mahendras

Subscribe Mahendras Youtube Channel | Join Mahendras Telegram Channel | Like Mahendras Facebook Page | Online Admission | Download Mahendras App

Now Subscribe for Free videos

Subscribe Now

Computer Knowledge : 18.08.2015

Bankers Guru
Computer Knowledge 

Q.1. Spooling is a form of ———————.

(1) Batch processing

(2) Multiple processing

(3) Parallels processing

(4) Simultaneous processing

(5) None of these

Q.2. Our slide show footer has the date, company name, and slide number. But you can change these details from ————.

(1) Tool (2) View (3) Design (4) Window (5) None of these

Q.3. Binary numbers need more places for counting because:

(1) 0’s and 1’s can be added in front of them

(2) 0’s and 1’s have to be properly placed 

(3) They are always big numbers

(4) Binary base is small 

(5) None of the above 

Q.4. Boot-sector viruses are usually triggered when ———————.

(1) a script is sent in an infected e-mail 

(2) a boot enters the optical drive

(3) a certain date is reached 

(4) the computer boots up with a flash drive connected 

(5) None of these

Q.5. The Melissa virus was the first practical example of ——————.

(1) an encryption virus (2) a nonreplicating worm (3) a logic virus (4) an e-mail virus 

(5) None of these

Q.6. A(n) —————— is a portion of the virus code that is unique to a particular computer virus. 

(1) quarantine quarter (2) code shield (3) encryption case (4) virus signature 

(5) None of these

Q.7. ———— use the tools created by skilled hackers to obtain unauthorized access to computer systems. 

(1) Script kiddies (2) keyloggers (3) Bots (4) White-hat hackers (5) None of these

Q.8. ———— are often used to launch, denial – of – service attacks on other computers. 

(1) Encryption codes (2) Boot-sector viruses (3) Zombies (4) Time bombs (5) None of these

Q.9. Which of the following will add to the strength of a password?

(1) Writing down your password and keeping it handy 

(2) Selecting a password that is associated with you, such as your birth date 

(3) Using a different password for each system or Web site you need to access. 

(4) Using a word that is found in the dictionary 

(5) None of these

Q.10. A logical port is a —————.

(1) Serial port designed for connecting to peripherals

(2) virtual communication gateway that allows a computer to organize request for information.

(3) virus that only can enter the computer a USB port

(4) physical pathway linking the computer to a printer

(5) None of these

Answers

Q.1.(1) Q.2.(5) Q.3.(4) Q.4.(4) Q.5.(4) Q.6.(4) Q.7.(1) Q.8.(3) Q.9.(3) Q.10.(2)

Copyright © 2023 www.mahendraguru.com All Right Reserved by Mahendra Educational Pvt . Ltd.