Computer Based Objective Questions for Bank PO
1.) All of the following are examples of real security and privacy risks EXCEPT:
A.) Hackers.
B.) Spam.
C.) Viruses.
D.) Identity theft.
Correct Answer: B.
2.) A process known as ____________ is used by large retailers to study trends.
A.) data mining
B.) data selection
C.) POS
D.) data conversion
Correct Answer: A.
3.) ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A.) Data
B.) Point-of-sale (POS)
C.) Sales
D.) Query
Correct Answer: B.
4.) DSL is an example of an ____________ connection.
A.) network
B.) wireless
C.) slow
D.) broadband
Correct Answer: D.
5.) The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called:
A.) robotics.
B.) simulation.
C.) computer forensics.
D.) animation.
Correct Answer: C.