Computer Awareness Quiz Set 17

Candidates can see the Questions and Answers for Computer Awareness Quiz in the Do study these Questions and are useful for all competitive Examinations. In this set no. 17 we provided the Questions along with a brief Explanation.

Computer Awareness Quiz Set 17

1. ______ is a network authentication protocol which is designed to provide strong authentication for client/server applications by using secret-key cryptography.

2. ________is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites.

3. AUI stands for ____

4. Which of the following is an interface between a computer’s Network Interface Card(NIC) and an Ethernet cable?

5. The _________ protocol defines how a client and server establish an SSL connection.

6. The ________ protocol defines how communicating hosts exchange data using SSL

7. The SSL protocol includes _______ subprotocols.

8. A server accelerator card is also known as ______

9. Full form of CSV is ______

10. Which of the following is a networking protocol for securing connections between network application clients and servers over an insecure network, such as the Internet?

11. The program which interprets commands given by the user?

12. GUID stands for _____

13. Which of the following is an invalid type of database key?

14. A system call of OS which is used to create a new process is known as ________

15. A _______ is a unique identification number generated by a computer hardware component or a program.

16. A process which is not executing due to any waiting event is called?

17. Through __________an administrator or another user can access someone else’s computer remotely.

18. Which of the following is a feature for scheduling & multiprogramming to provide an economical interactive system of two or more users?

19. GUID/UUID is a ______ integer number used to identify resources

20. Grouping & processing all of a firm’s transactions at one time is called _______

21. __________ is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.

22. Which of the following is the masking of server resources, including the number and identity of individual physical servers, processors, and OS, from server users?

23. _______ is a backup operational mode in which the functions of a system component.

24. _________ is a computer networking device that builds the connection with the other bridge networks which use the same protocol.

25. Which of the following is an unethical web practice that keeps users trapped on a particular site?

26. Which of the following is also known as an “UI redress attack”?

27. Which of the following is a type of malware that is designed to change your browser’s settings?

28. A virus _______ is a false warning about a computer virus.

29. Which of the following is a cyber attack intended to redirect a website’s traffic to another, fake site?

30. ________ is a mechanism for improving the time it takes to read from or write to a hard disk.



Please enter your comment!
Please enter your name here