Computer knowledge Quizzes Top 50 Questions and Answers For IBPS RRB Clerk/PO Mains 2022 - 18th October

1.

Which type of virus is hard to detect as it changes its own code to evade matching a virus signature?

   A.) Boot sector virus
   B.) Polymorphic virus
   C.) Macro virus
   D.) Stealthy virus

Answer: Option 'B'

Polymorphic virus

A polymorphic virus is a complicated computer virus that affects data types and functions. It is a self-encrypted virus designed to avoid detection by a scanner. Upon infection, the polymorphic virus duplicates itself by creating usable, albeit slightly modified, copies of itself.

2.

_________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.

   A.) Denial of service
   B.) Exploits
   C.) Keylogging
   D.) Spamming

Answer: Option 'C'

Keylogging

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.

3.

Which is the Software that translates and executes a high level language program one line at a time?

   A.) Compiler
   B.) Interpreter
   C.) Assembler
   D.) Executor

Answer: Option 'B'

Interpreter

4.

Computer programs are written in a high level programming language; however, the human-readable version of a program is called ____________.

   A.) cache
   B.) Instruction set
   C.) source code
   D.) word size

Answer: Option 'C'

source code

5.

Errors in a computer program are referred to as

   A.) Item overlooked
   B.) Mistakes
   C.) Bugs
   D.) Crash

Answer: Option 'C'

Bugs

6.

Computer language COBOL is appropriate for—

   A.) Commercial purpose
   B.) Graphic purpose
   C.) Scientific purpose
   D.) All

Answer: Option 'A'

Commercial purpose

COBOL (Common Business Oriented Language) is a programming language that reads like regular English and is often used for business and administrative purposes.

7.

Which of the following is not a programming language ?

   A.) Pascal
   B.) Microsoft Office
   C.) C++
   D.) Java

Answer: Option 'B'

Microsoft Office

8.

What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits?

   A.) Backdoors
   B.) Key-logger
   C.) Malware
   D.) Spyware

Answer: Option 'D'

Spyware

Spyware is malicious computer program that does exactly what its name implies-i.e., spies on you. After downloading itself onto your computer either through an email you opened, website you visited or a program you downloaded, spyware scans your hard drive for personal information and your internet browsing habits.

9.

What is Spyware?

   A.) Spyware is a type of malware installed on computers that collects information about users without their knowledge
   B.) The presence of spyware is typically hidden from the user and can be difficult to detect
   C.) Spyware programs lurk on your computer to steal important information, like your passwords and logins and other personal identification information and then send it off to someone else
   D.) All of the above

Answer: Option 'D'

All of the above

10.

Which malicious program cannot do anything until actions are taken to activate the file attached by the malware?

   A.) Trojan Horse
   B.) Worm
   C.) Virus
   D.) Bots

Answer: Option 'C'

Virus

11.

Which TCP/IP transport layer protocol is faster?

   A.) ICMP-because it is connection-oriented
   B.) TCP-because it is connected-oriented
   C.) UDP-because it is connection-less
   D.) IP-because it is connection-less

Answer: Option 'C'

UDP-because it is connection-less

12.

UDP and TCP are categorized under the ___layer of the OSI model.

   A.) Data link
   B.) Application
   C.) Transport
   D.) Session

Answer: Option 'C'

Transport

The transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet Protocol Suite and the Open Systems Interconnection (OSI). The protocols of the layer provide host-to-host communication services for applications.

13.

DHCP is the abbreviation of _________.

   A.) Dynamic Host Control Protocol
   B.) Dynamic Host Configuration Protocol
   C.) Dynamic Hyper Configuration Protocol
   D.) Dynamic Hyper Control Protocol

Answer: Option 'B'

Dynamic Host Configuration Protocol

14.

In which generation did multi-programming start?

   A.) First generation
   B.) Second generation
   C.) Third generation
   D.) Fourth generation

Answer: Option 'C'

Third generation

Multi-programming started in third generation.

15.

Which of the following is the type of software that has self-replicating software that causes damage to files and system?

   A.) Viruses
   B.) Trojan horses
   C.) Bots
   D.) Worms

Answer: Option 'D'

Worms

A worm is a type of virus that spreads through your computer by creating duplicates of itself on other drives, systems and networks.

16.

A simple automated program that scans the web for specific data and insert into a designated database is ________.

   A.) Web mining
   B.) Web database integration
   C.) Web crawler
   D.) Web scanning

Answer: Option 'C'

Web crawler

A web crawler (also known as a web spider or web robot) is a program or automated script which browses the World Wide Web in a methodical, automated manner. This process is called Web crawling or spidering.

17.

Multi-user systems provide cost savings for small business as they use a single processing unit to link several ______.

   A.) Personal computers
   B.) Workstations
   C.) Dumb terminals
   D.) Mainframe

Answer: Option 'C'

Dumb terminals

A dumb terminal is a computer terminal that consists mostly of just a display monitor and a keyboard (and perhaps a mouse as well). It has no internal CPU (central processing unit), and thus has little or no processing power.

18.

Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?

   A.) Toggle
   B.) Cold booting
   C.) Logging off
   D.) Warm booting

Answer: Option 'B'

Cold booting

Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.

19.

__________are ‘attempts by individuals to obtain confidential information from you by falsifying their identity.

   A.) Phishing
   B.) Computer viruses
   C.) Spyware scams
   D.) Viruses

Answer: Option 'A'

phishing is a type of Internet fraud scam where the scammer sends email messages that appear to be from financial institutions or credit card companies that try to trick recipients into giving private information (i.e., username, password, account number, etc.).

20.

What type of web technology creates an online community where people can make statements and others can read and respond to those statements?

   A.) I-Journal
   B.) Podcast
   C.) ASP
   D.) Blog

Answer: Option 'D'

A blog is a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.


Computer knowledge Quizzes Top 50 Questions and Answers For IBPS RRB Clerk/PO Mains 2022 - 18th October Download Pdf

Recent Posts