GENERAL KANNADA
1. ____ connects two networks that uses different protocol.
1. ____ connects two networks that uses different protocol.
A. Gateway
B. Bridge
C. Hub
D. Switch
ANSWER: A.Gateway
<
2. The person on Internet who gains unauthorized access, destroys vital data, denies users legitimate service and causes problem for their targets is called _____.
A. Database Administrator
B. Software developer
C. Cracker and Hacker
D. Programmer
ANSWER: C.Cracker and Hacker
<
3. Which of the following is not a search engine?
A. Google
B. Yahoo
C. Bing
D. Safari
ANSWER : D.Safari
<
4. Which protocol is used to retrieve email messages from the server to your computer?
A. HTTP
B. SMTP
C. POP3
D. POP
ANSWER: C.POP3
<
5. MPEG is a type of ____ format.
A. Image
B. Text
C. Audio
D. Video
ANSWER: D.Video
<
6. Which computer scientist discovered “Phishing” term?
A. John Hopins
B. Khan B Smith
C. Charles Babbage
D. Alan Turing
ANSWER: B. Khan B Smith
7. A Keylogger antivirus is typical example for ____.
A. Trojan
B. Spyware
C. Worm
D. Logic Bomb
ANSWER: B.Spyware
8. In MS power point the short cut key to justify the selected text is ____.
A. Ctrl + I
B. Ctrl + U
C. Ctrl + J
D. Ctrl + L
ANSWER: C. Ctrl + J
9. Which view displays the slides of presentation as miniature representation?
A. Normal
B. Slide sorter
C. Note page
C. Reading view
ANSWER: B.Slide sorter
10. In a powerpoint presentation ____ provides set of predefined colors, fonts and visual effects for slide.
A. Slide Master
B. Wizard
C. Theme
D. Slide Transition
ANSWER: C.Theme