Q1. Choose the odd one out:
(a) Brute force attack
(b) Virtual Reality
(c) Unethical Phreaker
(d) Keystroke logging
(e) Cross-site Scripting
Q2. The type of threats on the security of a computer system or network are ……………………..
i) Interruption ii) Interception iii) Modification
iv) Creation v) Fabrication
(a) i, ii, iii and iv only
(b) ii, iii, iv and v only
(c) i, ii, iii and v only
(d) iii, iv and v only
(e) All i, ii, iii, iv and v
Q3. State whether true or false:
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
iii) A worm cannot be spread without a human action, (such as running an infected program) to keep it going.
(a) True, False, True
(b) False, True, True
(c) True, True, False
(d) False, False, False
(e) True, True, True
Q4. Which of the following would most likely not be a symptom of a virus?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) The web browser opens to an unusual home page
(d) Odd message or images are displayed on the screen
(e) None of these
Q5. VIRUS stands for___________.
(a) Vital Information Resources Under Siege
(b) Viral Important Record User Searched
(c) Very Interchanged Result Until Source
(d) Very Intelligent Resources Under Search
(e) None of these
Q6. A virus that migrates freely within a large population of unauthorized email user is called a __________.
(a) worm
(b) flame war
(c) macro
(d) plagiarism
(e) None of these
Q7. The first Computer Virus is:
(a) Creeper
(b) Sasser
(c) Blaster
(d) All of the above
(e) None of these
Q8. Which of the following statements is incorrect about the UNIQUE KEY constraint?
(a) Unique key columns do not accept duplicate values.
(b) One table can have only one unique key.
(c) By default, unique key columns accept null values unless the NOT NULL constraint is specified.
(d) The same combinations of columns should not make both unique and primary keys.
(e) None of these
Q9. Which of the following heading elements displays text with the same size as the normal text written in an HTML document?
(a) <H1>
(b) <H2>
(c) <H3>
(d) <H4>
(e) <H5>
Q10. Which of the following HTML tags is a logical style tag?
(a) <B>
(b) <I>
(c) <SMALL>
(d) <ABBR>
(e) None of these
Q11. What does DDoS stand for?
(a) Data Denial-of-Service
(b) Distributed Denial-of-Service
(c) Distributed Data of Server
(d) Distribution of Data Service
(e) None of these
Q12. Which of the following statements is incorrect about a message-switched network?
(a) It reduces traffic congestion.
(b) It allows prioritizing of messages.
(c) It allows broadcasting of messages.
(d) It is an inexpensive network.
(e) It is not compatible with videoconferencing.
Q13. Which of the following statements is false in the context of client/server network?
(a) It is expensive to set up.
(b) It requires a specialized server.
(c) It is a slow network.
(d) It is highly secure.
(e) It is a congested network.
Q14. A pathway inside a computer that carries data between hardware components is called _____________.
(a) carrier signal
(b) data bus
(c) digital signal
(d) analog signal
(e) switching
Q15. Which of the following is related to simplex communication?
(a) Single wire and two-sided communication
(b) Television
(c) Two-wire communication
(d) Walkie-talkie
(e) None of these
- More Computer Questions for IBPS RRB exam
- Computer Awareness Study Notes for NABARD and IBPS RRB exam 2017