Quiz Electronics Engineering
Each Question carries 1 Mark
Negative Marking: 1/4
Time: 10 Minutes
Q1. ……. feature allows you to optimize your system and capture all possible transactions.
(d) None of the above
Q2. Out of given options, which one monitors user activity on internet and transmit that information in background to someone else?
(a) Trojan Horse
(d) None of the above
(a) is transparent to the user
(b) requires use of a loader
(c) allows larger programs, but requires more effort
(d) is mostly used on large computers
Q4. What does XHTML stands for?
(a) Extra Hyperlinks and text Markup Language
(b) Extreme Hypertext Markup Language
(c) Extended Hypertext Mark Up Language
(d) Extensible Hypertext Markup language
Q5. What are SSL and TLS?
(a) Internet protocols
(b) Data Link Layer
(c) Cryptographic Protocol
(d) Internet Layer
Q6. Management of software development is dependent on
(d) All of the above
Q7. IPv6 supports which of the following addressing modes?
(a) Unicast addressing
(b) Multicast addressing
(c) Anycast addressing
(d) All of them
Q8. _____________ enables the migration of the virtual image from one physical machine to another.
(d) virtual transfer
Q9. Antivirus signatures are created using which of the following?
(a) Decryption Algorithm
(b) Encryption Algorithm
Q10. In the relational model, cardinality is termed as:
(a) A number of attributes.
(b) A number of tuples.
(c) A number of tables.
(d) A number of constraints.
Sol. Elasticity is the degree to which a system is able to adapt to workload changes by provisioning and de-provisioning resources in an autonomic manner. It has the ability to right-size resources as required.
Sol. Spyware is a software that is installed on your computer directly or indirectly. It monitors different programs, internet activity secretly while running in background of your computer.
Sol. Overlaying is the process of transferring a block of program code or other data into internal memory, replacing what is already stored. This technique allow programs to be larger than the computer’s main memory.
Sol. Extensible Hypertext Markup Language (XHTML) is part of the family of XML markup languages.
- Secure Sockets Layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an insecure network like internet.
- TLS is Acronym of Transport Layer Security.
Both are cryptographic protocols designed to provide communications security over a computer network.
All of the above
Sol. IPv6 supports unicast, multicast and anycast addressing modes.
Sol. Virtualization enables the migration of the virtual image from one physical machine to another. Virtualization allows to share a single physical instance of a resource or an application among multiple customers and organizations at one time. It helps in optimization by sharing data to different machines.
Sol. An Antivirus Signature is a set of unique data or bits of code for its identification. Anti-virus software uses the virus signature to scan for the presence of malicious code.
A number of tuples.