Current Affairs PDF

Computer Questions Set – 160

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. Which of the following is an application designed to probe a server or host for open ports?
    A. bit robbing
    B. Web services description language (WSDL)
    C. jabber
    D. port scan
    E. service profile identifier
    Ans – D. port scan

  2.  __________ is an industry standard for a mobile audio/video interface that allows one to connect electronic devices such as mobile phones, tablets etc., to high-definition televisions (HDTVs) and audio receivers.
    A. MHL(Mobile High-Definition Link)
    B. HDMI (High-Definition Multimedia Interface)
    C. SDI (Serial Digital Interface)
    D. All of these
    E. None of these
    Ans – A. MHL(Mobile High-Definition Link)

  3. Which is a device designed to absorb and disperse heat away from a microprocessor?
    A. PCI
    B. Heat Sink
    C. Motherboard
    D. All of these
    E. None of these
    Ans – B. Heat Sink

  4. Which of the following is not a primary category of procedures?
    A. Testing
    B. Backup and recovery
    C. Firewall development
    D. Design
    E. None of these
    Ans – C. Firewall development

  5. A _________ is a type of malware that is designed to change your browser’s settings.
    A. Hoax
    B. Clickjacking
    C. Browser Hijacker
    D. Mousetrapping
    E. None of these
    Ans – C. Browser Hijacker

  6. When a file contains instructions that can be carried out by the computer. It is known as _________.
    A. information
    B. application
    C. executable
    D. data
    E. Other than those given as options
    Ans – C. executable

  7. How to select one hyperlink after another during a slide presentation?
    A. Ctrl + K
    B. Ctrl + H
    C. Ctrl + S
    D. Ctrl + M
    E. Tab
    Ans – E. Tab

  8. Which of the following sign is used to specify a cell range?
    A. : (colon)
    B. / (Slash)
    C. * (asterisk)
    D. – (hypen)
    E. None of these
    Ans – A. : (colon)

  9. Unauthorized access to restricted systems or resources is referred as __________
    A. Pharming
    B. Penetration
    C. Phishing
    D. All of these
    E. None of these
    Ans – B. Penetration

  10. Which is a special type of stored procedure that is automatically invoked whenever the data in the table is modified?
    A. Trigger
    B. Procedure
    C. Cursor
    D. All of these
    E. None of these
    Ans – A. Trigger