ICT Fest 2023 Quiz Competition
In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.
Her or his own public key
Her or his own private key
The sender's public key
None of the choices are correct
A regression test--------?
Can only be run during user acceptance testing
Will help us to ensure unchanged areas of the software have not been affected
Will always be automated
Will help us to ensure changed areas of the software have not been affected
______________ means concealing the message by covering it with something else.
Cryptography
Steganography
Compressing
None of the choices are correct
In _________ cryptography, the same key is used in both directions.
Symmetric-key
Asymmetric-key
Public-key
None of the choices are correct
__________ means that the sender and the receiver expect confidentiality.
Nonrepudiation
Integrity
Authentication
None of the choices are correct
______________ can provide authentication, integrity, and nonrepudiation for a message.
Encryption/decryption
Digital signature
Compression
None of the choices are correct
Arithmetic and logic unit is the ‘heart’ of the processor which handles variety of operations (+, -, ×, ÷, AND, OR)
True
False
The RSA algorithm for confidentiality uses _______ cryptography.
Asymmetric-key
Symmetric-key
Substitution
None of the choices are correct
Which of the following methodology does not exist?
Agile methodology
Scrum methodology
Waterfall methodology
None of the choices are correct
Which data structure is used for storing a collection of elements in a non-linear fashion?
Array
Stack
Queue
Tree
Which programming paradigm emphasizes on writing code that is easy to read and maintain?
Procedural programming
Object-oriented programming
Functional programming
Structured programming
Which operator is used for exponentiation in most programming languages?
^
*
%
**
Which of the following is not a valid variable name in most programming languages?
MyVariable
123Variable
_myVariable
My_variable
Which of the following is not a relational operator in most programming languages?
=
==
!=
++
Which data structure is used for implementing a Last-In-First-Out (LIFO) behavior?
Queue
Stack
Tree
Linked list
Intel 8008 was ________ Microprocessor
2nd generation
4-bit
Introduced in 1978
None of the choices are correct
Which of the following statement is incorrect for HDD?
Called backing store
Volatile
Originally developed by IBM
Utilize electro-magnetism method
Which of the following is used specifically for temporary storage of active data and commands during processing?
Read only memory
Random access memory
Archived storage
Cache memory
Which of the following attacks is threatening availability?
Replaying
Modification
Denial of service
None of the choices are correct
In ___________, the identity of a party is verified once for the entire duration of system access.
Entity authentication
Message integrity
Message authentication
None of the choices are correct
For communication, data in a network is divided into smaller chunks called ____________
Small data
Parcel
Packets
Photons
A network which is formed by interconnection of two mobile phone through Bluetooth is called _________________
MAN
WAN
PAN
LAN
The color represented by the HTML color code #FF00FF is one in which the intensity levels of the primary colors are
RED:100% GREEN:100% BLUE:0%
RED:100% GREEN:0% BLUE:100%
RED: 0% GREEN:100%BLUE:100%
RED:0% GREEN:100%BLUE:0%
How do you get a link to open in a new browser tab?
<a href =“url” target =”open”>
<a href =“url” target = “new”>
<a href =“url” target= “_blank”>
<a href =“url” target = “tab”>
In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message.
His or her own symmetric key
His or her own private key
His or her own public key
None of the choices are correct
URI stands for ______
Uniform Resource in India
Universal Resource Identifier
Uniform Resource Identifier
Uniform Remember Identifier
LAN provides ____________ communication with the ____________ data transfer rates.
Short range, high speed
Long range, high speed
Long range, low speed
Short range, low speed
ARPANET stands for ______________
Advanced Research Project Administration Network
Advanced Research Promote Agency Network
Admin Research Project Agency Network
Advanced Research Project Agency Network
Which of the following can be used as communication medium in LAN?
Ethernet cable
Optical fibre
Wi-Fi
All of the above
System Analyst performs analysis and design based upon:
Creating and maintaining system that perform basic business fun ctions
Understanding of organization's objectives, structure and processes.
Improving employee efficiency by applying software solutions to key business tasks
Developing or acquiring application software
IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level.
Data link
Network
Transport
None of the choices are correct
In a communication network, each device that is a part of a network and that can receive, create, store or send data to different network routes is called a ______
Node
Network computer
Device
Server
____________ is not a component of a Microprocessor
Register
Communication unit
Address bus
Input/output
On which layer of OSI model, SMTP Protocol is used?
Data link
Network
Transport
Application
Select whether the given statement is true or false: "Requirement specification, design, coding, testing, installation and maintenance is the various phases of SDLC (software development life cycle)."
True
False
___________ use high voltage electric pulses to erase stored information.
EEPROM
EEEPROM
EPROM
EEPRAM
What area of the HTML metadata is it located in?
Head tag
Title Tag
Body Tag
None of the choices are correct
Which of the following is a limitation of JavaScript?
Can react to events
Can be used to validate data
Can manipulate HTML elements
None of the choices are correct
"Cookie'' is a term used in Internet communication for
Storing authentication information at client side for entire session
For the duration of the session, server-side authentication information is stored
Detecting intrusion at client side for entire session
None of the choices are correct
What is the purpose of a loop in programming?
To execute a set of instructions a specified number of times
To terminate the program
To print output to the console
To declare variables
{"name":"ICT Fest 2023 Quiz Competition", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature., A regression test--------?, ______________ means concealing the message by covering it with something else.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}