Computer MCQ for Railway Exams

Rate this post

Computer MCQ for Railway Exams. We covered all the Computer MCQ for Railway Exams in this post for free so that you can practice well for the exam.

Install our MCQTUBE Android app from the Google Play Store and prepare for any competitive government exams for free.

These types of competitive MCQs appear in exams like SSC, Railway, Bank, Delhi Police, UPSSSC, UPSC (Pre), State PCS, CDS, NDA, Assistant Commandant, and other Competitive Examinations, etc.

We created all the competitive exam MCQs into several small posts on our website for your convenience.

Join Telegram Group and Get FREE Alerts! Join Now

Join WhatsApp Group For FREE Alerts! Join Now

You will get their respective links in the related posts section provided below.

Related Posts:

Questions hide

Computer MCQ for Railway Exams Students

Which of the following is Stuxnet?

(a) Trojan

(b) Antivirus

(c) Worm

(d) Virus

Option c – Worm

Which of the following ethical hacking techniques is used for determining which operating system (OS) is running on a remote computer? ( Computer MCQ for Railway Exams )

(a) Operating System fingerprinting

(b) Operating System penetration testing

(c) Digital-printing

(d) Machine printing

Option a – Operating System fingerprinting

Which of the following can diminish the chance of data leakage?

(a) Steganography

(b) Chorography

(c) Cryptography

(d) Authentication

Option a – Steganography

In which of the following, a person is constantly followed or chased by another person or group of several people? ( Computer MCQ for Railway Exams )

(a) Phishing

(b) Bullying

(c) Stalking

(d) Identity theft

Option c – Stalking

Which one of the following can be considered as a class of computer threats?

(a) DoS Attack

(b) Phishing

(c) Soliciting

(d) Both A and C

Option a – DoS Attack

Which of the following is considered unsolicited commercial email? ( Computer MCQ for Railway Exams )

(a) Virus

(b) Malware

(c) Spam

(d) All of the above

Option c – Spam

Which of the following usually observes each activity on the internet of the victim, gathers all information in the background, and sends it to someone else?

(a) Malware

(b) Spyware

(c) Adware

(d) All of the above

Option b – Spyware

Which of the following actions compromise cybersecurity?

(a) Vulnerability

(b) Attack

(c) Threat

(d) Exploit

Option c – Threat

Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic? ( Computer MCQ for Railway Exams )

(a) Pharming

(b) Website-Duplication

(c) Mimicking

(d) Spamming

Option a – Pharming

Which of the following is not a type of peer-to-peer cyber-crime?

(a) MiTM

(b) Injecting Trojans to a target victim

(c) Credit card details leak in the deep web

(d) Phishing

Option c – Credit card details leak in the deep web

A cyber-criminal or penetration tester uses additional data that stores certain special instructions in memory for activities to break the system in which of the following attacks? ( Computer MCQ for Railway Exams )

(a) Clickjacking

(b) Buffer-overflow

(c) Phishing

(d) MiTM

Option b – Buffer-overflow

Which of the following do cyber attackers commonly target for fetching the IP address of a target or victim user?

(a) IP tracker

(b) Emails

(c) Websites

(d) Web pages

Option c – Websites

Which of the following is defined as an attempt to harm, damage, or cause a threat to a system or network? ( Computer MCQ for Railway Exams )

(a) Digital crime

(b) Threats

(c) System hijacking

(d) Cyber Attack

Option d – Cyber Attack

Nefarious hackers whose main motive is to gain financial profit by committing cyber crimes are known as:

(a) White Hat Hackers

(b) Black Hat Hackers

(c) Hacktivists

(d) Gray Hat Hackers

Option b – Black Hat Hackers

IT security in any firm or organization is maintained and handled by: ( Computer MCQ for Railway Exams )

(a) Software Security Specialist

(b) CEO of the organization

(c) Security Auditor

(d) IT Security Engineer

Option d – IT Security Engineer

Where did the term “hacker” originate?

(a) MIT

(b) New York University

(c) Harvard University

(d) Bell’s Lab

Option a – MIT

What is the existence of weakness in a system or network known as? ( Computer MCQ for Railway Exams )

(a) Attack

(b) Exploit

(c) Vulnerability

(d) Threat

Option c – Vulnerability

Which of the following is an internet scam where users are digitally convinced by cyber-criminals to provide confidential information?

(a) MiTM attack

(b) Phishing attack

(c) Website attack

(d) DoS attack

Option b – Phishing attack

Which of the following is not a step followed by cyber-criminals in data breaching?

