Computer Awareness For IBPS RRB MAINS 2019| 18th September 2019: Updates Quiz

Computer Awareness 18th September 2019:Daily Computer Awareness quiz is playing a major role in any competitive exam. so here we are providing the current affairs quiz on daily basis for Bank, SSC & Railway Exams you can also read previous quizzes from Here

Q1. What does the SMTP in an SMTP server stand for?

(a) Simple Mail Transfer Protocol

(b) Serve Message Text Process

(c) Short Messaging Text Process

(d) Short Messaging Transfer Protocol

(e) Simple Messaging Text Process

Answer & Explanation
Ans.1.(a)

Exp. SMTP stands for Simple Mail Transfer Protocol

Q2. Which among the following was the first graphical web browser?

(a) Mosaic

(b) WAIS

(c) CERN

(d) Gopher

(e) None of the above

Answer & Explanation
Ans.2.(a)

Exp. NCSA Mosaic, or simply Mosaic, is a discontinued early web browser. It has been credited with popularizing the World Wide Web. It was the first graphical web browser.

Q3. What is JDBC?

(a) Utility Software

(b) Application Software

(c) Application Programming Interface (API)

(d) Programming Language

(e) None of the above

Answer & Explanation
Ans.3.(c)

Exp. Java Database Connectivity (JDBC) is an application programming interface (API) for the programming language Java, which defines how a client may access a database. It is part of the Java Standard Edition platform, from Oracle Corporation.

Q4. Which of the following is any malicious computer program which is used to hack into a computer by misleading users of its true intent?

(a) Worm

(b) Spyware

(C) Trojan horse

(d) Keylogger

(e) VGA file

Answer & Explanation
Ans.4.(c)

Exp. In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent.

Q5. Which protocol is used to obtain an IP and other network configuration information from a server on local network?

(a) Transmission Control Protocol

(b) User Datagram Protocol

(c) Code division multiple access

(d) Dynamic Host Configuration Protocol

(e) None of the above

Answer & Explanation
Ans.5.(d)

Exp. Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway.

Q6. Name the first widespread computer virus for MS-DOS?

(a) Brain

(b) Handshake

(c) Code Red

(d) Melissa

(e) Sasser

Answer & Explanation
Ans.6.(a)

Exp. Brain is the industry standard name for a computer virus that was released in its first form in January 1986, and is considered to be the first computer virus for MS-DOS.

Q7. A string of eight 0s and 1s is called a _______.

(a) megabyte

(b) byte

(c) kilobyte

(d) gigabyte

(e) bit

Answer & Explanation
Ans.7.(b)

Exp. A byte = 8 bits and a bit is either 0 or 1

Q8. Name the input device from the given options, that cannot be used to work in MS Office?

(a) Scanner

(b) Mouse

(c) Keyboard

(d) Joy stick

(e) All of the above

Answer & Explanation
Ans.8.(d)

Exp. Joystick is used for gaming purpose and MS Word is a text editing application.

Q9. Which type of virus is generally scripted into common application programs like Excel and Word to infect the other documents and spreads to the other parts when the application is running.?

(a) Macro Viruses

(b) File infector virus

(c) Resident Viruses

(d) Boot virus

(e) Worms

Answer & Explanation
Ans.9.(a)

Exp.A macro virus is a computer virus that “infects” a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it.

Q10. Which of the following scrambles a message by applying a secret code?

(a) Audits

(b) Encryption

(c) UPS

(d) Firewalls

(e) Encapsulation

Answer & Explanation
Ans.10.(b)

Exp. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.

You can also Read this:

IBPS PO 2019 Preparation Kit PDF

I challenge you will get Best Content in Our PDFs with Detail solutions and Latest Pattern

Memory Based Puzzle E-book | 2016-19 Exams Covered

Get PDF here

Caselet Data Interpretation 200 Questions

Get PDF here
Puzzle & Seating Arrangement E-Book for BANK PO MAINS (Vol-1)

Get PDF here

ARITHMETIC DATA INTERPRETATION 2019 E-book

Get PDF here
The Banking Awareness 500 MCQs E-book| Bilingual (Hindi + English)

Get PDF here

High Level DATA INTERPRETATION Practice E-BOOK

Get PDF here

 

3

Leave a Reply