Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 12


_________ is the theft of information from a wireless device through a Bluetooth connection.

   A.) White Surfing
   B.) Black Surfing
   C.) Bluesnarfing
   D.) Blue Surfing

Answer: Option 'C'



If you want to copy the entire disk then what command will you use?

   A.) Format
   B.) Chkdsk
   C.) Copy
   D.) Disk Copy

Answer: Option 'D'

Disk Copy


________ is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.

   A.) Metasearch engines
   B.) Sniffer
   C.) Spiders
   D.) Hits

Answer: Option 'C'



A digital multimedia file available on the Internet to be downloaded is known as ________

   A.) Bookmarks
   B.) Podcasts
   C.) Blogs
   D.) All of these

Answer: Option 'B'



In a computer system, ________ is a group of servers and other resources that act like a single system and enable high availability

   A.) Control
   B.) Cluster
   C.) Central
   D.) Backup

Answer: Option 'B'



_________ is a form of intrusion in which the attack is encoded in seemingly innocuous data.

   A.) Virus Attack
   B.) Unauthorized Attack
   C.) Data Driven Attack
   D.) All of these

Answer: Option 'C'

Data Driven Attack


A collection of conceptual tools for describing data, relationships, semantics & constraints is referred as ________

   A.) data model
   B.) ER model
   C.) DBMS
   D.) All of these

Answer: Option 'A'

data model


Every computer connected to an Intranet/Extranet must have a distinct ________

   A.) Firewall
   B.) Domain Name
   C.) IP Address
   D.) Brand name

Answer: Option 'C'

IP Address


_______ is a server that acts as an intermediary for requests from clients seeking resources from other servers.

   A.) dedicated server
   B.) Proxy Server
   C.) virtual server
   D.) Cache Server

Answer: Option 'B'

Proxy Server


_______ is surfing the Web using an inverted palette, with white text on a black body

   A.) White Surfing
   B.) Blue Surfing
   C.) Bluesnarfing
   D.) Black Surfing

Answer: Option 'D'

Black Surfing


A beam of light used to record and retrieve data on optical disk is known as ________

   A.) Polarized Light
   B.) Coloured Light
   C.) Unpolarized Concentric Light
   D.) Laser

Answer: Option 'D'



_________ is a communication technology used by some incoming mail servers.

   A.) TCP
   B.) Telnet
   C.) FTP
   D.) POP

Answer: Option 'D'



_______ is a form of computer security hacking in which corrupt DNS data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect IP address.

   A.) ARP Spoofing
   B.) DNS Spoofing
   C.) IP Spoofing
   D.) All of these

Answer: Option 'B'

DNS Spoofing


Program that automatically analyzes all network traffic, assesses system vulnerabilities is known as _____

   A.) Hardware Vandalism
   B.) Pharming
   C.) Intrusion Detection
   D.) Phishing

Answer: Option 'C'

Intrusion Detection


A cookie that was not created by the website that attempts to access it is known as _____

   A.) First Party Cookie
   B.) Second Party Cookie
   C.) Third Party Cookie
   D.) Intrusion Detection

Answer: Option 'C'

Third Party Cookie


_______ is a realistic and immersive simulation of a three-dimensional environment, created using interactive software and hardware

   A.) Virtual Reality
   B.) Augmented Reality
   C.) Mixed Reality
   D.) All of these

Answer: Option 'A'

Virtual Reality


_______ is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard.

   A.) Soft loading
   B.) Counterfeiting
   C.) Keylogger
   D.) Renting

Answer: Option 'C'



Web site that uses encryption techniques to secure its data is known as _______

   A.) Script Kiddie
   B.) Secure Site
   C.) Data Mining
   D.) Social Engineering

Answer: Option 'B'

Secure Site


__________ is a server that shares hardware and software resources with other operating systems (OS)

   A.) dedicated server
   B.) cache server
   C.) virtual server
   D.) Off-Line Services

Answer: Option 'C'

virtual server


________ is the integration of digital information with the user’s environment in real time.

   A.) Virtual Reality
   B.) Augmented Reality
   C.) Mixed Reality
   D.) All of these

Answer: Option 'B'

Augmented Reality

Computer Quiz Set - 12 Download Pdf

Recent Posts