Twitter Facebook LinkedIn RSS Feed Email
12

Tuesday, 15 July 2014

COMPUTER QUIZ

[1]. All of the following are examples of real security and privacy risks EXCEPT (1) hackers (2) viruses (3) Spam (4) identity theft (5) None of these Ans – Spam  [2]. Which of the following is not an example of hardware? (1) Scanner (2) Printer (3) Monitor (4) Mouse (5) Interpreter Ans - Interpreter [3]. In Excel, this is a prerecorded formula that provides a shortcut for complex calculations......... (1) Value (2) Data Series (3) Function (4) Field (5) None of these Ans - Function  [4]. The process of trading goods over the Internet...

Sunday, 13 July 2014

COMPUTER QUIZ

[1] For running WINDOW minimum disk free space required is? (1) 8 MB (2) 10 MB (3) 16 MB (4) 32 MB (5) None of these Ans - 1 [2] Which of the following is not valid version of MS Office? (1) Office XP (2) Office Vista (3) Office 2007 (4) None of above (5) None of these Ans - 2 [3] What is the standard query language supported by most DBMSs? (1) Object-oriented language (2) Report generator language (3) Structured Query Language (SQL) (4) Query-by-example (QBE) (5) None of these Ans - 3 [4] The 7-bit ASCII code widely used (1) For data communication...

Thursday, 10 July 2014

COMPUTER QUIZ

[1] An……converts and executes one statement at a time. Ans - Interpreter [2] Software engineering primarily aims on? Ans - reliable and cost effective software [3] In computer The first item defined for a new system is its... Ans - output [4] A string of eight 0s and 1s is called a: Ans - Byte [5] DPI stands for? Ans - Dots per inch [6] In computer knowledge A link may be defined as the representation of an? Ans - Program [7] In computer Database software may be divided into Ans - three distinct categories [8] FTP is ? Ans - File transfer...

Wednesday, 9 July 2014

COMPUTER QUIZ

[1] A (n) ……….is a special visual and audio effect applied in Power-point to text or content. (1) Animation (2) Flash (3) Wipe (4) Dissolve (5) None of these Ans - 1 [2] Which process checks to ensure the components of the computer and operating are connected properly? (1) Booting (2) Processing (3) Saving (4) Editing (5) None of these Ans - 1 [3] The server on the internet is also known as ___________. (1) Repeater (2) Host (3) Gateway (4) AND Gate (5) None of these Ans - 2 [4] The _____ tells the computer how to use its components. (1) Utility (2)...

Sunday, 6 July 2014

COMPUTER QUIZ

[1] Linux is a_____ (1) Utility program for peer-to-peer file sharing (2) Real-time operating system (3) Network operating system (4) PDA platform (5) None of these Ans - 2 [2] The_________ runs the front-end applications software in a network. (1) Client (2) Database (3) Server (4) CPU (5) None of these Ans - 1 [3] What is RISC? (1) Storage Device (2) Computer Network (3) Microprocessor (4) Operating System (5) None of these Ans - 3 [4] Device on one network can communicate with devices on another network via_______ (1) File Server (2) Utility...

Thursday, 3 July 2014

COMPUTER QUIZ

[1] Which of the following is used to create newspaper style columns? (1) Format Tabs (2) Table Insert Table (3) Insert Textbox (4) Format Columns (5) None of the Above Ans - 4 [2] The communication between a processor and other devices inside the computer is done through? (1) Bus (2) Channel (3) Network Cable (4) Chip (5) None of these Ans - 1 [3] Which of the following groups contains graphical file extensions? (1) JPG, CPX, GCM (2) GIF, TCF, WMF (3) TCP, JPG, BMP (4) JPG, GIF, BMP (5) None of these Ans - 4 [4] Grouping and processing all...

Tuesday, 1 July 2014

COMPUTER Questions Asked in SBI- PO Exam on 28 & 29 June (Based on memory)

1. To erase from left hand side of a word we use- Backspace 2. Which of the following is input device- Scanner 3. Which is not a storage device? Mouse 4. Virtual memory is _____. It is a form of RAM 5. Hard disk is present in ______. Computer 6. Explanation and formation of programs is called ____. Documentation 7. A URL is_____. The address of a document or page on the world wide web 8. ROM tells ______. The computer to start up the operating system 9. Length of word in computer measured in _____. Bits 10.What is...

Sunday, 29 June 2014

COMPUTER QUIZ

1. Which of the following can be used to select the entire document? (1) CTRL+A (2) ALT+F5 (3) SHIFT+A (4) CTRL+K (5) CTRL+H Ans - 1 2. A concentric circle on a disk is called a________ (1) cylinder (2) track (3) head (4) sector (5) none of these Ans - 2 3. DSL is an example of a(n) ____________ connection. (1) network (2) wireless (3) slow (4) broadband (5) none of these Ans - 4 4. Instructions and data that are processed by the CPU are located in________ (1) CD-ROM (2) RAM (3) the hard disk (4) the motherboard (5) none of these Ans - 2 5....

Thursday, 26 June 2014

COMPUTER QUIZ

[1] WORM stands for? (1) Write Once Read Memory (2) Wanted Once Read Memory (3) Wanted Original Read Memory (4) Write Original Read Memory (5) None of these Ans - 1 [2] Memory unit is a part of ______ (1) Input Device (2) Control Unit (3) Output Device (4) Central Processing Unit (5) None of these Ans - 4 [3] Which of the following companies developed MS Office-2000? (1) Novell (2) Corel (3) Lotus (4) Microsoft (5) None of these Ans - 4 [4]  What is the meaning of ‗MICR‘? (1) Magnetic Ink Character Recognition (2) Magnetic Intelligence...

