Sail E0 Webinar

Computer Aptitude

COMPUTER FUNDAMENTAL MCQs

Fundamental And Concepts Of Computer

Total Questions : 1289 | Page 39 of 129 pages
Question 381. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
  1.    More complicated
  2.    More difficult
  3.    Easier
  4.    Slower
 Discuss Question
Answer: Option C. -> Easier
Question 382. Software programs that close potential security breaches in an operating system are known as:
  1.    Security breach fixes
  2.    Refresh patches
  3.    Security repairs
  4.    Security patches
 Discuss Question
Answer: Option D. -> Security patches
Question 383. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
  1.    A virus
  2.    A Trojan Horse
  3.    Cracking
  4.    A denial of service attack.
 Discuss Question
Answer: Option D. -> A denial of service attack.
Question 384. __________ is the measurement of things such as fingerprints and retinal scans used for security access.
  1.    Biometrics
  2.    Biomeasurement
  3.    Computer security
  4.    Smart weapon machinery
 Discuss Question
Answer: Option A. -> Biometrics
Question 385. What is the most common tool used to restrict access to a computer system?
  1.    User log in
  2.    Passwords
  3.    Computer keys
  4.    Access-control software
 Discuss Question
Answer: Option B. -> Passwords
Question 386. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
  1.    Hacker-proof program
  2.    Firewall
  3.    Hacker-resistant server
  4.    Encryption safe wall
 Discuss Question
Answer: Option B. -> Firewall
Question 387. The scrambling of code is known as:
  1.    Encryption
  2.    A firewall
  3.    Scrambling
  4.    Password-proofing
 Discuss Question
Answer: Option A. -> Encryption
Question 388. If you want to secure a message, use a(n):
  1.    Cryptology source
  2.    Encryption key
  3.    Encryption software package
  4.    Cryptosystem
 Discuss Question
Answer: Option D. -> Cryptosystem
Question 389. Instructions and memory address are represented by
  1.    Character code
  2.    Binary codes
  3.    Binary word
  4.    Parity bit
 Discuss Question
Answer: Option B. -> Binary codes
Question 390. Which of the following will happen when data is entered into a memory location?
  1.    It will add to the content of the location.
  2.    It will change the address of the memory location.
  3.    It will erase the previous content.
  4.    It will not be fruitful if there is already some data at the location.
 Discuss Question
Answer: Option C. -> It will erase the previous content.

Latest Videos

Latest Test Papers