Computer Quiz for IBPS | RBI – Set 206

COMPUTER QUIZ – DIFFICULTY LEVEL : MODERATE

1. This technology is used to convert XML into HTML
a) HTML
b) XSL
c) PHP
d) XHTML

Click here to View Answer
Answer b) XSL.

2. Which of the following will not protect you from spam?
a) virus blockers
b) spam blockers
c) filters
d) popup blocker

Click here to View Answer
Answer d) popup blocker.

3. __________ are text files containing OS commands
a) Deleted files
b) Help files
c) Batch files
d) Executable files

Click here to View Answer
Answer c) Batch files.

4. A hacker contacts you by phone or email and attempts to acquire your password is called as _______________
a) phishing
b) spamming
c) hacking
d) spoofing

Click here to View Answer
Answer a) phishing.

5. The rules of a language are called its __________
a) information
b) code
c) structure
d) syntax

Click here to View Answer
Answer d) syntax.

6. The mail server as defined in the text uses the __________ protocol
a) SMTP
b) FTP
c) POP
d) HTTP

Click here to View Answer
Answer c) POP.

7. Which following ISP is free?
a) MSN
b) NetZero
c) CompuServe
d) AOL

Click here to View Answer
Answer b) NetZero.

8. The color of an object is an example of a(n) __________
a) attribute
b) icon
c) folder
d) listing

Click here to View Answer
Answer a) attribute.

9. To create a copy of files in the event of system failure, you create a __________
a) restore file
b) format
c) redundancy
d) backup

Click here to View Answer
Answer d) backup.

10. What type of graphical model is used to define a database?
a) Programming model
b) Data model
c) E-R diagram
d) Flowchart

Click here to View Answer
Answer c) E-R diagram.