Computer Hardware MCQ-1



Multiple Choice Quiz

1.                  The central processing unit is the most important hardware component of a computer system. It is also known as a(n):
a.         CPU or the central processor.
b.        Instruction processor
c.         Main microprocessor
d.        All of the above
2.                  One device used as an input device in a computer system is a pointing stick. A pointing stick is best described as:
a.         A small gearshift lever set in a box
b.        A stationary device containing a roller ball whose top is exposed outside its case.
c.         A pen-shaped device with a ballpoint at the end
d.        A small buttonlike device, sometimes likened to the eraser head of a pencil
3 Which one of the following statements would best describe magnetic strip technology?
a.         It is a form of data entry that helps computers read credit cards
b.        It is a form of computing where debit and credit cards have an embedded microprocessor chip
c.         It is a form of technology that enables you to shoot, store, and download still photos or full-motion video with audio into your computer system
d.        It is a form of technology that is commonly used in banks in order to magnetically read checks and deposit slips
4. Which one of the following printing devices uses an electrostatic process similar to a photocopying machine?
a)        Inkjet printers
b)        Laser printers
c)        Dot-matrix printers
d)        Bubble jet printers
2.        A terabyte (TB) is used to express which one of the following approximate measures?:
a)        1,000 bytes of storage
b)        1000,000 bytes of storage
c)        1,000,000,000 bytes of storage
d)        1,000,000,000,000 bytes of storage
3.        In most organizations, massive backup files are most likely to be archived on:
a)        Semiconductor RAM.
b)        Magnetic tape
c)        CD-ROM
d)        Magnetic diskette

Fill in the Blank Quiz

1). Microcomputers are the most important category of computer systems for business people and consumers. This type of computer (             ) is designed to support applications with heavy mathematical computing and graphics display demands such as computer-aided design (CAD) in engineering.
2. A (          )computer is a middle-size computer that is capable of supporting the computing needs of smaller organizations or of managing networks of other computers
3. Network (           ) have become more popular in recent years due in large part to the development of electronic commerce and other business uses of the Internet.
4. A (         )is one-billionth of a second:
5. These online devices (          ) depend on direct connections or telecommunications links to the central processing unit of a computer system.
6. These memory chips (         ) are the most widely used primary storage medium.

True-False Quiz

1.                  Your text discusses the major changes and trends that have occurred during the    major stages or generations of computers. The fourth generation of computers utilized vacuum tubes for their processing and memory circuitry. (true or false)
2.                  Midrange computers can serve as industrial process-control and manufacturing plant computers, and they play a major role in computer-aided manufacturing. (true or false)
3.                  One of the major components of the central processing unit (CPU) is the arithmetic-logic unit. The ALU performs the arithmetic and logic functions required in computer processing. (true or false)
4.                  The major disadvantage of voice computing systems is that they are not technologically or economically feasible for a variety of applications that could benefit from this form of input. (true or false)
5.                  Magnetic ink character recognition (MICR), is a form of input technology, which is widely used, in the banking industry. The iron oxide-based ink can be magnetically read from checks and deposit slips. (true or false)
6.                  A byte is a basic grouping of bits that the computer operates as a single unit. (true or false)

