Computer (Part-6)

Total Questions: 33

1. The delivery of computing services such as data storage, servers and databases over the internet is known as: [S.S.C. JE Electrical Exam 28.10.2020 (Shift-I)]

Correct Answer: (c) Cloud Computing
Solution:

The delivery of computing services such as data storage, servers, and databases over the internet is known as cloud computing.

This means you can access and use these resources on demand from a provider's data centers, without needing to own and maintain the physical infrastructure yourself. It offers benefits like scalability, cost-effectiveness, and accessibility from anywhere with an internet connection.

2. A _____ is an agreement between the communicating parties on how communication is to proceed. [S.S.C. Online Graduation Level (T-1) 1.09.2016 (Shift-I)]

Correct Answer: (d) Protocol
Solution:A protocol is an agreement between communicating parties on how communication should proceed. Protocols define the rules and formats used for data transmission, ensuring that different devices or systems can understand and interact with each other.

3. _______means that the data is accurate and consistent in the database. [S.S.C. Online Graduation Level (T-1) 27.08.2016 (Shift-III)]

Correct Answer: (d) Data Integrity
Solution:Data integrity is a concept and process that ensures the accuracy, completeness, consistency, and validity of an organization's data. By following the process, organizations not only ensure the integrity of the data but guarantee they have accurate and correct data in their database.

The importance of data integrity increases as data volumes continue to increase exponentially. Major organizations are becoming more reliant on data integration and the ability to interpret information to predict consumer behaviour, assess market activity, and mitigate potential data security risks. This is crucial to data mining, so data scientists can use the right information.

4. What is a collection of information stored as a unit called? [S.S.C. Online MTS (T-1) 11.10.2017 (Shift-I)]

Correct Answer: (a) file
Solution:A file is a collection of data or information. Every file has a unique name called filename. Almost all information stored in a computer must be in a file. Many different types of files store different types of information, eg. Program files store programs, text files store text, etc.

5. Which company developed Java? [S.S.C. Online CHSL (T-I) 18.01.2017 (Shift-III)]

Correct Answer: (b) Sun
Solution:The Java programming language was developed by Sun Microsystems in the early 1990s. Although it is primarily used for Internet-based applications, Java is a simple, efficient, general purpose language. Java was originally designed for embedded network applications running on multiple platforms. It is a portable, object-oriented, interpreted language.

6. In which year did the JavaScript Programming language come into existence? [S.S.C. Online CHSL (T-1) 13.10.2020 (Shift-2)]

Correct Answer: (c) 1995
Solution:

The JavaScript programming language came into existence in 1995.

It was created by Brendan Eich at Netscape Communications Corporation. Initially named "Mocha," it was later renamed "LiveScript" and finally "JavaScript" before its official release in December 1995 as part of Netscape Navigator 2.0.

7. ________changes each time it is installed to avoid detection by antivirus software. [S.S.C. Online Graduation Level (T-1) 29.08.2016 (Shift-I)]

Correct Answer: (a) Polymorphic virus
Solution:
A polymorphic virus is a type of malware that changes its code and structure with each infection, making it difficult for traditional security tools to detect and remove. It achieves this by using encryption with varying keys, effectively creating a modified version of itself each time it replicates. This ability to morph makes it a particularly dangerous threat. 

8. In IT, the technique of delaying outgoing acknowledgements temporarily is known as- [S.S.C. Online Graduation Level (T-1) 11.09.2016 (Shift-III)]

Correct Answer: (c) Piggybacking
Solution:In IT, delaying outgoing acknowledgements temporarily until they can be piggybacked onto the next outgoing data frame is known as piggybacking. This technique improves efficiency and reduces channel bandwidth usage by combining the acknowledgement with the outgoing data, rather than sending it as a separate packet.

9. Which of the following statements about firewall (in the context of computing) is INCORRECT? [S.S.C. Online CHSL (T-1) 12.10.2020 (Shift-III)]

Correct Answer: (a) It is unable to permit legitimate communication to pass.
Solution:One incorrect statement about firewalls is: "It is unable to permit legitimate communication to pass." Firewalls are designed to control network traffic, not completely block it. They allow legitimate communication to pass through while blocking unauthorized or potentially harmful traffic based on predefined security rules.

10. In computing,_________is network security system that monitors incoming and outgoing network traffic based on predefined security rules. [S.S.C. JE Civil Exam 23.03.2021 (Shift-I)]

Correct Answer: (a) Firewall
Solution:A firewall is a part of a computer system or network designed to prevent unauthorized access and allow authorized communications. Firewalls can he implemented with hardware or software or  combination of both. It is often used for unauthorized Internet to prevent users from using personal networks connected to the Internet, mainly intranets.