Sunteți pe pagina 1din 11

Question No. 150.

Microsoft PowerPoint is a
a. Database program
b. Spreadsheet program
c. Presentation program
d. Word processing program
Correct Answer: c
Read more: http://www.meritmock.com/2016/09/information-technology-for-officemultiple-choice-questions-and-answers-pdf-download-200mcqs.html#ixzz4QIc6LMvU

Read more: http://www.meritmock.com/2015/12/computer-knowledge-onlinequiz.html#ixzz4QHp6v7Fu

IC chips used in computers are usually made of

Lead

Silicon

Chromium

Gold

Q.5. One Gigabyte is approximately equal to

1000,000 bytes

1000,000,000 bytes

1000,000,000,000 bytes

None of these

which of the following refers to a small, single-site network?


LAN (Local Area Network)

WAN(Wide Area Network)

MAN(Metropolitan Area Network)

None of the above

http://www.testcurrentaffairs.com/2015/08/top-100-computer-quiz-questions-andanswers.html
1. All of the following are examples of real security and privacy risks
EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
2. A process known as ____________ is used by large retailers to study
trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
8. Surgeons can perform delicate operations by manipulating devices
through computers instead of manually. This technology is known as:

A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
11. ____________ is the science that attempts to produce machines that
display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D

12. ____________ is a processed data that has been organized or presented


in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers manipulate data into
information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B

15. After a picture has been taken with a digital camera and processed
appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B

22. A ____________ is approximately a million bytes.

A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C

25. All of the following are examples of input devices EXCEPT a:


A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D

30. Word processing, spreadsheet, and photo-editing are examples of:


A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A

39. The difference between people with access to computers and the
Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A

40. ____________ is the science revolving around the use of nano structures
to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A

41. Which of the following is the correct order of the four major functions
of a computer?
A. Process , Output, Input, Storage
B. Input, Output, Process, Storage
C. Process, Storage, Input, Output
D. Input, Process, Output, Storage
Answer: D

http://www.gkduniya.com/computer-science2

Number of bit used by the IPV6 address


a.
b.
c.
d.

32 bit
64 bit
128 bit
256 bit

Firewall in computer is used for


a.
b.
c.
d.

Security
Data Transmission
Authentication
Monitoring

Which of the following is not an operating system


a.
b.
c.
d.

Windows
Mac OS
Java
Linux

Number of layers in the OSI (Open Systems Interconnection) Model


a.
b.
c.
d.

9
3
7
11

1024 bit is equal to how many byte?


a.
b.
c.
d.

1 byte
128 byte
32 byte
64 byte

In computer world, Trojan refers to


a.
b.
c.
d.

Virus
Malware
Worm
Spyware

In which year @ sign was first chosen for its use in e-mail address
a. 1976

b. 1980
c. 1977
d. 1972

http://www.meritmock.com/2016/07/computer-awareness-quiz-for-sbi-po-mainexam-224.html

Question 9. PC cards, flash memory cards, and smart cards are all examples of:
(1) Removable hard disks.
(2) Digital video discs.
(3) Volatile memory devices.
(4) Solid state storage devices.
Ans. 4

Question 11. VPN stands for_______________.


(1) Virtual Personal Network
(2) Very Private Network
(3) Virtual Private Network
(4) Vicious Personal Network
(5) None of these
Ans. 3

Question 13. Which of the following groups contains graphical file extensions?
(1) JPG, CPX, GCM
(2) GIF, TCF, WMF
(3) TCP, JPG, BMP
(4) JPG, GIF, BMP
(5) None of these
Ans. 4

Read more: http://www.meritmock.com/2016/04/computer-awareness-for-bankingibps-examinations.html#ixzz4QIBQTRjP


Q.2. Alerts are mostly appearing in ______?
[A]Check Box
[B]Combo Box
[C]Dialog Box
[D]None of these
Ans. c
Q.5. Structured Query Language (SQL) is used in the following ?
[A]Create Databases
[B]Create & Modify Databases
[C]Create, Modify & Query Databases
[D]None of these
Ans. c

Question No. 3. a process in which text or other data is moved from one part of a
document and inserted elsewhere.
A. Copy & Paste
B. Cut & Paste
C. Bold
D. Justify
Correct Answer: B
Read more: http://www.meritmock.com/2016/09/information-technology-for-officemultiple-choice-questions-and-answers-pdf-download-200mcqs.html#ixzz4QID3qPHY

uestion No. 41. Auto Correct was originally designed to replace _________ words as
you type.
A) Short, repetitive
B) Grammatically incorrect
C) Misspelled
D) None of the above
Correct Answer: C
Read more: http://www.meritmock.com/2016/09/information-technology-for-officemultiple-choice-questions-and-answers-pdf-download-200mcqs.html#ixzz4QIDvxicA

https://www.jbigdeal.in/basic-computer-knowledge-test/

____ is a program which reproduces itself


a.
b.
c.
d.

Virus
Software
Both
None of the above

Define the acronym SPOOL


a. Simultaneous Peripheral Operation Off-line
b. Simultaneous Peripheral Operation On-line
c. Simultaneous Peripheral Organization On-line
d. System Peripheral Operation On-line

S-ar putea să vă placă și