IBPS BANK EXAM COMPUTER KNOWLEDGE OBJECTIVE QUESTIONS
1. On a CD-ROM , _______ are raised areas representing a 1.
a. mounds
b. lands
c. holes
d. pits
e. none of the above
ans. b
2. What program would you use to gain administrative rights to someones' computer?
a. Bot
b. Executive Android
c. Rootkit
d. Trojan horse
e. Spam
ans. c
3. Another name of computer antivirus is ?
a. Vaccine
b. Worm
c. Spam
d. Trojan horse
e. DES
ans. a
4. Computer virus program is usually hidden in .......
a. Operating system
b. Application programming
c. disk driver
d. USB port
e. Both a ans b
ans. e
5. Which one is not a computer virus?
a. Trojan horse
b. Logic bomb
c. Mcafee
d. Redlof
e. Malware
ans. c
6. what is " Trend Micro"?
a. It is an anti-virus program
b. It is just a program.
c. It is a virus program
d. It is operating system
e. none of the above
ans. a
7. What is the name of the viruses that fool user into downloading and /or executing them by pretending to be useful applications?
a. Cracker
b. Worm
c. Trojan horses
d. Keylogger
e. Malware
ans. c
8. The virus that spread in application software is called as .....
a. Boot virus
b. Macro virus
c. File virus
d. Anti virus
e. None of the above
ans.b
9. What is anti-virus?
a. It is a computer
b. It is a program code
c. It is a company name
d. It is an application
e. It is an operation system
ans. b
10. What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity ?
a. Computer Viruses
b. Spyware scams
c. Phishing scams
d. Troan horse
e. None of the above
ans. c
a. mounds
b. lands
c. holes
d. pits
e. none of the above
ans. b
2. What program would you use to gain administrative rights to someones' computer?
a. Bot
b. Executive Android
c. Rootkit
d. Trojan horse
e. Spam
ans. c
3. Another name of computer antivirus is ?
a. Vaccine
b. Worm
c. Spam
d. Trojan horse
e. DES
ans. a
4. Computer virus program is usually hidden in .......
a. Operating system
b. Application programming
c. disk driver
d. USB port
e. Both a ans b
ans. e
5. Which one is not a computer virus?
a. Trojan horse
b. Logic bomb
c. Mcafee
d. Redlof
e. Malware
ans. c
6. what is " Trend Micro"?
a. It is an anti-virus program
b. It is just a program.
c. It is a virus program
d. It is operating system
e. none of the above
ans. a
7. What is the name of the viruses that fool user into downloading and /or executing them by pretending to be useful applications?
a. Cracker
b. Worm
c. Trojan horses
d. Keylogger
e. Malware
ans. c
8. The virus that spread in application software is called as .....
a. Boot virus
b. Macro virus
c. File virus
d. Anti virus
e. None of the above
ans.b
9. What is anti-virus?
a. It is a computer
b. It is a program code
c. It is a company name
d. It is an application
e. It is an operation system
ans. b
10. What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity ?
a. Computer Viruses
b. Spyware scams
c. Phishing scams
d. Troan horse
e. None of the above
ans. c