Friday 2 August 2013

Computer Awareness-28

    1.     Which among the following is a correct definition of "Digital Divide"?
a.      gap between people having access to mobile and internet access
b.     gap between people having access to internet / IT and no internet / IT
c.      gap between people having access to broadband and narrowband internet
d.     gap between people having access to internet banking and normal banking
    2.     Now a days Vishing has become a criminal practice of using social engineering over which of the following?
a.      Social networking sites
b.     Mobile Phones   
c.      E-mail   
d.     Cyber cafes   
    3.     What is the fullform of W3C?
a.      World Wide Web Consortium
b.     World Wide Web Company
c.      World Wide Web Center
d.     World Wide Web Command

    4.     Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider?
a.      Version   
b.     Update
c.      Help   
d.     Patch
    5.     In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits?
a.      City   
b.     Bank
c.      Branch   
d.     Account Type
    6.     Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry?
a.      Virtual keyboard   
b.     Finger Touching
c.      Touchscreen   
d.     Shape Writer
    7.     ADSL data communications technology uses which of the following for faster data transmission?
a.      Voiceband modem   
b.     Wireless Modem
c.      Copper telephone Lines
d.     Sockets
    8.     What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode?
a.      Reduce Power consumption
b.     Back UP
c.      To write contents of RAM to hard disc
d.     To improve download speed
    9.     Which command devides the surface of the blank disk into sectors and assign a unique address to each one
a.      Ver   
b.     Format
c.      Fat   
d.     Chkdsk
    10. If you need to duplicate the entire disk, which command will you use?
a.      Copy   
b.     Diskcopy
c.      Chkdsk   
d.     Format
    11. A .............. sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk
a.       system virus   
b.     Trojan horse virus
c.      file virus   
d.     None of these
    12. A result of a computer virus can not lead to ......
a.      Disk Crash   
b.     Mother Board Crash
c.      Corruption o f program
d.     Deletion of files   
    13. Every computer connected to an intranet or extranet must have a distinct .......
a.      firewall   
b.     proxy server
c.      IP address   
d.     domain name
    14. Programming language built into user programs such as Word and Excel are known as ......
a.      4GLs    
b.     Macro languages
c.      object-oriented languages
d.     visual programming languages
    15. Firewalls are used to protect against .......
a.      unauthorized Attacks   
b.     virus Attacks
c.      Data Driven Attacks
d.     Fire Attacks
    16. Which of the following extensions suggest that the file is a backup copy
a.      Bak   
b.     Bas
c.      Com   
d.     Txt
    17. Computer programs are written in a high - level programming language; however, the human readable version of a program is called .......
a.      cache   
b.     instruction set
c.      source code   
d.     word size
    18. The software tools that enable a user to interact with a computer for specific purposes are known as .......
a.      Hardware   
b.     Networked Software
c.      Shareware   
d.     Applications
    19. .............. proessing is used when a large mail-order company accumulates orders and processes them together in one large set
a.      Batch   
b.     Online
c.      Real-time   
d.     Group
    20. When a file contains instructions that can be carried out by the computer, it is often called a(n) ...... file
a.      data   
b.     information
c.      executable   

d.     application   

No comments: