Computer Quiz – 74

Dear Aspirants,

Computer Quiz is the basic part of competitive exams. It is the scoring subject and also the easiest one so we give advice to Bank Aspirants to grasp these questions. It is a series of Computer MCQs.

1.UNIVAC is______
a) Universal Automatic Computer
b) Universal Array Computer
c) Unique Automatic Computer
d) Unvalued Automatic Computer

Click here to View Answer
Answer a) Universal Automatic Computer

2. Hacktivism is?
a) someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism
(malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime.
b) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others.
c) hacker who utilizes technology to announce a political message.
d) None of these

Click here to View Answer
Answer c) hacker who utilizes technology to announce a political message.

3. It is a prepared application that takes advantage of a known weakness?
a) security exploit
b) vulnerability scanner
c) packet sniffer
d) rootkit

Click here to View Answer
Answer a) security exploit

4. It is a tool used to quickly check computers on a network for known weaknesses.
a) security exploit
b) vulnerability scanner
c) packet sniffer
d) rootkit

Click here to View Answer
Answer b) vulnerability scanner

5. It is an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or overthe network?
a) security exploit
b) vulnerability scanner
c) packet sniffer
d) rootkit

Click here to View Answer
Answer c) packet sniffer

6. It is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access?
a) security exploit
b) vulnerability scanner
c) packet sniffer
d) rootkit

Click here to View Answer
Answer a) security exploit

7. Computer is free from tiresome and boardroom. We call it?
a) Accuracy
b) Reliability
c) Diligence
d) Versatility

Click here to View Answer
Answer c) Diligence

8. Storage capacity of magnetic disk depends on?
a) tracks per inch of surface
b) bits per inch of tracks
c) disk pack in disk surface
d) All of above

Click here to View Answer
Answer d) All of above

9. What do you call the programs that are used to find out possible faults and their causes?
a) Operating system extensions
b) Cookies
c) Diagnostic software
d) Boot diskettes

Click here to View Answer
Answer c) Diagnostic software

10. A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is?
a) Memory
b) Buffer
c) Accumulator
d) Address

Click here to View Answer
Answer b) Buffer

Leave a Comment