Current Affairs PDF

Computer Questions Set- 22

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the SBI/IBPS/SSC exams and other competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. A router is a___________
    1. Forwards a packet to all outgoing links, except the link upon which the packet
    originated.
    2. Forwards a packet to the next free outgoing link.
    3. Forwards a packet to all outgoing links.
    4. Determines on which outgoing link a packet is to be forwarded.
    5) None of these
    Answer-4

  2. What would you need to establish if you wanted to insure that the key in one database table was the same as a key in another database table?
    1) Top-level grouping
    2) Connectivity
    3) Referential integrity
    4) Field properties
    5) None of these
    Answer.) 3

  3. If you wished to limit what you would see on an Excel worksheet, what data function would you use?
    1) Sort
    2) Filter
    3) Conditional format
    4) Data analysis
    5) None of these
    Answer.) 2

  4. What Excel tool allows you to create quickly and automatically summary data from a large data set?
    1) Conditional formatting
    2) Sorting
    3) Pivot tables
    4) Field lists
    5) None of these
    Answer.) 3

  5. A(n) __________ file contains information in an indexed and cross-linked format.
    1) executable
    2) initialization
    3) help
    4) library
    5) None of these
    Answer.) 3

  6. __________ are text files containing OS commands.
    1) Initialization files
    2) Batch files
    3) Executable files
    4) Help files
    5) None of these
    Answer.) 2

  7. Which of the following will not protect you from spam?
    1) spam blockers
    2) e-mail rules
    3) popup blocker
    4) filters
    5) None of these
    Answer.) 3

  8. To read the system messages and warnings, access the __________ in Windows.
    1) system manager
    2) control panel
    3) event viewer
    4) message screen
    5) None of these
    Answer.) 3

  9. If configured correctly, the __________ will prevent interaction with your computer after a specified time period.
    1) firewall
    2) filter
    3) screen saver
    4) popup blocker
    5) virus
    Answer.) 3

  10. The __________ of a threat measures its potential impact on a system.
    1) vulnerabilities
    2) countermeasures
    3) degree of harm
    4) susceptibility
    5) none of these
    Answer.) 3