Hello Diploma Students in this article we have provided 22618 Emerging Trends in Computer and Information Technology Mcq Pdf. With the help of this Emerging Trends in Information Technology Mcq with Answers Diploma in Information Technology and Computer Engineering Students can Practice for their Upcoming Winter 2021 Exams.
In this 22618 Emerging Trends in Computer and Information Technology Mcq Questions We have selected Important Questions from Previous Year Model Answer Paper and Made A possible Set Of 30 Questions which can Help Students in Preparation for Their Exams. This Mcq on Emerging Trends in Computer and Information Technology Is Ideal for Candidates who are in 3rd Year of Diploma in Information Technology and Computer Engineering Course.
Emerging Trends in Information Technology Mcq with Answers
By Referring this Advanced Java Programming Mcq Msbte Diploma in Information Technology & Computer Engineering Students Can Practice for their Upcoming Exams. We Have Also Emerging Trends in Information Technology and Computer Engineering Link at the end of the Quiz You can Download it for Future Reference
22618 Emerging Trends in Computer and Information Technology Mcq Pdf
1) A certain Professor at the Stanford University coined the word ‘artificial intelligence’ in 1956 at a conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above
Correct!
Wrong!
2) The field that investigates the mechanics of human intelligence is:
A. History
B. cognitive science
C. psychology
D. sociology
E. None of the above
Correct!
Wrong!
3) A.M. turing developed a technique for determining whether a computer could or could not demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
Logarithm
E. None of the above
Correct!
Wrong!
4) The first AI programming language was called:
A. BASIC
B. FORTRAN
C. IPL
D. LISP
E. None of the above
Correct!
Wrong!
5) What is Artificial intelligence?
A. Putting your intelligence into Computer
B. Programming with your own intelligence
C. Making a Machine intelligent
D. Putting more memory into Computer
Correct!
Wrong!
6) More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Correct!
Wrong!
7) There are three c’s in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Correct!
Wrong!
8) When was the Federal Bureau Investigation program created?
A.1979
B.1984
C.1995
D.1989
Correct!
Wrong!
9) When did the field of PC forensics begin?
A.1960’s
B.1970’s
C.1980’s
D.1990’s
Correct!
Wrong!
10) What is Digital Forensic?
A. Process of using scientific knowledge in analysis and presentation of evidence in court
B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation
C. process where we develop and test hypotheses that answer questions about digital events
D. Use of science or technology in the investigation and establishment of the facts or evidence in a court of law
Correct!
Wrong!
11) In terms of digital evidence, the Internet is an example of:
A. Open computer systems
B. Communication systems
C. Embedded computer systems
D. None of the above
Correct!
Wrong!
12) Computers can be involved in which of the following types of crime?
A. Homicide and sexual assault
B. Computer intrusions and intellectual property theft
C. Civil disputes
D. All the above
Correct!
Wrong!
13) A logon record tells us that, at a specific time:
A. An unknown person logged into the system using account
B. The owner of a specific account logged into the system
C. The account was used to log into the system
D. None of the above
Correct!
Wrong!
14) Cyber trails are advantageous because:
A. They are not connected to the physical world.
B. Nobody can be harmed by crime on the Internet.
C. They are easy to follow.
D. Offenders who are unaware of them leave behind more clues than they otherwise would have
Correct!
Wrong!
15) Private networks can be a richer source of evidence than the Internet because:
A. They retain data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above
Correct!
Wrong!
16) Which tool is used for ping sweeps and port scanning?
A. Netcat
B. SamSpade
C. SuperScan
D. All the above
Correct!
Wrong!
17) Which of the following tools is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Correct!
Wrong!
18) What is the most important activity in system cracking?
A. Information gathering
B. Cracking password
C. Escalating privileges
D. Covering tracks
Correct!
Wrong!
19) Which Nmap scan does not completely open a TCP connection?
A. SYN stealth scan
B. TCP scan
C. XMAS tree scan
D. ACK scan
Correct!
Wrong!
20) Keyloggers are form of
A. Spyware
B. Shoulder surfing
C. Trojan
D. Social engineering
Correct!
Wrong!
11) Which hacker refers to an ethical hacker?
A. Black hat hacker.
B. White hat hacker.
C. Grey hat hacker.
D. None of the above
Correct!
Wrong!
22) The term cracker refers to_____
A. Black hat hacker.
B. White hat hacker.
C. Grey hat hacker.
D. None of the above
Correct!
