Computer for IBPS RRB PO Mains 2021 Exam set – 1

  1. A peer-to-peer LAN is an appropriate network architecture for_____?
    Wi-fi
    LAN connection
    Portable connection
    Home network
    None of these
    Option D

     

  2. Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains damaging code.
    Bots
    Viruses
    Worm
    Adware
    Trojans
    Option E
    You receive Trojan horses though emails, infected webpages, instant message, or downloading services like games, movies, and apps. True Trojan horses are not technically viruses, since they do not replicate; however, many viruses and worms use Trojan horse tactics to initially infiltrate a system.
    The best way to stay away from Trojans is by making sure you install software from trusted sources.

     

  3. Which of the following term is used for assurance of the accuracy and consistency of data over its entire life-cycle?
    Data Integrity
    Data Mobility
    Data Quality
    Data Availability
    Data Consistency
    Option A
    Data integrity is the maintenance of, and the assurance of the accuracy and consistency of data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.

     

  4. Which of the following technology was used in Second Generation of Computer?
    LSI
    VLSI
    Transistors
    Electronic valves
    SSI
    Option C

     

  5. To justify text over the height of paper, which option will be chosen?
    Page Setup from File menu
    From formatting toolbar
    Font from Format menu
    Paragraph from Format menu
    None of the Above
    Option A

     

  6. A pop-up window with a warning is known as ______?
    Drop Box
    Alert Box
    Deadbox
    Switch Box
    Tool Box
    Option B

     

  7. A Proxy server is used for which of the following?
    To provide TCP/IP
    To process client requests for database access
    To process client requests for web pages
    To provide security against unauthorized users
    None of the Above
    Option C
    In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.

     

  8. A _____ is a software-based security token that generates a single-use login PIN?
    Live ware
    Live token
    Soft token
    Auto token
    Hard token
    Option C
    A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display.

     

  9. In computing, a _______ is an unexpected termination of a process?
    Task
    Hold
    Event
    Crash
    Fixation
    Option D
    Crashes can happen to individual applications as well as the operating system itself.

     

  10. SAP is an identifying label for network endpoints used in Open Systems Interconnection (OSI) networking. what is meaning of ‘SAP’?
    Smart Access Point
    Smart At Point
    Service At Point
    Service Access Permission
    Service Access Point
    Option E
    A Service Access Point (SAP) is an identifying label for network endpoints used in Open Systems Interconnection (OSI) networking.

     

Related posts