Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- What do you call the programs that are used to find out possible faults and their causes?
A. operating system extensions
B. cookies
C. diagnostic software
D. boot diskettes
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans –C. diagnostic software [/spoiler] - The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called _______
A. robotics
B. simulation
C. computer forensics
D. animation
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans –C. computer forensics[/spoiler] - _______ are used to identify a user who returns to a Website.
A. Cookies
B. Plug-ins
C. Scripts
D. ASPs
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans –A. Cookies[/spoiler] - Which of the following contains permanent data and gets updated during the processing of transactions?
A. Operating System File
B. Transaction file
C. Software File
D. Master file
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – D. Master file[/spoiler] - The difference between people with access to computers and the Internet and those without this access is known as the _______
A. digital divide
B. Internet divide
C. Web divide
D. E-illiteracy
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans –A. digital divide.[/spoiler] - Which of the following is the smallest storage?
A. Megabyte
B. Gigabyte
C. Terabyte
D. All of these
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans –A. Megabyte.[/spoiler] - Hardware or software designed to guard against unauthorized access to a computer network is known as a(n) ________
A. Hacker-proof program.
B. Firewall.
C. Hacker-resistant server.
D. Encryption safe wall.
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans –B. Firewall.[/spoiler] - The scrambling of code is known as ____
A. Encryption.
B. a firewall.
C. Scrambling.
D. Password proofing.
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans –A. Encryption[/spoiler] - To prevent the loss of data during power failures, use a(n) ________
A. Encryption program.
B. Surge protector.
C. Firewall.
D. UPS
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans –D. UPS[/spoiler] - In which type of computer, data are represented as discrete signals.
A. Analog computer
B. Digital computer
C. both
D. Hybrid Computer
E. None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Digital computer[/spoiler]