Current Affairs PDF

Computer Questions Set – 182

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. Which of the following is the process of backing up server data to a centralized storage device rather than moving it across a LAN?
    A. Cold Backup
    B. Hot Backup
    C. LAN Free Backup
    D. Server Free Backup
    E. None of these
    Ans – C. LAN Free Backup
    LAN-free backup is the process of backing up server data to a centralized storage device rather than moving it across a local-area network (LAN)

  2. Backup that is going to be done outside of the server is known as ______
    A. Cold Backup
    B. Hot Backup
    C. LAN Free Backup
    D. Server Free Backup
    E. None of these
    Ans – D. Server Free Backup
    Backup that is going to be done outside of the server is known as Server Free Backup

  3. ______ is a database backup during which the database is offline and not accessible to updates.
    A. Cold Backup
    B. Hot Backup
    C. Warm Backup
    D. Server Free Backup
    E. None of these
    Ans – A. Cold Backup

  4. cold backup is also known as ____.
    A. Online Backup
    B. Offline Backup
    C. LAN Free Backup
    D. Server Free Backup
    E. None of these
    Ans – B. Offline Backup

  5. ______ is a backup performed on data while the database is actively online and accessible to users.
    A. Cold Backup
    B. Hot Backup
    C. Warm Backup
    D. Server Free Backup
    E. None of these
    Ans – B. Hot Backup

  6. A Hot Backup is also known as ______
    A. Online Backup
    B. Offline Backup
    C. Dynamic Backup
    D. Both (B) and (C)
    E. Both (A) and (C)
    Ans – E. Both (A) and (C)
    A Hot Backup is also known as Online Backup or Dynamic Backup.

  7. Which of the following is a technique where all the tables are locked and users cannot access at the time of backing up data?
    A. Cold Backup
    B. Hot Backup
    C. Warm Backup
    D. Server Free Backup
    E. None of these
    Ans – C. Warm Backup

  8. Which of the following is a large scale monetary theft conducted through computer hacking, the online equivalent of the real-world bank heist?
    A. Spoofing
    B. Cyber heist
    C. Phishing
    D. Plagiarism
    E. None of these
    Ans – B. Cyber heist

  9. ________ is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
    A. Malware
    B. Cyber heist
    C. Spear Phishing
    D. Plagiarism
    E. None of these
    Ans – C. Spear Phishing

  10. _______ is a form of computer security hacking in which corrupt DNS data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect IP address.
    A. ARP Spoofing
    B. DNS Spoofing
    C. IP Spoofing
    D. All of these
    E. None of these
    Ans – B. DNS Spoofing