Computer Quiz – 77

Dear Aspirants,

Welcome to D2G’s Computer Quiz. In upcoming clerk exam Computer section too plays a major role. It carries equal marks(40) similar to other sections. So do concentrate on this also.

1. Usually downloaded into folders that hold temporary internet files,______are written to your computer’s hard disk by some of the websites you visit?
a) anonymous files
b) behaviour files
c) banner ads
d) cookies
e) None of these

Click here to View Answer
Answer d) cookies

2. A packet sniffer is?
a) a prepared application that takes advantage of a known weakness.
b) a tool used to quickly check computers on a network for known weaknesses.
c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the
computer or over the network.
d) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Click here to View Answer
Answer c) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.

3. These hacker breaks security for altruistic or at least non-malicious reasons?
a) White hat
b) Grey hat
c) Blue hat
d) None of these

Click here to View Answer
Answer a) White hat

4. This hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted?
a) White hat
b) Grey hat
c) Blue hat
d) None of these

Click here to View Answer
Answer b) Grey hat

5. A USB communication device that supports data encryption for secure wireless communication for notebook users is called?
a) USB wireless network adapter
b) wireless switch
c) wireless hub
d) router
e) None of these

Click here to View Answer
Answer a) USB wireless network adapter

6. A(n)_______language reflects the way people think mathematically.
a) cross-platform programming
b) 3GL business programming
c) event driven programming
d) functional
e) None of these

Click here to View Answer
Answer d) functional

7. When entering text within a document, the Enter key is normally pressed at the end of every?
a) Line
b) Sentence
c) Paragraph
d) Word
e) None of these

Click here to View Answer
Answer b) Sentence

8. Which of the following is the first step in sizing a window?
a) Point to the title bar
b) Pull down the view menu to display the toolbar
c) Point to any corner or border
d) Pull down the view menu and change to large icons
e) None of these

Click here to View Answer
Answer a) Point to the title bar

9. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called?
a) Trojan horses
b) Keylogger
c) Worm
d) Cracker

Click here to View Answer
Answer a) Trojan horses

10. These are program designed as to seem to being or be doing one thing, but actually being or doing another?
a) Trojan horses
b) Keylogger
c) Worm
d) Cracker

Click here to View Answer
Answer a) Trojan horses