Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
SUBSCRIBE NOW
MISSION PATWARI 2020
SUBSCRIBE OUR CHANNEL
COMPUTER MCQ PART- 9
1.Which of the following will make high-
level application connections on behalf of
internal hosts?
A. Internet
B. Server
C. Application service provider.
D. Proxy Server
E. Network
Answer
Ans – D. Proxy Server
2.Which of the following is a cyber-attack
intended to redirect a website’s traffic to
another, fake site?
A. Phishing
B. Pharming
C. Piracy
D. Both (1) and (2)
E. None of these
Answer
Ans – B. Pharming
3.There are several primary categories of
procedures. Which of the following is not a
primary category of procedures?
A. Testing
B. Backup and recovery
C. Firewall development
D. Design
E. None of these
Answer
Ans – C. Firewall development
4.Which of the following is open source
project?
A. Firefox
B. MySQL
C. Open Office
D. All of these
E. None of these
Answer
Ans – D. All of these
5.Which of the following is an unethical web
practice that keeps users trapped on a
particular site?
A. Hoax
B. Clickjacking
C. Browser Hijacking
D. Mousetrapping
E. None of these
Answer
Ans – B. Clickjacking
SUBSCRIBE NOW
MISSION PATWARI 2020
6.System Software
A. is a programming language
B. is an optional form of software
C. helps the computer to manage internal
resources
D. controls and manipulates data
E. None of these
Answer
Ans – C. helps the computer to manage
internal resources
7.Which of the following statements is true
about “cookie”
A. Stores the password of the user
B. Stores the commands used by the user.
C. Stores information about the user’s web
activity
D. Stores information about software’s.
E. None of these
Answer
Ans – C. Stores information about the user’s
web activity
8.Which of the following is not a type of
computer software which can be acquired
by organizations?
A. Off-the-shelf
B. Custom-developed
C. Off-the-shelf with alterations
D. All of these
E. None of these
Answer
Ans – D. All of these
9.Which type of computers uses the 8-bit
code called EBCDIC?
A. Minicomputers
B. Microcomputers
C. Mainframe computers
D. Super Computers
E. None of these
Answer
Ans – C. Mainframe computers
10.Unauthorized access to restricted
systems or resources is referred as
__________
A. Pharming
B. Penetration
C. Phishing
D. All of these
E. None of these
Answer
Ans – B. Penetration
SUBSCRIBE NOW
MISSION PATWARI 2020
11.To access a mainframe or
Supercomputer, users often use a ______.
A. Node
B. Desktop
C. Terminal
D. All of these
E. None of these
Answer
Ans – C. Terminal
12.Which of the following refers to the
means by which an OS or any other
programs interacts with the user?
A. Program front-end
B. Programming Interface
C. User Compatibility
D. User Interface
E. None of these
Answer
Ans – D. User Interface
13.When a hardware component fails, the
computer switches over to a redundant
component without the service to the user
being interrupted is termed as
_____________
A. Payload
B. Failover
C. Fault‐Tolerant
D. All of these
E. None of these
Answer
Ans – B. Failover
SUBSCRIBE NOW
MISSION PATWARI 2020
14._______ is a network security system,
either hardware or software based that
monitors traffic to or from your network
based on a set of rules.
A. Anti-Spyware
B. Anti-virus
C. Firewall
D. All of these
E. None of these
Answer
Ans – C. Firewall
15.The term _______ designates equipment
that might be added to a computer system
to enhance its functionality.
A. digital device
B. system add-on
C. disk components
D. peripheral device
E. None of these
Answer
Ans – D. peripheral device
SUBSCRIBE NOW
MISSION PATWARI 2020
16.A computer-intensive problem runs on a
______
A. Server
B. Personal Computer
C. Mainframe Computer
D. Super Computer
E. None of these
Answer
Ans – D. Super Computer
17.Which of the following is a Peripheral
Component Interconnect (PCI) card used to
generate encryption keys for secure
transactions on e-commerce Web sites?
A. server accelerator card
B. smart card
C. PCMCIA card
D. network interface card
E. intelligent peripheral interface
Answer
Ans – A. server accelerator card
18.In a database record, When the user
changes existing values then it is called
________
A. editing.
B. manipulating.
C. mining
D. re-storing.
E. None of these
Answer
Ans – A. editing.
19.A computer that can be accessed by
users across a network mainly or
exclusively for storing and supplying data
files is known as ______
A. application server.
B. file server.
C. distributed file system.
D. Web server.
E. None of these
Answer
Ans – B. file server.
20._________ is computer processing that
enables a user to extract and view data
from different points of view
A. OLTP
B. OLAP
C. OLEP.
D. OLFP.
E. None of these
Answer
Ans – B. OLAP
SUBSCRIBE NOW
MISSION PATWARI 2020
SUBSCRIBE NOW
MISSION PATWARI 2020
SUBSCRIBE OUR CHANNEL
COMPUTER MCQ PART- 9