Current Affairs PDF

Computer Questions Set-24

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the SBI/IBPS/SSC exams and other competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. A hacker that changes or forges information in an electronic resource, is engaging in __________.
    1) denial of service
    2) sniffing
    3) terrorism
    4) data diddling
    5) None of these
    4) data diddling

  2. Software, such as Explorer and Firefox, are referred to as ______.
    1) internet tools
    2) Utility software
    3) Development software
    4) Browsers
    5) None of these
    4) Browsers

  3. When two companies are linked together by computers and they send business transactions through these computers, they are probably using ______.
    1) Digital wallets
    2) Electronic data interchange
    3) B2C
    4) Smart cards
    5) None of these.
    2) Electronic data interchange

  4. What term refers to your ability to connect to the internet and your company from a wireless device?
    1) Net services
    2) Push technology
    3) Pull technology
    4) Mobile computing
    5) None of these
    4) Mobile computing

  5. Which of the following systems mimics human thinking?
    1) Artificial intelligence
    2) Intelligent agent
    3) Bot
    4) Database management system
    5) All the above
    1) Artificial intelligence

  6. What database key uniquely identifies a record within a table?
    1) Primary key
    2) Foreign key
    3) Secondary key
    4) Relational key
    5) None of these
    1) Primary key

  7. What database key links one table to another?
    1) Primary key
    2) Foreign key
    3) Secondary key
    4) Relational key
    5) None of these
    2) Foreign key

  8. Which device can understand difference between data & programs?
    1) Input device
    2) Output device
    3) Memory
    4) Microprocessor
    5) None of these
    4) Microprocessor

  9. Algorithm and Flow chart help us to__________.
    1) Know the memory capacity
    2) Memory address register
    3) Direct the output to a printer
    4) Memory access register
    5) None of these
    1) Know the memory capacity

  10. A hacker contacts you my phone or email and attempts to acquire your password________.
    1) spoofing
    2) phishing
    3) spamming
    4) bugging
    5) None of these
    2) phishing