Computer Quiz

 Computer Questions asked in IBPS PO 2012

1. _____ allows users to upload files to an online site so they can be viewed and edited from another location?
(1) General-purpose applications
 (2) Microsoft Outlook
(3) Wed-hosted technology
 (4) Office Live
(5) None of these

 2. What feature adjusts the top and bottom margins so that the text is centered vertically on the printed page?
(1) Vertical justifying
(2) Vertical adjusting
(3) Dual centering
(4) Horizontal centering
(5) Vertical centering

 3. Which of these is not a means of personal communication on the internet?
(1) Chat
(2) Instant messaging
(3) Instant’s (
4) Electronic mail
(5) None of these

4. What is the overall term for creating? Editing Formatting Storing Retrieving and printing a text document?
(1) Word processing
(2) Spreadsheet design
 (3) Web design
(4) Database management
(5) Presentation generation

5. Fourth-generation mobile technology provides enhanced capabilities allowing the transfer of both_________ data including full-motion video, high-speed Internet access, and videoconferencing?
 (1) Video data and information
 (2) Voice and no voice
(3) Music and video
(4) Video and audio
(5) None of these

6._____ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses?
(1) Cyber gaming crime
(2) Memory shaving
(3) Syn flooding
(4) Software piracy
 (5) None of these

7. Which of these is a point-and-draw device?
(1) Mouse
(2) Scanner
(3) Printer
(4) CD-ROM

 8. The letter and number of the intersecting column and row is the______?
(1) Cell location
 (2) Cell position
(3) Cell address
(4) Cell coordinates
(5) Cell contents

 9. A set of rules for telling the computer what operations to perform is called a _______?
(1) Procedural language
 (2) Structures
(3) Natural language
(4) Command language
 (5) Programming language

10. A detailed written description of the programming cycle and the program along with the test results and a printout of the program is called _______?
(1) Documentation
 (2) Output
 (3) Reporting
(4) Spec sheets
(5) Directory

11. Forms that are used to organize business data into rows and columns are called _______?
 (1) Transaction sheets
(2) Registers
(3) Business forms
 (4) sheet-spreads
 (5) Spreadsheets
Ans- 5

12. In Power Point, the Header & Footer button can be found on the Insert tab in what group?
 (1) Illustrations group
(2) Object group
(3) Text group
(4) Tables group
 (5) None of these
Ans- 3

13. A(n) ______ is a set of programs designed to manage the resources of a computer, including starting the computer managing programs, managing memory and coordinating tasks between input and output devices?
(1) Application suite
(2) Compiler
(3) Input/output system
 (4) Interface
(5) Operating system (OS)
Ans- 5

14. A typical slide in a slide presentation would not include ________?
(1) Photo images charts, and graphs
(2) Graphs and clip art.
(3) Clip art and audio clips
(4) full-motion video
(5) Content templates,

15. The PC productivity tool that manipulates data organized in rows and columns is called a ____?
(1) Spreadsheet
(2) Word processing document
(3) Presentation mechanism
(4) Database record manager
(5) EDI creator
Ans- 1

16. In the absence of parentheses, the order of operation is ________?
(1) Exponentiation, addition or subtraction, multiplication or division (2) Addition or subtraction, multiplication or division, exponentiation (3) Multiplication or division, exponentiation, addition or subtraction (4) Exponentiation, multiplication or division, addition or subtraction (5) Addition or subtraction, exponentiation, Multiplication or division

 17. To find the Paste Special option, you use the Clipboard group on the tab of Power Point?
(1) Design
(2) Slide Show
(3) Page Layout
(4) Insert
(5) Home
Ans- 5

18. A(n)________ program is one that is ready to run and does not need to be altered in any way?
(1) Interpreter
(2) High-level
(3) Compiler
 (4) COBOL
(5) Executable

19. Usually downloaded into folders that hold temporary Internet files, ________ are written to your computer's hard disk by some of the Web sites you visit? 
(1) Anonymous files
(2) Behavior files
(3) Banner ads
(4) Large files
(5) Cookies
Ans- 5

20. What is the easiest way to change the phrase, revenues, profits, gross margin, to read revenues, profits, and gross margin?
(1) Use the insert mode, position the cursor before the g in gross, then type the word and followed by space
(2) Use the insert mode, position the cursor after the g in gross, then type the word and followed by a space
(3) Use the overtype mode, position the cursor before the g in gross, then type the word and followed by a space
(4) Use the overtype mode, position the cursor after the g in gross, then type the word and followed by a space
(5) None of these

 21. A program, either talk or music that is made available in digital format for automatic download over the Internet is called a _______?
(1) Wiki
(2) Broadcast
(3) vodcast
 (4) Blog
(5) Podcast
Ans- 5

22. Which PowerPoint view displays each slide of the presentation as a thumbnail and is useful rearranging slides?
(1) Slide Sorter
(2) Slide Show
(3) Slide Master
(4) Notes Page
(5) Slide Design
Ans- 1

23. Different components on the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called?
(1) Conductors
(2) Buses
(3) Connectors
(4) Consecutives
(5) None of these
Ans- 2

24. What is the name given to those applications that combine text, sound, graphics, motion video, and/or animation?
(1) Motion ware
(2) An graphics
 (3) Videos capes
 (4) Multimedia
(5) maxomedia
Ans- 4

 25. A USB communication device that supports data encryption for secure wireless communication for notebook users is called a______?
(1) USB wireless network adapter
(2) Wireless switch
 (3) Wireless hub
(4) Router
(5) None of these
Ans- 1

