Current Affairs PDF

Computer Questions Set – 187

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. ______ is a communication technology used by some incoming mail servers.
    A. TCP
    B. POP
    C. FTP
    D. Telnet
    E. None of these
    Ans – B. POP
    POP is a communication technology used by some incoming mail servers

  2. In POP protocol, O stands for _______
    A. Operation
    B. Office
    C. Ordinary
    D. One
    E. None of these
    Ans – B. Office 
    POP – Post Office Protocol

  3.  ________ is the exploitation of a vulnerability in domain name servers that allows traffic to a website to be redirected to another website.
    A. Phishing
    B. Pharming
    C. Protocol
    D. All of these
    E. None of these
    Ans – B. Pharming

  4. ___________ is the code of acceptable behaviours users should follow while on the Internet.
    A. SMTP
    B. Netiquette
    C. FTP
    D. All of these
    E. None of these
    Ans – B. Netiquette

  5. Many e-commerce sites use _____ to determine customer preferences.
    A. Data Redundancy
    B. Data Integrity
    C. Data Attribute
    D. Data Mining
    E. None of these
    Ans – D. Data Mining

  6. A map of a database is called a __________
    A. Data Redundancy
    B. Schema
    C. Data Attribute
    D. Data Entry Errors
    E. None of these
    Ans – B. Schema
    A map of a database is called a Schema

  7. Elimination of data redundancy does not solve _____
    A. Data Inconsistency
    B. Data Integrity
    C. Data Attribute
    D. Data Entry Errors
    E. None of these
    Ans – D. Data Entry Errors

  8. If a program exceeds its allocated space, the OS uses an area of the hard disk, called ____________ , to store parts of programs or data files until they are needed.
    A. Main Memory
    B. Secondary Memory
    C. Virtual Memory
    D. All of these
    E. None of these
    Ans – C. Virtual Memory

  9. Some viruses are hidden in _____, which are instructions saved in an application such as a word processing or spreadsheet program.
    A. Micros
    B. Macros
    C. Data
    D.All of these
    E.None of these
    Ans – B. Macros

  10. _______ occurs when a file is broken up into pieces to fit on the disk
    A. Program counter
    B. Disk Fragmentation
    C. Data Attribute
    D. Data Entry Errors
    E. None of these
    Ans – B. Disk Fragmentation