Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- Which of the following is an application designed to probe a server or host for open ports?
A. bit robbing
B. Web services description language (WSDL)
C. jabber
D. port scan
E. service profile identifierAns – D. port scan - __________ is an industry standard for a mobile audio/video interface that allows one to connect electronic devices such as mobile phones, tablets etc., to high-definition televisions (HDTVs) and audio receivers.
A. MHL(Mobile High-Definition Link)
B. HDMI (High-Definition Multimedia Interface)
C. SDI (Serial Digital Interface)
D. All of these
E. None of theseAns – A. MHL(Mobile High-Definition Link) - Which is a device designed to absorb and disperse heat away from a microprocessor?
A. PCI
B. Heat Sink
C. Motherboard
D. All of these
E. None of theseAns – B. Heat Sink - Which of the following is not a primary category of procedures?
A. Testing
B. Backup and recovery
C. Firewall development
D. Design
E. None of theseAns – C. Firewall development - A _________ is a type of malware that is designed to change your browser’s settings.
A. Hoax
B. Clickjacking
C. Browser Hijacker
D. Mousetrapping
E. None of theseAns – C. Browser Hijacker - When a file contains instructions that can be carried out by the computer. It is known as _________.
A. information
B. application
C. executable
D. data
E. Other than those given as optionsAns – C. executable - How to select one hyperlink after another during a slide presentation?
A. Ctrl + K
B. Ctrl + H
C. Ctrl + S
D. Ctrl + M
E. TabAns – E. Tab - Which of the following sign is used to specify a cell range?
A. : (colon)
B. / (Slash)
C. * (asterisk)
D. – (hypen)
E. None of theseAns – A. : (colon) - Unauthorized access to restricted systems or resources is referred as __________
A. Pharming
B. Penetration
C. Phishing
D. All of these
E. None of theseAns – B. Penetration - Which is a special type of stored procedure that is automatically invoked whenever the data in the table is modified?
A. Trigger
B. Procedure
C. Cursor
D. All of these
E. None of theseAns – A. Trigger
AffairsCloud Recommends Oliveboard Mock Test
AffairsCloud Ebook - Support Us to Grow
Govt Jobs by Category
Bank Jobs Notification