Blogger Widgets Blogger Widgets

Monday, July 23, 2012

Computer Awareness - 2


1.Which among the following is not a security / privacy risk?
(A)Spam
(B)Hacking
(C)Virus
(D)Phishing
(E)Vishing
Ans.  Spam
2.Now a days Vishing has become a criminal practice of using social engineering over which of the following?
(A)Social networking sites
(B)Mobile Phones
(C)E-mails
(D)Cyber cafés
(E)All of the above
Ans. Mobile Phones

3.When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for sensitive banks and online payment information, this is a case of __?
(A)spam
(B)hacking
(C)Phishing
(D)Vishing
(E)Simulation

Ans. Phishing 
4.Which among the following is a correct definition of “Digital Divide”?
(A) gap between people having access to mobile and internet access
(B) gap between people having access to internet /IT and no internet/IT
(C) gap between people having access to broadband and narrowband internet
(D) gap between people having access to internet banking and normal banking
(E)Gap between the people having an email account and no email account
Ans.  (B) gap between people having access to internet /IT and no internet/IT
5.Which among the following is the most common source of Viruses to the hard disk of your computer?
(A)Incoming Email
(B)Outgoing Email
(C)CD Roms
(D)Websites
(E)Mobile
Ans. (A) Incoming Email
6.What is the fullform of W3C?
(A)World Wide Web Consortium
(B)World Wide Web Company
(C)World Wide Web Center
(D)World Wide Web Command
(E)None of them
Ans. (A) World Wide Web Consortium
7.Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider?
(A)Version
(B)Update
(C)Help
(D)Patch
(E)Syntax
Ans. (D) Patch
8.What is the name of the proposed software application that would allow users of automated teller machines (ATMs) to alert the police of a forced cash withdrawal by entering their personal identification number (PIN) in reverse order?
(A)ATM SafetyPIN
(B)ATM SafetyPro
(C)ATM SafetyCode
(D)ATM SafetySign
(E)ATM SafetyDigit
Ans. (A) ATM SafetyPIN
9.In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits?
(A)City
(B)Bank
(C)Branch
(D)Account Type
(E)None of the above
Ans.  first three digits represent the city, the next three indicate the bank and the last three digits signify the branch
10.Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry?
(A)Virtual keyboard
(B)Finger Touching
(C)Touchscreen
(D)ShapeWriter
(E)Dasher
Ans. (A) Virtual Keyboard
11.ADSL data communications technology uses which of the following for faster data transmission ?
(A)Voiceband modem
(B)Wireless Modem
(C)Copper telephone Lines
(D)Sockets
(E)None of the above
Ans. (C) Copper telephone Lines
12.While working on Microsoft World , which among the following is the command for “Undo”?
(A)Cntrl +A
(B)Cntrl +Z
(C)Cntrl +Y
(D)Cntrl +C
(E)Cntrl +V
Ans. (B) Cntrl + Z
13.While browsing the internet , which of the following key is used for full screen view?
(A)F3
(B)F5
(C)F11
(D)F9
(E)F10
Ans. (C) F11
14.Which of the following is a suitable term for any programmable content of a hardware device configurations and data for application-specific integrated circuits (ASICs), programmable logic devices, etc.?
(A)Hardware
(B)Software
(C)Firmware
(D)Malware
(E)Liveware
Ans. (C) Firmware
15.Most of the internet sites now a days use CSS primarily to enable the separation of document content (written in HTML or a similar markup language) from document presentation, including elements such as the layout, colors, and fonts. What is full form?
(A)Cascading Style Software
(B)Clear Style Sheet
(C)Cascading Style Sheet
(D)Common Style Sheet
(E)Conditional Style Sheet
Ans. (C) Cascading Style Sheet
16.What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode?
(A)Reduce Power consumption
(B)Back Up
(C)To write contents of RAM to hard disc
(D)To improve download speed
(E)None of the above
Ans. (A) Deduce Power Consumption
17.Which of the following device is a volatile storage?
(A)RAM
(B)Hard Disc
(C)Magnetic Tape
(D)Floppy Disc
(E)ROM
Ans. (A) RAM
18.Which of the following company owns/ uses the Virtual Hard Disk (.vhd) format for Virtual PC?
(A)IBM
(B)Microsoft
(C)Intel
(D)Google
(E)Apple
Ans. (B) Microsoft
19.What is Office Open XML?
(A)A file format
(B)A software
(C)A electronic device
(D)An international standard
(E)None of the above
Ans. (A) A file format
20.What is the ultimate purpose of Defragmentation?
(A)Make the PC faster
(B)Create More Free Space
(C)Delete temporary files
(D)Reduce Power consumption
(E)All of the above
Ans. (B) Create More Free Space is the main purpose however performance is also improved in most cases.

No comments:

Post a Comment