1.
Which
among the following is a correct definition of "Digital Divide"?
a.
gap between people
having access to mobile and internet access
b.
gap between people having access to internet /
IT and no internet / IT
c.
gap between people
having access to broadband and narrowband internet
d.
gap between people
having access to internet banking and normal banking
2.
Now
a days Vishing has become a criminal practice of using social engineering over
which of the following?
b.
Mobile Phones
c.
E-mail
d.
Cyber
cafes
3.
What
is the fullform of W3C?
a.
World Wide Web Consortium
b.
World Wide Web Company
c.
World Wide Web Center
d.
World Wide Web Command
4.
Which
among the following is used for removing a software bug / defect which is
available for free of cost from the software provider?
a.
Version
b.
Update
c.
Help
d.
Patch
5.
In
the MICR Code Line Structure what do represent the first three digits of Sort
field number consisting of nine digits?
a.
City
b.
Bank
c.
Branch
d.
Account Type
6.
Most
of the internet banking sites provide which of the following feature to reduce
the risk of keystroke logging for the password entry?
a.
Virtual keyboard
b.
Finger Touching
c.
Touchscreen
d.
Shape Writer
7.
ADSL
data communications technology uses which of the following for faster data
transmission?
a.
Voiceband
modem
b.
Wireless Modem
c.
Copper telephone Lines
d.
Sockets
8.
What
is the purpose of keeping electronic devices such as computers, televisions,
and remote controlled devices on Sleep mode?
a.
Reduce Power consumption
b.
Back UP
c.
To write contents of RAM
to hard disc
d. To improve download speed
9.
Which command devides
the surface of the blank disk into sectors and assign a unique address to each
one
a. Ver
b. Format
c. Fat
d. Chkdsk
10.
If you need to duplicate
the entire disk, which command will you use?
a. Copy
b. Diskcopy
c. Chkdsk
d. Format
11.
A ..............
sometimes called a boot sector virus, executes when a computer boots up because
it resides in the boot sector of a floppy disk or the master boot record of a
hard disk
a. system
virus
b. Trojan horse virus
c. file virus
d. None
of these
12.
A result of a computer
virus can not lead to ......
a. Disk Crash
b. Mother
Board Crash
c. Corruption o f program
d. Deletion of files
13.
Every computer connected
to an intranet or extranet must have a distinct .......
a. firewall
b. proxy
server
c. IP address
d. domain name
14.
Programming language
built into user programs such as Word and Excel are known as ......
a. 4GLs
b. Macro languages
c. object-oriented languages
d. visual
programming languages
15.
Firewalls are used to
protect against .......
a. unauthorized
Attacks
b. virus Attacks
c. Data Driven Attacks
d. Fire Attacks
16.
Which of the following
extensions suggest that the file is a backup copy
a. Bak
b. Bas
c. Com
d. Txt
17.
Computer programs are
written in a high - level programming language; however, the human readable
version of a program is called .......
a. cache
b. instruction set
c. source
code
d. word size
18.
The software tools that
enable a user to interact with a computer for specific purposes are known as
.......
a. Hardware
b. Networked Software
c. Shareware
d. Applications
19.
.............. proessing
is used when a large mail-order company accumulates orders and processes them
together in one large set
a. Batch
b. Online
c. Real-time
d. Group
20.
When a file contains
instructions that can be carried out by the computer, it is often called a(n)
...... file
a. data
b. information
c. executable
d. application
No comments:
Post a Comment