☰
✕
Home
Mock Test
State PCS
Railway
SSC
HSSC
DSSSB
RO/ARO
UPSC
Hssc Computer Health Department Exam 2016 (Shift-I)
📆 March 4, 2025
Total Questions: 100
31.
An attack which makes the computer resources unavailable to its intended user is called.
(1) Denial of service attack
(2) Virus attack
(3) Worms attack
(4) Botnet process
Correct Answer:
(1) Denial of service attack
Solution:
An attack make the computer resources unavailable to its intended users is called Deniaj of service attack.
32.
_____is considered as a 'Scareware' as it forces users to pay a fee by scaring or intimidating them.
(1) Spam
(2) Adware
(3) spyware
(4) Ransom ware
Correct Answer:
(4) Ransom ware
Solution:
Ransom-ware is considered as scarewave as it forces user to pay a fee by scaring or intimidating them.
33.
The act to obtain confidential information from a user by falsifying their identity is called_______.
(1) Computer virus
(2) Spyware scam
(3) Phishing scam
(4) None of the options
Correct Answer:
(3) Phishing scam
Solution:
Phishing scam is an act to obtain confidential information from a user by falsifying their identity.
34.
In C++, _______ is the syntax used to access data members of an object
(1) object@datamernber
(2) object *datamember
(3) object->datamember
(4) object.datamember
Correct Answer:
(4) object.datamember
Solution:
C and C++ ar high level languages developed by Denis Richi & Brown karnigham gh-anof bell-laboratory in 1972. In C++ object datamember is the syntax used to acess data members of an object.
35.
In Java ___ is the range of "byte" data type
(1)-128 to 127
(2)-32768 to 32767
(3)-2147483648to 2147483647
(4)-1 to +1
Correct Answer:
(1)-128 to 127
Solution:
In Java-128 to 127 is the rang of byte data type.
36.
Which is not a computer peripheral?
(1) Tape drive
(2) Motherboard
(3) Microphone
(4) Light pen
Correct Answer:
(2) Motherboard
Solution:
Motherboard is not computer Peripheral.
37.
Which is the temporary memory that provides high speed data access to a processor?
(1) Random Access Memory (RAM)
(2) Cache
(3) Read only memory (ROM)
(4) Flash
Correct Answer:
(2) Cache
Solution:
Cache memory is primary memory that provides high speed data acces to a processor.
38.
Which one can generate images to a computer monitor?
(1) Sound card
(2) Video card
(3) Expension card
(4) Modem
Correct Answer:
(2) Video card
Solution:
Video card can generate Image to a computer monitor.
39.
Which of the following is a strong password?
(1) 29th September 88
(2) Bangalore88
(3) Laugustdelhi@#
(4) P@a55wOrd
Correct Answer:
(4) P@a55wOrd
Solution:
P@a55wOrd is a strong password.
40.
Χ* (Υ.Ζ) = (X*Y). (X*Z) is the
(1) Commutative Property
(2) Distributive property
(3) associative property
(4) Identity Property
Correct Answer:
(2) Distributive property
Solution:
X*(Y*Z) = (X*Y) (X*Z) is a distributive property
Submit Quiz
« Previous
1
2
3
4
5
6
7
8
9
10
Next »
« Previous Post
Next Post »
Related Posts
Optics part (1)
Conductivity
Physical Properties of Matter
Computer and Information Technology Part (2)
Space Part-3
Heat and Thermodynamics part-(1)