Tuesday, 24 June 2014

COMPUTER QUIZ

Q. 1. All of the following are examples of real security and privacy risks EXCEPT : (1) Hackers (2) Spam (3) Viruses (4) Identity theft (5) None of these Ans - 2 Q.2. A process known as --------------- is used by large retailers to study trends. (1) Data mining (2) Data selection (3) POS (4) Data conversion (5) None of these Ans - 1 Q.3.Which of the following is NOT one of the four major data processing functions of a computer ? (1) Gathering data (2) processing data into information (3) Analyzing the data or information (4) Storing the...

Sunday, 22 June 2014

COMPUTER QUIZ

Q.1. Which of the following word processors came first? (1) WordStar (2) WordPerfect (3) Lotus Notes (4) MS Word (5) None of these Ans - 1 Q.2. Who is considered as the father of computer? (1) Brass Pascal (2) Charles Babbage (3) William Napier (4) Bliase Pascal (5) None of these Ans - 2 Q.3. RTF stands for _____. (1) Real Time Tile (2) Real Text Format (3) Rich Time File (4) Rich Text Format (5) None of these Ans - 4 Q.4. Graphics is inserted as ________. (1) frame (2) box (3) page (4) name (5) None of these Ans - 1 Q.5. Which one of the...

Thursday, 19 June 2014

COMPUTER QUIZ

[1] An error in a computer program— (1) Crash (2) Power Failure (3) Bug (4) Virus (5) None of these Ans - 3 [2] What is output ? (1) What the processor takes from the user (2) What the user gives to the processor (3) What the processor gives to the user (4) All of the above (5) None of these Ans - 3 [3] The component of a computer system with the circuitry to control interpretation and execution of an instruction is known as ______. (1) ALU (2) Memory (3) Control (4) CPU (5) None of these Ans - 2 [4] Window’s settings are recorded...

Tuesday, 17 June 2014

COMPUTER QUIZ

[1]  The point at which the flow of text in a document moves to the top of a new page– (1) Page insert (2) Page break (3) Page format (4) All of the above (5) None of these Ans -  Page break  [2]  Multiprocessor is a computer system– (1) Where many CPU under a common control (2) Consisting of more than one input devices under common control (3) Where many output devices under (4) All of the above (5) None of these Ans -  Where many CPU under a common control [3]  Non-document files are– (1) Pure ASCII files that...

Monday, 16 June 2014

SBI – PO Computer Question Asked in 14 & 15 June 2014

1.    .xls, .doc. are type of ____.   Extensions 2.    Server is used to share date with other computer due to _____.   Network 3.    Word Processing software is used to output _______.  Word Document 4.    Lifting software unethically is _____  Software piracy 5.    Computer which can be used by only one person?  Personal Computer 6.    A computer which connects to other computer and sends information...

Sunday, 15 June 2014

COMPUTER QUIZ

[1 ] Total memory of system can be known using? (1) DIR commands (2) MEM commands (3) Warm boot (4) TOT MEM commands (5)None of these Ans - MEM commands [2]  The meaning of double-click is? (1) Pushing and releasing the main mouse button twice in rapid succession when the on-tree mouse pointer is positioned over the desired item (2) Appearance of an icon (3) To take a selection from the document and move it to the clipboard (4) All of the above (5) None of these Ans - Pushing and releasing the main mouse button twice in rapid succession...

Thursday, 12 June 2014

COMPUTER QUIZ

[1]. All of the following are examples of real security and privacy risks EXCEPT (1) hackers (2) viruses (3) Spam (4) identity theft (5) None of these  Ans – Spam  [2]. Which of the following is not an example of hardware? (1) Scanner (2) Printer (3) Monitor (4) Mouse (5) Interpreter Ans -  Interpreter [3]. In Excel, this is a prerecorded formula that provides a shortcut for complex calculations......... (1) Value (2) Data Series (3) Function (4) Field (5) None of these Ans -  Function  [4]. The process of trading...

Tuesday, 10 June 2014

COMPUTER QUIZ

[1]. Which of the following animations cannot be done in PowerPoint? (1) bullet list, revealed one bullet point at a time (2) clip art - Fly in from the bottom (3) table, revealed row by row (4) chart, revealed by series (5) None of these Ans -  table, revealed row by row  [2]. Several views are available in MS Front Page. Which one of the following is NOT a valid view ? (1) Design View (2) Folders View (3) Navigation View (4) Web Server View (5) None of these Ans - Web Server View  [3]. One of the components of central processing...

Sunday, 8 June 2014

COMPUTER QUIZ

[1]. What is MP3? (1) A mouse (2) A Printer (3) A Sound format (4) A Scanner (5) None of these Ans -   A Sound format [2]. ____________ is a process that permits multiple computers to use the same IP address and hide their actual IP addresses from the Internet. (1) Routing (2) Network address translation (NAT) (3) Signature referencing (4) Packet filtering (5) None of these Ans -  Network address translation (NAT) [3]. What characteristic of read-only memory (ROM) makes it useful ? (1) ROM information can be easily updated. (2) Data...

Friday, 6 June 2014

COMPUTER QUIZ

[1]. The purpose of the primary key in a database is to : (1) unlock the database (2) provide a map of the data (3) uniquely identify a record (4) establish constraints on database operations (5) None of these Ans -  provide a map of the data [2]. Using Windows Explorer, a plus (+) sign in front of a folder indicates— (1) an open folder. (2) the folder contains subfolders. (3) a text file. (4) a graphics file (5) none of these  Ans -  the folder contains subfolders. [3]. All of the following statements concerning windows are true...