Computer Knowledge Quiz for LIC AAO 2016 – Set 20



Hello and welcome to ExamPundit. Here is a set of Computer Knowledge Quiz for LIC AAO 2016.




1. A passive threat
to computer security is
1) Malicious Intent
2) Sabotage
3) Accident Errors
4) Espionage Agents
5) None of these
2. The Secure
Electronic Transaction (SET) specification
1) is a notice issued and verified by a certifying
authority, that guarantees a user or Web site to be legitimate
2) provides private-key encryption of all data that passes between
a client and a server
3) allows users to choose an encryption scheme for the data
that passes between a client and a server
4) uses a public-key encryption to secure credit-card transaction
systems
5) None of these
3. ________allows
wireless mobile devices to access the Internet and its services such as the Web
and e-mail.
1) TCP/IP
2) Ethernet
3) WAP
4) Token ring
5) None of these
4. Which of the
following does ‘DOS’ floppy disk not have?
1) A Boot Record
2) A File Allocation Table
3) A Root Directory
4) Virtual Memory
5) BIOS
5. ‘MICR’ technology
used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition
2) Magnetic Intelligence Character Recognition
3) Magnetic Information Cable Recognition
4) Magnetic Insurance Cases Recognition
5) None of these
6. All the information
collected during database development is stored in a
1) repository
2) data warehouse
3) RAD
4) CASE
5) None of these
7. The ________ component
is used by the data analyst to create the queries that access the database.
1) data extraction
2) end-user query tool
3) end-user presentation tool
4) data store
5) None of these
8. A(n) ________ allows
network users to share a single copy of software which resides on the network

server.
1) single-user licence agreement
2) network site licence
3) end-user licence agreement
4) business software licence
5) None of these
9. A polymorphic
virus
1) modifies its program code each time it attaches itself to
another program or file
2) is a malicious-logic program that copies itself repeatedly
in memory or on a disk drive until no memory or disk space remains
3) is a malicious-logic program that hides within or looks like
a legitimate program
4) infects a program file, but still reports the size and creation
date of the original, uninfected program
5) None of these
10. Microwave
transmission is used in environments where installing physical transmission
media is
1) difficult or impossible and where line-of-sight transmission
is unavailable
2) easy or promising and where line-of-sight transmission is
unavailable
3) difficult or impossible and where line-of-sight transmission
is available
4) easy or promising and where line-of-sight transmission is
available
5) None of these



Regards

Team ExamPundit

Sponsored

(adsbygoogle = window.adsbygoogle || []).push({});

Books For 2015 Banking/Insurance Exams