COMPUTER QUIZ For SBI Exam 2014
1. . …..aim at the boot sector of a hard drive by infecting
a very crucial component of the boot process?
(1) File infection virus
(2) Boot
virus
(3) Network
virus
(4) E-mail virus
(5) None of these
2. One
of the more recent e-mail scams, which lures internet users into revealing
personal information is referred to as :
(1) phishing
(2) flaming
(3) blogging
(4) pop- ups
3. Malicious
software is known as :
(1)
Badware
(2)
Malware
(3) Malicious
ware
(4) Illigalware
(5) None of these
4. Hardware
or software designed to guard against authorized access to computer network is
known as …
(1) Hacker proof
program
(2) Firewall
(3) Hacker resistant
server
(4)
Encryption safe wall
(5) None of these
5. The
fastest and quietest type of printer is a(n):
(1) dot-matrix printer. (2) inkjet printer.
(1) dot-matrix printer. (2) inkjet printer.
(3) laser
printer.
(4) plotter.
(5) None of
these
6. The type
of large printer that can most accurately produce images requiring
precise, continuous lines is a(n):
(1) plotter. (2) inkjet printer.
(1) plotter. (2) inkjet printer.
(3) laser
printer.
(4) dot-matrix printer.
(5) none of these
7. MICR
stands for?
(1) Magnetic Ink Character Recognition
(1) Magnetic Ink Character Recognition
(2) Magnetic Ink Code Reader
(3) Magnetic Ink Cases Reader
(3) Magnetic Ink Cases Reader
(4) None of the above
(5) All of the above
8. The
main difference between application and system software
is that:
(1) Application software is composed of program instructions but system software is not.
(2) Application software is stored in memory whereas system software is only in the CPU.
(3) System software is unnecessary whereas application software must be present on the computer.
(4) System software manages hardware whereas application software performs user tasks.
(1) Application software is composed of program instructions but system software is not.
(2) Application software is stored in memory whereas system software is only in the CPU.
(3) System software is unnecessary whereas application software must be present on the computer.
(4) System software manages hardware whereas application software performs user tasks.
(5) None of these
9. ________
Viruses are often transmitted by a floppy disk left in the floppy drive
(1) Trojan horse (2) Boot sector
(3) Script (4) Logic bomb
(5) None of these
(1) Trojan horse (2) Boot sector
(3) Script (4) Logic bomb
(5) None of these
10. Servers
are computers that provide resources to other computers connected to a
___________
(1) mainframe (2) network
(3) supercomputer (4) client
(5) None of these
(1) mainframe (2) network
(3) supercomputer (4) client
(5) None of these
11. A
goal of data mining includes which of the following?
(1) To explain some observed event or condition
(2) To confirm that data exists
(3) To analyze data for expected relationships
(4) To create a new data warehouse
(5) None of these
(1) To explain some observed event or condition
(2) To confirm that data exists
(3) To analyze data for expected relationships
(4) To create a new data warehouse
(5) None of these
12. A
Proxy server is used for which of the following?
(1) To provide security against unauthorized users
(2) To process client requests for web pages
(3) To process client requests for database access
(4) To provide TCP/IP
(5) None of these
(1) To provide security against unauthorized users
(2) To process client requests for web pages
(3) To process client requests for database access
(4) To provide TCP/IP
(5) None of these
13. When
data changes in multiple lists and all lists are not updated, this causes:
(1) data redundancy (2) information overload
(3) duplicate data (4) data inconsistency
(5) None of these
(1) data redundancy (2) information overload
(3) duplicate data (4) data inconsistency
(5) None of these
14. _____________
are words that a programming language has set aside for its own use.
(1) Control worlds (2) Reserved words
(3) Control structures (4) Reserved keys
(5) None of these
(1) Control worlds (2) Reserved words
(3) Control structures (4) Reserved keys
(5) None of these
15. You
must install a (n) ____________ on a network if you want to share a
broadband Internet connection.
(1) router (2) modem
(1) router (2) modem
(3)
node
(4)
cable
(5) None of these
16. Which
term identifies a specific computer on the web and the main page of the entire
site
(1) URL (2) Web site address
(1) URL (2) Web site address
(3)
Hyperlink
(4) Domain
name
(5) None of these
17. The
code that relational database management systems use to perform their database
task is referred to as …..
(1) QBE (2) SQL
(1) QBE (2) SQL
(3)
OLAP
(4) Sequel Server
(5) None of these
18. The
purpose of the primary key in a database is to:
(1) unlock the database
(1) unlock the database
(2) provide a map of the data
(3) uniquely identify a record
(4) establish constraints on database operations.
(5) None of these
(3) uniquely identify a record
(4) establish constraints on database operations.
(5) None of these
19. A
_________ contains specific rules and words that express the logical steps of
an algorithm.
(1) programming language (2) syntax
(3) programming structure (4) logic chart
(5) None of these
(1) programming language (2) syntax
(3) programming structure (4) logic chart
(5) None of these
20. The
most frequently used instructions of a computer program are likely to be
fetched from:
(1) the hard disk (2) cache memory
(3) RAM (4) registers
(5) None of these
(1) the hard disk (2) cache memory
(3) RAM (4) registers
(5) None of these
Answers
1
|
2
|
11
|
3
|
2
|
1
|
12
|
2
|
3
|
2
|
13
|
4
|
4
|
2
|
14
|
2
|
5
|
3
|
15
|
1
|
6
|
1
|
16
|
1
|
7
|
1
|
17
|
2
|
8
|
4
|
18
|
3
|
9
|
2
|
19
|
2
|
10
|
2
|
20
|
2
|
No comments:
Post a Comment