Glossary

Bit: :A contraction of "binary digit." It can have the value of either 0 or 1
Byte: A sequence of adjacent binary digits operated on as a unit and usually shorter than a computer word. In many computer systems, a byte is a grouping of eight bits that can represent one alphabetic or special character or can be packed with two decimal digits
CD-ROM: An optical disk technology for microcomputers featuring compact disks with a storage capacity of over 500 megabytes
Central processing unit: The unit of a computer system that includes the circuits that control the interpretation and execution of instructions. In many computer systems, the CPU includes the arithmetic-logic unit, the control unit, and the primary storage unit
Computer system: Computer hardware as a system of input, processing, output, storage, and control components. Thus a computer system consists of input and output devices, primary and secondary storage devices, the central processing unit, the control unit within the CPU, and other peripheral devices
Computer terminal: Any input/output device connected by telecommunications links to a computer
Direct access : A method of storage where each storage position has a unique address and can be individually accessed in approximately the same period of time without having to search through other storage positions. Same as Random Access. Contrast with Sequential Access.
Floppy disk: A small plastic disk coated with iron oxide that resembles a small phonograph record enclosed in a protective envelope. It is a widely used form of magnetic disk media that provides a direct access storage capability for microcomputer systems.
Gigabyte : One billion bytes. More accurately, 2 to the 30th power, or 1,073,741,824 in decimal notation.
Information appliance: Small Web-enabled microcomputer devices with specialized functions, such as hand-held PDAs, TV set-top boxes, game consoles, cellular and PCS phones, wired telephone appliances, and other Web-enabled home appliances.
Magnetic ink character recognition: The machine recognition of characters printed with magnetic ink. Primarily used for check processing by the banking industry
Magnetic tape: A plastic tape with a magnetic surface on which data can be stored by selective magnetization of portions of the surface
Megabyte: One million bytes. More accurately, 2 to the 20th power, or 1,048,576 in decimal notation
Microcomputer :A very small computer, ranging in size from a "computer on a chip" to hand-held, laptop, and desktop units, and servers.
Microprocessor :A microcomputer central processing unit (CPU) on a chip. Without input/ output or primary storage capabilities in most types.
Midrange computer: :A computer category between microcomputers and mainframes. Examples include minicomputers, network servers, and technical workstations
Network computer:  A low-cost networked microcomputer with no or minimal disk storage, which depends on Internet or intranet servers for its operating system and Web browser, Java-enabled application software, and data access and storage.
Optical character recognition:  The machine identification of printed characters through the use of lightsensitive devices.
Peripheral devices: In a computer system, any unit of equipment, distinct from the central processing unit, that provides the system with input, output, or storage capabilities.
Personal digital assistant: Hand-held microcomputer devices that enable you to manage information such as appointments, to-do lists, and sales contacts, send and receive e-mail, access the Web, and exchange such information with your desktop PC or network server
Picosecond : One trillionth of a second.
Pointing devices : Devices that allow end users to issue commands or make choices by moving a cursor on the display screen
Pointing stick:  A small buttonlike device on a keyboard that moves the cursor on the screen in the direction of the pressure placed upon it
RAID:  Redundant array of independent disks. Magnetic disk units that house many interconnected microcomputer hard disk drives, thus providing large, fault-tolerant storage capacities
Speech recognition:  Direct conversion of spoken data into electronic form suitable for entry into a computer system. Also called voice data entry
Terabyte:  One trillion bytes. More accurately, 2 to the 40th power, or 1,009,511,627,776 in decimal notation
Touch-sensitive screen : An input device that accepts data input by the placement of a finger on or close to the CRT screen.
Trackball:  A rollerball device set in a case used to move the cursor on a computer's display screen
Wand : A hand-held optical character recognition device used for data entry by many transaction terminals
Workstation:  (1) A computer system designed to support the work of one person. (2) A high-powered computer to support the work of professionals in engineering, science, and other areas that require extensive computing power and graphics capabilities.

Microsoft Window MCQ-1



Section 1. Multiple Choice.

The following questions refer to Microsoft Windows:

1.      If you deleted a file, then wanted to recover it, which icon should you select?
a.       My Computer
b.      Recycle Bin
c.       Network Neighborhood
d.      None of these answers are correct

2.      Which of the following allows you to switch back and forth between programs that are currently running?
a.       Recycle Bin
b.      Network Neighborhood
c.       Taskbar
d.      Start button

3.      If you start Windows and see an empty Taskbar (except for the Start button), what does it mean?
a.       The Recycle Bin is empty
b.      You are not connected to a network
c.       Multitasking is not set up on your computer
d.      There are no programs running in memory

4.      If the mouse pointer is a double arrow, what operation are you performing?
a.       Inserting text in a document
b.      Minimizing a window
c.       Sizing a window
d.      Selecting a Help topic

5.       Which program is used to format diskettes?
a.       Internet Explorer
b.      Windows Explorer
c.       Disk Explorer
d.      Drive Explorer

