Computer for IBPS RRB PO Mains 2021 Exam set – 1

  1. A peer-to-peer LAN is an appropriate network architecture for_____?
    Wi-fi
    LAN connection
    Portable connection
    Home network
    None of these
    Option D

     

  2. Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains damaging code.
    Bots
    Viruses
    Worm
    Adware
    Trojans
    Option E
    You receive Trojan horses though emails, infected webpages, instant message, or downloading services like games, movies, and apps. True Trojan horses are not technically viruses, since they do not replicate; however, many viruses and worms use Trojan horse tactics to initially infiltrate a system.
    The best way to stay away from Trojans is by making sure you install software from trusted sources.

     

  3. Which of the following term is used for assurance of the accuracy and consistency of data over its entire life-cycle?
    Data Integrity
    Data Mobility
    Data Quality
    Data Availability
    Data Consistency
    Option A
    Data integrity is the maintenance of, and the assurance of the accuracy and consistency of data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.

     

  4. Which of the following technology was used in Second Generation of Computer?
    LSI
    VLSI
    Transistors
    Electronic valves
    SSI
    Option C

     

  5. To justify text over the height of paper, which option will be chosen?
    Page Setup from File menu
    From formatting toolbar
    Font from Format menu
    Paragraph from Format menu
    None of the Above
    Option A

     

  6. A pop-up window with a warning is known as ______?
    Drop Box
    Alert Box
    Deadbox
    Switch Box
    Tool Box
    Option B

     

  7. A Proxy server is used for which of the following?
    To provide TCP/IP
    To process client requests for database access
    To process client requests for web pages
    To provide security against unauthorized users
    None of the Above
    Option C
    In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.

     

  8. A _____ is a software-based security token that generates a single-use login PIN?
    Live ware
    Live token
    Soft token
    Auto token
    Hard token
    Option C
    A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display.

     

  9. In computing, a _______ is an unexpected termination of a process?
    Task
    Hold
    Event
    Crash
    Fixation
    Option D
    Crashes can happen to individual applications as well as the operating system itself.

     

  10. SAP is an identifying label for network endpoints used in Open Systems Interconnection (OSI) networking. what is meaning of ‘SAP’?
    Smart Access Point
    Smart At Point
    Service At Point
    Service Access Permission
    Service Access Point
    Option E
    A Service Access Point (SAP) is an identifying label for network endpoints used in Open Systems Interconnection (OSI) networking.

     

Related posts

7 Thoughts to “Computer for IBPS RRB PO Mains 2021 Exam set – 1”

  1. What?s Taking place i am new to this, I stumbled upon this I’ve found It absolutely helpful and it has aided me out loads. I’m hoping to contribute & help different customers like its aided me. Good job.

  2. Hello There. I found your blog using msn. This is an extremely well written article. I?ll make sure to bookmark it and come back to read more of your useful information. Thanks for the post. I?ll definitely comeback.

  3. The very crux of your writing while appearing reasonable originally, did not really settle properly with me after some time. Somewhere throughout the sentences you were able to make me a believer unfortunately just for a while. I still have got a problem with your leaps in logic and you might do well to fill in those gaps. If you can accomplish that, I could surely end up being impressed.

  4. whoah this blog is great i love reading your posts. Keep up the great work! You know, a lot of people are searching around for this information, you could help them greatly.

  5. I have taken notice that in unwanted cameras, specialized devices help to {focus|concentrate|maintain focus|target|a**** automatically. Those sensors with some surveillance cameras change in contrast, while others start using a beam of infra-red (IR) light, specifically in low lumination. Higher standards cameras from time to time use a combination of both programs and may have Face Priority AF where the digital camera can ‘See’ some sort of face and focus only in that. Thank you for sharing your ideas on this site.

  6. A few things i have constantly told people is that when looking for a good on the net electronics shop, there are a few aspects that you have to remember to consider. First and foremost, you would like to make sure to get a reputable as well as reliable shop that has enjoyed great critiques and classification from other people and business sector experts. This will ensure that you are getting through with a well-known store that provides good service and help to their patrons. Thank you for sharing your opinions on this blog site.

  7. Wow, marvelous blog layout! How long have you been blogging for? you made blogging look easy. The overall look of your web site is wonderful, as well as the content!

Leave a Comment