Preview

Aptitude

Powerful Essays
Open Document
Open Document
1226 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Aptitude
RBI Assistant Comp. Knowledge Paper (Held on 29th April, 2013)
161. What is backup ?

(1) Adding more components to your network (2) Protectiong data by copying it from the original source to a different destination (3) Filtering old. data from the new data (4) Accessing data on tape (5) Using earlier data

162. The legal right to use software based on specific restrictions is granted via a..........

(1) software privacy policy (2) software license (3) software password manager (4) software log (5) None of these

163. What is an E-mail attachment?

(1) A receipt sent by the recipient (2) A separate document from another program sent along with an E-mail message (3) A malicious parasite that feeds off of your messages and destroys the contents

(4) A list of CC : or BCC : recipients (5) A friend to whom E-mail is sent regularly

164. The type of software that controls - the Internal operations in the computer, and controls how the computer works with all Its parts is which of the following ?

(1) Shareware (2) Public domain software (3) Application software (4) Operating system software (5) None of these

165. When data changes In multiple lists and all lists are not updated, this causes ...........

(1) Data redundancy (2) Information overload (3) Duplicate data (4) Data consistency (5) Data inconsistency

166. What Is the main folder on a storage device called ?

(1) Root directory (2) Interface (3) Device drive/

(4) Platform (5) Main directory

167. To view information on the web you must have a..........

(1) Cable modem (2) Web browser (3) Domain Name Server (4) Hypertext viewer (5) None of these

168. A file is often referred to as a(n)

(1) Wizard (2) Document (3) Pane (4) Device (5) Documentation

169. To protect yourself from' computer hacker intrusions you shoud install a .............

(1) Firewall (2) Mailer (3) Macro (4) Script

(5) None of these

170. What type of computers are client computers (most of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1) As a student explain what the Tenable Security INC software license permits you to do and what it does not permit you to do?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    5 - The software that runs on the mail server is referred to as the ____________…

    • 1464 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    8. Which protocol is used for a variety of functions in the e-mail server, such as resolving the numeric address of email.user@emailserver.net, and which servers are blacklisted for being sources of Unsolicited…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Pt2520 Unit 6

    • 1447 Words
    • 6 Pages

    Data redundancy in a database occurs when same data is stored in different tables unnecessarily. A modification to a single piece of data requires change for all the copies. Use of flat file database designs and spreadsheets can lead to data redundancy.…

    • 1447 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Itm/6015 Week 3 Quiz

    • 806 Words
    • 4 Pages

    3. All of the following led to an unprecedented level of IT investments in the 1990s…

    • 806 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    a. Closing off unused ports via a firewall to reduce the chance of unwanted network access…

    • 299 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mail may have confidential information; it may include personal information about employees or contain confidential business information. When we receive mail or parcels from unknown addresses which may be suspicious, security procedures have to be followed and reported to the office manager. All mails and packages have to be thoroughly checked to see if it has been opened or tampered with. When handling mails and packages you must also look out for any suspicious features. Therefore, strict security procedures have to be followed at all times.…

    • 2151 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Lesson 10

    • 672 Words
    • 3 Pages

    ____a___ 10. This is a component of the Microsoft Windows operating system that provides management information and control in an enterprise environment.…

    • 672 Words
    • 3 Pages
    Good Essays
  • Good Essays

    5)message decoded, they now must take what we have told them( the item we desire) however, not all message are this straight forward, so this is where a breakdown may occur as they may decode the message incorrectly.…

    • 1384 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Exegetical Ephesians

    • 2023 Words
    • 7 Pages

    receiver of the letter, and a greeting, 2.) body, 3.) and a conclusion, which usually ends with a…

    • 2023 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Abap Coding Standards

    • 5360 Words
    • 22 Pages

    ABAP/4 Programming Standards Version 1.03 Printed at: 03/18/98 9:55 AM Chapter 1: Overview 1-1 Maintenance of Standards 1-1 Introduction 1-1 Process for Changing / Updating Standards 1-1 UPI 1-1 Chapter 2: Naming Standards 2-1 Technical Naming Standards 2-1 Introduction 2-1 Naming Patterns 2-1 Development Classes 2-3 Function Groups 2-4 External Files 2-4 Naming External Files 2-4 Defining External Files in Programs 2-4 UPI Objects 2-6 Partner Pair 2-6 UPI Id 2-6 Other Id 2-6 Transaction Pair 2-6 Transaction Code 2-6 Transaction Type 2-6 Chapter 3: ABAP/4 Programming Standards 3-1 Program Attributes 3-1 Type 3-1 Status 3-1 Application 3-1 Authorization Group 3-1 Development Class 3-2 Logical Database 3-2 Fixed Point Arithmetic 3-2 Program Structure 3-2 Order of code 3-2 Comments 3-2 Naming Conventions 3-2 Batch Input Groups 3-2 Internal Tables 3-3 Parameters 3-3 Select Options 3-3 Subroutines 3-3 Naming 3-3 Parameters 3-4 Local Variables 3-4 System Table (SYST) 3-4 Variables 3-5 Accumulators 3-5 Constants 3-5 Switches 3-6 Work Fields 3-6 Program Documentation 3-6 External Documentation 3-6 Modifications 3-7 Help Functions 3-7 Messages 3-7 Statement Formatting 3-7 Code Formatting 3-7 Clearing Data 3-7 Chaining 3-8 Include Code 3-8 Report Formatting 3-8 Report Header 3-8 Batch Input 3-8 Data Access 3-9 Data Update 3-9 External File Usage 3-9 Subroutines 3-9 Internal Subroutines (Form’s)…

    • 5360 Words
    • 22 Pages
    Good Essays
  • Better Essays

    Work place communication

    • 3379 Words
    • 14 Pages

    The sender creates a message either in the written or in verbal or nonverbal form. The message is…

    • 3379 Words
    • 14 Pages
    Better Essays
  • Powerful Essays

    Term Paper

    • 2888 Words
    • 12 Pages

    10. Discuss the ways in which a software manufacturer can protect the unauthorized use of its software. Which do you think is the best way for a software manufacturer to protect new software? Why?…

    • 2888 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Attribution of electronic message Contents of electronic message Each electronic message to be regarded separately Time of dispatch Time of receipt Place of dispatch Place of receipt Acknowledgement of receipt PART V…

    • 2772 Words
    • 12 Pages
    Good Essays