Computer Quiz for IBPS Clerk Mains 2017
Computer Quiz for IBPS Clerk Mains 2017. Welcome to the www.letsstudytogether.co online Computer section. If you are preparing for IBPS Clerk 2017 exam, you will come across a section on Computer Awareness. Here we are providing you Computer Quiz for IBPS Clerk Mains 2017 based on the latest pattern for your daily practice.
Computer Quiz for IBPS Clerk Mains 2017 will help you learn concepts on important topics in Computer Section.
This Computer Quiz for IBPS Clerk Mains 2017 is also important for other banking exams such as IBPS PO, IBPS Clerk, SBI Clerk, IBPS RRB Officer, IBPS RRB Office Assistant, IBPS SO, SBI SO and other competitive exams
Computer Quiz for IBPS Clerk Mains 2017: Set – 17
1.Voice powered personal assistant like Siri, Cortana, Alexa become hugely popular in this decade. Which of the following is a related technology?
A. Artificial Intelligence
B. Robotics
C. Cloud Technology
D. Reality 4D
E. All of the above
2._______ is a security process that relies on the unique biological characteristics of an individual to verify.
A. CAPTCHA
B. AADHAR
C. PAN CARD
D. BIOMETRICS
E. DNA
3.Which of the following topologies provides a highly fault-tolerant architecture?
A. Star
B. Bus
C. Ring
D. Mesh
E. Tree
4.Which of the following statements is incorrect for TELNET?
A. It is an application layer protocol.
B. It does not provide security on its own.
C. It provides encryption feature.
D. It provides bidirectional text-oriented communication
E. None of these
5.Which of the following techniques is used by unethical hackers to certify fake data over the data over the Internet for stealing confidential information?
A. Phishing
B. Spear Phishing
C. Logic Bomb
D. Spoofing
E. Cracking
6._______ ensures secure transfer of data over an unsecured network, such as the Internet.
A. Antivirus
B. Hacking
C. Cracking
D. Spoofing
E. Cryptography
7.Which of the following is/are the benefits of subnetting?
A. Preservation of address space
B. Reduced network traffic
C. Better security
D. Enhanced performance
E. All of these
8.Which of the following techniques minimizes the interference between wireless devices?
A. FCS
B. RTFS
C. HCFS
D. FSSH
E. FHSS
9.Software that gathers con?dential information of a person without his or her permission and sends that information to another person is called?
A. Antivirus
B. Spyware
C. Spam
D. Trojan Horse
E. Adware
10.Which of the following models does the working of Bluetooth devices depend?
A. Client/Server
B. LAN
C. Master/Slave
D. Analog/Digital
E. None of these
IBPS Clerk Mains Study Plan: How to Crack IBPS Clerk Mains in 40 days – Download In PDF