Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
4su
cce
ss.c
om
1. In addition to keying data directly into a database, data entry can also be done from a (an)
1) field
2) table
3) data dictionary
4) input form
5) None of these
2. A word processor would most likely be used to do which of the following?
1) Doing a computer search in the media centre
2) Keeping an account of money spent
3) Maintaining an inventory
4) Typing a biography
5) None of these
3. What is the main folder on a storage device called?
1) Interface
2) Root directory
4) Device driver
5) None of these
3) Platform
4. In database, a field is a
1) table of information
4) category of information
2) label
5) None of these
3) Hard disk
7. You can do transactions on Internet using your bank account. This is called
1) Banking
2) Online banking
3) Offline banking
4) Transactions
5) None of these
8. Which of the following is graphics solution for Word Processor?
1) Clipart
2) Wordart
3) Dropcap
4) All the above
5) None of these
5) None of these
4) Slow
5) None of these
4) Project
5) None of these
3) Network
3) Hybrid Computer
3) Photoshop
bsc
4su
cce
ss.c
om
15. Since viruses are only a form of software, they primarily infect
1) Data
2) Hardware 3) Peripherals 4) Programs
5) None of these
16. What is the other name of LAN card?
1) Modem
2) NIC
4) Internet card
5) None of these
3) Network connector
17. Which of the following is the name given to devices that make up a computer that you can see or
touch?
1) Print
2) Mouse
3) Hardware 4) Software
5) None of these
18. A(n)_____contains commands that can be selected.
1) icon
2) button
3) pointer
4) menu
5) None of these
5) None of these
4) JPEG
20. Which of the following is used to measure the speed of the processor?
1) Unit
2) Processing speed
3) Clock speed
4) Memory
5) None of these
21. What is a flowchart?
1) It represents process.
3) It represents process or algorithm.
5) None of these
2) It represents algorithm.
4) It represents mathematical subtraction.
22. Which of the following is used to find a saved document in the computers memory and bring it up
on the screen to view?
1) Rerun
2) Reverse
3) Retrieve
4) Return
5) None of these
23. A computer uses_____ system to process data.
1) kilobyte
2) processing
4) representational
5) None of these
3) binary
5) None of these
1) Memory
2) Information 3) Data
4) Reports
5) None of these
bsc
4su
cce
ss.c
om
28. What do we call the keys that change the meaning of what you type?
1) Change keys
2) Disk space
3) Modifier keys
4) Keyboard
5) None of these
29. What kind of files do we care about the most? (letters, pictures, memos, etc.)
1) Document files
2) Application files
3) System files
4) User files
5) None of these
3) Watts data
35. Which of the following is used for writing the webpage code?
1) Winzip
2) Hypertext markup language 3) Fifth generation language
4) Part
5) None of these
36. FLASH is a
1) Hardware
2) Game
4) EEPROM
5) None of these
5) None of these
3) RAM
2) Sequential files
5) None of these
3) Both 1 and 2
39. How many characters can be typed in a single cell in an Excel sheet?
1) 256
2) 1024
3) 32000
4) 65535
5) None of these
40. Whas is the full form of XP in Windows-XP?
1) XTRA Power
2) XTREME Programming
4) XTREME Power
5) None of these
3) XTRA Process
5) None of these
bsc
4su
cce
ss.c
om
5) None of these
3) A3
46. Which of the following is used to find an individual item in a file immediately?
1) File allocation table
2) Sequential access
3) Direct access
4) Directory
5) None of these
47. In Excel, charts are created using which of the following options?
1) Pivot table
2) Chart Wizard3) Pie chart
4) Bar chart
5) None of these
48. Which device is used to access your computer from another computer or for talk over phone?
1) CD-Rom Drive
2) Hard Drive
3) RAM
4) Modem
5) None of these
49. Which of the following is the name of the software which is used for sending or receiving a message?
1) Telnet
2) Browser
3) Messenger
4) Operating system
5) None of these
50. Which of the following software applications would be most appropriate for performing numerical
and statistical calculations?
