Set 79- HTET and IBPS Specialist Officer Questions and Answers



1. Which one of the following languages is the system programming language derived from Pascal and intended for the defence application?
C-language
C++ language
FORTRAN
Ada
None of the above
2. Which one of the following memories is not the primary memory of a computer?
ROM
RAM
EEPROM
CD-ROM
Life style segmentation



3. What is the web crawler?
It is a computer program that browses the world wide web in an automated manner and in an orderly fashion
It is a computer program that browses the word wide web with the intention to use the free memory available in the virtual world
It is a computer program that assists the world wised web to establish a quick search engine
It is a computer program that infects the files stored in the computer’s memory
None of the above

4. Which one of the following languages is not the scripting language?
Java script
Python
Perl
Lisp
Better technology

5. A proxy server is used for which of the following?
To provide security against unauthorised users
To process client requests for web pages
To process client requests for database access
To provides TCP/IP
The back office staff

6. Software designed for a specific purpose/application such as pay calculations, processing of examination result etc. are known as
utility software
system software
application software
customized software
None of above

7. A data warehouse is which of the following?
Can be updated by the end users
Contains numerous naming conventions and formats
Organised around important subject areas
Contains only current data
None of the above

8. A packet filtering firewall operates at which of the following OSI layers?
At the application layer
At the transport layer
At the network layer
At the gateway layer
(2) and (3)

9. Which of the following key combination will perform the warm boot of computer?
Ctrl-Shift-Del
Ctrl-Alt-Delete
Alt-Shift-Enter
Spacebar-Shift-Enter
Ctrl-Alt-Enter

10. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also sometimes called 
Trojan horse
keylogger
worm
cracker
None of these


. Published By:- http://itsawal.blogspot.in/ .

No comments:

Post a Comment