IT &computer MCQ section 2 MCQ Questions & Answers Detailed Explanation

MOST IMPORTANT general awareness mcq - 7 EXERCISES

Top 20,000+ General Awareness Memory Based Exercises

The following question based on IT & computer topic of general awareness mcq

Questions : Which among the following is the name given to the cursor for the computer language ‘LOGO’?

(a) Spider

(b) Robot

(c) Frog

(d) Turtle

The correct answers to the above question in:

Answer: (d)

LOGO is a computer programming language used for functional programming. It is used for generating basic shapes using a turtle cursor.

The turtle cursor is an on-screen cursor, which can be given movement and drawing instructions, and is used to programmatically produce line graphics.

Practice IT & computer (IT &computer MCQ section 2) Online Quiz

Discuss Form

Valid first name is required.
Please enter a valid email address.
Your genuine comment will be useful for all users! Each and every comment will be uploaded to the question after approval.

Read more it and computer Based General Awareness Questions and Answers

Question : 1

Which of the following uses the spawn mechanism to duplicate itself ?

a) Keystroke logger

b) Trojan horse

c) Worm

d) Logic bomb

Answer: (c)

A worm is a process that uses the spawn mechanism to clobber system performance.

The worm spawns copies of itself, using up system resources and perhaps locking out the system used by all other processes. On computer networks, worms are particularly potent, since they may reproduce themselves among systems and thus shut down the entire network.

Such an event occurred in 1988 to UNIX systems on the internet.

Question : 2

How many types of recipients are there in an e-mail system?

a) One

b) Three

c) Four

d) Two

Answer: (b)

Electronic mail, most commonly referred to as email, is a method of exchanging digital messages from an author to one or more recipients.

Normally, there could be three types of recipients:

  1. the target recipient;
  2. a carbon copy (Cc) recipients; and
  3. blind carbon copy (Bcc) recipients.

Question : 3

What is clickjacking ?

a) A form of Computer Engineering

b) Malicious technique of tricking Web usear into revealing confidential information

c) A device that sends and receives data in a bit second

d) A digital process that is used to display an image on monitor

Answer: (b)

Clickjacking is a malicious technique of tricking a Web user into clicking on something different to what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages. It is a browser security issue that is vulnerable across a variety of browsers and platforms.

A clickjacking takes the form of embedded code or a script that can execute without the user’s knowledge, such as clicking on a button that appears to perform another function. The term “clickjacking” was coined by Jeremiah Grossman and Robert Hansen in 2008.

Question : 4

_______ is a type of computing that performs computation, storage and even applications as a service across a network.

a) Parallel Computing

b) Cloud Computing

c) Distributed Computing

d) Virtual Computing

Answer: (b)

Cloud computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand.

It enables convenient, on-demand network access to a shared pool of networks, servers, storage, applications, and services that can be rapidly provisioned with minimal effort or service provider interaction.

Question : 5

DTP stands for

a) Data Type Programming

b) Digital Protocol

c) Desktop Publishing

d) Document Type Processing

Answer: (c)

Desktop publishing (abbreviated DTP) is the creation of documents using page layout skills on a personal computer. This technology allows individuals, businesses, and other organizations to self-publish a wide range of printed matter.

Question : 6

The act of writing new data into register

a) erases the previous contents of the register

b) is possible only when the register is an accumulator

c) is possible only when the register is an accumulator or instruction register

d) is non-destructive to existing contents

Answer: (c)

The act of writing new data into register is possible only when the register is an accumulator or instruction register.

Recently Added Subject & Categories For All Competitive Exams

Most Important Antonyms Vocabulary - IBPS Clerk Prelims 2024

Latest Antonyms multiple choice questions and answers with free PDFfor IBPS Clerk Prelims 2024. English Vocabulary practice exercise for all bank exam

17-May-2024 by Careericons

Continue Reading »

Syllogism Practice Questions Answers PDF - IBPS Clerk 2024

Practice Verbal Reasoning Syllogism multiple choice questions and answers with Fully solved explanation, PDF for the IBPS Clerk Prelims 2024 Bank Exam

16-May-2024 by Careericons

Continue Reading »

IBPS Clerk Prelims 2024 Synonyms Questions Solved Answers

Most important IBPS Clerk Prelims 2024 Synonyms and Antonyms multiple choice questions and answers with detailed solutions, English vocabulary PDF Download

14-May-2024 by Careericons

Continue Reading »

New Cloze Test Questions and Answers PDF - IBPS Clerk 2024

The most important Cloze Test questions with detailed answers for upcoming IBPS Clerk prelims 2024. Latest English verbal ability practice MCQs, PDF

13-May-2024 by Careericons

Continue Reading »