Hssc Computer Health Department Exam 2016 (Shift-I)

Total Questions: 100

31. An attack which makes the computer resources unavailable to its intended user is called.

Correct Answer: (1) Denial of service attack
Solution:An attack make the computer resources unavailable to its intended users is called Deniaj of service attack.

32. _____is considered as a 'Scareware' as it forces users to pay a fee by scaring or intimidating them.

Correct Answer: (4) Ransom ware
Solution:Ransom-ware is considered as scarewave as it forces user to pay a fee by scaring or intimidating them.

33. The act to obtain confidential information from a user by falsifying their identity is called_______.

Correct Answer: (3) Phishing scam
Solution:Phishing scam is an act to obtain confidential information from a user by falsifying their identity.

34. In C++, _______ is the syntax used to access data members of an object

Correct Answer: (4) object.datamember
Solution:C and C++ ar high level languages developed by Denis Richi & Brown karnigham gh-anof bell-laboratory in 1972. In C++ object datamember is the syntax used to acess data members of an object.

35. In Java ___ is the range of "byte" data type

Correct Answer: (1)-128 to 127
Solution:In Java-128 to 127 is the rang of byte data type.

36. Which is not a computer peripheral?

Correct Answer: (2) Motherboard
Solution:Motherboard is not computer Peripheral.

37. Which is the temporary memory that provides high speed data access to a processor?

Correct Answer: (2) Cache
Solution:Cache memory is primary memory that provides high speed data acces to a processor.

38. Which one can generate images to a computer monitor?

Correct Answer: (2) Video card
Solution:Video card can generate Image to a computer monitor.

39. Which of the following is a strong password?

Correct Answer: (4) P@a55wOrd
Solution:P@a55wOrd is a strong password.

40. Χ* (Υ.Ζ) = (X*Y). (X*Z) is the

Correct Answer: (2) Distributive property
Solution:X*(Y*Z) = (X*Y) (X*Z) is a distributive property