Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- Mail from unwanted senders can be blocked by ______
A. e-mailing them & asking to be removed from the list
B. using mail filters
C. clicking the unsubscribe link
D. All of these
E. None of theseAns – B. using mail filters - Which of the following is possible with open architecture?
A. Hot swapping of devices
B. A minimum of six new devices to be added to a computer
C. Users to upgrade and add new devices as they come on the market
D. All of these
E. None of theseAns – C. Users to upgrade and add new devices as they come on the market - A type of malicious software that is activated each time your system boots up. This malicious software difficult to detect because they are activated before your system’s Operating System has completely booted up is called _____
A. Phishing
B. Rootkits
C. Pharming
D. All of these
E. None of theseAns – B. Rootkits - Overwhelming or saturating resources on a target system to cause a reduction of availability to legitimate users is termed as _______
A. Distributed DoS attack
B. Denial of Service (DoS) attack
C. Data Diddling
D. All of these
E. None of theseAns -B. Denial of Service (DoS) attack - Modifying data for fun and profit is defined as _____
A. Distributed DoS attack
B. Denial of Service (DoS) attack
C. Data Diddling
D. All of these
E. None of theseAns – C. Data Diddling - Internet-mediated attack accomplished by enlisting the services of many compromised systems to launch a denial of service (DoS) is termed as ______
A. Distributed DoS attack
B. Denial of Service (DoS) attack
C. Data Diddling
D. All of these
E. None of theseAns – A. Distributed DoS attack - An attacker outside your network pretends to be a part of your network or legal terminal is called ______
A. Password Attacks
B. IP Spoofing
C. Identity Theft
D. All of these
E. None of theseAns – C. Identity Theft - A reliability & flow control technique where the source sends one packet starts a timer and waits for an acknowledgment before sending a new packet is called _______
A. Positive Acknowledgement Retransmission (PAR)
B. Checksum
C. Routing
D. All of these
E. None of theseAns – A. Positive Acknowledgement Retransmission (PAR) - Which combines efficient implementation techniques that enable them to be used in an extremely large database?
A. Data Mining
B. Data Manipulation
C. Data reliability
D. All of these
E. None of these.Ans – A. Data Mining - A program that generally has more user-friendly interface than a DBMS is called a ______
A. back end
B. front end
C. form
D. All of these
E. None of theseAns – B. front end
AffairsCloud Recommends Oliveboard Mock Test
AffairsCloud Ebook - Support Us to Grow
Govt Jobs by Category
Bank Jobs Notification