Quantcast
Channel: Exam Pundit - IBPS PO | Clerk | SBI PO | Insurance Exams | SSC Exams | Current Affairs
Viewing all articles
Browse latest Browse all 3589

Computer Knowledge Quiz for upcoming IBPS Exams - Set 30

$
0
0



Hello and welcome to exampundit. Here is a set of Computer Knowledge Quiz for upcoming IBPS Exams.

1. Which is NOT a good Web security strategy?
1) Restrict access to the Web server; keep a minimum number of ports open.
2) Limit the users who can load software, edit or add files.
3) Add demo programs, so users can test system without accessing production data.
4) Remove unnecessary compilers and interpreters.
5) None of these


2. The altering of data so that it is not usable unless the changes are undone is called
1) Biometrics
2) Compression
3) Encryption
4) Ergonomics
5) None of these


3. The word FTP stands for
1) File Translate Protocol
2) File Transit Protocol
3) File Typing Protocol
4) File Transfer Protocol
5) None of these


4. Voice mail
1) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet
2) permits users to converse in real time with each other via the computer while connected to the Internet
3) functions much like an answering machine, allowing callers to leave a voice message for the called party
4) involves using video and computer technology to conduct a meeting between participants at geographically separate locations
5) None of these


5. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is
1) Bridge
2) Gateway
3) Router
4) Modem
5) All of these


6. Which of the following is a general-purpose programming language designed by Sun Microsystems and well suited for use on the Web?
1) VB Script
2) Java Script
3) CSS
4) Java
5) None of these


7. This ________ tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
1) Client
2) Applications/Web server
3) Enterprise server
4) DBA
5) None of these


8. RSA is
1) Symmetric Cryptosystem
2) Asymmetric Cryptosystem
3) Block Cypher
4) Digital Signature
5) None of these


9. A DVD-RAM is similar to a ________ except it has storage capacities up to 5.2 GB.
1) CD-R
2) floppy disk
3) CD-RW
4) hard disk
5) None of these


10. When you are selecting a mouse for a particular computer system, what is the most important consideration?
1) The type of drivers that come with the mouse
2) The length of the mouse cord
3) The type of connector the mouse is equipped with
4) The number of buttons the mouse has
5) None of these

 
















Sponsored




Regards



Team ExamPundit


Viewing all articles
Browse latest Browse all 3589

Trending Articles