Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the SBI/IBPS/SSC exams and other competitive exams. We have included questions that are repeatedly asked in many bank exams !!!
- A hacker that changes or forges information in an electronic resource, is engaging in __________.
1) denial of service
2) sniffing
3) terrorism
4) data diddling
5) None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]4) data diddling[/spoiler] - Software, such as Explorer and Firefox, are referred to as ______.
1) internet tools
2) Utility software
3) Development software
4) Browsers
5) None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]4) Browsers[/spoiler] - When two companies are linked together by computers and they send business transactions through these computers, they are probably using ______.
1) Digital wallets
2) Electronic data interchange
3) B2C
4) Smart cards
5) None of these.
[spoiler title=”Answer” icon=”plus” style=”fancy”]2) Electronic data interchange [/spoiler] - What term refers to your ability to connect to the internet and your company from a wireless device?
1) Net services
2) Push technology
3) Pull technology
4) Mobile computing
5) None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]4) Mobile computing[/spoiler] - Which of the following systems mimics human thinking?
1) Artificial intelligence
2) Intelligent agent
3) Bot
4) Database management system
5) All the above
[spoiler title=”Answer” icon=”plus” style=”fancy”]1) Artificial intelligence[/spoiler] - What database key uniquely identifies a record within a table?
1) Primary key
2) Foreign key
3) Secondary key
4) Relational key
5) None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]1) Primary key [/spoiler] - What database key links one table to another?
1) Primary key
2) Foreign key
3) Secondary key
4) Relational key
5) None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]2) Foreign key [/spoiler] - Which device can understand difference between data & programs?
1) Input device
2) Output device
3) Memory
4) Microprocessor
5) None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]4) Microprocessor [/spoiler] - Algorithm and Flow chart help us to__________.
1) Know the memory capacity
2) Memory address register
3) Direct the output to a printer
4) Memory access register
5) None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]1) Know the memory capacity [/spoiler] - A hacker contacts you my phone or email and attempts to acquire your password________.
1) spoofing
2) phishing
3) spamming
4) bugging
5) None of these
[spoiler title=”Answer” icon=”plus” style=”fancy”]2) phishing [/spoiler]
Comments are closed.