1) Document Processor
2) Database
3) Graphics Package
4) Spreadsheet
5) None of these
51. Which of the following is the minimum zoom percentage supported by MS Word?
1) 10%
2) 15%
3) 25%
4) 4%
5) None of these
52. The default lines to drop for drop cap is
1) three lines 2) two lines
3) four lines
4) eight lines
5) None of these
3) address block
bsc
4su
cce
ss.c
om
3) John Burden
2) Grace Hopper
5) None of these
4) 219
5) None of these
59. Which page orientation will you select if you want to print in wide format?
1) Landscape 2) Horizontal 3) Portrait
4) Vertical
5) None of these
60. Which type of server is responsible for storing files for users on the network?
1) Web server
2) File server
3) Print server
4) Both (2) and (3)
4) Both (1) and (2)
3) Ken Thompson
5) None of these
66. In DOS, primary hard disk drive has the drive letter
1) A
2) B
3) C
4) D
5) None of these
3) Letter
1) ctrl + W
2) ctrl + P
5) None of these
bsc
4su
cce
ss.c
om
3) Right Attributes
4) Attribute
2) operating system
5) None of these
3) Equal-Relationship
5) None of these
5) F7
3) application
3) software
3) NOR
5) None of these
80. Which of the following is ones complement of the binary number 110010?
1) 111111
2) 001111
3) 010101
4) 001101
5) None of these
81. Which of the following will come next in the series?
10, 01, 100, 011, 11001, ....
1) 0101
2) 00110
3) 01101
4) 00101
82. Which of the following is not a type of error?
1) Logical error
2) Run time error
4) All the above
5) None of these
5) None of these
3) Syntax error
5) F5
3) website
bsc
4su
cce
ss.c
om
2) MS-Word
5) All the above
3) MS-Excel
3) ROM
3) Epic
90. Which of the following is used to click to open any web page?
1) URL
2) Hyperlink
3) Navigation
4) URN
5) None of these
91. Which of the following is one of the most business-oriented languages?
1) BASIC
2) COBOL
3) ALGOL
4) FORTRAN 5) None of these
92. C language is a
1) High level language
2) High level and low level language
3) Low level language
4) High level language with some features of low level language
5) None of these
93. Which of the following codes needs 7 bits to represent any character?
1) EBCDIC
2) BCD
3) ASCII
4) All the above
5) None of these
94. For deleting data permanently, we use
1) Delete
2) Shift + Alt + Delete
4) Erase
5) All the above
95. Integrated circuits are made up of
1) Si
2) Al
3) Mn
96. WORM stands for
1) Wanted One Read Memory
4) All the above
4) Mg
3) Shift + Delete
3) 8.0 inches
bsc
4su
cce
ss.c
om
3) .docxs
3) Address Book
2) E-mail Client
5) None of these
3) 138.124.256.225
5) None of these
3) malicious ware
104.____ is the measurement of things such as fingerprints and retinal scans used for security access.
1) Biometrics
2) Bio measurement
3) Computer security
4) Smart weapon machinery
5) None of these
105.The scrambling of code is known as
1) encryption 2) firewall
3) scrambling
106.Which is the part of a computer that one can touch and feel?
1) Programs
2) Software
3) Hardware 4) Output
5) None of these
107.Which of the following moves the cursor one space to the right to puts spaces in between words?
1) Control key 2) Space bar
3) Printer
4) Mouse
5) None of these
108.When your computer stops working suddenly, it is referred to as a
1) crash
2) die
3) death
4) penalty
5) None of these
109.A symbol or question on the screen that prompts you to take action and tell the computer what to
do next is called
1) scanner
2) questionnaire
3) prompt and dialog box
4) information seeker
5) None of these
5) None of these
bsc
4su
cce
ss.c
om
111.Name the key that will erase information from the computers memory and characters on the screen.
1) Edit
2) Delete key 3) Dummy out 4) Trust key
5) None of these
112.A program that works like a calculator for keeping track of money and making budgets.
1) Calculator 2) Spreadsheet 3) Budgeter
4) Financier
5) None of these
113. The OSI model is divided into _______ processes called layers.
1) five
2) six
3) seven
4) eight
5) None of these
114._____ are specially designed computer chips that reside inside other devices such as your car or
your electronic thermostat.
