Hssc Computer Health Department Exam 2016 (Shift-I)Total Questions: 10031. An attack which makes the computer resources unavailable to its intended user is called.(1) Denial of service attack(2) Virus attack(3) Worms attack(4) Botnet processCorrect Answer: (1) Denial of service attackSolution:An attack make the computer resources unavailable to its intended users is called Deniaj of service attack.32. _____is considered as a 'Scareware' as it forces users to pay a fee by scaring or intimidating them.(1) Spam(2) Adware(3) spyware(4) Ransom wareCorrect Answer: (4) Ransom wareSolution:Ransom-ware is considered as scarewave as it forces user to pay a fee by scaring or intimidating them.33. The act to obtain confidential information from a user by falsifying their identity is called_______.(1) Computer virus(2) Spyware scam(3) Phishing scam(4) None of the optionsCorrect Answer: (3) Phishing scamSolution:Phishing scam is an act to obtain confidential information from a user by falsifying their identity.34. In C++, _______ is the syntax used to access data members of an object(1) object@datamernber(2) object *datamember(3) object->datamember(4) object.datamemberCorrect Answer: (4) object.datamemberSolution:C and C++ ar high level languages developed by Denis Richi & Brown karnigham gh-anof bell-laboratory in 1972. In C++ object datamember is the syntax used to acess data members of an object.35. In Java ___ is the range of "byte" data type(1)-128 to 127(2)-32768 to 32767(3)-2147483648to 2147483647(4)-1 to +1Correct Answer: (1)-128 to 127Solution:In Java-128 to 127 is the rang of byte data type.36. Which is not a computer peripheral?(1) Tape drive(2) Motherboard(3) Microphone(4) Light penCorrect Answer: (2) MotherboardSolution:Motherboard is not computer Peripheral.37. Which is the temporary memory that provides high speed data access to a processor?(1) Random Access Memory (RAM)(2) Cache(3) Read only memory (ROM)(4) FlashCorrect Answer: (2) CacheSolution:Cache memory is primary memory that provides high speed data acces to a processor.38. Which one can generate images to a computer monitor?(1) Sound card(2) Video card(3) Expension card(4) ModemCorrect Answer: (2) Video cardSolution:Video card can generate Image to a computer monitor.39. Which of the following is a strong password?(1) 29th September 88(2) Bangalore88(3) Laugustdelhi@#(4) P@a55wOrdCorrect Answer: (4) P@a55wOrdSolution:P@a55wOrd is a strong password.40. Χ* (Υ.Ζ) = (X*Y). (X*Z) is the(1) Commutative Property(2) Distributive property(3) associative property(4) Identity PropertyCorrect Answer: (2) Distributive propertySolution:X*(Y*Z) = (X*Y) (X*Z) is a distributive propertySubmit Quiz« Previous12345678910Next »