Basic Computer Knowledge Fundamentals Questions and Answers MCQs Set - 12

1.

_______ is a realistic and immersive simulation of a three-dimensional environment, created using interactive software and hardware

   A.) Virtual Reality
   B.) Augmented Reality
   C.) Mixed Reality
   D.) All of these

Answer: Option 'A'

Virtual Reality

2.

_______ is surfing the Web using an inverted palette, with white text on a black body

   A.) White Surfing
   B.) Blue Surfing
   C.) Bluesnarfing
   D.) Black Surfing

Answer: Option 'D'

Black Surfing

3.

_________ is a communication technology used by some incoming mail servers.

   A.) TCP
   B.) Telnet
   C.) FTP
   D.) POP

Answer: Option 'D'

POP

4.

_______ is a server that acts as an intermediary for requests from clients seeking resources from other servers.

   A.) dedicated server
   B.) Proxy Server
   C.) virtual server
   D.) Cache Server

Answer: Option 'B'

Proxy Server

5.

If you want to copy the entire disk then what command will you use?

   A.) Format
   B.) Chkdsk
   C.) Copy
   D.) Disk Copy

Answer: Option 'D'

Disk Copy

6.

__________ is a server that shares hardware and software resources with other operating systems (OS)

   A.) dedicated server
   B.) cache server
   C.) virtual server
   D.) Off-Line Services

Answer: Option 'C'

virtual server

7.

In a computer system, ________ is a group of servers and other resources that act like a single system and enable high availability

   A.) Control
   B.) Cluster
   C.) Central
   D.) Backup

Answer: Option 'B'

Cluster

8.

_______ is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard.

   A.) Soft loading
   B.) Counterfeiting
   C.) Keylogger
   D.) Renting

Answer: Option 'C'

Keylogger

9.

A beam of light used to record and retrieve data on optical disk is known as ________

   A.) Polarized Light
   B.) Coloured Light
   C.) Unpolarized Concentric Light
   D.) Laser

Answer: Option 'D'

Laser

10.

A collection of conceptual tools for describing data, relationships, semantics & constraints is referred as ________

   A.) data model
   B.) ER model
   C.) DBMS
   D.) All of these

Answer: Option 'A'

data model

11.

A cookie that was not created by the website that attempts to access it is known as _____

   A.) First Party Cookie
   B.) Second Party Cookie
   C.) Third Party Cookie
   D.) Intrusion Detection

Answer: Option 'C'

Third Party Cookie

12.

A digital multimedia file available on the Internet to be downloaded is known as ________

   A.) Bookmarks
   B.) Podcasts
   C.) Blogs
   D.) All of these

Answer: Option 'B'

Podcasts

13.

Every computer connected to an Intranet/Extranet must have a distinct ________

   A.) Firewall
   B.) Domain Name
   C.) IP Address
   D.) Brand name

Answer: Option 'C'

IP Address

14.

_________ is the theft of information from a wireless device through a Bluetooth connection.

   A.) White Surfing
   B.) Black Surfing
   C.) Bluesnarfing
   D.) Blue Surfing

Answer: Option 'C'

Bluesnarfing

15.

Program that automatically analyzes all network traffic, assesses system vulnerabilities is known as _____

   A.) Hardware Vandalism
   B.) Pharming
   C.) Intrusion Detection
   D.) Phishing

Answer: Option 'C'

Intrusion Detection

Computer Quiz Set - 12 Download Pdf

Recent Posts