Twitter Facebook LinkedIn RSS Feed Email

Thursday 12 June 2014

COMPUTER QUIZ

[1]. All of the following are examples of real security and privacy risks EXCEPT
(1) hackers
(2) viruses
(3) Spam
(4) identity theft
(5) None of these
 Ans – Spam 


[2]. Which of the following is not an example of hardware?
(1) Scanner
(2) Printer
(3) Monitor
(4) Mouse
(5) Interpreter
Ans -  Interpreter


[3]. In Excel, this is a prerecorded formula that provides a shortcut for complex calculations.........
(1) Value
(2) Data Series
(3) Function
(4) Field
(5) None of these
Ans -  Function 


[4]. The process of trading goods over the Internet is known as ..............
(1) e-selling-n-buying
(2) e-trading
(3) e-finance
(4) e-salesmanship
(5) e-commerce
Ans - e-commerce

[5]. A device that connects to a network without the use of cables is said to be–
(1) distributed
(2) free
(3) centralized
(4) open source
(5) None of these
Ans - free 


[6]. Which of the following is a circuit that issue signals at regular intervals...?
(1) Circuit board
(2) Clock
(3) Circuit card
(4) Gates
(5) None of these
Ans - Clock 

 [7]. A set of related programs are known as-------------
(1) File
(2) Arrays
(3) Package
(4) Subscripts
(5) None of these
Ans -  Package 

 
[8]. The 0 and 1 in the binary numbering system are called binary digits or ....
(1) bytes
(2) kilobytes
(3) decimal bytes
(4) bits
(5) nibbles
Ans - bits

[9]. The 7-bit ASCII code widely used
(1) For data communication work
(2) In IBM mainframe models
(3) For coding external memory
(4) In large machines produced by non-IBM vendors
(5) None of the above
Ans- For data communication work

[10]. A hard copy would be prepared on a
(1) Line printer
(2) Dot matrix printer
(3) Type writer terminal
(4) Plotter
(5) All of the above
Ans - All of the above

2 comments:

  1. Can we have some more tough questions in this section ( just like asked in SBI exams ) ? It will help us a lot.

    Ty in advance :)

    ReplyDelete