a) Vital Information Recourse Under System
b) Vital Information Resource Under Seize
c) Vital Information Resource Under Secure
d) Vital Information Recourse Under System
e) None of these
2. What kind of server converts IP addresses to domain names?
a) RTP
b) UTP
c) MNS
d) DNS
e) None of these
3. To print to find an individual item in a file immediately __________.
a) Esc+P
b) Alt+P
c) Ctrl+P
d) Shift+P
e) None of these
4. Which of the following is not a function of the control unit?
a) Direct operations
b) Interpret instructions
c) Execute instructions
d) Read instructions
e) None of these
5. Coaxial cables are widely used on which of the following network?
a) Mobile networks
b) Broadband networks
c) Cable TV networks
d) Telephone networks
e) None of these
6. Which among the following is the Extension of MS Access?
a) .txt
b) .xls
c) .doc
d).accdb and .mdb
e) None of these
7. Which protocol provides e-mail facility among different hosts?
a) TELNET
b) SMTP
c) FTP
d) SNMP
e) None of these
8. What happens when operating system is loaded in RAM?
a) Copying
b) Re-booting
c) Booting
d) Scanning
e) None of these
9. Which of the following is used by the browser to connect to the location of the Internet resources?
a) WWW
b) URL
c) HTML
d) XML
e) None of these
10. Effective system requirement analysis is required for___________.
a) Joint Application Design (JAD)
b) Reverse engineering
c) Traditional system development life cycle
d) All of these
e) None of these
Answers:
1. b) Vital Information Resource Under Seize
2. d) DNS
3. c) Ctrl+P
4. a) Direct operations
5. c) Cable TV networks
6. d).accdb and .mdb
7. b) SMTP
8. c) Booting
9. b) URL
10. c) Traditional system development life cycle
Thanks.