Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- Which of the following will make high-level application connections on behalf of internal hosts?
A. Internet
B. Server
C. Application service provider.
D. Proxy Server
E. NetworkAns – D. Proxy Server - Which of the following is a cyber attack intended to redirect a website’s traffic to another, fake site?
A. Phishing
B. Pharming
C. Piracy
D. Both (1) and (2)
E. None of theseAns – B. Pharming - There are several primary categories of procedures. Which of the following is not a primary category of procedures?
A. Testing
B. Backup and recovery
C. Firewall development
D. Design
E. None of theseAns – C. Firewall development - Which of the following is open source project?
A. Firefox
B. MySQL
C. Open Office
D. All of these
E. None of theseAns – D. All of these - Which of the following is an unethical web practice that keeps users trapped on a particular site?
A. Hoax
B. Clickjacking
C. Browser Hijacking
D. Mousetrapping
E. None of theseAns – B. Clickjacking - System Software
A. is a programming language
B. is an optional form of software
C. helps the computer to manage internal resources
D. controls and manipulates data
E. None of theseAns – C. helps the computer to manage internal resources - Which of the following statements is true about “cookie”
A. Stores the password of the user
B. Stores the commands used by the user.
C. Stores information about the user’s web activity
D. Stores information about softwares.
E. None of theseAns – C. Stores information about the user’s web activity - Which of the following is not a type of computer software which can be acquired by organizations?
A. Off-the-shelf
B. Custom-developed
C. Off-the-shelf with alterations
D. All of these
E. None of theseAns – D. All of these - Which type of computers uses the 8-bit code called EBCDIC?
A. Minicomputers
B. Microcomputers
C. Mainframe computers
D. Super Computers
E. None of theseAns – C. Mainframe computers - Unauthorized access to restricted systems or resources is referred as __________
A. Pharming
B. Penetration
C. Phishing
D. All of these
E. None of theseAns – B. Penetration
AffairsCloud Recommends Oliveboard Mock Test
AffairsCloud Ebook - Support Us to Grow
Govt Jobs by Category
Bank Jobs Notification