This quiz consists of questions from
various Banking entrance exams held during the last few years. Leave your
answers/ responses in the comments section below and we’ll soon let you know
the correct answers!
__________ is defined as any crime completed through the use of computer
(A) Computer forensics
(D) Computer Crime
A ________ is a computer connected to two networks.
Unauthorized access to computers is called _________.
(C) a worm
(D) a virus
A _________ store(s) data in two dimensional tables.
(A) Relational database
(B) Table database
(C) Network and Hierarchical
(D) Network Database
Collecting personal information and effectively posing as another individuals
is known as the crime of ______.
(B) identity theft
(D) personality theft
Bookmarks can be organized by using _________.
What mark up language includes all of the features of HTML and programming
A table in a relational database terminology is synonymous with ________.
(A) A value
(B) A row
(C) An attribute
(D) A relation
Metadata does not enable database designer and users to _________.
(A) Understand what the data mean.
(B) Know what the fine distinctions are
between similar data items.
(C) Understanding what does exist
(D) Sample data
Which of the following is true of Client-side extension? They add functionally
it to the ______.
To follow our
Banking portal on Facebook and Twitter, click on the following links:
3(b) 4(b) 5(b) 6(b)
7(c) 8(d) 9(d)