Computer Questions Set – 176

0
2711
computer

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. The programs which are as permanent as hardware and stored in ROM is known as _________
    A. Hardware
    B. Software
    C. Firmware
    D. ROMware
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – C. Firmware[/spoiler]
  2. Which of the following memories must be refreshed many times per second?
    A. Static RAM
    B. Dynamic RAM
    C. EPROM
    D. ROM
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans -B. Dynamic RAM[/spoiler]
  3. ________ is a technique made possible by a special program available on most computer systems.
    A. Super zapping
    B. Vandalism
    C. Spamming
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – A. Super zapping[/spoiler]
  4. ______ is a computer program that performs malicious function such as extracting a user’s password or other data or erasing the hard disk.
    A. Super zapping
    B. Vandalism
    C. Spamming
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Vandalism[/spoiler]
  5. _______ also known as a pen test, is an authorized simulated attack on a computer system.
    A. Piggybacking
    B. Penetration
    C. Phishing
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Penetration[/spoiler]
  6. A process which is not executing due to any waiting event is called?
    A. Kernel
    B. Shell
    C. Deadlock
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – C. Deadlock[/spoiler]
  7. Which provides an interface between process & OS?
    A. Kernel
    B. System Calls
    C. Deadlock
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. System Calls[/spoiler]
  8. Which of the following is a primary key of one file that also appears in another file?
    A. Physical key
    B. Foreign key
    C. Logical key
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Foreign key[/spoiler]
  9. Vendor-created program modifications are called ______
    A. Patches
    B. Antiviruses
    C. Holes
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – A. Patches[/spoiler]
  10. If your computer rebooting itself then it is likely that _______
    A. It has a virus
    B. It does not have enough memory
    C. There has been a power surge
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – A. It has a virus[/spoiler]