Sunday, August 07, 2011

Computer Awareness Question Part-4 For Bank PO/Clerk & CWE


1. A passive threat to computer security is—
(A)Malicious Intent (B)Sabotage (C)Accident Errors(D)Espionage Agents(E)None of these
Ans. (A)  

2. The Secure Electronic Transaction (SET) specification—
(A)is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate
(B)provides private-key encryption of all data that passes between a client and a server
(C)allows users to choose an encryption scheme for the data that passes between a client and a server
(D)uses a public-key encryption to secure credit-card transaction systems (E)None of these
Ans.  (D)  

3. ……………allows wireless mobile devices to access the Internet and its services such as the Web and e-mail—(A)TCP/IP(B)Ethernet(3)WAP(D)Token ring (E)None of these
Ans.  (C)  

4. 'DOS' floppy disk does not have— (A)A Boot Record(B)A File Allocation Table(C)A Root Directory(D)Virtual Memory(E)BIOS  
Ans. (D)
 
5. 'MICR' technology used for clearance of cheques by banks refers to—
(A)Magnetic Ink Character Recognition(B)Magnetic Intelligence Character Recognition(C)Magnetic Information Cable Recognition(D)Magnetic Insurance Cases Recognition(E)None of these
Ans. (A)


6. Which of the following places the common data elements in order from smallest to largest
(A) character, file, record, field, database (B) character, record, field, database, file (C) character, field, record, file, database (D) Bit, byte, character, record, field, file, database, (E) None of these
Ans : (C)

7. All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference. (B) Files can be generated from an application. (C) Files are stored in RAM. (D) Files should be organized in folders. (E) None of these
Ans : (C)

8. Verification of a login name and password is known as: (A) configuration(B) accessibility(C) authentication(D) logging in(E) None of these
Ans : (C)

9. Using Windows Explorer, a plus (+) sign in front of a folder indicates— (A) an open folder.(B) the folder contains subfolders.(C) a text file.(D) a graphics file. (E) None of these
Ans : (B)

10. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear. (B) The CD-ROM stops functioning. (C) The Web browser opens to an unusual home page. (D) Odd messages or images are displayed on the screen. (E) None of these
Ans : (B)

11. Which is NOT a good Web security strategy? 
(A)Restrict access to the Web server; keep a minimum number of ports open(B)Limit the users who can load software, edit or add files.(C)Add demo programs, so users can test system without accessing production data.(D)Remove unnecessary compilers and interpreters.(E)None of these
Ans. (D)  

12. The altering of data so that it is not usable unless the changes are undone is—(A)Biometrics(B)Compression(C)Encryption(D)Ergonomics(E)None of these
Ans. (C)  

13. The word FIP stands for— (A)File Translate Protocol(B)File Transit Protocol(C)File Typing Protocol(D)File Transfer Protocol(E)None of these
Ans. (A)  

14. Voice mail— (A)is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet (B)permits users to converse in real time with each other via the computer while connected to the Internet (C)functions much like an answering machine, allowing callers to leave a voice message for the called party (D)involves using video and computer technology to conduct a meeting between participants at geographically separate locations (E)None of these
Ans. (C)  

15. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is— (A)Bridge(B)Gateway(C)Router(D)Modem(E)All of these
Ans. (B)

16. The memory resident portion of the operating system is called the— (A) registry.(B) API.(C) CMOS.(D) kernel. (E) None of these
Ans : (D)
17. Which of the following is NOT a type of broadband Internet connection? (A) Cable(B) DSL(C) Dial-up(D) Satellite(E) None of these
Ans : (C)
18. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT: (A) files.(B) folders.(D) drives.(D) systems. (E) None of these
Ans : (D)
19. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(A) spyware(B) adware(C) spam(D) malware(E) None of these
Ans : (D)
20. All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
(E) None of these
Ans : (A)

21. How is power supplied to a low-power USB device? (A)Through a power cable(B)From an external power supply(C)Directly from the computer's power supply(D)Through the USB cable(E)None of these
Ans.  (D)  

22. All of the following are basic principles of net works, except—
(A)each computer must have a network card
(B)there must be communications media connecting the network hardware devices
(C)there must be at least one connecting device
(D)each computer must have software that supports the movement of information
(E)None of these
Ans. (B)  

23. The………….data mining technique derives rules from real-world case examples.
(A)Rule discover(B)Signal processing(C)Neural nets(D)Case-based reasoning(E)None of these
Ans. (C)  

24. …………….are used to identify a user who returns to a Website. (A)Cookies(B)Plug-ins(C)Scripts(D)ASPs(E)None of these
Ans. (A)  

25. Which one of the following objects is passed to a JavaBean when one of its properties is set via a JSP action?
(A)Servlet Request(B)Http Servlet Request(C)Servlet Response(D)Http Servlet Response(E)None of these
Ans. (C)  

No comments:

Post a Comment