Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- Mail from unwanted senders can be blocked by ______
A. e-mailing them & asking to be removed from the list
B. using mail filters
C. clicking the unsubscribe link
D. All of these
E. None of these
Answer
Ans – B. using mail filters - Which of the following is possible with open architecture?
A. Hot swapping of devices
B. A minimum of six new devices to be added to a computer
C. Users to upgrade and add new devices as they come on the market
D. All of these
E. None of these
Answer
Ans – C. Users to upgrade and add new devices as they come on the market - A type of malicious software that is activated each time your system boots up. This malicious software difficult to detect because they are activated before your system’s Operating System has completely booted up is called _____
A. Phishing
B. Rootkits
C. Pharming
D. All of these
E. None of these
Answer
Ans – B. Rootkits - Overwhelming or saturating resources on a target system to cause a reduction of availability to legitimate users is termed as _______
A. Distributed DoS attack
B. Denial of Service (DoS) attack
C. Data Diddling
D. All of these
E. None of these
Answer
Ans -B. Denial of Service (DoS) attack - Modifying data for fun and profit is defined as _____
A. Distributed DoS attack
B. Denial of Service (DoS) attack
C. Data Diddling
D. All of these
E. None of these
Answer
Ans – C. Data Diddling - Internet-mediated attack accomplished by enlisting the services of many compromised systems to launch a denial of service (DoS) is termed as ______
A. Distributed DoS attack
B. Denial of Service (DoS) attack
C. Data Diddling
D. All of these
E. None of these
Answer
Ans – A. Distributed DoS attack - An attacker outside your network pretends to be a part of your network or legal terminal is called ______
A. Password Attacks
B. IP Spoofing
C. Identity Theft
D. All of these
E. None of these
Answer
Ans – C. Identity Theft - A reliability & flow control technique where the source sends one packet starts a timer and waits for an acknowledgment before sending a new packet is called _______
A. Positive Acknowledgement Retransmission (PAR)
B. Checksum
C. Routing
D. All of these
E. None of these
Answer
Ans – A. Positive Acknowledgement Retransmission (PAR) - Which combines efficient implementation techniques that enable them to be used in an extremely large database?
A. Data Mining
B. Data Manipulation
C. Data reliability
D. All of these
E. None of these.
Answer
Ans – A. Data Mining - A program that generally has more user-friendly interface than a DBMS is called a ______
A. back end
B. front end
C. form
D. All of these
E. None of these
Answer
Ans – B. front end
AffairsCloud Recommends Oliveboard Mock Test
AffairsCloud Ebook - Support Us to Grow
Govt Jobs by Category
Bank Jobs Notification