Computer Awareness Quiz Set 24

Dear aspirants who are preparing for all competitive examinations they can chek out the Computer Awareness Quiz in this set no. 24. So candidates can practice these Questions And Answers which are given with an explanation.

Computer Awareness Quiz Set 24

1. When data changes in multiple lists and all lists are not updated this causes _____
 
 
 
 

2. Press _________ to move the insertion point to the Address box, or to highlight the URL in the Address box.
 
 
 
 
 

3. By default, your documents print in ________ mode
 
 
 
 

4. Companies use ______ vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves.
 
 
 
 

5. The path of the creation of an executable program is _______
 
 
 
 

6. When a website automatically retrieves information from another website is known as ________
 
 
 
 

7. Which of the following is the delivery of information through the internet that is initiated by the server rather than by Client?
 
 
 
 

8. _________ video is content sent in compressed form over the Internet and displayed by the viewer in real time.
 
 
 
 

9. Storing same data in many places is called _______
 
 
 
 

10. _________ is a method of providing website content such as news stories or software updates.
 
 
 
 

11. Which of the following will make high-level application connections on behalf of internal hosts?
 
 
 
 

12. Which type of computers uses the 8-bit code called EBCDIC?
 
 
 
 

13. Which of the following is an unethical web practice that keeps users trapped on a particular site?
 
 
 
 

14. Unauthorized access to restricted systems or resources is referred as __________
 
 
 
 

15. System Software
 
 
 
 

16. Which of the following is not a type of computer software which can be acquired by organizations?
 
 
 
 

17. Which of the following is open source project?
 
 
 
 

18. There are several primary categories of procedures. Which of the following is not a primary category of procedures?
 
 
 
 

19. Which of the following is a cyber attack intended to redirect a website’s traffic to another, fake site?
 
 
 
 

20. Which of the following statements is true about “cookie”
 
 
 
 

21. Microsoft’s Access and Corel’s Paradox are both examples of which type of software?
 
 
 
 

22. The _______ icon and bold message heading indicating that the e-mail message has not been read.e-mail message has not been read.e-mail message has not been read.e-mail message has not been read.
 
 
 
 

23. In Excel, what two keys must be pressed to enter multiple lines of text in one cell?
 
 
 
 

24. Which of the following is a method of transferring information between digital devices, especially audio and video equipment?
 
 
 
 

25. Which of the following is a specification that combines video and audio into a single digital interface?
 
 
 
 

26. _________ is a method of providing website content such as news stories or software updates.
 
 
 
 

27. _______ is a way to quickly access a favorite website by saving it in your browser
 
 
 
 

28. Which of the following is used to move your paragraph closer to margin?
 
 
 
 

29. ________ is the masking of server resources, including the number and identity of individual physical servers, processors, and operating systems, from server users.
 
 
 
 

30. Which of the following is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites?
 
 
 
 


 

LEAVE A REPLY

Please enter your comment!
Please enter your name here