22618 Emerging Trends in Computer and Information Technology Mcq Pdf

0
703

Hello Diploma Students in this article we have provided 22618 Emerging Trends in Computer and Information Technology Mcq Pdf. With the help of this Emerging Trends in Information Technology Mcq with Answers Diploma in Information Technology and Computer Engineering Students can Practice for their Upcoming Winter 2021 Exams.

In this 22618 Emerging Trends in Computer and Information Technology Mcq Questions We have selected Important Questions from Previous Year Model Answer Paper and Made A possible Set Of 30 Questions which can Help Students in Preparation for Their Exams. This Mcq on Emerging Trends in Computer and Information Technology Is Ideal for Candidates who are in 3rd Year of Diploma in Information Technology and Computer Engineering Course.

For More Java Mock Test Questions (Start Test)

By Referring this Advanced Java Programming Mcq Msbte Diploma in Information Technology & Computer Engineering Students Can Practice for their Upcoming Exams. We Have Also Emerging Trends in Information Technology and Computer Engineering Link at the end of the Quiz You can Download it for Future Reference

1) A certain Professor at the Stanford University coined the word ‘artificial intelligence’ in 1956 at a conference held at Dartmouth College. Can you name the Professor? 
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above

Correct!

Wrong!

2) The field that investigates the mechanics of human intelligence is: 
A. History
B. cognitive science
C. psychology
D. sociology
E. None of the above

Correct!

Wrong!

3) A.M. turing developed a technique for determining whether a computer could or could not demonstrate the artificial Intelligence,, Presently, this technique is called 
A. Turing Test
B. Algorithm
C. Boolean Algebra
Logarithm
E. None of the above

Correct!

Wrong!

4) The first AI programming language was called: 
A. BASIC
B. FORTRAN
C. IPL
D. LISP
E. None of the above

Correct!

Wrong!

5)  What is Artificial intelligence? 
A. Putting your intelligence into Computer
B. Programming with your own intelligence
C. Making a Machine intelligent
D. Putting more memory into Computer

Correct!

Wrong!

6) More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email 
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime

Correct!

Wrong!

7) There are three c’s in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core

Correct!

Wrong!

8) When was the Federal Bureau Investigation program created?
A.1979
B.1984
C.1995
D.1989

Correct!

Wrong!

9) When did the field of PC forensics begin? 
A.1960’s
B.1970’s
C.1980’s
D.1990’s

Correct!

Wrong!

10) What is Digital Forensic? 
A. Process of using scientific knowledge in analysis and presentation of evidence in court
B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation
C. process where we develop and test hypotheses that answer questions about digital events
D. Use of science or technology in the investigation and establishment of the facts or evidence in a court of law

Correct!

Wrong!

11)  In terms of digital evidence, the Internet is an example of: 
A. Open computer systems
B. Communication systems
C. Embedded computer systems
D. None of the above

Correct!

Wrong!

12) Computers can be involved in which of the following types of crime? 
A. Homicide and sexual assault
B. Computer intrusions and intellectual property theft
C. Civil disputes
D. All the above

Correct!

Wrong!

13) A logon record tells us that, at a specific time: 
A. An unknown person logged into the system using account
B. The owner of a specific account logged into the system
C. The account was used to log into the system
D. None of the above

Correct!

Wrong!

14) Cyber trails are advantageous because: 
A. They are not connected to the physical world.
B. Nobody can be harmed by crime on the Internet.
C. They are easy to follow.
D. Offenders who are unaware of them leave behind more clues than they otherwise would have

Correct!

Wrong!

15) Private networks can be a richer source of evidence than the Internet because: 
A. They retain data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above

Correct!

Wrong!

16) Which tool is used for ping sweeps and port scanning? 
A. Netcat
B. SamSpade
C. SuperScan
D. All the above

Correct!

Wrong!

17) Which of the following tools is used for security checks as port scanning and firewall testing? 
A. Netcat
B. Nmap
C. Data communication
D. Netscan

Correct!

Wrong!

18) What is the most important activity in system cracking? 
A. Information gathering
B. Cracking password
C. Escalating privileges
D. Covering tracks

Correct!

Wrong!

19) Which Nmap scan does not completely open a TCP connection? 
A. SYN stealth scan
B. TCP scan
C. XMAS tree scan
D. ACK scan

Correct!

Wrong!

20) Keyloggers are form of 
A. Spyware
B. Shoulder surfing
C. Trojan
D. Social engineering

Correct!

Wrong!

11) Which hacker refers to an ethical hacker? 
A. Black hat hacker.
B. White hat hacker.
C. Grey hat hacker.
D. None of the above

Correct!

Wrong!

22) The term cracker refers to_____ 
A. Black hat hacker.
B. White hat hacker.
C. Grey hat hacker.
D. None of the above

Correct!

Wrong!

23) Who described a dissertation on fundamentals of hacker’s attitude? 
A. G. Palma.
B. Raymond.
C. Either.
D. Jhon Browman

Correct!

Wrong!

24) Computer Hackers have been in existence for more than a ____.
A. Decade.
B. Year.
C. Century
D. Era.

Correct!

Wrong!

25) Hackers do hack for? 
A. Fame.
B. Profit.
C. Revenge.
D. All the above

Correct!

Wrong!

26) The first mass produced embedded system is 
A. Minuteman-I
B. Minuteman-II
C. Autonetics D-17
D. Apollo Guidance Computer (AGC)

Correct!

Wrong!

27) Which of the following is an (are) an intended purpose(s) of embedded systems? 
A. Data collection
B. Data processing
C. Data communication
D. All of these

Correct!

Wrong!

28) Which of the following is (are) example(s) of embedded system for data communication? 
A. Network router
B. Digital camera
C. Music player
D. All of these

Correct!

Wrong!

29) What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above

Correct!

Wrong!

30) A digital multimeter is an example of an embedded system for 
A. Data communication
B. Monitoring
C. Control
D. All of these

Correct!

Wrong!

Share the quiz to show your results !

Subscribe to see your results

22618 TEST 2

I got %%score%% of %%total%% right

%%description%%

%%description%%

Loading…

Emerging Trends in Computer and Information Technology Mcq Questions (Download)

Students Also Search for:

First Year Basic Science MCQ (View Here)

For Free Mock Test (View Here)

Msbte News Social accounts

We provide regular updates about msbte on our social accounts For latest msbte diploma updates you can follow our page on Instagram @msbtenews and Facebook @msbtediplomaupdates. we solve your queries by message on our social accounts so do follow our social accounts if you have any queries related to diploma and engineering courses. 

Thankyou for Visiting Msbte News.

Msbte News is created to help msbte diploma students to find study resources, which are very much needed for diploma students while preparing for the exam. msbtenews.com provide polytechnic solved question papers which are provided by msbte.org.in. with these msbte polytechnic model answer paper students gets a rough idea about paper pattern and marks distribution.

Leave a reply

Please enter your comment!
Please enter your name here