Current Affairs PDF

Computer Questions Set – 146

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. Which of the following is a protocol for authenticating service requests between trusted hosts across an untrusted network?
    A.Kerberos
    B.gateway
    C.Proxy Server
    D.DMZ
    E.None of these
    Ans – A.Kerberos

  2. Which is used to turn off the pen tool during a presentation?
    A.Shift
    B.Esc
    C.Del
    D.End
    E.None of these
    Ans – B.Esc

  3. Which is used to change the text in Microsoft Word from uppercase to lowercase or a capital letter at the beginning of every word?
    A.Shift + F3
    B.Shift + F4
    C.Shift + F5
    D.Shift + F7
    E.Shift + F6
    Ans – A.Shift + F3

  4. System proposal is prepared in _____ phase of SDLC.
    A. Conception
    B. Initiation
    C. Analysis
    D. Design
    E. None of these
    Ans – B. Initiation

  5. A data warehouse _____
    A. contains numerous naming conventions and formats
    B. is organized around important subject areas
    C. contains only current data
    D. All of these
    E. None of these
    Ans – B. is organized around important subject areas

  6. “>” symbol in DOS commands is used to ______
    A. Compare two values
    B. Redirect Input
    C. Redirect Output
    D. All of these
    E. None of these
    Ans – C. Redirect Output

  7. To connect networks of similar protocols ______ are used.
    A. Routers
    B. Gateways
    C. Bridges
    D. All of these
    E. None of these
    Ans – C. Bridges

  8. ______ is one reason for problems of data integrity.
    A.Data availability constraints
    B.Data inconsistency
    C.Data redundancy
    D.All of these
    E.None of these
    Ans – A.Data availability constraints

  9. Which of the following is an advantage of mounting an application on the web?
    A. the possibility of 24-hour access for users
    B. creating a system that can extend globally
    C. standardizing the design of the interface
    D. All of these
    E. None of these
    Ans – D. All of these

  10. A product that is owned exclusively by a single company that can only function properly is known as ______
    A.Proprietary Software
    B.Public Domain Software
    C.Commercial Software
    D.All of these
    E.None of these
    Ans – A.Proprietary Software