Computer Awareness Quiz Set 25

Dear candidates for each and every Explanation for given Questions And Answers of Computer Awareness you can check this page and also can practice these Questions through online. So study these Questions and Answers thoroughly.

Computer Awareness Quiz Set 25

1. The unauthorized activities of malicious software is called __________

2. ________ is computer processing that enables a user to extract and view data from different points of view

3. Which of the following source code is highly protected and only available to trusted employees and contractors?

4. Which of the following is the one that runs within a browser and does not need to be pre- installed?

5. Which of the following contains text as well information about the text?

6. Which of the following is not a domain suffix?

7. Which one of the following rebooting commonly occurs when the system of the computer is crashed?

8. In computing, ______________ is an Adaptec-developed programming interface which standardizes communication on a computer bus.

9. How to select one hyperlink after another during a slide presentation?

10. When a hardware component fails, the computer switches over to a redundant component without the service to the user being interrupted is termed as _____________

11. A device for changing the connection on a connector to a different configuration is ______

12. The signal that a computer is waiting for a command from the user is _______

13. Telnet is which of the following based computer protocol?

14. _____is an invalid type of database key

15. Which one of the following is an MS-DOS external command?

16. Which of the following supports the process by dividing a path to peripheral devices?

17. System proposal is prepared in ____ phase of SDLC.

18. The program which interprets commands given by the user?

19. A system call of OS which is used to create a new process is known as?

20. ______ is a primary key of one file that also appears in another file.

21. A _________ is a type of malware that is designed to change your browser’s settings.

22. Which is a special type of stored procedure that is automatically invoked whenever the data in the table is modified?

23. Macros are executed from the ______ menu.

24. Sending large numbers of unwanted e-mail messages to a single recipient or to a group of such recipients is termed as ______

25. The ability to combine name and addresses with a standard document is called _________

26. Which of the following are known as cursor control keys?

27. __________ distributed as freeware, but it requires the user to view advertisements to use the software.

28. A remote control that is used to turn on or off some machine is called__________

29. A program either talk or music that is made available in digital format for automatic download over the Internet is called a _______

30. Decreasing the amount of space required to store data and programs is accomplished by _________



Please enter your comment!
Please enter your name here