer

©Gagan@9855689837. All rights reserved. Photocopying is strictly prohibited.

You might also like