Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- In RFID, “R” stands for ____
A. Rapid
B. Remote
C. Random
D. Radio
E. None of theseAns –D. Radio(Radio Frequency Identification) - _______ is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
A. Robotics
B. Animation
C. Simulation
D. Computer Forensics
E. None of theseAns – D. Computer Forensics - Which of the following is the process of sorting through large data sets to identify patterns and establish relationships to solve problems through data analysis?
A. Data Mining
B. Data Marting
C. Data Warehousing
D. All of these
E. None of theseAns – A. Data Mining - The practice of collecting into a single database data relevant to a particular function, department, etc is known as?
A. Data Mining
B. Data Marting
C. Data Warehousing
D. Data Diddling
E. None of theseAns – B. Data Marting - The unauthorized changing of data before or during their input to a computer system is known as ____
A. Data Mining
B. Data Marting
C. Data Warehousing
D. Data Diddling
E. None of theseAns –D. Data Diddling - In Excel _______allows you to extract the significance from a large, detailed data set.
A. Sorting
B. Pivot table
C. Conditional Formatting
D. All of these
E. None of theseAns – B. Pivot table - The rules of a language is known as ____
A. Code
B. Structure
C. Procedure
D. Flow Chart
E. SyntaxAns –E. Syntax. - _____ is a part of computer network that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks.
A. Server
B. Client
C. Protocol
D. Backbone
E. None of theseAns –D. Backbone - _______ is a sequence of responses to an initial message posting.
A. Comment
B. List
C. Post
D. Thread
E. None of theseAns –D. Thread - ______ is a cyber attack intended to redirect a website’s traffic to another, fake site
A. Redirecting
B. Phishing
C. Pharming
D. All of these
E. None of theseAns – C. Pharming
AffairsCloud Recommends Oliveboard Mock Test
AffairsCloud Ebook - Support Us to Grow
Govt Jobs by Category
Bank Jobs Notification