(a) Exfiltration

(b) Research & info-gathering

(c) Attack the system

(d) Fixing the bugs

Option d – Fixing the bugs

Which of the following online service’s privacy cannot be protected using Tor? ( Computer MCQ for Railway Exams )

(a) Browsing data

(b) Instant messaging

(c) Login using ID

(d) Relay chats

Option c – Login using ID

Which of the following terms refers to a group of hackers who are both white and black hat?

(a) Yellow Hat Hackers

(b) Grey Hat Hackers

(c) Red Hat Hackers

(d) White-Black Hat Hackers

Option b – Grey Hat Hackers

Which of the following is not an email-related hacking tool? ( Computer MCQ for Railway Exams )

(a) Mail Password

(b) Email Finder Pro

(c) Mail Pass View

(d) Sendinc

Option d – Sendinc

Which of the following DDoS attacks in mobile systems wait for the owner to trigger the cyber attack?

(a) Botnets

(b) Programs

(c) Virus

(d) Worms

Option a – Botnets

Which of the following is the least strong security encryption standard? ( Computer MCQ for Railway Exams )

(a) WPA3

(b) WPA2

(c) WPA

Join Telegram Group and Get FREE Alerts! Join Now

Join WhatsApp Group For FREE Alerts! Join Now

(d) WEP

Option d – WEP

Each record is constituted by a number of individual data items which are called:

(a) Fields

(b) Data Types

(c) Relations

(d) Tables

Option a – Fields

Which of the following is not a database object in MS Access?

(a) Tables

(b) Query

(c) Report

(d) Relationship

Option d – Relationship

A database object in MS Access that stores a question about the data in the database is:

(a) Table

(b) Form

(c) Query

(d) Report

Option c – Query

The complete information about an entity in a database is called:

(a) Data

(b) Information

(c) Field

(d) Record

Option d – Record

Which of the following statement is true?

(a) Reports can be used to retrieve data from tables & calculate

(b) Queries can be printed in well-formatted manner & presented as the information

(c) Queries can include calculated fields that do not exist in a table

(d) Reports & forms are similar, but forms are used to print while reports display on the screen only

Option c – Queries can include calculated fields that do not exist in a table

It is a query that, when run, displays its own dialog box prompting you for information, such as:

(a) Select

(b) Crosstab

(c) Parameter

(d) Append

Option c – Parameter

It is used to calculate & restructure data for easier analysis of your data. It calculates the sum:

(a) Parameter

(b) Select

(c) Crosstab

(d) Append

Option c – Crosstab

What is the maximum length a text field can be?

(a) 120

(b) 255

(c) 265

(d) 75

Option b – 255

Which of the following statement is true?

(a) Foreign key fields don’t allow duplicate values

(b) In the primary key field, you can enter duplicate values

(c) In an indexed field, you may or may not enter duplicate values depending on the setting

(d) All statements are true

Option c – In an indexed field, you may or may not enter duplicate values depending on the setting

Microsoft Access is a:

(a) RDBMS

(b) OODBMS

(c) ORDBMS

(d) Network database model

Option a – RDBMS

If you need to edit a relationship:

(a) Right-click the relationship line & choose Edit Relationship

(b) Double-click the relationship line

(c) Both of the above

(d) None of the above

Option c – Both of the above

DCL provides commands to perform actions like:

(a) Change the structure of tables

(b) Insert, update, or delete records & data values

(c) Authorizing access & other control over the database

(d) None of the above

Option c – Authorizing access & other control over the database

Which of the following stores commands to retrieve data from a database?

(a) Forms

(b) Reports

(c) Queries

(d) Tables

Option c – Queries

Both conditions display on the same row in the design grid when the operator is in use:

(a) OR

(b) IN

(c) AND

(d) LIKE

Option c – AND

If you write criteria values vertically (one in a row), it will mean:

(a) OR conditions

(b) AND conditions

(c) NOT condition

(d) None of the above

Option a – OR conditions

The key uniquely identifies each record in a table:

(a) Primary key

(b) Keyword

(c) Field name

(d) All of the above

Option a – Primary key

What do you mean by a one-to-many relationship between the Student & Class table?

(a) One student can have many classes

(b) One class may have many students

(c) Many classes may have many students

(d) Many students may have many classes

Option a – One student can have many classes

A part of a database that stores only one type of data is:

(a) Report

(b) Field

(c) Query

(d) Record

Option b – Field

Which of the following may not be a database?

(a) Data presented in a table in an MS Word document

(b) Data entered in an Excel spreadsheet

(c) A presentation created in PowerPoint

(d) A telephone diary

Option c – A presentation created in PowerPoint

A database can be best described as:

(a) Organized collection of data

(b) Useful presentation of data

(c) Graphical representation of data

(d) All of the above

Option a – Organized collection of data

Which of the following terms is least related to a database?

