Computer Awareness Test - IBPS PO Mains

October 27, 2015    

computer quiz
Q1. Computers use the _______number system to store data and perform calculations:
c) decimal
d) hexadecimal
e) None of The Above
a) memory only
b) write only
c) once only
d) run only
e) read only
Q3. Which of the following can be used to select the entire document?
a) Ctrl + A
b) Alt + F5
c) Shift + A
d) Ctrl + K
e) Ctrl + H
Q4. _____are attempts by individuals to obtain confidential information from you by falsifying their identity:
a) Phishing Trips
b) Computer Viruses
c) Spyware Scams
d) Viruses 
e) Phishing Scams
Q5. Part number, part description and number of parts ordered are examples of:
a) control
c) processing
d) feedback
e) input 
Q6. A Web Site's main page is called its:
a) Home Page
b) Browser Page
c) Search Page
d) Bookmark
e) None of The Above 
Q7. The simultaneous processing of two or more programs by multiple processors is:
a) multi programming
b) multitasking 
c) time sharing
d) multiprocessing 
e) None of The Above 
Q8. Codes consisting of lines of varying widths or lengths that are computer readable are known as:
a) an ASCII code
b) a magnetic tape 
c) an OCR scanner
d) a bar code
e) None of The Above
Q9. To instruct word to fit the width of a column to the contents of a table automatically, click the ______button and then point to Auto Fit Contents:
a) Fit to Form
c) Auto Size
d) Contents
e) Auto Fit
Q10. Why is it unethical to share copyrighted files with your friends?
a) It is not unethical because it is legal
b) It is unethical because the files are being given for free
c) Sharing copyrighted files without permission breaks copyright laws
d) It is not unethical because the files are being given for free 
e) It is not unethical - anyone can access a computer 
Q11. Reusable optical storage will typically have the acronym ______:
Q12. The most common type of storage devices are :
a) persistent
b) optical 
c) magnetic
e) steel 
Q13. A device that connects to a network without the use of cables is said to be:
a) distributed
c) centralized 
d) open source 
e) None of The Above 
Q14. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a:
a) hacker 
b) analyst 
c) instant messenger
d) programmer
e) spammer
Q15. To access properties of an object, the mouse technique to use is:
a) dragging 
b) dropping 
c) right - clicking 
d) shift - clicking 
e) None of The Above 
Q16. The change selected text to all capital letters, click the change case button, then click ___:
a) UPPERCASE 
b) UPPER ALL 
c) CAPS LOCK
d) Lock Upper 
e) Large Size 
Q17. The basic unit of a worksheet into which you enter data in Excel is called a:
d) range 
e) None of The Above 
Q18. You can keep your personal files/folders in:
a) My Folder
b) My Documents 
c) My Files
d) My Text 
e) None of The Above 
Q19. In Word, you can force a page break:
a) By positioning your cursor at the appropriate place and pressing the F1 key
b) By positioning your cursor at the appropriate place and pressing Ctrl + Enter 
c) By using the Insert/Section Break
d) By changing the font size of your document
e) None of The Above 
Q20. A DVD is an example of:
a) hard disk
b) optical disk
c) output device
d) solid - state storage device 
e) None of The Above 
Q21. Mobile Commerce is best described as:
a) The use of Kiosks in marketing
b) Transporting products
c) Buying and Selling goods/services through wireless handheld devices 
d) Using notebook PC's in marketing
e) None of The Above 
Q22. When the pointer is positioned on a _____, it is shaped like a hand:
a) grammar error 
b) formatting error 
c) screen tip 
d) spelling error 
e) hyperlink 
Q23. Personal Computers can be connected together to form a _____:
a) server 
b) super computer 
c) network
d) enterprise 
e) None of The Above 
Q24. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information:
a) floppy diskette 
b) hard disk
c) permanent disk
d) optical disk
e) None of The Above 
Q25. What is the process of copying software programs from secondary storage media to the hard disk called?
a) Configuration 
b) Download
c) Storage

This entry passed through the Full-Text RSS service - if this is your content and you're reading it on someone else's site, please read the FAQ at http://ift.tt/jcXqJW.



Computer Awareness Test - IBPS PO Mains 4.5 5 Yateendra sahu October 27, 2015 Q1. Computers use the _______number system to store data and perform calculations: c) decimal d) hexadecimal e) None of The Above a) m...


Load comments

No comments:

Post a Comment