Computer Awareness Quiz for Upcoming Exams (Part 39)

Published on Tuesday, February 09, 2016
computer awareness quiz
1. Which of the following can't spread Virus ?
     (a) An e-mail with attachment
     (b) A plain text mail

     (c) Downloading files over the web
     (d) A per drive use
     (e) None of these

2. Which of the following is not a virus ?
     (a) Blaster
     (b) Creeper
     (c) Mellisa
     (d) Kaspersky
     (e) none of these

3. Unwanted repetitious messages, such as unsolicited bulk e-mails is known as.
    (a) Spam
    (b) Trash
    (c) Calibri
    (d) Courier
    (e) None of these

4. Le-Hard virus is effect of a ________________.
    (b) Hardware
    (c) Software
    (d) Application
    (e) None of these

5. Which of the following is not a popular Anti-Virus software ?
     (a) Kaspersky
     (b) Symantec
     (c) Trend Micro
     (d) Blaster
     (e) None of these

6. A result of a computer Virus can not lead to.
    (a) Disk Crash
    (b) Mother Board crash
    (c) Corruption
    (d) Deletion of files
    (e) None of these

7. All of the following are example of real security and privacy risks except.
   (a) Hackers
   (b) Spam
   (c) Viruses
   (d) Identify theft
   (e) None of these

8. Which of the following is a popular Dos based spread Sheet ?
    (a) Excel
    (b) Word
    (c) Smart cell
    (d) Lotus 1-2-3
    (e) None of these

9. Eithernet, LAN, Token Ring, and token Bus are types of _______________.
   (a) WAN
   (b) Communication channels
   (c) LAN
   (d) Physical Medium
   (e) None of these

10. An e-mail account includes a storage area, often called a ____________________.
      (a) Attachment
      (b) Hyperlink
      (c) Mailbox
      (d) IP address
      (e) None of these

11. What is the name of the software that allows us to browse through web pages called ?
      (a) Browser
      (b) Mail client
      (c) FTP client
      (d) Messenger
      (e) None of these

12. Most world wide web pages contain commands in the language ______________.
      (a) NIH
      (b) URL
      (c) HTML
      (d) IRC
      (e) None of these

13. Fire walls are used to protect against
      (a) Un authorised Attacks
      (b) Virus Attacks
      (c) Data Driver Attacks
      (d) Fire Attacks
      (e) None of these

14. "Trend Micro" is a ______________?
       (a) Virus program
       (b) Anti virus program
       (c) Application
       (d) All of the above
       (e) None of these

15. The most important powerful computer in a typical network is ______________.
      (a) Desktop
      (b) Network Client
      (c) Network Server
      (d) Network Station
      (e) None of these


1. A plain text mail
2. Kaspersky
3. Spam
5. Blaster
6. Mother Board crash
7. Spam
8. Lotus 1-2-3
9. LAN
10. Mailbox
11. Browser
12. HTML
13. Virus Attacks
14. Anti virus program
15. Network Server

==>> Download Computer Awareness PDF (Free)

Can I help you?

ramandeep singh

Hey I am Ramandeep Singh. I am determined to help students preparing for RBI, SEBI, NABARD and IBPS exams. Do you want me to help you ?

Join my class here
    Follow me:
Close Menu
Close Menu