6.      Which of the following allows you to see which programs are currently open and running?
a.       Recycle Bin
b.      Network Neighborhood
c.       My Computer
d.      Taskbar

7.      Where are the Maximize, Minimize, and Close buttons found?
a.       on the Toolbar
b.      on the Taskbar
c.       on the Title bar
d.      on the Menu bar

8.      What does it indicate when a folder in Windows Explorer displays neither a minus nor a plus sign?
a.       the folder has already been expanded to show its additional folders
b.      the folder has been collapsed and its folders are not currently visible
c.       the folder does not have any additional folders in it
d.      the folder is on a write-protected disk

Section 2. True/False.

1.       A dimmed command indicates that additional information is required to execute the command.

2.       Check boxes indicate mutually exclusive options.

3.       Even when there are multiple windows open, only one window is active at any time.

4.      The Windows desktop will be exactly the same on every computer.

5.      Dragging the corner of a window will change both dimensions, height and width, at the same time.

6.      Windows NT and Windows 2000 are geared for the home user.

Network Security MCQ-1



1- A Self-Enforcing Protocol
(A)  Makes it obvious to all parties involved in a transaction when a party attempts to cheat.
(B)  Uses an adjudicator to evaluate if any party to the transaction cheated
(C)  Uses a trusted third party (TTP) to mediate the transaction between the various parties
(D)  Others                                  

2- Disadvantages in using an arbitrated computer protocol.
(A)  Two sides may not agree on a neutral third party.
(B)  Arbitration causes  a time  in communication
(C)  Secrecy becomes invulnerable,
(D)  Others                          

3- One of Goals Of secure computing is :
(A)  Confidentiality
(B)  Interruption
(C)  Modification
(D)  Others  

4-One of the following is threats to security in computing:
(A)  Confidentiality
(B)  Interruption
(C)  Integrity
(D)  Others          

5- Circuit-level Gateway means :
(A)  Stand-alone system
(B)  Specialized function performed by an Application-level Gateway
(C)  Sets up two TCP connections
(D) All           


6-   Fabrication:
(A)  Counterfeit objects on a computing system.
(B)  Changing the values in a database modifying a program so that it performs an additional computation,
(C)  An asset of the system becomes lost,
(D)  Others                        

7- Integrity:
(A)  Viewing, printing
(B)  Separation and protection of the resources
(C)  Access to computing resources without difficulties.
(D)  Others

8- Trojan horse is -:
(A)  A program that overtly does one thing while covertly doing another
(B)  Can be used to spread infection from one computer to another.
(C)  A program that has a secret entry point.
(D)  Others

9- Storage media
(A)  A collections of software, hardware
(B)  The intruder may steal computer time just to do computing and he can destroy software
(C)  Effective security plans consider adequate backups of data and physical protection for the media contains these backups.
(D)  Others                  

10 - OS Controls:
(A)  Limitations enforced By the OS to protect each user from other users  
(B)  Quality standards under which program is designed, coded, tested und maintained
(C)  Parts of the program that enforce security restriction such as access limitation in a data base management system
(D)  Others                    

11-    Cipher text is:
(A)  The encrypted form.
(B)  A system of encryption and decryption
(C)  Hidden writing.
(D)  Others                  

12- Transient
(A)  Runs when its attached program executes and terminates when its attached program ends
(B)  Locates itself in memory so that it can remain active even after its attached program ends
(C)  A class of malicious code that detonates when a specified condition occurs
(D)  Others                   

13- Packet-filtering Router means:
(A)  Applies a set of rules to each incoming IP packet and then forwards or discards the packet
(B)  Also called proxy server
(C)  Acts as a relay of application-level traffic
(D)  Others                 

14- Appended Viruses
(A)  Virus code runs the original program but has control before and after its execution.
(B)  Virus code attaches itself to a program and is activated whenever the program is run.
(C)  Virus program replaces some of its target, integrating itself into the original code of the target.
(D)  Others                            

15 - Homes for Viruses
(A)  Boot Sector Viruses
(B)  Memory-Resident Viruses
(C)  Other Homes (like Application)
(D) All                                    

