Technical Questions
A) Common Application and MS Office
1. What was Photo Editor renamed to while using Microsoft Office, 2003? :
A) Photo Manager
B) Picture Manager
C) Picture Editor
D) Paint Editor
Answers : B
2. Which of the following was the HTML editor associated with Microsoft Office until 2003?
A) Front Page
B) Explorer
C) Web Page
D) Dream Weaver
Answer : A
3. Which of these functions is used to land into a specific location of a document?
A) Table of contents
B) Hyper Text
C) Bookmark
D) Macro
Answers: C
4. Which if these can we type in the Run dialogue box to start MS Office.
A) winword.exe
B) word.exe
C) msword.exe
D) Docx.exe
Answers: A
5. Choose a shortcut to open dialogue box:
A) F12
B) Shift F12
C) Alt+F12
D) Ctrl+F12
Answers: D
6. Which option will you choose if you want to copy the formatting of a document that is
Bold, Red in Color with Green Background to another paragraph in one go?
A) Format button
B) Format menu
C) Format Painter
D) Format Macro
Answer: C
7. Which of these terms is used to denote a letter and number in the intersecting column and
row:
A) Cell location
B) Cell position
C) Cell co-ordinates
D) Cell address
E) Cell continents
Answer: D
8. Which of he following can be termed as a collection of information saved as unit.
A) Folder
B) File
C) Path
D) File extension
E) None of these
Answer: B
B) Networking Security and Cloud
9. Which is not an objective of network security?
A) Identification
B) Authentication
C) Lock
D) Access Control
Answer: C
Explanation: The Identification, Authentication and Access control are the objectives of
network security. There is no such thing called lock.
10. An algorithm in encryption is called _____________
A) Algorithm
B) Procedure
C) Cipher
D) Module
Answer: C
Explanation: An algorithm used in encryption is referred to as a cipher. cipher is an
algorithm for performing encryption or decryption.
Ciphers, also called encryption algorithms, are systems for encrypting and decrypting data. A
cipher converts the original message, called plaintext, into ciphertext using a key to
determine how it is done.
11. What is ransomware?
A) A nicknames for the types of spyware that require a password on boot
B) Software that steals files from your computer and is used by blackmailers.
C) A software that hijacks your computer and asks you to pay in order for it to be removed.
D) Viruses that infects files and won’t let you open them and unless you a certain passcode.
Answer: C
Explanation: A software that hijacks your computer and asks you to pay in order for it to be
removed.
Ransomware is malware that employs encryption to hold a victim’s information at ransom.
A user or organization’s critical data is encrypted so that they cannot access files, databases,
or applications. A ransom is then demanded to provide access. Ransomware is often
designed to spread across a network and target database and file servers, and can thus
quickly paralyze an entire organization.
12. Which of the following has network reliability issues?
A) Frequency of Failures
B) Recovery time after failures
C) Catastrophe
D) All of the above
Answer: D
Explanation: Frequency of failures, recovery time after failure, catastrophe all are network
reliability issues.
13. A digital signature scheme consists of which of the following typical algorithms?
A) Key generation, Signing, Signature Verifying Algorithm
B) Signature Verifying Algorithm
C) Key generation Algorithm
D) Signing Algorithm
Answer: A
Explanation:
Key generation:-
Key generation is the process of generating keys for cryptography. The key is used to
encrypt and decrypt data whatever the data is being encrypted or decrypted .
Signing and Signature :-
To create a digital signature, signing algorithms like email programs create a one-way hash
of the electronic data which is to be signed. The signing algorithm then encrypts the hash
value using the private key (signature key)
Verifying Algorithm:-
A verification algorithm is a two-argument algorithm A, where one argument is an ordinary
input string x, and the other argument is a binary string y called a certificate.
14. The type of encoding in which manipulation of bit streams without regard to what the
bits mean is ..................…
A) Destination Encoding
B) Entropy Encoding
C) Source Encoding
D) Differential Encoding
Answer: B
Explanation: Entropy encoding is a term referring to lossless coding technique that replaces
data elements with coded representations. Entropy encoding in combination with the
transformation and quantization results in significantly reduced data size.
15. The protocol used to provide security to e-mails?
A) POP(Post Office Protocol)
B) PGP (Pretty Good Privacy)
C) SNMP(Simple Network Management Protocol)
D) HTTP(Hyper Text Transfer Protocol)
Answer: B
Explanation: PGP is a protocol used for encrypting, decrypting and signing messages or
files using a key pair. PGP is primarily used for encrypting communications at the
Application layer, typically used for one-on-one encrypted messaging.
16. The ................... portion of LAN management software restricts access, records user
activities and audit data etc.
A) Configuration management
B) Security management
C) Performance management
D) None of these
Answer: B
Explanation: The Security management portion of LAN management software restricts
access, records user activities and audit data etc.
C) Pseudo Code Questions
17. What will be the output of the following pseudo code?
For input a = 5 & b = 5.
function (input a, input b)
If (a < b)
return function (b, a)
elseif (b != 0)
return (a * function (a, b - 1))
else
return 0
A) 15625
B) 625
C) 3125
D) 525
Answer: C
Explantion:
function(5,5) will return 5 x function(5,4)
function(5,4) will return 5 x 5 x function(5,3)
function(5,3) will return 5 x 5 x 5 x function(5,2)
function(5,2) will return 5 x 5 x 5 x 5 function(5,1)
function(5,0) will return 5 x 5 x 5 x 5 x 5 = 3125
18. What will be the output of the following pseudo code
initialize char c
set c= a
print "%d",a
A) 64
B) 97
C) a
D) Error
Answer: B
Explanation: The code will print the ASCII value of the entered character.
19. What will be the output of the following code ?
#include<stdio.h>
int main ()
{
char c,a,b;
c='f';
a='s';
b='x';
int sum= c+a+b;
printf ("%d", sum);
}
A) 324
B) 315
C) 320
D) 337
Answer: D
Explanation:
The following code will add the ASCII values of the given characters
f = 102
s = 115
x = 120
sum = 102+115+120 = 337
20. What will be the output of the following pseudo code for arr[]= 1,2,3,4,5 .
initialize i,n
intialize an array of size n
accept the values for the array
for i= 0 to n
arr[i] = arr[i]+arr[i+1]
end for
print the array elements
A) 3 5 7 9 5
B) 3 5 7 9 11
C) 3 5 9 15 20
D) Error
Answer: A
Explanation: The following pseudo code will add the first element with the second, the
second element with the third, the third element with the fourth and the fourth element with
the fifth, the fifth element will remain as it is
and hence the output will be 3 5 7 9 5 .