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these
115.The goal of data mining is
1) to explain some observed event or condition
2) to confirm that data exists
3) to analyse data for expected relationships
4) to create a new data warehouse
5) None of these
3) Field definition
119.The code that relational database management systems use to perform their database task is referred
as
1) QBE
2) SQL
3) OLAP
4) Sequel Server 5) None of these
120.Chip is a common nickname for a (n)
1) transistor
2) resistor
3) integrated circuit 4) semiconductor 5) None of these
121.The most frequently used instructions of a computer program are likely to be fetched from
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these
bsc
4su
cce
ss.c
om
122.____ are viruses that are triggered off by the passage of time or on a certain date.
1) Boot-sector viruses
2) Macro viruses
3) Time bombs
4) Worms
5) None of these
123.Which of the following places the common data elements in order from smallest to largest?
1) character, file, record, field, database
2) character, record, field, database, file
3) character, field, record, file, database
4) bit, byte, character, record, field, file, database,
5) None of these
124.The Internet is
1) a large network of networks
2) an internal communication system for a business
3) a communication system for the Indian government
4) All the above
5) None of these
129.The ability to recover and read deleted or damaged files from a criminals computer is an example
of a law enforcement specialty called
1) robotics
2) simulation 3) computer forensics 4) animation 5) None of these
130.______ server stores and manages files for network users.
1) Authentication 2) Main
3) Web
4) File
5) None of these
131.In a ring topology, the computer in possession of the ____ can transmit data.
1) packet
2) data
3) access method 4) token
5) None of these
132.When data changes in multiple lists and all lists are not updated, this causes
1) data redundancy
2) information overload
3) duplicate data
4) data inconsistency
5) None of these
133.____arewordsthataprogramminglanguagesetsasideforitsownuse.
1) Control words
2) Reserved words
3) Control structures
4) Reserved keys
5) None of these
134.You must instal a(n) ____ on a network if you want to share a broadband Internet connection.
1) router
2) modem
3) node
4) cable
5) None of these
bsc
4su
cce
ss.c
om
136.The system unit of a personal computer typically contains all of the following except
1) Microprocessor
2) Disk controller
3) Serial interface
4) Modem
5) None of these
5) None of these
2) 5
3) 2
4) 5
5) None of these
5) None of these
145.Which protocol is used by the operating system to generate error message like Host Unreachable
over a TCP/IP network?
1) HTTP/1.1 2) ICMP
3) PPP
4) ICGM
5) TCP/IP
146.What does SNMP stand for?
bsc
4su
cce
ss.c
om
147.On a school computer, Lucy learned how to copy programs. A classmate asked her to copy a program
for his home use. Her most ethical response would be which of the following?
1)Ill copy it, but you have to promise not to tell anyone.
2)I dont know how to copy disks.
3)I cant copy it because it will break copyright laws.
4)Ill copy it for you, but you cant copy it for anyone else.
5)None of these
148.Which of the following is not true?
1) LOGO stands for Live On Googles Orkut.
2) BIOS is a system software.
3) GRUB is a Linux boot loader.
4) Ruby is a web scripting language.
5) LILO is a Linux boot loader.
149.What is Mail-Merge?
1)a web based e-mail service with no spam
2)a name of Yahoo! MINDSET search feature
3)a new virus hoax which can delete data from mail inbox
4)a feature of MS-Word used to create multiple documents like letters, mailing labels, name tags etc
5)None of these
150.In MS-Word, a menu item in dim color (gray) indicates that the menu is?
1) toggle menu
2) unavailable for current context
3) not much required menu
4) over-used menu
5) None of these
151.Which of the following cant be a proper virus detection and prevention tip?
1)Do not open any file attached to an email unless you know what it is, even if it appears to come
from a dear friend or someone you know. Some viruses can replicate themselves and spread through
email. Better be safe than sorry and confirm that they really sent it.
2)Do not open any file attached to an email if the subject line is questionable or unexpected. If the
need to do so is there, always save the file to your hard drive before doing so.
3)Open chain emails or junk mail and forward it to others.
4)Do not download any file from strangers.
5)None of these
152._____ temporarily holds program instructions, data and output until they are no longer needed by
the computer.
1) Hard disk
2) Motherboard 3) CD
4) RAM
5) Floppy disk
153.Which of the following statements is true about a storage media?
1)Storage media are non-volatile.
2)Hard disk has a very high access time as compared to RAM (10-20 million ns).
3)Hard disk is very cheap as compared to RAM and large in capacity.
1) Only 1
2) Only 2
3) Both 1 and 3
4) Both 1 and 2
5) All 1, 2 and 3
bsc
4su
cce
ss.c
om
157.In which type of channel messages may flow in two directions but never at the same time?
1) Full duplex
2) Half duplex
3) Simplex
4) In data com, it is not possible.
5) None of these
158.The first line of the C program contains a/an _____, indicated by # include.
1) preprocessing directive
2) processing directive
3) main directive
4) new line character
5) None of these
159._____ technology standards have been used in the past, but Ethernet over twisted pair cabling and
Wi-Fi are the two most common technologies currently used to build LANs.
1) ARCNET, Token Ring 2) CIR 3) X.25
4) VoFR
5) None of these
160.POST stands for
1) Positive Operating System Test
2) Particle Of Static Transfer
3) Power-On Self-Test
4) Printer Online Static Test
5) None of these
5) None of these
163._____ is an electronic spreadsheet. You can use it to organise your data into rows and columns. You
can also use it to perform mathematical calculations quickly.
1) Microsoft Excel
2) Microsoft Word
3) Microsoft PowerPoint
4) Microsoft Calculator
5) None of these
bsc
4su
cce
ss.c
om
164.A hard drive consists of spinning ____ made up of aluminum or ceramic that is coated with magnetic
media.
1) plates
2) disks
3) relays
4) memories
5) platters
165.The power supply supplies power to every single part in the PC. The power supply is to convert the
230 VAC into 3.3 V, 5 V and 12 VDC power that the system requires for the operations. It is
commonly known as
1) Simple mode power supply 2) Switch mode power supply
3) Uninterrupted power supply 4) Invertor
5) Convertor
166.Which of the following statements is NOT true about a computer?
1)8085 is an example of 8-bit microprocessor.
2)Software is used to make computer usable.
3)Based on the microprocessor, systems are classified as PC-XT and PC-AT.
4)SMPS converts AC (Alternate Current) into DC (Direct Current).
5)None of these
167.The Intel 8085 is a/an _____ microprocessor introduced by Intel in the year _____.
1) 16-bit, 1976 2) 16-bit, 1977 3) 8-bit, 1978 4) 8-bit, 1977 5) 8-bit, 1967
168.Which of the following is NOT a goal of transaction processing system?
1)Capture, process and store transactions
2)Produce a variety of documents related to routine business activities
3)Reduce manual effort associated with processing business transactions
4)Produce standard reports used for management decision making
5)None of these
169.Which of the following is not an example of a virus?
1) Polymorphic 2) Logic Bombs
3) Worms
4) Tartan
5) Trojan
5) BIOS
4) CMOS
171._____ is a software that is available for use at no cost or for an optional fee, but usually with one or
more restricted usage rights.
1) Firmware
2) Teachware 3) Testware
4) Freeware
5) Groupware
172.____ involves checking or logging the data in; checking the data for accuracy; entering the data into
the computer; transforming the data and developing and documenting a database structure that
integrates the various measures.
1) Data mining 2) Database
3) Data preparation 4) Data structuring 5) Data validation
173.Which of the following is true for OCR?
A)OCR is an improvement over OMR.
B)It is the mechanical or electronic translation of scanned images of handwritten, typewritten or
printed text into machine-encoded text.
C)It is widely used to convert books and documents into electronic files, to computerise a recordkeeping system in an office or to publish the text on a website.
D)OCR systems require calibration to read a specific font; early versions needed to be programmed
with images of each character, and worked on one font at a time.
1) Only A)
2) Only B)
3) Only A), C) and D)
4) Only B), C) and D)
5) All the above
bsc
4su
cce
ss.c
om
2) Web document
4) Hyperlink document
176._____ is the amount of time a computer will repeat a single character when its key is held down.
1) Typematic rate
2) Recycle rate
3) Holding rate
4) Baud rate
5) Typewriter rate
177.Database that spreads information across different tables while maintaining links between them is
referred as
1) Relational database
2) Rotational database
3) Database connection
4) Tabular database
5) None of these.
178.Which is the first electronic spreadsheet on a microcomputer that helped turn the Apple II computer
into a success and greatly assisted in their widespread application?
1) Visi Calc
2) Lotus 1-2-3 3) Excel
4) TRS-80
5) None of these
179.____ is a process where an external device can get the attention of the microprocessor. The process
starts from the I/O device and is asynchronous.