16 -   Virus signatures are used by virus scanners to detect the virus in 
(A)  Storage Patterns
(B)  Boot Sector
(C)  Object code
(D)  Others              


17- Polymorphic Viruses using encryption contains three    parts one of them:
(A)  Encryption key
(B)  Encrypted code
(C)  Unencrypted object code of the decryption routine
(D)  Others




18- Preventing Virus Infection:
(A)  Use only commercial software acquired from reliable, well established vendors
(B)  Test all old software on an isolated computer
(C)  Make many copies for your software
(D)  Others
        

19-The Sources of Trapdoors are:
(A)  Debug commands left is code before r testing
(B)  Poor error checking
(C)  A small amount of money is shaved from each computation
(D)  Others             

20 – The Causes of Trapdoors are:
(A)  Forgets to remove them
(B)  Intentionally leaves them for programmers
(C)  Intentionally leaves them for users
(D)  Others     
               

21- The Basic Principles of Software Engineering is:
(A)  Division of Labor
(B)  Reuse of Code
(C)  Use of Standard Pre-constructed Software tools
(D) All               

22- Characteristics of a Module are:
(A)  Unity
(B)  Reuse of Code
(C)  Organized Activity
(D)  Others                     


23- Program correctness proofs are hindered by:
(A)  Program translation is error prone
(B)  The logical engines are slow
(C)  Proofs of correctness have not been consistently and successfully applied to large production systems
(D) all
                       
24- Characteristics of Trusted Software are:
(A)  Functional Correctness
(B)  Enforcement of Integrity
(C)  Limited Privilege
(D) all
                   
25-                  By Patents  we mean :
(A)  Protect inventions
(B)  Algorithms are facts of nature
(C)  Patent process is expensive
(D)  Others                

26-In the fire wall service control:
(A)  Determines the types of Internet services that can be accessed, inbound or outbound
(B)  Determines the direction in which particular service requests are allowed to flow
(C)  Controls access to a service according to which user is attempting to access it
(D)  Others                  

27-Threats are categorized as:
(A)  Passive or active
(B)  Traffic
(C)  Masquerade
(D)  Others

28- Release of message contents means:
(A)  Obtain information that is being transmitted.
(B)  Telephone conversation, email message and transferred     files.
(C)  Attack that have a specific target
(D)  Others

29-The basic elements of model of access control are:
(A)  Subject, Object, Access right
(B)  Capability list, Object, Access right
(C)  Centralized, Decentralized
(D)  Others

30-In the boot sector viruses, virus:
(A)  Gains control very early in the boot process before most detection tools are active
(B)  Gains control very early in the boot process after most detection tools are active
(C)  Gains control in AUTOEXEC.BAT batch file
(D)  Others

31) By Salami Attack virus we mean:
(A)  Control viruses
(B)  A small amount of money is shaved from each computation
(C)  Trapdoors persist
(D)  Others

32) The main idea of peer review is:
(A)  Each team member has a clear design document
(B)  Team members review each others’ code
(C)  All team members recognize that the product belongs to the group
(D) ALL the above

33) What is a network?
(A)  A single main processor
(B)  More than one independent processor.
(C)  More users and computing systems have access
(D)  Others

34) Complexity is one of network security problems that mean:
(A)  Network may combine two or more dissimilar operating systems with mechanisms for interhost connection
(B)  Sensitive data
(C)  Insertion of bogus messages
(D)  Others

35) Authentication is:
(A)  Modification
(B)  Insertion
(C)  Hard to assure identity of user on a remote system
(D)  Others

36) Copyrights means:
(A)  Protect expression of ideas
(B)  Protect inventions
(C)  Allows the distribution of the result of the secret
(D)  Others

37) Trade Secret means:
(A)  Information that gives one company a competitive edge over others
(B)  Provides protection for the source code and not the algorithm
(C)  Copy distributed that must be marked
(D)  Others

38) Communication systems are used to transmit data, it concerns the following:
(A)  Availability
(B)  Security
(C)  Integrity
(D) Others

39) Masquerade in communication systems means:
(A)  This attack may have a specific target
(B)  Takes place when one entity pretends to be different entity
(C)  The message are delayed
(D)  Others

