Current Affairs PDF

Computer Questions Set – 151

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. Which of the following will make high-level application connections on behalf of internal hosts?
    A. Internet
    B. Server
    C. Application service provider.
    D. Proxy Server
    E. Network
    Ans – D. Proxy Server

  2. Which of the following is a cyber attack intended to redirect a website’s traffic to another, fake site?
    A. Phishing
    B. Pharming
    C. Piracy
    D. Both (1) and (2)
    E. None of these
    Ans – B. Pharming

  3. There are several primary categories of procedures. Which of the following is not a primary category of procedures?
    A. Testing
    B. Backup and recovery
    C. Firewall development
    D. Design
    E. None of these
    Ans – C. Firewall development

  4. Which of the following is open source project?
    A. Firefox
    B. MySQL
    C. Open Office
    D. All of these
    E. None of these
    Ans – D. All of these

  5. Which of the following is an unethical web practice that keeps users trapped on a particular site?
    A. Hoax
    B. Clickjacking
    C. Browser Hijacking
    D. Mousetrapping
    E. None of these
    Ans – B. Clickjacking

  6. System Software
    A. is a programming language
    B. is an optional form of software
    C. helps the computer to manage internal resources
    D. controls and manipulates data
    E. None of these
    Ans – C. helps the computer to manage internal resources

  7. Which of the following statements is true about “cookie”
    A. Stores the password of the user
    B. Stores the commands used by the user.
    C. Stores information about the user’s web activity
    D. Stores information about softwares.
    E. None of these
    Ans – C. Stores information about the user’s web activity

  8. Which of the following is not a type of computer software which can be acquired by organizations?
    A. Off-the-shelf
    B. Custom-developed
    C. Off-the-shelf with alterations
    D. All of these
    E. None of these
    Ans – D. All of these

  9. Which type of computers uses the 8-bit code called EBCDIC?
    A. Minicomputers
    B. Microcomputers
    C. Mainframe computers
    D. Super Computers
    E. None of these
    Ans – C. Mainframe computers

  10. Unauthorized access to restricted systems or resources is referred as __________

    A. Pharming
    B. Penetration
    C. Phishing
    D. All of these
    E. None of these
    Ans – B. Penetration