"ExamGuruAdda: Top website for Daily Current Affairs , General Awareness : Computer Awareness Quiz for IBPS Clerk

Computer Awareness Quiz for IBPS Clerk

1. Hackers often gain entry to a network be pretending to be at a legitimate computer?
1. spoofing
2. forging
3. IP spoofing
4. ID theft
Ans- 3

2. The ...... of a threat measures its potential impact on a system?
1. Vulnerabilities
2. countermeasures
3. degree of harms
4. susceptibility
Ans- 3

3. A ...... is a small program embedded inside of a GIF image?
1. web bug
2. cookie
3. spyware apllication
4. spam
Ans- 1

4. The OSI model is divided into .... processes called layers?
1. Five
2. Six
3. Seven
4. Eight
Ans- 3

5. ........ describes what is database fields?
1. Structures
2. Field markers
3. Field definition
4. Field names
Ans- 4

6. ...... are words that a programming language has set aside for its own use?
1. Control worlds
2. Reserved words
3. Control structures
4. Reserved keys
Ans- 2

7. ..... are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat?
1. Servers
2. Embedded computers
3. Robotic computers
4. Mainframes
Ans- 2

8. A protocol used to control the secure sending of data on the internet is ;?
1. SMTP
2. HTTPS
3. TCP/IP
4. HTTP
Ans- 2

9. In a ring topology, the computer in possession of the ...... can transmit data?
1. packet
2. data
3. access method
4. Token
Ans- 4

10. Any piece of equipment forming an interface to a data communication system is ......?
1. DTE
2. DTA
3. CSA
4. DCA
and- 2
1. Hackers often gain entry to a network be pretending to be at a legitimate computer?
1. spoofing
2. forging
3. IP spoofing
4. ID theft
Ans- 3

2. The ...... of a threat measures its potential impact on a system?
1. Vulnerabilities
2. countermeasures
3. degree of harms
4. susceptibility
Ans- 3

3. A ...... is a small program embedded inside of a GIF image?
1. web bug
2. cookie
3. spyware apllication
4. spam
Ans- 1

4. The OSI model is divided into .... processes called layers?
1. Five
2. Six
3. Seven
4. Eight
Ans- 3

5. ........ describes what is database fields?
1. Structures
2. Field markers
3. Field definition
4. Field names
Ans- 4

6. ...... are words that a programming language has set aside for its own use?
1. Control worlds
2. Reserved words
3. Control structures
4. Reserved keys
Ans- 2

7. ..... are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat?
1. Servers
2. Embedded computers
3. Robotic computers
4. Mainframes
Ans- 2

8. A protocol used to control the secure sending of data on the internet is ;?
1. SMTP
2. HTTPS
3. TCP/IP
4. HTTP
Ans- 2

9. In a ring topology, the computer in possession of the ...... can transmit data?
1. packet
2. data
3. access method
4. Token
Ans- 4

10. Any piece of equipment forming an interface to a data communication system is ......?
1. DTE
2. DTA
3. CSA
4. DCA
and- 2

No comments:

Post a Comment