1) Request
2) Control
3) Interrupt
4) Interaction 5) None of these
180.In relation to computer which of the following is arranged in proper sequence?
1)HardwareAssembly languageMachine language- Highlevel language
2)HardwareMachine languageHigh-level language-Assembly Language
3)Machine languageAssembly languageHigh-level languageHardware
4)HardwareMachine languageAssembly languageHigh-level language
5)None of these
bsc
4su
cce
ss.c
om
3) Shadowing 4) Casting
5) MiniSD
189.Which of the following is/are examples of upper layer technologies in the OSI model?
1) TCP
2) HTTP, SSL and NFS
3) IP
4) Ethernet
5) None of these
190.In a Batch Processing Operating System, interaction between the user and the processor is
1) limited
2) not possible
3) unlimited
4) depends upon user only
5) depends upon amount of work
191.In case of computer, JUMPER is
1) used to configure the hard disk
2) used to configure the primary memory
3) used to play computer game
4) a software language
5) machine language
5)Apple
194.____ is a system that pre-dates the World Wide Web for organising and displaying files on internet
servers.
1) HTML
2) SGML
3) Telnet
4) Gopher
5) None of these
bsc
4su
cce
ss.c
om
195.A specialised network device that determines the next network point to which it can forward a data
packet towards the destination of the packet is commonly known as
1) bridge
2) router
3) switch
4) hub
5) repeater
196.Which of the following is a computer network service which allows clients to make indirect network
connections to other network services?
1) Firewall
2) Proxy
3) Network address translator 4) Hub
5) Bridge
197.In a computer, a hardware and/or software that duplicates the functions of a first computer system
in a different second computer system, so that the behaviour of the second system closely resembles
the behaviour of the first system is known as
1) Stimulator 2) Emulator
3) Scanner
4) Copier
5) None of these
198.A _____ is the basic unit of data storage on a hard disk.
1) track
2) sector
3) zone
4) gap
5) None of these
199.A method of transferring information directly from a mass storage device such as hard disk or from
adapter card into memory (or vice versa) without information passing through processor is commonly
known as
1) Direct memory access
2) Casting
3) Standard memory access
4) Directional memory access
5) None of these
200.____ is the portion of the data block (oracle block) that contains information about the table having
rows in this block.
1) Table directory
2) Table row
3) Table column
4) Header
5) Footer
ANSWERS:
1. 4
2. 4
3. 2
4. 3
5.1; BIOS is Basic Input Output System. It is stored in computers permanent memory ROM.
6.1; Boot strap is a program which is loaded in BIOS and it is responsible to start a computer.
7.2; Transactions can be performed on Internet through online banking
8.1
9.4; Format drive name is used to format a drive through command prompt.
10.4; FIND option is used to find a particular word or group of words. It is available under
EDIT menu.
11.2
12. 3
13. 2
14.2; PDF files can be opened through only PDF readers such as Adobe Reader.
15.4; Because programs are software
16.2; NIC, ie Netowork Interface Card, is another name of LAN card which provides interface
between a computer and a network.
17.3
18. 4
19.1; TMPIt is an extension of temporary file.
20. 3
21.3; Flowchart is a man-made diagram on paper, to represent algorithm and process both.
bsc
4su
cce
ss.c
om
22.4
23.3; Computer understands only binary system, so it uses binary system to process data
24.4
25. 1
26. 3
27. 2
28.3; Modifier key is a key which is used to change the meaning what we write.
29.1; Document files are the special type of files where we can store letters, photos and memories.
30.5; Artifical intelligence is the feature in which computers behave like human beings.
31.1
32. 4
33. 1
34. 2
35. 2
36.3; FLASH memory is based on time memory that means all data will be lost whenever current is
discontinued. So it is RAM.
37.4
38.3; Both Sequential and Random files can be stored on a disk.
39.4
40. 2
41.2; Private key is used, because it is known to user only .
42.3
43. 1
44. 2
45. 4
46.3
47. 2
48. 4
49.3; We can interchange the messages through Messenger, for example Yahoo Messenger, gtalk
etc.