 26. An____ language reflects the way people think mathematically? (1) Cross-platform programming
(2) 3GL business programming
 (3) Event-driven programming
(4) Functional
(5) None of these
Ans- 4

 27. When entering text within a document the Enter key is normally pressed at the end of every ________?
(1) Line
 (2) Heritance
(3) Paragraph
(4) Word
(5) File

28. When a real-time telephone call between people is made over the Internet using computers, it is called _______?
 (1) A chat session
 (2) An e-rnail
(3) An instant message
 (4) Internet telephony
(5) None of these.
Ans- 4

 29. Which of the following is the first step in sizing a window?
(1) Point to the title bar
(2) Pull down the View menu to display the toolbar
(3) Point to any corner or border
(4) Pull down the View menu and change to large icons
 (5) None of these
Ans- 3

30. Which of the following software could assist someone who cannot use their hands for computer input?
 (1) Video conferencing (2) Speech recognition
 (3) Audio digitizer
(4) Synthesizer
(5) None of these
Ans- 2

31. ______ a document means the file is transferred from another computer to your computer?
(1) Uploading
(2) Really Simple Syndication (RSS)
(3) Accessing
(4) Downloading
 (5) Upgrading
Ans- 4

32. Which computer memory is used for storing programs and data Ram being processed by the CPU?
(1) Mass memory
(2) Internal memory
(3) Non-volatile memory
(4) PROM
 (5) None of these
Ans- 2

33. Computers that control processes accept data in a continuous__________?
 (1) Data traffic pattern
(2) Data highway
(3) Infinite loop
(4) Feedback loop
(5) Slot
Ans- 3

34. What refers to a set of characters of a particular design?
 (1) Key face
 (2) Formation
 (3) Allograph
 (4) Stencil
 (5) Typeface
Ans- 5

 35. _______ is used by public and private enterprises to publish and share financial information with each other and industry analysts across all computer platforms and the Internet
 (1) Extensible Markup Language (EML)
 (2) Extensible Business Reporting Language (XBRL)
(3) Enterprise Application Integration (EAI)
 (4) Sales Force Automation (SFA) software
 (5) None of these
Ans- 2

36. Which part of the computer is used for calculating and comparing?
 (1) ALU
(2) Control unit
 (3) Disk unit
(4) Modem
(5) None of these
Ans-  1

37. The method of Internet access that requires a phone line, but offers faster access speeds than dial-up is the ________ connection?
 (1) Cable access
(2) Satellite access
(3) fiber-optic service
 (4) Digital Subscriber Line (DSI)
 (5) Modem
Ans- 4

38. _______ software creates a mirror image of the entire hard disk, including the operating system, applications, files, and data?
 (1) Operating system
(2) Backup software
(3) Utility programs
 (4) Driver imaging
(5) None of these
Ans- 4

39. What is a URL?
 (1) A computer software program
 (2) A type of programming object
(3) Address of a document or "page" on the World Wide Web
(4) An acronym for Unlimited Resources for Learning
 (5) a piece of hardware
Ans- 3

 40. What is the significance of a faded (dimmed) command in a pull-down menu?
(1) The command is not currently accessible
(2) A dialog box appears if the command is selected
 (3) A Help window appears if the command is selected
(4) There are no equivalent keystrokes for the particular command (5) None of these
Ans- 1

41. Your business has contracted with another company to have them host and run an application for your company over the Internet. The company providing this service to your business is called a ________?
 (1) Internet service provider
 (2) Internet access provider
 (3) Application service provider
(4) Application access provider
 (5) Outsource agency
Ans- 4

 42. An________ allows you to access your e-mail from anywhere? (1) Forum
 (2) Webmail interface
 (3) Message Board
(4) Weblog
(5) None of these
Ans- 2

43. Which of the following would you find on LinkedIn?
 (1) Games
 (2) Connections
 (3) Chat
(4) Applications
 (5) None of these
Ans- 2

 44. _____ is a technique that is used to send more than one call over a single line?
 (1) Digital transmission
 (2) Infrared transmission
(3) Digitizing
(4) Streaming
(5) Multiplexing
Ans- 5

 45. The Search Companion can________?
(1) Locate all files containing a specified phrase
 (2) Restrict its search to a specified set of folders
(3) Locate all files containing a specified phrase and restrict its search to a specified set of folders
(4) Cannot locate all files containing a specified phrase or restrict its search to a specified set of folders
(5) None of these
Ans- 3

46. Which of the following cannot be part of an e-mail address?
(1) Period (.)
(2) At sign (@)
(3) Space ( )
 (4) Underscore (_)
(5) None of these
Ans- 3

 47. Which of the following must be contained in a URL?
(1) A protocol identifier
 (2) The letters, www.
(3) The unique registered domain name
(4) www. and the unique registered domain name
 (5) A protocol identifier, www. and the unique registered domain name
Ans- 4

48. Which of the following information systems focuses on making manufacturing processes more efficient and of higher quality?
(1) Computer-aided manufacturing
(2) Computer-integrated manufacturing
(3) Computer-aided software engineering
(4) Computer-aided system engineering
(5) None of these
Ans- 2

49. A mistake in an algorithm that causes incorrect results is called a _________?
(1) Logical error
(2) Syntax error
(3) Procedural error
(4) Compiler error
(5) Machine error
Ans- 1

 50. A device for changing the connection on a connector to a different configuration is ______?
 (1) A converter
(2) A component
 (3) An attachment adapter
(4) An adepter
(5) Voltmeter
Ans- 4

No comments:

Post a comment