(a) Attributes

(b) Tuples

(c) Relationship

(d) Columns

Option d – Columns

Collection of related records in a database is known as:

(a) File

(b) Bench

(c) Table

(d) Relationship

Option a – File

The task of arranging data in order is called:

(a) Searching

(b) Sorting

(c) Ordering

(d) Shorting

Option b – Sorting

Cascade-update option:

(a) Means do not change the value in the primary key field if that record has related records in another table

(b) Means change all the related records in child tables if the record in the parent table is changed

(c) Both of the above

(d) None of the above

Option c – Both of the above

You can set a control’s border type to make the border invisible:

(a) Transparent

(b) Invisible

(c) Do not display

(d) No border

Option c – Do not display

The database language that allows you to access or maintain data in a database:

(a) DCL

(b) DML

(c) DDL

(d) None of the above

Option b – DML

Referential integrity means:

(a) Do not enter a value in the foreign key field of a child table if that value does not exist in the primary key of the parent table

(b) Do not enter a value in the primary key field of the child table if that value does not exist in the primary key of the parent table

(c) Do not enter a value in the foreign key field of a parent table if that value does not exist in the primary key of the child table

(d) All of the above

Option a – Do not enter a value in the foreign key field of a child table if that value does not exist in the primary key of the parent table

To duplicate a control’s formatting, you can use:

(a) Manager

(b) Wizard

(c) Painter

(d) Control

Option c – Painter

Which field type will you select when creating a new table if you require to enter long text in that field?

(a) Text

(b) Memo

(c) Currency

(d) Hyperlink

Option b – Memo

In table design view, what are the first column of buttons used for?

(a) Indicate Primary Key

(b) Indicate Current Row

(c) Both of the above

(d) None of the above

Option c – Both of the above

What does the “Show” checkbox in the query design window indicate?

(a) Whether the field is to be used or not

(b) Whether the field is to be displayed in the query result or not

(c) Whether the field names are to be displayed in the query result or not

(d) None of the above

Option b – Whether the field is to be displayed in the query result or not

Which of the following is not a type of relationship that can be applied in an Access database?

(a) One to One

(b) One to Many

(c) Many to Many

(d) All of the above can be applied

Option d – All of the above can be applied

This option allows you to build a new table by entering data directly into the datasheet:

(a) Datasheet view

(b) Design view

(c) Link table

(d) None of the above

Option a – Datasheet view

To create queries in Access:

(a) You can drag & drop fields on query builders

(b) You can type the SQL command in SQL view

(c) You can use query wizard or design view

(d) All of the above

Option d – All of the above

Following is not a database model:

(a) Network database model

(b) Relational database model

(c) Object-oriented database model

(d) None

Option d – None

In table design view, which key can be used to switch between the field names & properties panels?

(a) F3

(b) F4

(c) F5

(d) F6

Option d – F6

Which of the following is NOT a type of Microsoft Access database object?

(a) Table

(b) Form

(c) Worksheets

(d) Modules

Option c – Worksheets

Which field has a width of 8 bytes?

(a) Memo

(b) Number

(c) Date/Time

(d) Hyperlink

Option c – Date/Time

Which is not a view to display a table in Access?

(a) Datasheet View

(b) Design View

(c) Pivot Table & Pivot Chart View

(d) None of the above

Option d – None of the above

Which of the following database objects hold data?

(a) Forms

(b) Reports

(c) Queries

(d) Tables

Option d – Tables

The button on the toolbox displays data from a related table:

(a) Subform/subreport

(b) Relationships

(c) Select objects

(d) More controls

Option a – Subform/subreport

The Expression Builder is an Access tool that controls an expression for entering an expression:

(a) Table

(b) Box

(c) Cell

(d) Palette

Option b – Box

A query enables you to view data from a table based on a specific criterion:

(a) Form

(b) Query

(c) Macro

(d) Report

Option b – Query

Which of the following database objects produces the final result to present?

(a) Forms

(b) Reports

(c) Queries

(d) Tables

Option b – Reports

The default & maximum size of a text field in Access:

(a) 50 & 255 Characters

(b) 8 & 1 GB

(c) 266 Characters & 64,000 Characters

(d) None of the above

Option a – 50 & 255 Characters

We covered all the Computer MCQ for Railway Exams above in this post for free so that you can practice well for the exam.

Check out the latest MCQ content by visiting our mcqtube website homepage.

Also, check out:

Join Telegram Group and Get FREE Alerts! Join Now

Join WhatsApp Group For FREE Alerts! Join Now

Hello, I am the admin of mcqtube.com website. I am a blogger and app developer. Thanks.

Leave a Comment

Sticky Bottom Popup