1. Verification
2. Validation
3. Testing
4. Software quality assurance
5. None of these
1. Blind Carbon Copy
2. Black Carbon Copy
3. Blank Carbon Copy
4. Blue Carbon Copy
5. None of these
3. Which of the following is the correct use of Buffer or Block cashes?
1. Improve disk performance
2. Handle interrupts
3. Increase the capacity of main memory
4. Speed up main memory read operations
5. None of these
4. The principal electronic payment systems for electronic commerce is
1. Credit card
2. Digital wallet
3. Electronic cheque
4. All of the above
5. None of these
5. _______ allows wireless mobile device to access the internet and its services such as the web and email.
1. TCP
2. Ethernet
3. WAP
4. Token ring
5. None of these
6. The conversation of electronic data into another form is called-
1. Biometrics
2. Encryption
3. Compression
4. Encapsulation
5. None of these
7. Which of the following protocol have file edit capability in remote logging?
1. FTP
2. TFTP
3. Telnet
4. SMTP
5. None of these
8. Grammar of the programming is checked at which phase of compiler?
1. Semantic analysis
2. Syntax analysis
3. Code generation
4. Code optimization
5. None of these
9. End to End connectivity is provided from which of the following layer?
1. Network layer
2. Session layer
3. Transport layer
4. Data link layer
5. None of these
10. JPEG stands for -
1. Joint Photographic Expert group
2. Joint Photographic Expert graphics
3. Join Photographic Expert group
4. Join Photographic Expert graphics
5. None of these