Tuesday, 18 July 2017

Whats-App Discussion SBI/IBPS PO Computer 18/7/2017(Tuesday)

Q1: Which of the following line spacing is invalid in MS-Word?
A) Multiple
B) Double
C) Triple
D) Single
Answer:(c)Triple
(Please note: Line spacing determines the amount of vertical space between lines of text in a paragraph) 



Q2: When your computer stops working suddenly. it is referred to as a ________.
A. crash
B. die
C. death
D. penalty
E. fault tolerance
Answer:Crash



Q3: Which among the following is a distinctive feature by which a CD-ROM drive is classified in a personal computer?
A. Storage period
B.Memory capacity
C.Software bundle
D.Data transfer rate
E.None of the above
Answer: Data transfer rate



Q4 Which of the following domains is used for profit businesses?
A. .com
B. .edu
C. .net
D. Both (1) and (3)
E. None of these
Answer: .com




Q5. A repeater with multiple parts is called:
A. Hub
B. Switch
C. Router
D. Bridge
E. Gateway
Answer: Hub



Q6: An inverter is also called a ________ gate.
A. NOT
B. OR 
C. AND
D. NAND
Answer: NOT



Q7: A relational database consists of a collection of 
A. Tables
B. Fields
C. Records 
D. Keys
E. ROM 
Answer: Tables



Q8: SCSI is a set of standard electronic interfaces that allow personal computers (PCs) to communicate with peripheral hardware such as disk drives, tape drives. What is the full form of "SCSI" in this context?
Answer: Small Computer Systems Interface



Q9: IDS is a device or software application that monitors a network or systems for malicious activity or policy violations. IDS Stands for______
Answer: Intrusion Detection System



Q10: _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
A) Denial of service
B) Exploits
C) Scams
D) Keylogging
E) Spamming
Answer: Keylogging



Q11: _______ is the part of malware such as worms or viruses which performs the malicious action; deleting data, sending spam or encrypting data.
A) Denial of service
B) Exploits
C) Scams
D) Payload
E) Spamming
Answer: Payload

No comments:

Post a Comment