Computer Awareness Quiz Set 25

Dear candidates for each and every Explanation for given Questions And Answers of Computer Awareness you can check this page and also can practice these Questions through online. So study these Questions and Answers thoroughly.

Computer Awareness Quiz Set 25

1. The unauthorized activities of malicious software is called __________
 
 
 
 

2. ________ is computer processing that enables a user to extract and view data from different points of view
 
 
 
 

3. Which of the following source code is highly protected and only available to trusted employees and contractors?
 
 
 
 

4. Which of the following is the one that runs within a browser and does not need to be pre- installed?
 
 
 
 

5. Which of the following contains text as well information about the text?
 
 
 
 

6. Which of the following is not a domain suffix?
 
 
 
 

7. Which one of the following rebooting commonly occurs when the system of the computer is crashed?
 
 
 
 

8. In computing, ______________ is an Adaptec-developed programming interface which standardizes communication on a computer bus.
 
 
 
 

9. How to select one hyperlink after another during a slide presentation?
 
 
 
 
 

10. When a hardware component fails, the computer switches over to a redundant component without the service to the user being interrupted is termed as _____________
 
 
 
 

11. A device for changing the connection on a connector to a different configuration is ______
 
 
 
 

12. The signal that a computer is waiting for a command from the user is _______
 
 
 
 

13. Telnet is which of the following based computer protocol?
 
 
 
 

14. _____is an invalid type of database key
 
 
 
 

15. Which one of the following is an MS-DOS external command?
 
 
 
 

16. Which of the following supports the process by dividing a path to peripheral devices?
 
 
 
 

17. System proposal is prepared in ____ phase of SDLC.
 
 
 
 

18. The program which interprets commands given by the user?
 
 
 
 

19. A system call of OS which is used to create a new process is known as?
 
 
 
 

20. ______ is a primary key of one file that also appears in another file.
 
 
 
 

21. A _________ is a type of malware that is designed to change your browser’s settings.
 
 
 
 

22. Which is a special type of stored procedure that is automatically invoked whenever the data in the table is modified?
 
 
 
 

23. Macros are executed from the ______ menu.
 
 
 
 

24. Sending large numbers of unwanted e-mail messages to a single recipient or to a group of such recipients is termed as ______
 
 
 
 

25. The ability to combine name and addresses with a standard document is called _________
 
 
 
 

26. Which of the following are known as cursor control keys?
 
 
 
 

27. __________ distributed as freeware, but it requires the user to view advertisements to use the software.
 
 
 
 

28. A remote control that is used to turn on or off some machine is called__________
 
 
 
 

29. A program either talk or music that is made available in digital format for automatic download over the Internet is called a _______
 
 
 
 

30. Decreasing the amount of space required to store data and programs is accomplished by _________
 
 
 
 


 

LEAVE A REPLY

Please enter your comment!
Please enter your name here