Computer RRB,IBPS CWE,LIC AAO,RBI,SBI PO,Bank Clerk,GIC,NIACL
Mahatmaacademy

Computer Knowledge MCQ-248

A computer works faster with

(A) GUI
(B) Mouse
(C) Keyboard
(D) All of these
(E) None of these

SMTP protocol is used for

(A) Sending email messages between servers
(B) Sits between client server
(C) Transmit news to all clients
(D) All of the above
(E) None of these

Which form of job scheduling uses triggers?

(A) Manual scheduling
(B) Distributed scheduling
(C) Mainframe scheduling
(D) Automated scheduling
(E) None of these

MICR devices can read:

(A) Characters
(B) Numbers
(C) Both of these
(D) All of these
(E) None of these

Auxiliary storage consists of

(A) Magnetic tapes
(B) CDs
(C) Both of these
(D) All of these
(E) None of these

Who can provides access rights to users?

(A) Data custodian
(B) Data owner
(C) The data base administrator
(D) Management
(E) None of these

Security policy of an organization need not have

(A) The overall security philosophy of the organization *:
(B) The authorization procedure for accessing data
(C) Security awareness program
(D) Highlights and identity of the sensitive security features
(E) None of these

In case of a virus getting into computer, which of the following will help?

(A) Encryption
(B) NORTON
(C) Police complaint
(D) All of these
(E) None of these

Which of the following do you think is NOT necessary for computerization system in a bank?

(A) Effective customer service
(B) Effective back office integration
(C) Focus on manual records
(D) All of these
(E) None of these

BCNF is needed because:

(A) Otherwise tuples may be duplicated
(B) When a data is deleted tuples may be lost
(C) Updating is otherwise is difficult
(D) When there is dependent attributes in two possible composite keys one of the attribute is unnecessarily duplicated in the tuples.
(E) None of these

Which of the following is reliable service?

(A) TCP
(B) UDP
(C) Both [A] & [B]
(D) Either [A] nor [B]
(E) None of these

Firewall is used in PC for

(A) Security
(B) Authentication
(C) Data transmission
(D) All of these
(E) None of these

A transmission in which receiver receives the data simultaneously as it is relayed is called

(A) Video-conferencing
(B) Online transmission
(C) Real-time transmission
(D) Offline transmission
(E) None of these

A protocol is:

(A) Service that helps in communicating
(B) Rules that help computer talk
(C) Way of transmission data over the net
(D) All of these
(E) None of these

Which of the following are relational integrity constraints?

(A) Null value
(B) Primary key
(C) Referential integrity
(D) All the above
(E) None of these

Which of the following do think is NOT to develop an application for computer?

(A) Feasibility study
(B) Designing
(C) Testing
(D) All the above
(E) None of these

Binary equivalent to 87 is:

(A) 1010111
(B) 1101 111
(C) 1011111
(D) 10111111
(E) None of these