Current Affairs PDF

Computer Questions Set – 171

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. Which of the following is one of the methods used by cyber criminals to capture personal information?
    A. Zombie
    B. Computer Worm
    C. WiFi eavesdropping
    D. Rootkit
    E. None of these
    Ans – C. WiFi eavesdropping

  2. Which of the following is often used by third parties to infiltrate your computer?
    A. Spyware
    B. Computer Worm
    C. Adware
    D. Both (A) and (C)
    E. Both (B) and (C)
    Ans – D. Both (A) and (C)

  3. Which of the following is often used in conjunction with phishing in an attempt to steal your information?
    A. Zombie
    B. Computer Worm
    C. Spoofing
    D. Rootkit
    E. Scareware
    Ans – C. Spoofing

  4. _______ is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
    A. Phishing
    B. Computer Worm
    C. Malicious Spyware
    D. Ransomware
    E. Scareware
    Ans -D. Ransomware

  5. Which displays an image that prevents you from accessing your computer?
    A. Phishing
    B. Computer Worm
    C. Malicious Spyware
    D. Lock Screen Ransomware
    E. Encryption Ransomware
    Ans – D. Lock Screen Ransomware

  6. Which encrypts files on your system’s hard drive and sometimes on shared network drives, USB drives, external hard drives etc.,
    A. Phishing
    B. Computer Worm
    C. Malicious Spyware
    D. Lock Screen Ransomware
    E. Encryption Ransomware
    Ans – E. Encryption Ransomware

  7. Which of the following means to point you to a malicious and illegitimate website by redirecting the legitimate URL?
    A. Phishing
    B. Computer Worm
    C. Malicious Spyware
    D. Pharming
    E. None of these
    Ans – D. Pharming

  8. A type of message that web servers pass to your web browser when you visit the website is known as ______
    A. Pharming
    B. Cookies
    C. Cache
    D. Spam
    E. None of these
    Ans – B. Cookies

  9. Which of the following activity can be termed as software piracy?
    A. Soft loading
    B. Counterfeiting
    C. Renting
    D. All of these
    E. None of these
    Ans – D. All of these

  10. A coding language that is compatible with Windows servers which is used for increased functionality on a website or to work with a database
    A. HTML
    B. ASP
    C. XML
    D. All of these
    E. None of these
    Ans – B. ASP