Latest News :

Flex Slider (Do Not Edit Here!)

Ready, Study & Go.... :)

Friday, 25 April 2014

0 Computer Quiz 161

1. Malicious access is called
a. Unauthorized reading of data
b. Unauthorized modification of data
c. Unauthorized destruction of data
d. All the above

2. When you work on a document on PC, where is the document temporarily stored
a. ROM
b. RAM
c. CPU
d. CD-ROM
e. Flash memory

3. Ctrl, Shift and Alt are called ---- keys
a. Modifier
b. Function
c. Alphanumeric
d. Adjustment
e. Specifier

4. Files deleted from the hard disk are sent to
a. Memory
b. Recycle bin
c. Secondary memory
d. Motherboard

5. IEEE 802.5 standard is used for
a. Ethernet
b. LIC
c. Token bus
d. Token ring

6. In which of the following topologies, and there are devices in a network, each device has n-1 parts for cables
a. Mesh
b. Star
c. Ring
d. Bus

7. A notice on the screen that informs you of a problem is called
a. Frame
b. Window
c. Dialog box
d. Message
e. Monitor

8. VDU is used as a(n)
a. Input device
b. Output device
c. Processing device
d. Storage units
e. Control unit

9. Which of the following items is not used in local area network (LAN)
a. Computer
b. Modem
c. Printer
d. Cable
e. Connector

10. WWW is based on which of the following modes
a. Local server
b. Client server
c. 3-tier
d. 2-tier

ANSWERS

[dropshadowbox align="none" effect="lifted-both" width="500px" height="" background_color="#ffffff" border_width="1" border_color="#dddddd" ]1.(d) 2.(b) 3.(d) 4.( b) 5.(d) 6.(a) 7.(d) 8.(b) 9.(b) 10.(b)[/dropshadowbox]

About The Banking Quiz :

Banking Quiz Loves to Sharing Banking Exams Related Quiz,Updates,News and Announcements.
Previous Page Next Page Home

Comment Policy : We invite you to comment on our posts, as long as they are respectful, to the point and approving. We do not perform pre-moderation of comments. However, in order to keep this site clean and useful, we reserve the right to remove any comment that is not in accordance with our Comment Policy.

0 comments:

Thanks For Comment.