SSC Multi-Tasking Non-Technical Staff Model Exams in Telugu

AP Grama Sachivalayam 2023 Free Test Series in Telugu (14,523 Vacancies)

Digital Assistant 2023 PART B - 100 Marks All Topics MCQs

Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 12


A digital multimedia file available on the Internet to be downloaded is known as ________

   A.) Bookmarks
   B.) Podcasts
   C.) Blogs
   D.) All of these

Answer: Option 'B'



Web site that uses encryption techniques to secure its data is known as _______

   A.) Script Kiddie
   B.) Secure Site
   C.) Data Mining
   D.) Social Engineering

Answer: Option 'B'

Secure Site


Program that automatically analyzes all network traffic, assesses system vulnerabilities is known as _____

   A.) Hardware Vandalism
   B.) Pharming
   C.) Intrusion Detection
   D.) Phishing

Answer: Option 'C'

Intrusion Detection


_________ is a communication technology used by some incoming mail servers.

   A.) TCP
   B.) Telnet
   C.) FTP
   D.) POP

Answer: Option 'D'



A cookie that was not created by the website that attempts to access it is known as _____

   A.) First Party Cookie
   B.) Second Party Cookie
   C.) Third Party Cookie
   D.) Intrusion Detection

Answer: Option 'C'

Third Party Cookie


_______ is a form of computer security hacking in which corrupt DNS data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect IP address.

   A.) ARP Spoofing
   B.) DNS Spoofing
   C.) IP Spoofing
   D.) All of these

Answer: Option 'B'

DNS Spoofing


_______ is a server that acts as an intermediary for requests from clients seeking resources from other servers.

   A.) dedicated server
   B.) Proxy Server
   C.) virtual server
   D.) Cache Server

Answer: Option 'B'

Proxy Server


________ is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.

   A.) Metasearch engines
   B.) Sniffer
   C.) Spiders
   D.) Hits

Answer: Option 'C'



_______ is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard.

   A.) Soft loading
   B.) Counterfeiting
   C.) Keylogger
   D.) Renting

Answer: Option 'C'



_______ is surfing the Web using an inverted palette, with white text on a black body

   A.) White Surfing
   B.) Blue Surfing
   C.) Bluesnarfing
   D.) Black Surfing

Answer: Option 'D'

Black Surfing


_________ is the theft of information from a wireless device through a Bluetooth connection.

   A.) White Surfing
   B.) Black Surfing
   C.) Bluesnarfing
   D.) Blue Surfing

Answer: Option 'C'



________ is the integration of digital information with the user’s environment in real time.

   A.) Virtual Reality
   B.) Augmented Reality
   C.) Mixed Reality
   D.) All of these

Answer: Option 'B'

Augmented Reality


_______ is a realistic and immersive simulation of a three-dimensional environment, created using interactive software and hardware

   A.) Virtual Reality
   B.) Augmented Reality
   C.) Mixed Reality
   D.) All of these

Answer: Option 'A'

Virtual Reality


__________ is a server that shares hardware and software resources with other operating systems (OS)

   A.) dedicated server
   B.) cache server
   C.) virtual server
   D.) Off-Line Services

Answer: Option 'C'

virtual server


Every computer connected to an Intranet/Extranet must have a distinct ________

   A.) Firewall
   B.) Domain Name
   C.) IP Address
   D.) Brand name

Answer: Option 'C'

IP Address


If you want to copy the entire disk then what command will you use?

   A.) Format
   B.) Chkdsk
   C.) Copy
   D.) Disk Copy

Answer: Option 'D'

Disk Copy


In a computer system, ________ is a group of servers and other resources that act like a single system and enable high availability

   A.) Control
   B.) Cluster
   C.) Central
   D.) Backup

Answer: Option 'B'



_________ is a form of intrusion in which the attack is encoded in seemingly innocuous data.

   A.) Virus Attack
   B.) Unauthorized Attack
   C.) Data Driven Attack
   D.) All of these

Answer: Option 'C'

Data Driven Attack


A beam of light used to record and retrieve data on optical disk is known as ________

   A.) Polarized Light
   B.) Coloured Light
   C.) Unpolarized Concentric Light
   D.) Laser

Answer: Option 'D'



A collection of conceptual tools for describing data, relationships, semantics & constraints is referred as ________

   A.) data model
   B.) ER model
   C.) DBMS
   D.) All of these

Answer: Option 'A'

data model

Computer Quiz Set - 12 Download Pdf

Recent Posts