2023 2024 Student Forum

2023 2024 Student Forum (https://management.ind.in/forum/)
-   Main Forum (https://management.ind.in/forum/main-forum/)
-   -   IIT Delhi Old Question Papers (https://management.ind.in/forum/iit-delhi-old-question-papers-129188.html)

Unregistered 2nd May 2015 10:27 AM

IIT Delhi Old Question Papers
 
Hi I am going to appear in B.TECH Computer Science and Engineering final year exam of Indian Institute of Technology Delhi . Will you please provide the Old B.TECH Computer Science and Engineering final year exam Question Papers of IIT Delhi for revision ?

Unregistered 11th June 2018 02:52 PM

Re: IIT Delhi Old Question Papers
 
I want the sample question paper of Indian Institute of Technology (IIT) Delhi Junior Assistant exam so will you provide me?

pawan 11th June 2018 02:52 PM

Re: IIT Delhi Old Question Papers
 
I am providing you the sample question paper of Indian Institute of Technology (IIT) Delhi Junior Assistant exam

IIT Delhi Junior Assistant exam question paper

Section : Computer General Awareness
1. In a survey of more than 500 companies and government agencies, ____________ percent
detected computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C
2. The survey showed that these businesses lost more than ____________ due to security
breaches.
A. $100,000 each
B. $377 million
C. five employees each
D. $1 million
Answer: B
3. The typical computer criminal is a(n):
A. young hacker.
B. trusted employee with no criminal record.
C. trusted employee with a long, but unknown criminal record.
D. overseas young cracker.
Answer: B
4. The majority of computer crimes are committed by:
A. hackers.
B. insiders.
C. overseas criminals.
D. young teenage computer geniuses.
Answer: B
5. The common name for the crime of stealing passwords is:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: C Reference: Theft by Computer
6. Collecting personal information and effectively posing as another individual is known as
the crime of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B
7. Malicious software is known as:
A. badware.
B. malware.
C. maliciousware.

D. illegalware.
Answer: B
8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate
9. An intentionally disruptive program that spreads from program to program or from disk to
disk is known as a:
A. Trojan horse.
B. virus.
C. time bomb.
D. time-related bomb sequence.
Answer: B
10. In 1999, the Melissa virus was a widely publicized:
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A
11. What type of virus uses computer hosts to reproduce itself?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B
12. The thing that eventually terminates a worm virus is a lack of:
A. memory or disk space.
B. time.
C. CD drive space.
D. CD-RW.
Answer: A
13. When a logic bomb is activated by a time-related event, it is known as a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
14. A logic bomb that was created to erupt on Michelangelos birthday is an example of a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C

15. What is the name of an application program that gathers user information and sends it
to someone through the Internet?
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B
16. Standardization of Microsoft programs and the Windows operating system has made the
spread of viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C
17. HTML viruses infect:
A. your computer.
B. a Web page in the HTML code.
C. both a Web page and the computer that is viewing it.
D. No
18. Software programs that close potential security breaches in an operating system are
known as:
A. security breach fixes.
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D
19. When customers of a Web site are unable to access it due to a bombardment of fake
traffic, it is known as:
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
Answer: D
20. ___________ is the measurement of things such as fingerprints and retinal scans used for
security access.
A. Biometrics
B. Biomeasurement
C. Computer security
D. Smart weapon machinery
Answer: A
21. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer: B
22. The most common passwords in the U.S. or Britain include all EXCEPT:
A. love.

B. Fred.
C. God.
D. 123.
Answer: D
23. Hardware or software designed to guard against unauthorized access to a computer
network is known as a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
D. encryption safe wall.
Answer: B
24. The scrambling of code is known as:
A. encryption.
B. a firewall.
C. scrambling.
D. password-proofing.
Answer: A
25. If you want to secure a message, use a(n):
A. cryptology source.
B. encryption key.
C. encryption software package.
D. cryptosystem.
Answer: D
26. To prevent the loss of data during power failures, use a(n):
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.
Answer: D
27. A(n) ____________ can shield electronic equipment from power spikes.
A. encryption program
B. surge protector
C. firewall
D. UPS
Answer: B
28. All of these are suggestions for safe computing EXCEPT:
A. dont borrow disks from other people.
B. open all e-mail messages but open them slowly.
C. download shareware and freeware with caution.
D. disinfect your system.
Answer: B
29. Freeware ___________ encrypts data.
A. encryption
B. firewall software
C. PGP
D. private and public keys
Answer: C

30. ____________ is defined as any crime completed through the use of computer technology.
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer: B
31. Most computer systems rely solely on ___________ for authentication.
A. logins
B. passwords
C. encryption
D. lock and key
Answer: B
32. Creating strong computer security to prevent computer crime usually simultaneously
helps protect :
A. privacy rights.
B. personal ethics.
C. the number of cookies downloaded to your personal computer.
D. personal space.
Answer: A
33. Over ___________ was spent by businesses and government to repair problems in regard
to Y2K.
A. 20 million dollars
B. 100 million dollars
C. 1 billion dollars
D. 100 billion dollars
Answer: D
34. What is a complex system that takes on nearly complete responsibility for a task
eliminating the need for people, verification, or decision making?
A. Autonomous system
B. Missile defense auto-system
C. Smart weapon
D. Independent system
Answer: D
35. Security procedures can:
A. will eliminate all computer security risk.
B. reduce but not eliminate risks.
C. are prohibitively expensive.
D. are inaccessible for the average home user.
Answer: B
ICICI Bank PO Exam 2010 Computer General Awareness Question Paper 2
Question No. 36 to 58
Fill in the Blank:
36. The field of computer ____________ uses special software to scan hard drives of potential
criminal suspects.
Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging

37. Computer ____________ often goes unreported because businesses fear negative publicity.
Answer: crime
38. ____________ connections are the most frequent point of attack for Internet commerce.
Answer: Internet
39. ____________ is the most common form of computer crime.
Answer: Theft
40. A survey by eMarketer.com found that ____________ are the most often cited online fraud
cases.
Answer: online auctions Reference: Identity Theft
41. Theft of computers is most common for PDAs and ____________ computers.
Answer: notebook
42. When you use a disk in several different computers within the same day, you are taking
the chance of contracting a(n) ____________.
Answer: virus Reference: Viruses Difficulty: Easy
43. A(n) ____________ attaches itself to documents that contain embedded programs that
automate tasks.
Answer: macro virus
44. Both viruses and ____________ use computer hosts to replicate.
Answer: worms
45. ____________ programs search for and eliminate viruses.
Answer: Antivirus
46. A security patch is a software program that closes possible security breaches in the
operating system. The cost to the consumer is ____________.
Answer: nothing or free
47. ____________ was once the word used for malicious computer wizardry.
Answer: Hackers or hacking
48. ____________ refers to electronic trespassing or criminal hacking.
Answer: Cracking
49. DoS stands for ___________.
Answer: denial of service
50. DDoS stands for ___________.
Answer: distributed denial of service
51. ____________ hijack Web pages and redirect users to other sites.
Answer: Webjackers
52. ___________ software monitors and records computer transactions.
Answer: Audit-control

Contact-


Indian Institute of Technology, Delhi
Hauz Khas, New Delhi, Delhi 110016
011 2659 7135


All times are GMT +5. The time now is 05:08 PM.

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.6.0 PL2


1 2 3 4