Computer Questions Set-24

19
3279

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the SBI/IBPS/SSC exams and other competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. A hacker that changes or forges information in an electronic resource, is engaging in __________.
    1) denial of service
    2) sniffing
    3) terrorism
    4) data diddling
    5) None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]4) data diddling[/spoiler]
  2. Software, such as Explorer and Firefox, are referred to as ______.
    1) internet tools
    2) Utility software
    3) Development software
    4) Browsers
    5) None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]4) Browsers[/spoiler]
  3. When two companies are linked together by computers and they send business transactions through these computers, they are probably using ______.
    1) Digital wallets
    2) Electronic data interchange
    3) B2C
    4) Smart cards
    5) None of these.
    [spoiler title=”Answer” icon=”plus” style=”fancy”]2) Electronic data interchange [/spoiler]
  4. What term refers to your ability to connect to the internet and your company from a wireless device?
    1) Net services
    2) Push technology
    3) Pull technology
    4) Mobile computing
    5) None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]4) Mobile computing[/spoiler]
  5. Which of the following systems mimics human thinking?
    1) Artificial intelligence
    2) Intelligent agent
    3) Bot
    4) Database management system
    5) All the above
    [spoiler title=”Answer” icon=”plus” style=”fancy”]1) Artificial intelligence[/spoiler]
  6. What database key uniquely identifies a record within a table?
    1) Primary key
    2) Foreign key
    3) Secondary key
    4) Relational key
    5) None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]1) Primary key [/spoiler]
  7. What database key links one table to another?
    1) Primary key
    2) Foreign key
    3) Secondary key
    4) Relational key
    5) None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]2) Foreign key [/spoiler]
  8. Which device can understand difference between data & programs?
    1) Input device
    2) Output device
    3) Memory
    4) Microprocessor
    5) None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]4) Microprocessor [/spoiler]
  9. Algorithm and Flow chart help us to__________.
    1) Know the memory capacity
    2) Memory address register
    3) Direct the output to a printer
    4) Memory access register
    5) None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]1) Know the memory capacity [/spoiler]
  10. A hacker contacts you my phone or email and attempts to acquire your password________.
    1) spoofing
    2) phishing
    3) spamming
    4) bugging
    5) None of these
    [spoiler title=”Answer” icon=”plus” style=”fancy”]2) phishing [/spoiler]

Comments are closed.