Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- Which of the following is the standard way that computer users share files across corporate intranets and the Internet?
A. Network File System(NFS)
B. Common Internet File System (CIFS)
C. File Sharing System
D. All of these
E. None of theseAns – B. Common Internet File System(CIFS)
Common Internet File System (CIFS) is the standard way that computer users share files across corporate intranets and the Internet - Which of the following allows remote hosts to mount file systems over a network?
A. Network File System(NFS)
B. Common Internet File System (CIFS)
C. File Sharing System
D. All of these
E. None of theseAns – A. Network File System(NFS)
Network File System(NFS) allows remote hosts to mount file systems over a network. - _______ is a simple, lock-step FTP that allows a client to get a file from or put a file onto a remote host.
A. SSH FTP
B. Trivial FTP
C. FTP
D. All of these
E. None of theseAns – B. Trivial FTP - FTP which uses the Secure Shell protocol to transfer files is known as _______
A. SSH FTP
B. Trivial FTP
C. FTP
D. All of these
E. None of theseAns – A. SSH FTP - _______ is used to store custom data private to the page or application.
A. Data Redundancy
B. Data Integrity
C. Data Attribute
D. All of these
E. None of theseAns – C. Data Attribute - _______ is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle
A. Data Redundancy
B. Data Integrity
C. Data Attribute
D. Data Inconsistency
E. None of theseAns – B. Data Integrity
Data Integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle - ________ occur between files when similar data is kept in different formats in two different files.
A. Data Redundancy
B. Data Integrity
C. Data Attribute
D. Data Inconsistency
E. None of theseAns – D. Data Inconsistency - Attributes can be defined for _____
A. Pages
B. Entity
C. Macro
D. All of these
E. None of theseAns – B. Entity - Which one of the following is a cryptographic protocol used to secure http concession?
A.Transport Layer Security
B.Explicit Congestion Notification
C.Resource Reservation Notification(RRN)
D.All of these
E.None of theseAns – A.Transport Layer Security - The load instruction is mostly used to designate a transfer from memory to a processor register known as _______
A. Program counter
B. instruction register
C. accumulator
D. All of these
E. None of theseAns – C. accumulator
AffairsCloud Recommends Oliveboard Mock Test
AffairsCloud Ebook - Support Us to Grow
Govt Jobs by Category
Bank Jobs Notification