Chitika

Friday 30 September 2011

Quiz 01 | Computer Awareness for IBPS - Part 1

1. ____________ are viruses that are triggered by the passage of time or on a certain date.
(A) Boot-sector viruses
(B) Macro viruses
(C) Time bombs
(D) Worms
(E) None of these

2. The design of the network is called the network:
(A) architecture
(B) server
(C) transmission
(D) type
(E) None of these

3. The most frequently used instructions of a computer program are likely to be fetched from:
(A) the hard disk
(B) cache memory
(C) RAM
(D) registers
(E) None of these

4. The ____________ contains data descriptions and defines the name, data type, and length of each field in the database.
(A) data dictionary
(B) data table
(C) data record
(D) data field
(E) None of these

5. Personal logs or journal entries posted on the Web are known as:
(A) listservs
(B) Webcasts
(C) blogs
(D) subject directories
(E) None of these

6. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
(A) command – based user interface
(B) GUI
(C) system utility
(D) API
(E) None of these

7. Linux is a (n) ____________ operating system.
(A) open-source
(B) Microsoft
(C) Windows
(D) Mac
(E) None of these

8. Which of the following is NOT a type of broadband Internet connection?
(A) Cable
(B) DSL
(C) Dial-up
(D) Satellite
(E) None of these

9. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(A) spyware
(B) adware
(C) spam
(D) malware
(E) None of these

10. Making a field ______ meAns : that it cannot be left blank.
(A) numeric
(B) required
(C) calculated
(D) validated
(E) None of these

Answers
1. C
2. A
3. B
4. A
5. C
6. B
7. A
8. C
9. D
10.B

No comments:

Post a Comment