Computer Knowledge Quiz for upcoming IBPS Exams – Set 25


Hello and welcome to exampundit. Here is a set of Computer Knowledge Quiz for upcoming IBPS Exams.

1. A passive threat to computer security is
1) Malicious Intent
2) Sabotage
3) Accident Errors
4) Espionage Agents
5) None of these
2. The Secure Electronic Transaction (SET) specification
1) is a notice issued and verified by a certifying authority, that guarantees a user or Web site to be legitimate
2) provides private-key encryption of all data that passes between a client and a server
3) allows users to choose an encryption scheme for the data that passes between a client and a server
4) uses a public-key encryption to secure credit-card transaction systems
5) None of these
3. ________allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.
1) TCP/IP
2) Ethernet
3) WAP
4) Token ring
5) None of these
4. Which of the following does ‘DOS’ floppy disk not have?
1) A Boot Record
2) A File Allocation Table
3) A Root Directory
4) Virtual Memory
5) BIOS
5. ‘MICR’ technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition
2) Magnetic Intelligence Character Recognition
3) Magnetic Information Cable Recognition
4) Magnetic Insurance Cases Recognition
5) None of these





Sponsored


(adsbygoogle = window.adsbygoogle || []).push({});



6. All the information collected during database development is stored in a

1) repository
2) data warehouse
3) RAD
4) CASE
5) None of these
7. The ________ component is used by the data analyst to create the queries that access the database.
1) data extraction
2) end-user query tool
3) end-user presentation tool
4) data store
5) None of these
8. A(n) ________ allows network users to share a single copy of software which resides on the network server.
1) single-user licence agreement
2) network site licence
3) end-user licence agreement
4) business software licence
5) None of these
9. A polymorphic virus
1) modifies its program code each time it attaches itself to another program or file
2) is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains
3) is a malicious-logic program that hides within or looks like a legitimate program
4) infects a program file, but still reports the size and creation date of the original, uninfected program
5) None of these
10. Microwave transmission is used in environments where installing physical transmission media is
1) difficult or impossible and where line-of-sight transmission is unavailable
2) easy or promising and where line-of-sight transmission is unavailable
3) difficult or impossible and where line-of-sight transmission is available
4) easy or promising and where line-of-sight transmission is available
5) None of these

  EP Recommends: Toprankers Mock Tests
  • IBPS RRB Assistant 2017 – Free Mock Test
  • IBPS PO & Clerk 2017 – Free Mock Test
  • IBPS RRB Officer 2017 – Free Mock Test
  • UIIC Assistant 2017- Free Mock Test
  • OICL AO 2017 – Free Mock Test
Sponsored


(adsbygoogle = window.adsbygoogle || []).push({});

Regards

Team ExamPundit