Current Affairs PDF

Computer Questions Set – 186

AffairsCloud YouTube Channel - Click Here

AffairsCloud APP Click Here

Hello Aspirants. Welcome to Online Computer Quiz in AffairsCloud.com. Here we are creating quiz covering important topics in computer awareness, which is common for all the competitive exams. We have included questions that are repeatedly asked in many bank exams !!!

  1. Which of the following is the standard way that computer users share files across corporate intranets and the Internet?
    A. Network File System(NFS)
    B. Common Internet File System (CIFS)
    C. File Sharing System
    D. All of these
    E. None of these
    Ans – B. Common Internet File System(CIFS)
    Common Internet File System (CIFS) is the standard way that computer users share files across corporate intranets and the Internet

  2. Which of the following allows remote hosts to mount file systems over a network?
    A. Network File System(NFS)
    B. Common Internet File System (CIFS)
    C. File Sharing System
    D. All of these
    E. None of these
    Ans – A. Network File System(NFS)
    Network File System(NFS) allows remote hosts to mount file systems over a network.

  3. _______ is a simple, lock-step FTP that allows a client to get a file from or put a file onto a remote host.
    A. SSH FTP
    B. Trivial FTP
    C. FTP
    D. All of these
    E. None of these
    Ans – B. Trivial FTP

  4. FTP which uses the Secure Shell protocol to transfer files is known as _______
    A. SSH FTP
    B. Trivial FTP
    C. FTP
    D. All of these
    E. None of these
    Ans – A. SSH FTP

  5. _______ is used to store custom data private to the page or application.
    A. Data Redundancy
    B. Data Integrity
    C. Data Attribute
    D. All of these
    E. None of these
    Ans – C. Data Attribute

  6. _______ is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle
    A. Data Redundancy
    B. Data Integrity
    C. Data Attribute
    D. Data Inconsistency
    E. None of these
    Ans – B. Data Integrity
    Data Integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle

  7. ________ occur between files when similar data is kept in different formats in two different files.
    A. Data Redundancy
    B. Data Integrity
    C. Data Attribute
    D. Data Inconsistency
    E. None of these
    Ans – D. Data Inconsistency

  8. Attributes can be defined for _____
    A. Pages
    B. Entity
    C. Macro
    D. All of these
    E. None of these
    Ans – B. Entity

  9. Which one of the following is a cryptographic protocol used to secure http concession?
    A.Transport Layer Security
    B.Explicit Congestion Notification
    C.Resource Reservation Notification(RRN)
    D.All of these
    E.None of these
    Ans – A.Transport Layer Security

  10. The load instruction is mostly used to designate a transfer from memory to a processor register known as _______
    A. Program counter
    B. instruction register
    C. accumulator
    D. All of these
    E. None of these
    Ans – C. accumulator