Computer Awareness Quiz Set 19

Applicants who are preparing for competitive exams can get Questions And Answers in set no. 19 for Computer Awareness in the form of Quiz. So these can be practiced by the aspirants who are getting prepare for competitive examinations through online.

Computer Awareness Quiz Set 19

1. Which is used to create a soft break instead of a new paragraph?
 
 
 
 

2. Which key is used to erase pen tool drawings during a presentation?
 
 
 
 

3. Which is used to turn off the pen tool during a presentation?
 
 
 
 

4. ___________ is the part of the World Wide Web that is not indexed by traditional search engines.
 
 
 
 

5. ICMP used for _____
 
 
 
 

6. Which of the following is a two-dimensional bar code consisting of a black and white pixel pattern which allows to encode up to a few hundred characters?
 
 
 
 

7. Which of the following is a database of information about the Windows operating system including customized settings and software installations?
 
 
 
 

8. __________ is a technique that tricks users into clicking on a malicious link.
 
 
 
 

9. When a hardware component fails, the computer switches over to a redundant component without the service to the user being interrupted is termed as ________
 
 
 
 

10. ____________ is a collection of one or more files that correct flaws in the performance, reliability or security of a specific software product.
 
 
 
 

11. The terminal device that functions as a cash register is known as _______
 
 
 
 

12. A program either audio or music that is made available in digital format for automatic download over the internet is called a ______
 
 
 
 

13. Which one of the following is a cryptographic protocol used to secure http concession?
 
 
 
 

14. Which of the following is the technique that extends storage capacities of main memory beyond the actual size of the main memory?
 
 
 
 

15. Software that is made available at no cost is known as _______
 
 
 
 

16. Which one of the following is a key function of firewall?
 
 
 
 

17. Which of the following acts as a temporary high-speed holding area between the memory and CPU?
 
 
 
 

18. Malicious modification or destruction of data such as changing information on Web sites is called ________
 
 
 
 

19. The act of secretly removing RAM chips from computers is known as ______
 
 
 
 

20. Which of the following allows end-to-end notification of network congestion without dropping packets?
 
 
 
 

21. _________ is a software system that is designed to search for information on the World Wide Web.
 
 
 
 

22. _________is an integrated circuit design on a printed circuit board (PCB) that uses semiconductor technology.
 
 
 
 

23. ___________ processing is used when a large mail-order company accumulates orders and processes them together in one large set.
 
 
 
 

24. To create a new slide you choose a ______
 
 
 
 

25. Which of the following provides battery backup for a limited period of time?
 
 
 
 

26. Which of the following is an automated way to enter and process data or reports continuously?
 
 
 
 

27. Which of the following is used to place an organization chart on a slide?
 
 
 
 

28. Bar code scanning is an example of ________
 
 
 
 

29. Which of the following is used to choose slide layout?
 
 
 
 


 

LEAVE A REPLY

Please enter your comment!
Please enter your name here