0

Computer Awareness

Description: These questions are related to computer Basic Knowledge to spread Computer Awareness.
Number of Questions: 15
Created by:
Tags: Computer Computer Basics
Attempted 0/15 Correct 0 Score 0

Which of the following represents the volatile memory in a computer?

  1. ROM

  2. RAM

  3. Processor

  4. Hard disk

  5. None of these


Correct Option: B
Explanation:

Volatile memory or volatile storage is a Computer Memory that requires power to maintain the stored information. It retains its contents while powered, but when power is interrupted stored data is immediately lost.The data held in RAM is temporary that is lost when the power is switched off, hence RAM is a volatile memory

What does CVV, the 3-digit number mentioned on the back of debit or credit card mean?

  1. Credit Value Voucher

  2. Card Verified by Visa

  3. Card Verification Value

  4. Both 1 and 2

  5. None of these


Correct Option: C
Explanation:

The Card Verification Value (CVV*) is an extra code printed on your debit card or credit card. CVV for Visa, MasterCard and Diners is the final three digits of the number printed on the signature strip on the back of the card.

In a LAN configuration, ____________ is used to connect all the computers to each other.

  1. router

  2. modem

  3. switch

  4. UPS

  5. jack panel


Correct Option: A
Explanation:

Router is a device to connect two different networks LAN and the Internet. Routers connect networks. A router links computers to the Internet, so users can share the connection.

(Source:Basics of Computer Networking and setting up of LAN - unit 5- A publication of International Telecommunicaion Union)

In which of the following units is computer data measured?

  1. Hertz

  2. Bytes

  3. Pixels

  4. RPMs

  5. None of these


Correct Option: B
Explanation:

Since Binary System is followed in computers, so Bytes is the measuring system for computer data.

Which of the following is not an input device in computer?

  1. Keyboard

  2. Mike

  3. Printer

  4. All of these

  5. None of these


Correct Option: C
Explanation:

It is an out put device which prints any given information report.

In banking, what does IMPS stand for?

  1. Inter Bank Messaging and Propagation System

  2. InterBank Mobile Payment System

  3. International Mobile Payment and Settlements

  4. Immediate Payment Service

  5. None of these


Correct Option: D
Explanation:

IMPS - Immediate Payment Service is an interbank electronic instant mobile money transfer service through mobile phones. IMPS service from ICICI Bank helps you access your bank account and transfer funds instantly.

Which of the following describes the frauds perpetrated by creating fake web pages to look like original and luring the customers to reveal personal information over the web page?

  1. Voice phishing

  2. Phishing

  3. Pharming

  4. Skimming

  5. Key logging


Correct Option: B
Explanation:

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

Whiich of the following best represents “Android”?

  1. Software to play games

  2. Operating system

  3. Anti Virus

  4. Application Software

  5. None of these


Correct Option: B
Explanation:

Android is an operating system used by Samsung. An operating system (OS) is a software program that manages the hardware and software resources of a computer. A key component of system software, the OS performs basic tasks, such as controlling and allocating memory, prioritizing the processing of instructions, controlling input and output devices, facilitating networking and managing files.

Which of the following is the longest key on the keyboard?

  1. Space bar

  2. Shift key

  3. Caps lock

  4. Zero

  5. Tab key


Correct Option: A
Explanation:

A typical space bar key is large enough so that a thumb from either hand can use it, and is almost always found on the bottom row of standard QWERTY keyboard layouts.

A fraud, in which vital information hidden in the magnetic strip of a card is stolen, is known as _________.

  1. keylogging

  2. phishing

  3. skimming

  4. duplicating

  5. none of these


Correct Option: C
Explanation:

‘Card skimming’ is the illegal copying of information from the magnetic strip of a credit or ATM card. It is a more direct version of a phishing scam.

A computer cannot work without which of the following?

  1. MS Office

  2. Antivirus

  3. Mouse

  4. Operating System

  5. All of the above except option 3


Correct Option: D
Explanation:

An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function. The operating system and application software are essential and co-related to each other and are required to run a computer efficiently. The computer can work without a mouse as in case of laptops, notebooks, tablets, etc. which is an external input device in which touch pad is inbuilt.

When a new hardware is added to the system, a software has to be installed for the new hardware to work. What is this software is known as?

  1. Driver

  2. Marker interface

  3. Compiler

  4. Interpreter

  5. Windows XP/Vista/7


Correct Option: A
Explanation:

A driver is a small piece of software that tells the operating system and other software how to communicate with a piece of hardware.

“Virtual Keyboard” is used to prevent

  1. to protect your password from malicious “Spyware” and “Trojan Programs”

  2. keylogging

  3. skimming

  4. hassels of searching keys on the keyboard

  5. slower inputs through physical keyboard


Correct Option: B
Explanation:

Keystroke logging, often referred to as keylogging or Keyboard Capturing, is the action of recording the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that his actions are being monitored. A virtual keyboard is a software component that allows a user to enter characters. A virtual keyboard can usually be operated with multiple input devices, which may include a touchscreen, an actual computer keyboard and a computer mouse. Hence, Virtual Key Board are used.

What is the set of instructions given to a computer to perform tasks known as?

  1. Data

  2. Device

  3. Programmes

  4. Application

  5. None of these


Correct Option: C
Explanation:

A set of instructions that a computer uses to carry out its tasks is called a computer program. A computer program can also be called a software program. These programs consist of programming codes to tell the computer what to do.

Cases related to virus or cyber attacks are handled by a central agency of Government of India known as _______________.

  1. Deptartment of Information Technology

  2. National Security Council Secretariat (NSCC)

  3. CERT-In

  4. Cybre India Technologies

  5. Alert India


Correct Option: B
Explanation:

The Indian government has launched a new and dedicated wing of the country’s National Security Council Secretariat (NSCC) under the Cyber security Council of India. The function of the proposed wing would be to deal with the growing cyber threat especially those from cyber terrorists.

- Hide questions