ISS Statistics Paper I (New 2016 MCQ Pattern): Questions 70 - 75 of 404

Get 1 year subscription: Access detailed explanations (illustrated with images and videos) to 404 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. View Sample Explanation or View Features.

Rs. 300.00 or

Question number: 70

» Computer Application and Data Processing » Network » Internet

MCQ▾

Question

An Internet-type application uses following Internet protocol:

Choices

Choice (4) Response

a.

HTTP

b.

FTP

c.

SMTP

d.

All a. , b. and c. are correct

Question number: 71

» Computer Application and Data Processing » Network » Antivirus

MCQ▾

Question

Antivirus software will always detect:

Choices

Choice (4) Response

a.

Macro viruses

b.

Encrypted viruses

c.

Viruses that have been identified by the author of the anti-virus software

d.

Question does not provide sufficient data or is vague

Question number: 72

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

In security threat, the process where communication between two parties has been overheard by someone else is an example of:

Choices

Choice (4) Response

a.

Interception

b.

Modification

c.

Interruption

d.

Fabrication

Question number: 73

» Computer Application and Data Processing » Basics of Computer » Hardware - Input, Output and Peripheral Devices

MCQ▾

Question

For a computer, a thumb drive is

Choices

Choice (4) Response

a.

Input device

b.

Output device

c.

None of the above

d.

Question does not provide sufficient data or is vague

Question number: 74

» Computer Application and Data Processing » Basics of Programming » Flowchart

MCQ▾

Question

QuickSort algorithm have following as a pivot:

Choices

Choice (4) Response

a.

Pick a random element as pivot.

b.

Always pick first element as pivot.

c.

Always pick last element as pivot (implemented below).

d.

All a. , b. and c. are correct

Question number: 75

» Computer Application and Data Processing » Network » Computer Security

MCQ▾

Question

Which of the following statement is/are correct regarding computer security mechanism?

Choices

Choice (4) Response

a.

Encryption verify the claimed identity of a user.

b.

Authentication transforms data into something an attacker cannot understand.

c.

Authorization is a kind of permission.

d.

Question does not provide sufficient data or is vague

Sign In