50.4
51. 1
52. 1
53. 1
54. 2
55. 4
56. 2
57. 2
58. 5
59. 1
60. 4
61. 5
62. 2
63. 3
64. 2
65. 1
66. 3
67. 2
68. 3
69. 3
70. 2
71. 1
72. 2
73. 2
74. 5
75. 2
76. 4
77. 1
78. 4
79. 2
80. 4
81. 2
82. 5
83. 3
84. 1
85. 2
86. 1
87. 4
88. 4
89. 5
90. 2
91. 2
92. 4
93. 3
94. 3
95. 1
96. 2
97. 4
98. 2
99. 2
100. 3
101. 3
102. 2
103. 4
104. 1
105. 1
106. 3
107. 2
108. 5
109. 3
110. 3
111. 2
112. 2
113. 3
114. 2
115. 1
116. 4
117. 4
118. 4
119. 2
120. 3
121. 2
122. 3
123. 3
124. 1
125. 3
126. 2
127. 1
128. 1
129. 3
130. 4
131. 4
132. 4
133. 2
134. 1
135. 2
136. 4
137. 4
138. 4
139. 3
140. 4
141. 2
142. 3
143. 3
144. 5
145. 2
146. 4
147. 3
148. 1
149. 4
150. 2
151. 3
152. 4; RAM is called primary memory of a computer.
153. 5
154. 1
155.2;Class As default mask is 255.0.0.0
Class Bs default mask is 255.255.0.0
Class Cs default mask is 255.255.255.0
156. 1
157. 2; Half duplex is bidirectional connection, with the restriction that data can travel in one
direction at a time.
158. 1
159. 1
bsc
4su
cce
ss.c
om
160. 3; POST: Power-On Self-Test refers to routines run immediately after power is applied, by
nearly all electronic devices.
161. 5
162. 4
163. 1
164. 5
165. 2
166. 5
167. 4
168. 2
169. 4
170. 2
171. 4; Freeware (from free and software) is a computer software that is available for use at no
cost or for an optional fee, but usually with one or more restricted usage rights.
172. 3
173. 5
174. 4
175. 1
176. 1
177. 1; A relational database stores information across different tables and connects them with links
in the computer.
178. 1; VisiCalc: It was the first spreadsheet that combined all essential features of modern spreadsheet
applications.
179. 3
180. 4
181. 5
182. 5
183. 3
184. 3
185. 2; RAID (redundant Arrays of Independent Disks) is a method of storing data on two or more
hard drives that work in combination to do the job of a larger drive. Although RAID can be
used to increase performance, it is most often used to protect critical data on a storage server.
186. 5
187. 4
188. 3; C is a computer programming language developed for general purpose between 1969 and
1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating
system.
189. 2; OSI designates the application, presentation and session stages of the stack as the upper
layers. Generally speaking, software in these layers performs application-specific functions like
data formatting encryption, and connection management. Examples of upperlayer technologies
in the OSI model are HTTP, SSL and NFS.
190. 1; In a batch processing operating system, interaction between the user and the processor is
limited or there is no interaction at all during the execution of work. Data and programs that
need to be processed are bundled and collected as a batch and executed together.
191. 1; Several different connectors and jumpers are used to configure the hard disk and connect it
to the rest of the system. The number and types of connectors on the hard disk depend on the
data interface it uses to connect to the system, the manufacturer of the drive and any special
features that the drive may possess.
192. 5; File Allocation Table (FAT) is a computer file system architecture now widely used on many
computer systems and most memory cards, such as those used with digital cameras. FAT file
systems are commonly found on floppy disks, flash memory cards, digital cameras and many
other portable devices because of their relative simplicity. FAT was also commonly used on hard
disks throughout the DOS and Windows 9x eras, but its use on hard drives has declined since the
introduction of Windows XP, which primarily uses the newer NTFS.The initial version of FAT
designed for 16-bit microprocessors is now referred to as FAT12.
193. 2
194. 4; Gopher is a system that pre-dates the World Wide Web for organising and displaying files on
Internet servers. A Gopher server presents its contents as a hierarchically structured list of files.
With the ascendance of the Web, many gopher databases were converted to Web sites which can
be more easily accessed via Web search engines
195. 2
196. 2; Proxy is the computer network service which allows clients to make indirect network
connections to other network services.
197. 2
198. 2; A sector is the basic unit of data storage on a hard disk. The term sector emanates from a
mathematical term referring to that pie-shaped angular section of a circle.
199. 1
200. 1