Current Affairs PDF

Computer Questions Set – 137

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. Which of the following is an open source development environment to develop dynamic web pages?
    A. PHP
    B. XML
    C. VB Script
    D. All of these
    E. None of these
    Ans – A. PHP

  2. Multi-user systems use a single processing unit to link several _______
    A. Personal computers
    B. Workstations
    C. Dumb terminals
    D. Mainframes
    E. None of these
    Ans – C. Dumb terminals

  3. Using ______, an admin / user can access someone else’s computer remotely.
    A. Web Server
    B. Telnet
    C. Web application
    D. All of these
    E. None of these
    Ans – B. Telnet

  4. A list of rules for transferring data over a network is known as______
    A. Protocol
    B. Program code
    C. Rules
    D. All of these
    E. None of these
    Ans -A. Protocol

  5. Which of the following involves deliberate attacks intended to disable computers or networks?
    A. Piggybacking
    B. Sabotage
    C. Phishing
    D. All of these
    E. None of these
    Ans -B. Sabotage

  6. Which of the following is the changing of data before or during entry into the computer system.?
    A. Data diddling
    B. Data mining
    C. Data Warehousing
    D. All of these
    E. None of these
    Ans – A. Data diddling

  7. An intelligent Hub that has the ability to determine the destination of a packet sent across the network is called _______
    A. Repeater
    B. Switch
    C. Bridge
    D. All of these
    E. None of these
    Ans – B. Switch

  8. A file that contains character styles, customized toolbars and menus is called a _______
    A. guide
    B. prompt
    C. template
    D. All of these
    E. None of these
    Ans – C. template

  9. Unauthorized access to restricted systems or resources is referred as ______
    A. Pharming
    B. Penetration
    C. Phishing
    D. All of these
    E. None of these
    Ans – B. Penetration

  10. Unauthorized access to information by using a terminal that is already logged on with an authorized ID is called ______
    A. Piggybacking
    B. Penetration
    C. Phishing
    D. All of these
    E. None of these
    Ans – A. Piggybacking