Set 4 – Computers Awareness Quiz for SBI IBPS Bank PO/Clerk

0
  1. Hackers………………..
    (1) all have the same motive
    (2) break into other people’s computers
    (3) may legally break into computers as long as they do not do any damage
    (4) are people who are allergic to computers
    (5) None of these

    Show Answer


    Solution:2
  2.  In page preview mode………………
    (1) You can see all pages of your document
    (2) You can only see the page you are currently working
    (3) You can only see pages that do not contain graphics
    (4) You can only see the title page of your document
    (5) None of these

    Show Answer


    Solution:2
  3. What type of computers are client computers (most of the time) in a client-server system?
    (1) Mainframe
    (2) Mini-computer
    (3) Microcomputer
    (4) PDA
    (5) None of these

    Show Answer


    Solution:2
  4. What is the full form of `GUI’ ?
    (1) Gnutella Universal Interface
    (2) Graphical User Interface
    (3) Graphic Uninstall/Install
    (4) General Utility Interface
    (5) None of these

    Show Answer


    Solution:2
  5.  Junk e-mail is also called……………….
    (1) spam
    (2) spoof
    (3) sniff script
    (4) spool
    (5) None of these

    Show Answer


    Solution:1
  6. A word in a web page that, when clicked, opens another document…………….
    (1) anchor
    (2) URL
    (3) hyperlink
    (4) reference
    (5) None of these

    Show Answer


    Solution:3
  7. Which of the following referes to a small, single-site network?
    (1) LAN
    (2) DSL
    (3) RAM
    (5) USB
    (5) CPU

    Show Answer


    Solution:1
  8. Which keystroke will take you at the beginning or the end of a long document?
    (1) Ctrl+PageUP and Ctrl+ PageDown
    (2) Shift+Home and Shift+End
    (3) Ctrl +Home and Ctrl +End
    (4) The only way is by using the right scroll ball
    (5) None of these

    Show Answer


    Solution:3
  9. In Word you can force a page break …………………
    (1) By positioning your cursor or at he appropriate place and pressing the F1 Key
    (2) By using the Insert/Section Break
    (3) By positioning your cursor at the appropriate place and pressing Ctrl+Enter
    (4) By changing the font size of your document
    (5) None of these

    Show Answer


    Solution:3
  10. When you want to move some text from one page to a different page, the best method is…………………
    (1) drag and drop
    (2) cut and paste
    (3) delete and replace
    (4) find and replace
    (5) None of these

    Show Answer


    Solution:2
  11. To view information on the web you must have a………………
    (1) cable modem
    (2) web browser
    (3) Domain Name Server
    (4) hypertext viewer
    (5) None of these

    Show Answer


    Solution:2
  12. How many margins are on a page ?
    (1) Two (header and footer)
    (2) Four (top, bottom, right, left)
    (3) Two (landscape and Portrait)
    (4) Two (top and bottom)
    (5) None of these

    Show Answer


    Solution:2
  13. Which key is used in combination with another key to perform a specific- task?
    (1) function
    (2) arrow
    (3) space bar
    (4) control
    (5) None of these

    Show Answer


    Solution:4
  14. What is an embedded system?
    (1) A program that comes wrapped in a box
    (2) A program that is permanently part of computer
    (3) A computer that is part of a larger computer
    (4) A computer and software system that controls a machine or appliance
    (5) None of these

    Show Answer


    Solution:4
  15.  Text in a column is generally alinged………………….
    (1) justified
    (2) right
    (3) center
    (4) left
    (5) None of these

    Show Answer


    Solution:4
  16.  A directory within a directotry is called…………….
    (1) Mini Directotry
    (2) Junior Directory
    (3) Part Directory
    (4) Sub Directory
    (5) None of these

    Show Answer


    Solution:4
  17. Why should you delete unknown e-mail attachments?
    (1) You could go to jail
    (2) the person could track you down and hurt you
    (3) it is bad manners
    (4) it mights contains a virus that could hurt your computer
    (5) None of these

    Show Answer


    Solution:4
  18. Selecting the Zoom command ……………
    (1) opens a copy of the document in a different view
    (2) prints a copy of the dislayed document
    (3) changes the magnification of the displayed document
    (4) saves a copy of the displayed document
    (5) None of these

    Show Answer


    Solution:3
  19.  Name the hardware equipment that a computer is made up of……………….
    (1) monitor, the central processing unit (CPU), the keyboard, mouse, software and network
    (2) monitor, the central processing unit (CPU), the keyboard, mouse, programs , and network
    (3) monitor, the central processing unit (CPU), the keyboard, mouse, printer and modem
    (4) monitor, the central processing unit (CPU), the keyboard, mouse, applications and network
    (5) None zit these

    Show Answer


    Solution:3
  20. Where are programs and data kept while the processor is using them?
    (1) Main Memory
    (2) Secondary memory
    (3) Disk memory ,
    (4) Program memory
    (5) None of these

    Show Answer


    Solution:1

Leave A Reply

Your email address will not be published.

Click Here to ASK Doubtsx