Computer Questions Set – 202

0
16102
computer

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. In RFID, “R” stands for ____
    A. Rapid
    B. Remote
    C. Random
    D. Radio
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans –D. Radio(Radio Frequency Identification)[/spoiler]
  2. _______ is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
    A. Robotics
    B. Animation
    C. Simulation
    D. Computer Forensics
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – D. Computer Forensics[/spoiler]
  3. Which of the following is the process of sorting through large data sets to identify patterns and establish relationships to solve problems through data analysis?
    A. Data Mining
    B. Data Marting
    C. Data Warehousing
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – A. Data Mining[/spoiler]
  4. The practice of collecting into a single database data relevant to a particular function, department, etc is known as?
    A. Data Mining
    B. Data Marting
    C. Data Warehousing
    D. Data Diddling
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Data Marting[/spoiler]
  5. The unauthorized changing of data before or during their input to a computer system is known as ____
    A. Data Mining
    B. Data Marting
    C. Data Warehousing
    D. Data Diddling
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans –D. Data Diddling[/spoiler]
  6. In Excel _______allows you to extract the significance from a large, detailed data set.
    A. Sorting
    B. Pivot table
    C. Conditional Formatting
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Pivot table[/spoiler]
  7. The rules of a language is known as ____ 
    A. Code
    B. Structure
    C. Procedure
    D. Flow Chart
    E. Syntax
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans –E. Syntax.[/spoiler]
  8. _____ is a part of computer network that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks.
    A. Server
    B. Client
    C. Protocol
    D. Backbone
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans –D. Backbone[/spoiler]
  9. _______ is a sequence of responses to an initial message posting.
    A. Comment
    B. List
    C. Post
    D. Thread
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans –D. Thread[/spoiler]
  10. ______ is a cyber attack intended to redirect a website’s traffic to another, fake site
    A. Redirecting
    B. Phishing
    C. Pharming
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – C. Pharming[/spoiler]