Current Affairs PDF Sales

Computer Questions Set-28

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the SBI/IBPS/SSC exams and other competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. Which of the following is NOT one of the four major data processing functions of a computer__________
    1) gathering data
    2) processing data into information
    3) analyzing the data or information
    4) storing the data or information
    5) None of these
    C. analyzing the data or information

  2. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
    1) languages
    2) methods
    3) CPUs
    4) storage devices
    5) None of these
    3) CPUs

  3. User actions such as keystrokes or mouse clicks are referred to as__________
    1) Interrupts
    2) Tasks
    3) Events
    4) Processes
    5) None of these
    3) Events

  4. Microsoft’s Access and Corel’s Paradox are both examples of which type of software?
    1) Network database systems
    2) Relational database systems
    3) Flat-file database systems
    4) Hierarchical database systems
    5) None of these
    2) Relational database systems

  5. To read the system messages and warnings, access the __________ in Windows.
    1) system manager
    2) control panel
    3) event viewer
    4) message screen
    5) None of these
    3) event viewer

  6. In the right setting a thief will steal your information by simply watching what you type________
    1) snagging
    2) spying
    3) social engineering
    4) shoulder surfing
    5) None of these
    4) shoulder surfing

  7. The __________ of a threat measures its potential impact on a system.
    1) vulnerabilities
    2) countermeasures
    3) degree of harm
    4) susceptibility
    5) none of these
    3) degree of harm

  8. Most dangerous risk in leaking of information is___________
    1) Ready access to online terminals
    2) Online processing of data
    3) Ignorance about the existence of risk
    4) All of these
    5) none of these
    4) All of these

  9. MCI and AT&T are examples of which of the following?
    1) Social networks
    2) Communications systems
    3) Internet service providers
    4) Mobisodes
    5) None of these
    3) Internet service providers

  10. What type of web technology provides news that can automatically download right to your desktop________
    1) Social network
    2) RSS feed
    3) Podcast
    4) Wiki
    5) None of these
    2) RSS feed