Computer Awareness - SPLessons

Computer Awareness Practice Set 44

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

Computer Awareness Practice Set 44

shape Introduction

Computer Awareness Practice Set 44 presents multiple choice Q & A for basics of computers and applications. Computer Awareness Practice Set 44 article, is exceedingly important for candidates preparing for RRB ALP/Technical Exams/Junior Engineer Recruitment, SSC CGL, UPSC (Civil services exam including IAS) Exams and etc.

shape Quiz

1. Which protocol is used to convert IP addresses to MAC addresses?
    A. IP B. RARP C. In ARP D. ARP

Answer: Option D
2. Which IEEE Standards is used for Wi-Fi system?
    A. 802.11 B. 802.1 C. 802.2 D. 802.3

Answer: Option A
3. Which of the following key is a minimal super key?
    A. Primary key B. Alternate key C. Candidate key D. Secondary key

Answer: Option C
4. Which of the following language defines commands GRANT and REVOKE?
    A. DDL B. DML C. DCL D. DQL

Answer: Option C
5. The abbreviation ISP stands for___
    A. International spy project B. Indian social planning C. Internet solution provider D. Internet service provider

Answer: Option D
1. A barcode is ________ code that represents data with bars of varying widths or heights.
    A. optical B. magnetic C. laser D. read/write

Answer: Option A
2. Virtual memory allocates hard disk space to supplement the immediate, functional memory capacity of what?
    A. ROM B. EPROM C. The registers D. RAM

Answer: Option D
3. Which of the following contains permanent data and gets updated during the processing of transactions?
    A. Operating System File B. Transaction file C. Software File D. Master file

Answer: Option A
4. Which of the following is used to transfer data intended for a peripheral device into a disk so that it can be transmitted to the peripheral device at a more suitable time or in bulk?
    A. Virtual programming B. Multi programming C. Caching D. Spooling

Answer: Option D
5. Decryption & Encryption of data are the responsibility of which layer.
    A. Physical B. Data Link C. Presentation D. Session

Answer: Option C
1. Which of the following is used to open file menu options in current program?
    A. Ctrl+F B. Shift+F C. Alt+F D. Alt+Ctrl+F

Answer: Option C
2. What is the term that refers to an ad hidden inside the software that you downloaded from an internet site?
    A. Spam B. Cookie C. Phish D. Adware

Answer: Option D
3. Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?
    A. Shareware B. Public domain software C. Application software D. Operating system software

Answer: Option D
4. A term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
    A. hacker B. analyst C. instant messenger D. programmer

Answer: Option A
5. Computer language COBOL is appropriate for—
    A. Commercial purpose B. Graphic purpose C. Scientific purpose D. All

Answer: Option A

Computer Awareness - Related Information
IBPS RRB Clerk Computer Awareness Quiz 1
IBPS RRB Clerk Computer Awareness Quiz 2
IBPS RRB Clerk Computer Awareness Quiz 3
Computer Awareness Book for Bank Exams