Monday, March 2, 2015

Computer Quiz for Bank PO Exams- IBPS PO, SBI PO, RRB

Computer Quiz for Bank PO Exams
(1) Another name for a program is 
  1. Software
  2. Procedure
  3. Typology
  4. Utilities
  5. Userware
(2) ____________ is a communication technology used by some incoming mail servers.
  1. Telnet
  2. TCP
  3. FTP
  4. GIF
  5. POP3
(3) The two basic parts of URLs are
  1. TCP and IP
  2. TCP/IP and ISP
  3. TCP and FTP
  4. Destination and device
  5. The protocol and the domain name
(4) The primary purpose of software is to turn data into :
  1. Information
  2. Programs
  3. Objects
  4. Charts
  5. Websites
(5) The ___________database is the most widely used database structure.
  1. hierarchical
  2. general
  3. standard
  4. table
  5. relational
(6) Mail from unwanted senders can be blocked by
  1. Not buying anything online so that junk mail senders will not have your emails.
  2. sending them nasty replies when they send any mail
  3. using mail filters
  4. clickingthe Unsubscribe link
  5. e-mailingthem and asking to be removed from the list
(7) POP denotes
  1. Post Office Program
  2. Post Office Protocol
  3. Popular Office Program
  4. Protocol on Protocol
  5. Program of Programmer
(8) How many gigabytes are there in a petabyte?
  1. 1000
  2. 001
  3. 100
  4. 1000000
  5. 5000000
(9) For a browser to connect to other resources, the location or address of the resources must be specified. These addresses are called.
  1. MSN
  2. e-mail forms
  3. packets
  4. Ids
  5. URLs
(10) The extensions .gov, .edu, .mil, and .net are called
  1. mail to addresses
  2. add-ons
  3. domain codes
  4. DNSs
  5. e-mail targets
(11) Software that is actively utilised by end-users( like Word or Photoshop) is called
  1. actionware
  2. operating system
  3. system software
  4. driver
  5. application software
(12)Using a_________helps to place an image into a love video conference.
  1. printer
  2. digital camera
  3. video camera
  4. webcam
  5. scanner
(13) Programmes designed to perform specific tasks related to managing computer resources are called.
  1. Operating System
  2. helper software
  3. system software
  4. application software
  5. utility program
(14)A rectangular are on a computer screen that can contain a document, program, or messages is referred t as a(n).
  1. field
  2. opening
  3. window
  4. tublet 
  5. cell
(15)The storage locations in the internal storage of a CPU is called
  1. reference points
  2. addresses
  3. contents
  4. mask
  5. locations
(16)Of the following types of computers, which is the most powerful?
  1. laptop
  2. mainframe computer
  3. minicomputer
  4. supercomputer
  5. microcomputer
(17)An input device which can read characters directly from an ordinary piece of paper is
  1. OMR
  2. POS
  3. OCR
  4. MSI
  5. CD
(18)The radian of a number system
  1. has nothing to do with digit position value
  2. equals the number of its distinct counting digits
  3. is more than the number of its distinct counting digits
  4. is always an even number
  5. is variable
(19) Which of the following statements is false?
  1. Passwords are case-sensitive
  2. Passwords are not echoed on the screen for security reasons
  3. A good password should be not more than six characters long
  4. Password is a secret code that authenticates a person to the computer
  5. Passwords should be changed frequently
(20) The most common method for gaining access to the internet is through a
  1. dumb terminal
  2. keyboard
  3. provider or host computer
  4. virtual provider or computer
  5. point-to-point computer

Answers of above questions
  1. (1) Software
  2. (5) POP3
  3. (5)the protocol and the domain name
  4. (1)Information
  5. (5)relational
  6. (3)using mail filters
  7. (2)Post Offices Protocol
  8. (4)1000000
  9. (5)URLs
  10. (4)DNSs
  11. (5)application software
  12. (4)Webcam
  13. (5)utility program
  14. (3)Window
  15. (2)addresses
  16. (4)supercomputer
  17. (3)OCR
  18. (2)equals the number of its distinct counting digits
  19. (3)A good password should be not more than six characters long
  20. (3) Provider or host computer

Get Study Materials in Your E-Mail


0 comments:

Post a Comment

Leave your comment but never use bad words otherwise you will be blocked.