Computer Awareness Quiz Set 20

Candidates who had a wish to get a high score for any competitive examinations they can have a look at this page that we have uploaded the Questions And Answers along with an accurate explanation.

Computer Awareness Quiz Set 20

1. Unauthorized access to information by using a terminal that is already logged on with an authorized ID is called ______
 
 
 
 
2. Using ______, an admin / user can access someone else’s computer remotely.
 
 
 
 
3. Multi-user systems use a single processing unit to link several _______
 
 
 
 
4. A list of rules for transferring data over a network is known as______
 
 
 
 
5. Which of the following involves deliberate attacks intended to disable computers or networks?
 
 
 
 
6. A file that contains character styles, customized toolbars and menus is called a _______
 
 
 
 
7. Which of the following is the changing of data before or during entry into the computer system.?
 
 
 
 
8. An intelligent Hub that has the ability to determine the destination of a packet sent across the network is called _______
 
 
 
 
9. Unauthorized access to restricted systems or resources is referred as ______
 
 
 
 
10. Which of the following is an open source development environment to develop dynamic web pages?
 
 
 
 
11. Which of the following protocol is used for locating and transferring information on the internet?
 
 
 
 
12. Programs that automatically submit your search request to several search engines simultaneously are called _______
 
 
 
 
13. To protect yourself from computer hacker intrusions you should install a _______
 
 
 
 
14. _______represents the use of links between information of all sorts whether text, graphics, video or audio based.
 
 
 
 
15. GUID or UUID is a ______ bit integer number used to identify resources.
 
 
 
 
16. An on-line backing storage system capable of storing larger quantities of data is
 
 
 
 
17. The information of credit and debit card are stored on _______
 
 
 
 
18. The disk drive component used to position read/write heads over a specific track is known as______
 
 
 
 
19. Which of the following is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet?
 
 
 
 
20. This dialog box specifies or modifies the worksheet cell range containing data to be charted __________
 
 
 
 
21. A USB communication device that supports data encryption for secure wireless communication for notebook users is called a ______
 
 
 
 
22. Which of the following is not used for real-time processing?
 
 
 
 
23. Telnet is _____ based computer protocol.
 
 
 
 
24. ______ is a process in which pages of data are not copied from disk to RAM until they are needed.
 
 
 
 
25. The most widely used type of database management system is ________
 
 
 
 
26. Which of the following activity can be termed as software piracy?
 
 
 
 
27. __________ is the transmission of voice and multimedia content over Internet Protocol (IP) networks.
 
 
 
 
28. Which of the following is also known as Static Routing?
 
 
 
 
29. Which of the following routing technique is used in distributed operating system?
 
 
 
 
30. Which of the following provides remote login?
 
 
 
 

 

LEAVE A REPLY

Please enter your comment!
Please enter your name here