Thanks to visit codestin.com
Credit goes to www.scribd.com

100% found this document useful (1 vote)
55 views7 pages

Technical Questions

Uploaded by

rakeen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
55 views7 pages

Technical Questions

Uploaded by

rakeen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Technical Questions

A) Common Application and MS Office


1. What was Photo Editor renamed to while using Microsoft Office, 2003? :

A) Photo Manager
B) Picture Manager
C) Picture Editor
D) Paint Editor

Answers : B

2. Which of the following was the HTML editor associated with Microsoft Office until 2003?

A) Front Page
B) Explorer
C) Web Page
D) Dream Weaver

Answer : A

3. Which of these functions is used to land into a specific location of a document?

A) Table of contents
B) Hyper Text
C) Bookmark
D) Macro

Answers: C

4. Which if these can we type in the Run dialogue box to start MS Office.

A) winword.exe
B) word.exe
C) msword.exe
D) Docx.exe

Answers: A
5. Choose a shortcut to open dialogue box:

A) F12
B) Shift F12
C) Alt+F12
D) Ctrl+F12

Answers: D

6. Which option will you choose if you want to copy the formatting of a document that is
Bold, Red in Color with Green Background to another paragraph in one go?

A) Format button
B) Format menu
C) Format Painter
D) Format Macro

Answer: C

7. Which of these terms is used to denote a letter and number in the intersecting column and
row:

A) Cell location
B) Cell position
C) Cell co-ordinates
D) Cell address
E) Cell continents

Answer: D

8. Which of he following can be termed as a collection of information saved as unit.

A) Folder
B) File
C) Path
D) File extension
E) None of these

Answer: B
B) Networking Security and Cloud
9. Which is not an objective of network security?

A) Identification
B) Authentication
C) Lock
D) Access Control

Answer: C

Explanation: The Identification, Authentication and Access control are the objectives of
network security. There is no such thing called lock.

10. An algorithm in encryption is called _____________

A) Algorithm
B) Procedure
C) Cipher
D) Module

Answer: C

Explanation: An algorithm used in encryption is referred to as a cipher. cipher is an


algorithm for performing encryption or decryption.

Ciphers, also called encryption algorithms, are systems for encrypting and decrypting data. A
cipher converts the original message, called plaintext, into ciphertext using a key to
determine how it is done.

11. What is ransomware?

A) A nicknames for the types of spyware that require a password on boot


B) Software that steals files from your computer and is used by blackmailers.
C) A software that hijacks your computer and asks you to pay in order for it to be removed.
D) Viruses that infects files and won’t let you open them and unless you a certain passcode.

Answer: C

Explanation: A software that hijacks your computer and asks you to pay in order for it to be
removed.

Ransomware is malware that employs encryption to hold a victim’s information at ransom.


A user or organization’s critical data is encrypted so that they cannot access files, databases,
or applications. A ransom is then demanded to provide access. Ransomware is often
designed to spread across a network and target database and file servers, and can thus
quickly paralyze an entire organization.
12. Which of the following has network reliability issues?

A) Frequency of Failures
B) Recovery time after failures
C) Catastrophe
D) All of the above

Answer: D

Explanation: Frequency of failures, recovery time after failure, catastrophe all are network
reliability issues.

13. A digital signature scheme consists of which of the following typical algorithms?

A) Key generation, Signing, Signature Verifying Algorithm


B) Signature Verifying Algorithm
C) Key generation Algorithm
D) Signing Algorithm

Answer: A

Explanation:

Key generation:-

Key generation is the process of generating keys for cryptography. The key is used to
encrypt and decrypt data whatever the data is being encrypted or decrypted .

Signing and Signature :-

To create a digital signature, signing algorithms like email programs create a one-way hash
of the electronic data which is to be signed. The signing algorithm then encrypts the hash
value using the private key (signature key)

Verifying Algorithm:-

A verification algorithm is a two-argument algorithm A, where one argument is an ordinary


input string x, and the other argument is a binary string y called a certificate.

14. The type of encoding in which manipulation of bit streams without regard to what the
bits mean is ..................…

A) Destination Encoding
B) Entropy Encoding
C) Source Encoding
D) Differential Encoding

Answer: B

Explanation: Entropy encoding is a term referring to lossless coding technique that replaces
data elements with coded representations. Entropy encoding in combination with the
transformation and quantization results in significantly reduced data size.

15. The protocol used to provide security to e-mails?

A) POP(Post Office Protocol)


B) PGP (Pretty Good Privacy)
C) SNMP(Simple Network Management Protocol)
D) HTTP(Hyper Text Transfer Protocol)

Answer: B

Explanation: PGP is a protocol used for encrypting, decrypting and signing messages or
files using a key pair. PGP is primarily used for encrypting communications at the
Application layer, typically used for one-on-one encrypted messaging.

16. The ................... portion of LAN management software restricts access, records user
activities and audit data etc.

A) Configuration management
B) Security management
C) Performance management
D) None of these

Answer: B

Explanation: The Security management portion of LAN management software restricts


access, records user activities and audit data etc.
C) Pseudo Code Questions

17. What will be the output of the following pseudo code?


For input a = 5 & b = 5.
function (input a, input b)
If (a < b)
return function (b, a)
elseif (b != 0)
return (a * function (a, b - 1))
else
return 0

A) 15625
B) 625
C) 3125
D) 525

Answer: C

Explantion:

function(5,5) will return 5 x function(5,4)

function(5,4) will return 5 x 5 x function(5,3)

function(5,3) will return 5 x 5 x 5 x function(5,2)

function(5,2) will return 5 x 5 x 5 x 5 function(5,1)

function(5,0) will return 5 x 5 x 5 x 5 x 5 = 3125

18. What will be the output of the following pseudo code


initialize char c
set c= a
print "%d",a

A) 64
B) 97
C) a
D) Error

Answer: B

Explanation: The code will print the ASCII value of the entered character.

19. What will be the output of the following code ?


#include<stdio.h>
int main ()
{
char c,a,b;
c='f';
a='s';
b='x';
int sum= c+a+b;
printf ("%d", sum);
}

A) 324
B) 315
C) 320
D) 337

Answer: D

Explanation:
The following code will add the ASCII values of the given characters
f = 102
s = 115
x = 120
sum = 102+115+120 = 337

20. What will be the output of the following pseudo code for arr[]= 1,2,3,4,5 .
initialize i,n
intialize an array of size n
accept the values for the array
for i= 0 to n
arr[i] = arr[i]+arr[i+1]
end for
print the array elements

A) 3 5 7 9 5
B) 3 5 7 9 11
C) 3 5 9 15 20
D) Error
Answer: A

Explanation: The following pseudo code will add the first element with the second, the
second element with the third, the third element with the fourth and the fourth element with
the fifth, the fifth element will remain as it is
and hence the output will be 3 5 7 9 5 .

You might also like