#1
2nd May 2015, 10:27 AM
| |||
| |||
IIT Delhi Old Question Papers
Hi I am going to appear in B.TECH Computer Science and Engineering final year exam of Indian Institute of Technology Delhi . Will you please provide the Old B.TECH Computer Science and Engineering final year exam Question Papers of IIT Delhi for revision ?
|
#2
11th June 2018, 02:52 PM
| |||
| |||
Re: IIT Delhi Old Question Papers
I want the sample question paper of Indian Institute of Technology (IIT) Delhi Junior Assistant exam so will you provide me?
|
#3
11th June 2018, 02:52 PM
| |||
| |||
Re: IIT Delhi Old Question Papers
I am providing you the sample question paper of Indian Institute of Technology (IIT) Delhi Junior Assistant exam IIT Delhi Junior Assistant exam question paper Section : Computer General Awareness 1. In a survey of more than 500 companies and government agencies, ____________ percent detected computer security breaches. A. 20 B. 75 C. 85 D. 99 Answer: C 2. The survey showed that these businesses lost more than ____________ due to security breaches. A. $100,000 each B. $377 million C. five employees each D. $1 million Answer: B 3. The typical computer criminal is a(n): A. young hacker. B. trusted employee with no criminal record. C. trusted employee with a long, but unknown criminal record. D. overseas young cracker. Answer: B 4. The majority of computer crimes are committed by: A. hackers. B. insiders. C. overseas criminals. D. young teenage computer geniuses. Answer: B 5. The common name for the crime of stealing passwords is: A. spooling. B. identity theft. C. spoofing. D. hacking. Answer: C Reference: Theft by Computer 6. Collecting personal information and effectively posing as another individual is known as the crime of: A. spooling. B. identity theft. C. spoofing. D. hacking. Answer: B 7. Malicious software is known as: A. badware. B. malware. C. maliciousware. D. illegalware. Answer: B 8. A program that performs a useful task while simultaneously allowing destructive acts is a: A. worm. B. Trojan horse. C. virus. D. macro virus. Answer: B Moderate 9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a: A. Trojan horse. B. virus. C. time bomb. D. time-related bomb sequence. Answer: B 10. In 1999, the Melissa virus was a widely publicized: A. e-mail virus. B. macro virus. C. Trojan horse. D. Time bomb. Answer: A 11. What type of virus uses computer hosts to reproduce itself? A. Time bomb B. Worm C. Melissa virus D. Macro virus Answer: B 12. The thing that eventually terminates a worm virus is a lack of: A. memory or disk space. B. time. C. CD drive space. D. CD-RW. Answer: A 13. When a logic bomb is activated by a time-related event, it is known as a: A. time-related bomb sequence. B. virus. C. time bomb. D. Trojan horse. Answer: C 14. A logic bomb that was created to erupt on Michelangelos birthday is an example of a: A. time-related bomb sequence. B. virus. C. time bomb. D. Trojan horse. Answer: C 15. What is the name of an application program that gathers user information and sends it to someone through the Internet? A. A virus B. Spybot C. Logic bomb D. Security patch Answer: B 16. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses: A. more complicated. B. more difficult. C. easier. D. slower. Answer: C 17. HTML viruses infect: A. your computer. B. a Web page in the HTML code. C. both a Web page and the computer that is viewing it. D. No 18. Software programs that close potential security breaches in an operating system are known as: A. security breach fixes. B. refresh patches. C. security repairs. D. security patches. Answer: D 19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as: A. a virus. B. a Trojan horse. C. cracking. D. a denial of service attack. Answer: D 20. ___________ is the measurement of things such as fingerprints and retinal scans used for security access. A. Biometrics B. Biomeasurement C. Computer security D. Smart weapon machinery Answer: A 21. What is the most common tool used to restrict access to a computer system? A. User logins B. Passwords C. Computer keys D. Access-control software Answer: B 22. The most common passwords in the U.S. or Britain include all EXCEPT: A. love. B. Fred. C. God. D. 123. Answer: D 23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n): A. hacker-proof program. B. firewall. C. hacker-resistant server. D. encryption safe wall. Answer: B 24. The scrambling of code is known as: A. encryption. B. a firewall. C. scrambling. D. password-proofing. Answer: A 25. If you want to secure a message, use a(n): A. cryptology source. B. encryption key. C. encryption software package. D. cryptosystem. Answer: D 26. To prevent the loss of data during power failures, use a(n): A. encryption program. B. surge protector. C. firewall. D. UPS. Answer: D 27. A(n) ____________ can shield electronic equipment from power spikes. A. encryption program B. surge protector C. firewall D. UPS Answer: B 28. All of these are suggestions for safe computing EXCEPT: A. dont borrow disks from other people. B. open all e-mail messages but open them slowly. C. download shareware and freeware with caution. D. disinfect your system. Answer: B 29. Freeware ___________ encrypts data. A. encryption B. firewall software C. PGP D. private and public keys Answer: C 30. ____________ is defined as any crime completed through the use of computer technology. A. Computer forensics B. Computer crime C. Hacking D. Cracking Answer: B 31. Most computer systems rely solely on ___________ for authentication. A. logins B. passwords C. encryption D. lock and key Answer: B 32. Creating strong computer security to prevent computer crime usually simultaneously helps protect : A. privacy rights. B. personal ethics. C. the number of cookies downloaded to your personal computer. D. personal space. Answer: A 33. Over ___________ was spent by businesses and government to repair problems in regard to Y2K. A. 20 million dollars B. 100 million dollars C. 1 billion dollars D. 100 billion dollars Answer: D 34. What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision making? A. Autonomous system B. Missile defense auto-system C. Smart weapon D. Independent system Answer: D 35. Security procedures can: A. will eliminate all computer security risk. B. reduce but not eliminate risks. C. are prohibitively expensive. D. are inaccessible for the average home user. Answer: B ICICI Bank PO Exam 2010 Computer General Awareness Question Paper 2 Question No. 36 to 58 Fill in the Blank: 36. The field of computer ____________ uses special software to scan hard drives of potential criminal suspects. Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging 37. Computer ____________ often goes unreported because businesses fear negative publicity. Answer: crime 38. ____________ connections are the most frequent point of attack for Internet commerce. Answer: Internet 39. ____________ is the most common form of computer crime. Answer: Theft 40. A survey by eMarketer.com found that ____________ are the most often cited online fraud cases. Answer: online auctions Reference: Identity Theft 41. Theft of computers is most common for PDAs and ____________ computers. Answer: notebook 42. When you use a disk in several different computers within the same day, you are taking the chance of contracting a(n) ____________. Answer: virus Reference: Viruses Difficulty: Easy 43. A(n) ____________ attaches itself to documents that contain embedded programs that automate tasks. Answer: macro virus 44. Both viruses and ____________ use computer hosts to replicate. Answer: worms 45. ____________ programs search for and eliminate viruses. Answer: Antivirus 46. A security patch is a software program that closes possible security breaches in the operating system. The cost to the consumer is ____________. Answer: nothing or free 47. ____________ was once the word used for malicious computer wizardry. Answer: Hackers or hacking 48. ____________ refers to electronic trespassing or criminal hacking. Answer: Cracking 49. DoS stands for ___________. Answer: denial of service 50. DDoS stands for ___________. Answer: distributed denial of service 51. ____________ hijack Web pages and redirect users to other sites. Answer: Webjackers 52. ___________ software monitors and records computer transactions. Answer: Audit-control Contact- Indian Institute of Technology, Delhi Hauz Khas, New Delhi, Delhi 110016 011 2659 7135 |
|