SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None...

15
SUBSCRIBE NOW MISSION PATWARI 2020 SUBSCRIBE OUR CHANNEL COMPUTER MCQ PART- 9

Transcript of SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None...

Page 1: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

SUBSCRIBE NOW

MISSION PATWARI 2020

SUBSCRIBE OUR CHANNEL

COMPUTER MCQ PART- 9

Page 2: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

1.Which of the following will make high-

level application connections on behalf of

internal hosts?

A. Internet

B. Server

C. Application service provider.

D. Proxy Server

E. Network

Answer

Ans – D. Proxy Server

2.Which of the following is a cyber-attack

intended to redirect a website’s traffic to

another, fake site?

A. Phishing

B. Pharming

C. Piracy

D. Both (1) and (2)

E. None of these

Page 3: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

Answer

Ans – B. Pharming

3.There are several primary categories of

procedures. Which of the following is not a

primary category of procedures?

A. Testing

B. Backup and recovery

C. Firewall development

D. Design

E. None of these

Answer

Ans – C. Firewall development

4.Which of the following is open source

project?

A. Firefox

B. MySQL

C. Open Office

D. All of these

E. None of these

Page 4: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

Answer

Ans – D. All of these

5.Which of the following is an unethical web

practice that keeps users trapped on a

particular site?

A. Hoax

B. Clickjacking

C. Browser Hijacking

D. Mousetrapping

E. None of these

Answer

Ans – B. Clickjacking

SUBSCRIBE NOW

MISSION PATWARI 2020

Page 5: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

6.System Software

A. is a programming language

B. is an optional form of software

C. helps the computer to manage internal

resources

D. controls and manipulates data

E. None of these

Answer

Ans – C. helps the computer to manage

internal resources

7.Which of the following statements is true

about “cookie”

A. Stores the password of the user

B. Stores the commands used by the user.

C. Stores information about the user’s web

activity

D. Stores information about software’s.

E. None of these

Page 6: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

Answer

Ans – C. Stores information about the user’s

web activity

8.Which of the following is not a type of

computer software which can be acquired

by organizations?

A. Off-the-shelf

B. Custom-developed

C. Off-the-shelf with alterations

D. All of these

E. None of these

Answer

Ans – D. All of these

9.Which type of computers uses the 8-bit

code called EBCDIC?

A. Minicomputers

B. Microcomputers

C. Mainframe computers

D. Super Computers

E. None of these

Page 7: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

Answer

Ans – C. Mainframe computers

10.Unauthorized access to restricted

systems or resources is referred as

__________

A. Pharming

B. Penetration

C. Phishing

D. All of these

E. None of these

Answer

Ans – B. Penetration

SUBSCRIBE NOW

MISSION PATWARI 2020

Page 8: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

11.To access a mainframe or

Supercomputer, users often use a ______.

A. Node

B. Desktop

C. Terminal

D. All of these

E. None of these

Answer

Ans – C. Terminal

12.Which of the following refers to the

means by which an OS or any other

programs interacts with the user?

A. Program front-end

B. Programming Interface

C. User Compatibility

D. User Interface

E. None of these

Page 9: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

Answer

Ans – D. User Interface

13.When a hardware component fails, the

computer switches over to a redundant

component without the service to the user

being interrupted is termed as

_____________

A. Payload

B. Failover

C. Fault‐Tolerant

D. All of these

E. None of these

Answer

Ans – B. Failover

SUBSCRIBE NOW

MISSION PATWARI 2020

Page 10: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

14._______ is a network security system,

either hardware or software based that

monitors traffic to or from your network

based on a set of rules.

A. Anti-Spyware

B. Anti-virus

C. Firewall

D. All of these

E. None of these

Answer

Ans – C. Firewall

15.The term _______ designates equipment

that might be added to a computer system

to enhance its functionality.

A. digital device

B. system add-on

C. disk components

D. peripheral device

E. None of these

Page 11: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

Answer

Ans – D. peripheral device

SUBSCRIBE NOW

MISSION PATWARI 2020

16.A computer-intensive problem runs on a

______

A. Server

B. Personal Computer

C. Mainframe Computer

D. Super Computer

E. None of these

Answer

Ans – D. Super Computer

Page 12: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

17.Which of the following is a Peripheral

Component Interconnect (PCI) card used to

generate encryption keys for secure

transactions on e-commerce Web sites?

A. server accelerator card

B. smart card

C. PCMCIA card

D. network interface card

E. intelligent peripheral interface

Answer

Ans – A. server accelerator card

18.In a database record, When the user

changes existing values then it is called

________

A. editing.

B. manipulating.

C. mining

D. re-storing.

E. None of these

Page 13: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

Answer

Ans – A. editing.

19.A computer that can be accessed by

users across a network mainly or

exclusively for storing and supplying data

files is known as ______

A. application server.

B. file server.

C. distributed file system.

D. Web server.

E. None of these

Answer

Ans – B. file server.

Page 14: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

20._________ is computer processing that

enables a user to extract and view data

from different points of view

A. OLTP

B. OLAP

C. OLEP.

D. OLFP.

E. None of these

Answer

Ans – B. OLAP

SUBSCRIBE NOW

MISSION PATWARI 2020

Page 15: SUBSCRIBE NOW MISSION PATWARI 2020 · A. Phishing B. Pharming C. Piracy D. Both (1) and (2) E. None of these . Answer ... Ans – B. Clickjacking SUBSCRIBE NOW MISSION PATWARI 2020

SUBSCRIBE NOW

MISSION PATWARI 2020

SUBSCRIBE OUR CHANNEL

COMPUTER MCQ PART- 9