Wrong!
23) Who described a dissertation on fundamentals of hacker’s attitude?
A. G. Palma.
B. Raymond.
C. Either.
D. Jhon Browman
Correct!
Wrong!
24) Computer Hackers have been in existence for more than a ____.
A. Decade.
B. Year.
C. Century
D. Era.
Correct!
Wrong!
25) Hackers do hack for?
A. Fame.
B. Profit.
C. Revenge.
D. All the above
Correct!
Wrong!
26) The first mass produced embedded system is
A. Minuteman-I
B. Minuteman-II
C. Autonetics D-17
D. Apollo Guidance Computer (AGC)
Correct!
Wrong!
27) Which of the following is an (are) an intended purpose(s) of embedded systems?
A. Data collection
B. Data processing
C. Data communication
D. All of these
Correct!
Wrong!
28) Which of the following is (are) example(s) of embedded system for data communication?
A. Network router
B. Digital camera
C. Music player
D. All of these
Correct!
Wrong!
29) What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Correct!
Wrong!
30) A digital multimeter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
Correct!
Wrong!
Share the quiz to show your results !
Subscribe to see your results
22618 TEST 2
I got %%score%% of %%total%% right
%%description%%
%%description%%
Loading…
Mcq 0n Emerging Trends in Computer Engineering
Emerging Trends in Computer and Information Technology Mcq Questions (Download)
We provide regular updates about msbte on our social accounts For latest msbte diploma updates you can follow our page on Instagram @msbtenews and Facebook @msbtediplomaupdates. we solve your queries by message on our social accounts so do follow our social accounts if you have any queries related to diploma and engineering courses.
Msbte News is created to help msbte diploma students to find study resources, which are very much needed for diploma students while preparing for the exam. msbtenews.com provide polytechnic solved question papers which are provided by msbte.org.in. with these msbte polytechnic model answer paper students gets a rough idea about paper pattern and marks distribution.
Hello Diploma Students in this article we have provided 22618 Emerging Trends in Computer and Information Technology Mcq Pdf. With the help of this Emerging Trends in Information Technology Mcq with Answers Diploma in Information Technology and Computer Engineering Students can Practice for their Upcoming Winter 2021 Exams.
In this 22618 Emerging Trends in Computer and Information Technology Mcq Questions We have selected Important Questions from Previous Year Model Answer Paper and Made A possible Set Of 30 Questions which can Help Students in Preparation for Their Exams. This Mcq on Emerging Trends in Computer and Information Technology Is Ideal for Candidates who are in 3rd Year of Diploma in Information Technology and Computer Engineering Course.
Emerging Trends in Information Technology Mcq with Answers
By Referring this Advanced Java Programming Mcq Msbte Diploma in Information Technology & Computer Engineering Students Can Practice for their Upcoming Exams. We Have Also Emerging Trends in Information Technology and Computer Engineering Link at the end of the Quiz You can Download it for Future Reference
22618 Emerging Trends in Computer and Information Technology Mcq Pdf
1) A certain Professor at the Stanford University coined the word ‘artificial intelligence’ in 1956 at a conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above
Correct!
Wrong!
2) The field that investigates the mechanics of human intelligence is:
A. History
B. cognitive science
C. psychology
D. sociology
E. None of the above
Correct!
Wrong!
3) A.M. turing developed a technique for determining whether a computer could or could not demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
Logarithm
E. None of the above
Correct!
Wrong!
4) The first AI programming language was called:
A. BASIC
B. FORTRAN
C. IPL
D. LISP
E. None of the above
Correct!
Wrong!
5) What is Artificial intelligence?
A. Putting your intelligence into Computer
B. Programming with your own intelligence
C. Making a Machine intelligent
D. Putting more memory into Computer
Correct!
Wrong!
6) More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Correct!
Wrong!
7) There are three c’s in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Correct!
Wrong!
8) When was the Federal Bureau Investigation program created?
A.1979
B.1984
C.1995
D.1989
Correct!
Wrong!
9) When did the field of PC forensics begin?
A.1960’s
B.1970’s
C.1980’s
D.1990’s
Correct!
Wrong!
10) What is Digital Forensic?
A. Process of using scientific knowledge in analysis and presentation of evidence in court
B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation
C. process where we develop and test hypotheses that answer questions about digital events
D. Use of science or technology in the investigation and establishment of the facts or evidence in a court of law
Correct!
Wrong!
