With each visit, the list of questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1. What is the term for a security vulnerability that allows an attacker to intercept and capture login credentials as they are transmitted over a network?
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2. In machine learning, what is the term for the process of selecting the best subset of features for a model?
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3. Which LAN technology allows data to be transmitted over coaxial cables with a central bus or trunk line?
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4. How many bytes are in a petabyte (PB)?
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5. Which of the following actions is generally considered a violation of copyright?
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6. Which programming language is often used for web development on the server side and is known for its speed and scalability?
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.When did arch rivals IBM and Apple Computers Inc. decide to join hands?
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8. What is the maximum speed of data transmission typically associated with a LAN?
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9. In programming, what is the term for a predefined class or interface that other classes can inherit properties and methods from?
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10. What is the term for adjusting the brightness and contrast of an image or video in post-production?
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11. Which HTTP status code indicates that the requested resource has been permanently moved to a different URL?
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12. Which of the following is a commonly used protocol for remote access to Unix-based systems?
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13. In a GUI, what does the "taskbar" or "dock" typically contain?
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14. In word processing software, what is the term for a predefined set of formatting settings, such as font, size, and color?
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15. What is a program or set of instructions that a computer can execute called?
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16. What is the term for a collection of slides in a presentation software file?
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17. Which network topology connects devices in a circular fashion, where each device is connected to exactly two other devices?
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18. What is a "safe harbor" provision under the DMCA?
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19. What is "recursion" in programming?
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20. What is the primary function of a file path or file location?
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21. Which of the following is a top-level domain (TLD) used for educational institutions and universities?
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22. What is a "DMCA takedown notice" used for?
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23. In a function, what is the purpose of the "local variables"?
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24. Which of the following is a commonly customized aspect of the desktop environment?
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.________is the linux flavor which runs from CD
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26. Which storage technology is most commonly used in cloud-based data centers for its speed and reliability?
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27. What is the purpose of "System Restore" in Windows troubleshooting?
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28. What is the purpose of a URL?
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29. What is a pipeline in CPU design?
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30. What is the primary function of a backup during the software installation process?
Your Answer:Correct
Your Answer:Incorrect