Current Affairs PDF

Computer Questions Set – 180

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. ______ is an attack technique designed to change an authentic Web page in a search engine’s index and search results pages.
    A. Proxy Hacking
    B. Keyword Stuffing
    C. Proxy Hijacking
    D. Both (A) and (B)
    E. Both (A) and (C)
    Ans – E. Both (A) and (C)
    Proxy Hacking aka Proxy Hijacking is an attack technique designed to change an authentic Web page in a search engine’s index and search results pages.

  2. _______ is the practice of inserting a large number of keywords into Web content and meta tags.
    A. Proxy Hacking
    B. Keyword Stuffing
    C. Proxy Hijacking
    D. Both (A) and (B)
    E. Both (A) and (C)
    Ans – B. Keyword Stuffing
    Keyword stuffing is the practice of inserting a large number of keywords into Web content and meta tags in the attempt to artificially increase a rank of the page in search results and drive more traffic to the website.

  3. ________ is a server that acts as an intermediary for requests from clients seeking resources from other servers.
    A. dedicated server
    B. virtual server
    C. Proxy Server
    D. Cache Server
    E. None of these
    Ans – C. Proxy Server

  4. Keyword stuffing in content is also known as ______
    A. Proxy Hacking
    B. Spamdexing
    C. Proxy Hijacking
    D. Both (A) and (B)
    E. Both (A) and (C)
    Ans – B. Spamdexing

  5. Which of the following is the concept of isolating a logical operating system (OS) instance from the client?
    A. Desktop Virtualization
    B. Pen Testing
    C. Proxy Hijacking
    D. Both (A) and (B)
    E. Both (A) and (C)
    Ans – A. Desktop Virtualization

  6. _______ is the practice of testing a computer system, network or Web application to find vulnerabilities.
    A. Debugging
    B. Pen Testing
    C. Penetration Testing
    D. Both (A) and (B)
    E. Both (B) and (C)
    Ans – E. Both (B) and (C)
    Penetration testing aka pen testing is the practice of testing a computer system, network or Web application to find vulnerabilities

  7. _______ is surfing the Web using an inverted palette, with white text on a black body
    A. White Surfing
    B. Blue Surfing
    C. Black Surfing
    D. Bluesnarfing
    E. None of these
    Ans – C. Black Surfing

  8. _________ is the theft of information from a wireless device through a Bluetooth connection.
    A. White Surfing
    B. Blue Surfing
    C. Black Surfing
    D. Bluesnarfing
    E. None of these
    Ans – D. Bluesnarfing

  9. ________ is the integration of digital information with the user’s environment in real time. 
    A. Virtual Reality
    B. Augmented Reality
    C. Mixed Reality
    D. All of these
    E. None of these
    Ans – B. Augmented Reality

  10. _______ is a realistic and immersive simulation of a three-dimensional environment, created using interactive software and hardware
    A. Virtual Reality
    B. Augmented Reality
    C. Mixed Reality
    D. All of these
    E. None of these
    Ans – A. Virtual Reality