Current Affairs PDF

Computer Questions Set – 157

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. Mail from unwanted senders can be blocked by ______
    A. e-mailing them & asking to be removed from the list
    B. using mail filters
    C. clicking the unsubscribe link
    D. All of these
    E. None of these
    Ans – B. using mail filters

  2. Which of the following is possible with open architecture?
    A. Hot swapping of devices
    B. A minimum of six new devices to be added to a computer
    C. Users to upgrade and add new devices as they come on the market
    D. All of these
    E. None of these
    Ans – C. Users to upgrade and add new devices as they come on the market

  3. A type of malicious software that is activated each time your system boots up. This malicious software difficult to detect because they are activated before your system’s Operating System has completely booted up is called _____
    A. Phishing
    B. Rootkits
    C. Pharming
    D. All of these
    E. None of these
    Ans – B. Rootkits

  4. Overwhelming or saturating resources on a target system to cause a reduction of availability to legitimate users is termed as _______
    A. Distributed DoS attack
    B. Denial of Service (DoS) attack
    C. Data Diddling
    D. All of these
    E. None of these
    Ans -B. Denial of Service (DoS) attack

  5. Modifying data for fun and profit is defined as _____
    A. Distributed DoS attack
    B. Denial of Service (DoS) attack
    C. Data Diddling
    D. All of these
    E. None of these
    Ans – C. Data Diddling

  6. Internet-mediated attack accomplished by enlisting the services of many compromised systems to launch a denial of service (DoS) is termed as ______
    A. Distributed DoS attack
    B. Denial of Service (DoS) attack
    C. Data Diddling
    D. All of these
    E. None of these
    Ans – A. Distributed DoS attack

  7. An attacker outside your network pretends to be a part of your network or legal terminal is called ______
    A. Password Attacks
    B. IP Spoofing
    C. Identity Theft
    D. All of these
    E. None of these
    Ans – C. Identity Theft

  8. A reliability & flow control technique where the source sends one packet starts a timer and waits for an acknowledgment before sending a new packet is called _______
    A. Positive Acknowledgement Retransmission (PAR)
    B. Checksum
    C. Routing
    D. All of these
    E. None of these
    Ans – A. Positive Acknowledgement Retransmission (PAR)

  9. Which combines efficient implementation techniques that enable them to be used in an extremely large database?
    A. Data Mining
    B. Data Manipulation
    C. Data reliability
    D. All of these
    E. None of these.
    Ans – A. Data Mining

  10. A program that generally has more user-friendly interface than a DBMS is called a ______
    A. back end
    B. front end
    C. form
    D. All of these
    E. None of these
    Ans – B. front end