ISS (Statistical Services) Statistics Paper I (New 2016 MCQ Pattern): Questions 70 - 75 of 471

Access detailed explanations (illustrated with images and videos) to 471 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. Subscription can be renewed yearly absolutely FREE! View Sample Explanation or View Features.

Rs. 300.00 or

How to register?

Question number: 70

» Computer Application and Data Processing » Network » Internet

Edit
MCQ▾

Question

An Internet-type application uses following Internet protocol:

Choices

Choice (4) Response

a.

SMTP

b.

HTTP

c.

FTP

d.

All a. , b. and c. are correct

Question number: 71

» Computer Application and Data Processing » Network » Antivirus

Edit
MCQ▾

Question

Antivirus software will always detect:

Choices

Choice (4) Response

a.

Viruses that have been identified by the author of the anti-virus software

b.

Encrypted viruses

c.

Macro viruses

d.

None of the above

Question number: 72

» Computer Application and Data Processing » Network » Computer Security

Edit
MCQ▾

Question

In security threat, the process where communication between two parties has been overheard by someone else is an example of:

Choices

Choice (4) Response

a.

Interception

b.

Fabrication

c.

Interruption

d.

Modification

Question number: 73

» Computer Application and Data Processing » Basics of Computer » Hardware - Input, Output and Peripheral Devices

Edit
MCQ▾

Question

For a computer, a thumb drive is

Choices

Choice (4) Response

a.

Input device

b.

Output device

c.

Question does not provide sufficient data or is vague

d.

All of the above

Question number: 74

» Computer Application and Data Processing » Basics of Programming » Flowchart

Edit
MCQ▾

Question

QuickSort algorithm have following as a pivot:

Choices

Choice (4) Response

a.

Always pick first element as pivot.

b.

Pick a random element as pivot.

c.

Always pick last element as pivot (implemented below).

d.

All a. , b. and c. are correct

Question number: 75

» Computer Application and Data Processing » Network » Computer Security

Edit
MCQ▾

Question

Which of the following statement is/are correct regarding computer security mechanism?

Choices

Choice (4) Response

a.

Encryption verify the claimed identity of a user.

b.

Authentication transforms data into something an attacker cannot understand.

c.

Authorization is a kind of permission.

d.

All of the above