Computer Questions Set – 187

0
5175
computer

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. ______ is a communication technology used by some incoming mail servers.
    A. TCP
    B. POP
    C. FTP
    D. Telnet
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. POP
    POP is a communication technology used by some incoming mail servers[/spoiler]
  2. In POP protocol, O stands for _______
    A. Operation
    B. Office
    C. Ordinary
    D. One
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Office 
    POP – Post Office Protocol[/spoiler]
  3.  ________ is the exploitation of a vulnerability in domain name servers that allows traffic to a website to be redirected to another website.
    A. Phishing
    B. Pharming
    C. Protocol
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Pharming[/spoiler]
  4. ___________ is the code of acceptable behaviours users should follow while on the Internet.
    A. SMTP
    B. Netiquette
    C. FTP
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Netiquette
    [/spoiler]
  5. Many e-commerce sites use _____ to determine customer preferences.
    A. Data Redundancy
    B. Data Integrity
    C. Data Attribute
    D. Data Mining
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – D. Data Mining[/spoiler]
  6. A map of a database is called a __________
    A. Data Redundancy
    B. Schema
    C. Data Attribute
    D. Data Entry Errors
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Schema
    A map of a database is called a Schema[/spoiler]
  7. Elimination of data redundancy does not solve _____
    A. Data Inconsistency
    B. Data Integrity
    C. Data Attribute
    D. Data Entry Errors
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – D. Data Entry Errors[/spoiler]
  8. If a program exceeds its allocated space, the OS uses an area of the hard disk, called ____________ , to store parts of programs or data files until they are needed.
    A. Main Memory
    B. Secondary Memory
    C. Virtual Memory
    D. All of these
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – C. Virtual Memory[/spoiler]
  9. Some viruses are hidden in _____, which are instructions saved in an application such as a word processing or spreadsheet program.
    A. Micros
    B. Macros
    C. Data
    D.All of these
    E.None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Macros[/spoiler]
  10. _______ occurs when a file is broken up into pieces to fit on the disk
    A. Program counter
    B. Disk Fragmentation
    C. Data Attribute
    D. Data Entry Errors
    E. None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]Ans – B. Disk Fragmentation[/spoiler]