Question Bank & Answer Key of Fundamental of Computers Part 12

Get unlimited access to the best preparation resource for Bank-PO : fully solved questions with step-by-step explanation- practice your way to success.

163. Which of the following is not a binary number?

a. 001

b. 101

c. 202

d. 110

Answer: C

164. Which of the following does not store data permanently?

a. ROM

b. RAM

c. Floppy Disk

d. Hard Disk

Answer: B

165. Which of the following is the smallest storage?

a. Megabyte

b. Gigabyte

c. Terabyte

d. None of these

Answer: D

166. Which of the following contains permanent data and gets updated during the processing of transactions?

a. Operating System File

b. Transaction file

c. Software File

d. Master file

Answer: D

167. Which of the following helps to protect floppy disks from data getting accidentally erased?

a. Access notch

b. Write-protect notch

c. Entry notch

d. Input notch

Answer: B

168. A modem is connected to

a. a telephone line

b. a keyboard

c. a printer

d. a monitor

Answer: A

169. Large transaction processing systems in automated organisations use

a. Online processing

b. Batch Processing

c. Once-a-day Processing

d. End-of-day processing

Answer: B

170. In a computer, most processing takes place in

a. Memory

b. RAM

c. motherboard

d. CPU

Answer: D

171. . Which of the following is not a storage medium?

a. Hard disk

b. Flash drive

c. DVD

d. scanner

Answer: D

172. The computer abbreviation KB usually means

a. Key Block

b. Kernel Boot

c. Kilo Byte

d. Kit Bit

Answer: C

173. The typical computer criminal is a (n) :

a. Young hacker.

b. Trusted employee with no criminal record.

c. Trusted employee with a long, but unknown criminal record.

d. Overseas young cracker.

Answer: B

174. The common name for the crime of stealing passwords is:

a. Jacking.

b. Identity theft.

c. Spoofing.

d. Hacking.

Answer: C

175. Collecting personal information and effectively posing as another individual is known

as the crime of:

a. Spooling.

b. Identity theft.

c. Spoofing.

d. Hacking.

Answer: B

176. Malicious software is known as:

a. Badware.

b. Malware.

c. Maliciousware.

d. Illegalware.

Answer: B

Developed by: