Current Affairs PDF Sales

Computer Questions Set – 131

AffairsCloud YouTube Channel - Click Here

Hello Aspirants. Welcome to Online Computer Quiz in Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. SAN, Google Docs, and Network drive are all examples of _________ Storage
    A. Primary
    B. Remote
    C. RAM
    D. Volatile
    E. None of these
    Ans – B. Remote

  2. RAID stands for________
    A.Reproduce Array of Intelligent Disks
    B.Reproduce Array of Inexpensive Disks
    C.Redundant Array of Inexpensive Drives
    D.Redundant Array of Inexpensive Disks
    E.Redundant Array of Intelligent Disks
    Ans – D.Redundant Array of Inexpensive Disks

  3. Which is used to display one or more web pages within another normal web page?
    A. iframe
    B. hyperlink
    C. home page
    D. new tab
    E. None of these
    Ans – A. iframe

  4. _______ is a method in which multiple communication devices are connected to one another efficiently.
    A. Procedure
    B. Redundancy
    C. Detecting
    D. Modem
    E. Routing
    Ans -E. Routing

  5. Which of the following is a cache memory that is used to speed up the process of storing and accessing data from the host hard disk?
    A. Crashing
    B. Disk Caching
    C. RAID
    D. File Compression
    E. None of these
    Ans -B. Disk Caching

  6. __________ distributed as freeware, but it requires the user to view advertisements to use the software.
    A. Abandonware
    B. Adware
    C. Donationware
    D. All of these
    E. None of these
    Ans – B. Adware

  7. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft is termed as _______
    A. Pharming
    B. Smishing
    C. Vishing
    D. All of these
    E. None of these
    Ans – C. Vishing

  8. Which of the following involves sending several thousand identical messages to an electronic mailbox in order to overflow it?
    A. Logic bomb
    B. Mail bombing
    C. Time bomb
    D. All of these
    E. None of these
    Ans – B. Mail bombing

  9. Unauthorized access to restricted systems or resources is referred as __________
    A. Pharming
    B. Penetration
    C. Phishing
    D. All of these
    E. None of these
    Ans – B. Penetration

  10. The original ASCII code used___bits of each byte, reserving that last bit for error checking?
    A. 5
    B. 6
    C. 4
    D. 8
    E. 7
    Ans – E. 7