Computer Application and Data Processing (ISS (Statistical Services) Statistics Paper I (New 2016 MCQ Pattern)): Questions 65 - 69 of 214
Get 1 year subscription: Access detailed explanations (illustrated with images and videos) to 469 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. View Sample Explanation or View Features.
Rs. 300.00 or
Question number: 65
» Computer Application and Data Processing » Basics of Computer » Low & High Level Languages
Question
Following is an example of Low Level Language
Choices
Choice (4) | Response | |
---|---|---|
a. | COBOL |
|
b. | Java |
|
c. | BASIC |
|
d. | Assembly Language |
|
Question number: 66
» Computer Application and Data Processing » Network » Firewall
Question
Which of the following statement is/are correct regarding a Firewall?
Choices
Choice (4) | Response | |
---|---|---|
a. | Avast is an example of a firewall in computer. |
|
b. | One cannot download firewall in computer. |
|
c. | None of the above |
|
d. | Question does not provide sufficient data or is vague |
|
Question number: 67
» Computer Application and Data Processing » Network » Internet
Question
Which of the following property is satisfied by Peer to peer network?
Choices
Choice (4) | Response | |
---|---|---|
a. | It has centralized administration. |
|
b. | It can have a spread over thousands of kilometer. |
|
c. | It is a cheap solution for sharing information or devices. |
|
d. | It has dedicated servers. |
|
Question number: 68
» Computer Application and Data Processing » Network » Antivirus
Question
Which of the following is a type of kinds of vulnerabilities seen in antivirus software?
Choices
Choice (4) | Response | |
---|---|---|
a. | ActiveX-related |
|
b. | Engine-based |
|
c. | Local Privilege Escalation |
|
d. | All a. , b. and c. are correct |
|
Question number: 69
» Computer Application and Data Processing » Network » Computer Security
Question
Confidentiality in Computer Security refers to:
Choices
Choice (4) | Response | |
---|---|---|
a. | Improper alterations in a secure computer system should be detectable and recoverable. |
|
b. | The situation that an unauthorized party has gained access to a service or data. |
|
c. | Information of computer is disclosed only to authorize parties. |
|
d. | Both a. and c. are correct |
|