1. If you wish to extend the length of the network without having the signal degrade you would use a –
[A]Gateway
[B]Repeater
[C]Resonance
[D]Router
2. A repair for a known software bug usually available for no charge on the internet is called a-
[A]Tutorial
[B]Rectifier
[C]Version
[D]Patch
3. URL stands for-
[A]Uniform Resource Locater
[B]Uniform Research locater
[C]Universal Research List
[D]Uniform Research List
4. When data changes in multiple lists and all lists are not updated this causes,
[A]Duplicate data
[B]Data inconsistency
[C]Data redundancy
[D]Information overload
5. What is a backup?
[A]The ability to get a system up and running in the event of system failure or crash
[B]None of these
[C]Restoring the information backup
[D]An exact copy of a system’s information
6. The internet is-
[A]A communication system for a country
[B]A communication system for some states
[C]A large network of networks
[D]An internal communication system for a business
7. Computers that are portable and convenient for users who travel are known as-
[A]Fileservers
[B]Laptops
[C]Planners
[D]Minicomputers
8. What is the storage area of e-mail called?
[A]Directory
[B]Hard disk
[C]Folder
[D]Mail box
9. One advantage of dial up internet access is
[A]Modem speeds are very fast
[B]It utilises existing telephone services
[C]It uses broadband technology
[D]It uses a router for security
10. What is the process of copying software program from secondary storage medium to the hard disk called?
[A]Upload
[B]Installation
[C]Downloads
[D]Storage
11. Which process checks to ensure that the components of the computer are properly connected and operating properly?
[A]Saving
[B]Editing
[C]Booting
[D]Processing
12. A means of capturing an image (drawing a photo) so that it can be stored on a computer is______
[A]Scanner
[B]Keyboard
[C]Modem
[D]Software
13. An error in a computer program is_________
[A]Crash
[B]Power failure
[C]Virus
[D]Bug
14. Access control based on a person’s finger prints is an example of _________
[A]Characteristic security
[B]Finger print security
[C]Biometric identification
[D]Characteristic identification
15. The patterns of printed lines on the most products are called_________
[A]Barcodes
[B]Scanners
[C]Prices
[D]Scanner
Home
Computer Quiz
Computers
Computer Awareness for Upcoming Banking Exams 2012 ( Computer Quiz - 13)
Computer Awareness for Upcoming Banking Exams 2012 ( Computer Quiz - 13)
Subscribe to:
Post Comments (Atom)
Most Played Quizzes Last Week
-
1. What is Baisakhi? A festival of harvest A festival of flowers A festival of colors A festival of lights 2. In which month is Baisakhi ...
-
1. In which year was Mahatma Jyotiba Phule born? 1827 1837 1847 1857 2. Which social reformer was Mahatma Jyotiba Phule's inspiration? I...
-
1. What is Bihu? A folk song of Assam A dance form of Assam A type of traditional food A popular festival of Assam 2. How many Bihus are...
-
1. When was Sri Aurobindo born? [A]15th August 1872 [B]12th May 1872 [C]1st April 1872 [D]16th July 1872 2. Who was Sri Aurobindo...
-
1. When is World Homeopathy Day celebrated? 10 Dec 10 Aug 10 Oct 10 Apr 2. Who is considered the father of homeopathy? Edward Jenner William...
-
1. What is Mahavir Jayanti? A Hindu festival A Buddhist festival A Jain festival A Sikh festival 2. Which Tirthankara is Mahavir Jayanti ...
-
1. Ratan Tata was the Chairman of which of the following conglomerates? Reliance Industries Aditya Birla Group Infosys Tata Group 2. ...
-
1. Which of the following is considered to be poor e-mail etiquette? [A]Have a proper sign off: Regards, Sincerely, etc. [B]Responding to me...
-
1. When is Ram Navami celebrated? In January In March or April In May In July 2. Ram Navami celebrates the birth of which Hindu god? Lord Sh...
-
1. What is Hanuman Jayanti? A Hindu festival A Buddhist festival A Jain festival A Sikh festival 2. In which month and day is Hanuman...
No comments:
Post a Comment