11) In terms of digital evidence, the Internet is an example of:
A. Open computer systems
B. Communication systems
C. Embedded computer systems
D. None of the above
Correct!
Wrong!
12) Computers can be involved in which of the following types of crime?
A. Homicide and sexual assault
B. Computer intrusions and intellectual property theft
C. Civil disputes
D. All the above
Correct!
Wrong!
13) A logon record tells us that, at a specific time:
A. An unknown person logged into the system using account
B. The owner of a specific account logged into the system
C. The account was used to log into the system
D. None of the above
Correct!
Wrong!
14) Cyber trails are advantageous because:
A. They are not connected to the physical world.
B. Nobody can be harmed by crime on the Internet.
C. They are easy to follow.
D. Offenders who are unaware of them leave behind more clues than they otherwise would have
Correct!
Wrong!
15) Private networks can be a richer source of evidence than the Internet because:
A. They retain data for longer periods of time.
B. Owners of private networks are more cooperative with law enforcement.
C. Private networks contain a higher concentration of digital evidence.
D. All the above
Correct!
Wrong!
16) Which tool is used for ping sweeps and port scanning?
A. Netcat
B. SamSpade
C. SuperScan
D. All the above
Correct!
Wrong!
17) Which of the following tools is used for security checks as port scanning and firewall testing?
A. Netcat
B. Nmap
C. Data communication
D. Netscan
Correct!
Wrong!
18) What is the most important activity in system cracking?
A. Information gathering
B. Cracking password
C. Escalating privileges
D. Covering tracks
Correct!
Wrong!
19) Which Nmap scan does not completely open a TCP connection?
A. SYN stealth scan
B. TCP scan
C. XMAS tree scan
D. ACK scan
Correct!
Wrong!
20) Keyloggers are form of
A. Spyware
B. Shoulder surfing
C. Trojan
D. Social engineering
Correct!
Wrong!
11) Which hacker refers to an ethical hacker?
A. Black hat hacker.
B. White hat hacker.
C. Grey hat hacker.
D. None of the above
Correct!
Wrong!
22) The term cracker refers to_____
A. Black hat hacker.
B. White hat hacker.
C. Grey hat hacker.
D. None of the above
Correct!
Wrong!
23) Who described a dissertation on fundamentals of hacker’s attitude?
A. G. Palma.
B. Raymond.
C. Either.
D. Jhon Browman
Correct!
Wrong!
24) Computer Hackers have been in existence for more than a ____.
A. Decade.
B. Year.
C. Century
D. Era.
Correct!
Wrong!
25) Hackers do hack for?
A. Fame.
B. Profit.
C. Revenge.
D. All the above
Correct!
Wrong!
26) The first mass produced embedded system is
A. Minuteman-I
B. Minuteman-II
C. Autonetics D-17
D. Apollo Guidance Computer (AGC)
Correct!
Wrong!
27) Which of the following is an (are) an intended purpose(s) of embedded systems?
A. Data collection
B. Data processing
C. Data communication
D. All of these
Correct!
Wrong!
28) Which of the following is (are) example(s) of embedded system for data communication?
A. Network router
B. Digital camera
C. Music player
D. All of these
Correct!
Wrong!
29) What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Correct!
Wrong!
30) A digital multimeter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
Correct!
Wrong!
Share the quiz to show your results !
Subscribe to see your results
22618 TEST 2
I got %%score%% of %%total%% right
%%description%%
%%description%%
Loading…
Mcq 0n Emerging Trends in Computer Engineering
Emerging Trends in Computer and Information Technology Mcq Questions (Download)
We provide regular updates about msbte on our social accounts For latest msbte diploma updates you can follow our page on Instagram @msbtenews and Facebook @msbtediplomaupdates. we solve your queries by message on our social accounts so do follow our social accounts if you have any queries related to diploma and engineering courses.
Msbte News is created to help msbte diploma students to find study resources, which are very much needed for diploma students while preparing for the exam. msbtenews.com provide polytechnic solved question papers which are provided by msbte.org.in. with these msbte polytechnic model answer paper students gets a rough idea about paper pattern and marks distribution.
Msbte Exam Form Winter 2022 - Hello Diploma students Maharashtra state Board of Technical Education has released the Msbte Winter 2022 Exam Form. Students...
Hello if you're aspiring Junior Associate of Indian Institute of Bankers Candidate and looking For IIBF Caiib Syllabus 2022 Pdf Then You have landed...
Want to stay up to date with the latest news?
We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!