40) Open design principle means:
(A)  The security of system should not depend on keeping the design of its mechanism secret
(B)  Interfere with the work of users
(C)  Security mechanisms should simple and small as possible.
(D)  Others

41) One of the general techniques for Firewall Characteristics is :
(A)  Packet-filtering routers
(B)  Application-level gateways
(C)  Circuit-level gateways
(D) Others

42) The behavior control allows:
(A)  Controls how particular services are used
(B)  Controls access to a service according to which user is attempting to access it
(C)  The types of Internet services that can be accessed
(D)  Others

43) Filter packets going:
(A)  In both directions
(B)  In One direction
(C)  In Parallel direction
(D)  Others

44) The main disadvantages of packet-filtering Router:
(A)  Simplicity
(B)  Transparency to users
(C)  Lack of Authentication
(D)  Others

45) We can call the application-level Gateway:
(A)  Stand-alone system
(B)  Proxy server
(C)  The SOCKS package
(D)  Others

46-The primary choice for password storage:
A-    Clear text

B- Encrypted password
        C- Hash value of a password



D- All of the above

47-The best  storage locations for passwords is.
         A-Root or administrator readable only
                      B-Readable by anyone.
A-                 
                     C- Any file
                     D- All of the above.



48- Client/Server Model A Network Access Server (NAS) operates as

A-    Client to RADIUS.
B-    User for RADIUS server.
C-    Peer to RADIUS server.
D-    None of the above

49- In RADIUS any user passwords are sent

A-    encrypted.
B-    Hashed.
C-    In clear text.
D-    None of the above.

50- In a computer protocol arbiter is a trustworthy third party who ensures

A-     Fairness.
B-      Truth.
C-     Data.
D-     People.



- C51- Low error propagation is one of the advantages of.
      A- asymmetric

      B- Block Ciphers

      C- Stream Ciphers

      D- none of the above.




52- Substitution ciphers.
A-      The order of plaintext letters is rearranged during encryption.
B-      Letters of the plaintext messages are replaced with other letters during the encryption.
C-      A & B.
D-       None of the above.





- C
53- One of the security Phases is Response, it means.
       A-plans/processes that focus on security improvements.

       B- proactive risk reduction

       C- to take measures that allow recovery of assets or recovery from damage, and minimize losses.
       D- to take measures to detect whether an asset has been damaged, how, and who has caused the damage.












B-

54- Transient
 Viruses
         A- Locates itself in memory so that it can remain active even after its attached program ends

         B-Runs when its attached program executes and terminates when its attached program ends
         C- A & B
        D- none of the above

55- Appended Viruses
A-  Virus code attaches itself to a program and is activated whenever the program is run.
        B- Virus code runs the original program but has control before and after its execution.
        C- Virus program replaces some of its target, integrating itself into the original code of the target.
        D- A & C.

56- Virus attaches itself to memory resident code.
A-   Virus gains control very early in the boot process before most detection tools are active.
B-  Virus is activated many times while the machine is running
C-   Virus embeds itself in data files
 D-None of the above.

D-   

57- The DBMS maintains the integrity by:
                    A- Applying field checks
B-    Access control
C-    Change log
D-    All of the above

58-Interruption affects

A-    availability
B-     
integrity
      
C- authenticity

D-    none of the above

 

59-Modification affects

A-    availability
B-     
integrity
       
C- authenticity
       D- none of the above

60-Error detection and correction is one of the aspects of
A-    availability
B-     
 integrity
     
C- authenticity
      D- none of the above

61-International Standards in Information Security are developed by
A-    the
A-    IETF
B-     
C-    ETSI
C-
B-    IEEE
D-
C-    ISO/IEC

2-



the above graph represent the.
A- Asymmetric Cryptosystem
 
B- symmetric Cryptosystem
C- Hash function
D- Web Access with SSL

 

63-
    this picture represent

     A- Arbitrated Protocols
A-   
      B-  Adjudicated Protocols
.
    C- A Hardware protocols.
    D- Self-Enforcing Protocols
.