Maharashtra SET (MH-SET) 2020 Solved Library & Information Science Questions with Explanations (71-80)
71. Which of the following facets are associated with the session layer?
(a) Diaglog control (b) Token management
(c) Semantics of the information transmitted
(d) Synchronization
Answer: (A)
Notes: Session layer of OSI model, also known as a network dialog controller, is responsible for creating, maintaining, synchronizing the interaction between communicating applications.
72. An attempt to make computer resources unavailable to its intended user is called :
Answer: (C) Denial-of-Service Attack
Notes: A DoS (Denial of Service) Attack is an attack which is perpetrated for the purpose of making a target machine or network resource unavailable for its intended users.
73. Which layers of the OSI reference model are host to host layers?
(a) Transport layer (b) Network layer
(c) Session layer
(d) Data Link Layer
Answer: (C)
74. Program which is used to control system performance is classified as __.
Answer: (B) System program
75. LOCKSS is an initiative of which university ?
Answer: (B) Stanford University
76. Which ‘‘V’’ of Big Data is concerned with the usefulness of data ?
Answer: (D) Value
77. Position Detection pattern are arranged at __ corners of the QR code.
Answer: (C) 3
Notes: Quick response code (QR code) is a matrix 2D code for high-speed reading developed by DENSO WAVE in 1994.The position detection patterns are arranged at three corners of the QR codes.
78. ISO/IEC 18004 : 2000 is the international standard for developing __.
Answer: (A) QR code
79. Assertion (A): Proxy server does not act as an intermidiary between a computer and the internet. Reason (R): Proxy server ensures security, administative control and cache.
Answer: (B)
80. Assertion (A): Search engines search documents for specified key-words, and returns a list of documents where the keywords were found. Reason (R): Spider helps the search engines to index the documents.
Answer: (C)
0 Comments