1. If you wish to extend the length of the network without having the signal degrade you would use a –
[A]Gateway
[B]Repeater
[C]Resonance
[D]Router
2. A repair for a known software bug usually available for no charge on the internet is called a-
[A]Tutorial
[B]Rectifier
[C]Version
[D]Patch
3. URL stands for-
[A]Uniform Resource Locater
[B]Uniform Research locater
[C]Universal Research List
[D]Uniform Research List
4. When data changes in multiple lists and all lists are not updated this causes,
[A]Duplicate data
[B]Data inconsistency
[C]Data redundancy
[D]Information overload
5. What is a backup?
[A]The ability to get a system up and running in the event of system failure or crash
[B]None of these
[C]Restoring the information backup
[D]An exact copy of a system’s information
6. The internet is-
[A]A communication system for a country
[B]A communication system for some states
[C]A large network of networks
[D]An internal communication system for a business
7. Computers that are portable and convenient for users who travel are known as-
[A]Fileservers
[B]Laptops
[C]Planners
[D]Minicomputers
8. What is the storage area of e-mail called?
[A]Directory
[B]Hard disk
[C]Folder
[D]Mail box
9. One advantage of dial up internet access is
[A]Modem speeds are very fast
[B]It utilises existing telephone services
[C]It uses broadband technology
[D]It uses a router for security
10. What is the process of copying software program from secondary storage medium to the hard disk called?
[A]Upload
[B]Installation
[C]Downloads
[D]Storage
11. Which process checks to ensure that the components of the computer are properly connected and operating properly?
[A]Saving
[B]Editing
[C]Booting
[D]Processing
12. A means of capturing an image (drawing a photo) so that it can be stored on a computer is______
[A]Scanner
[B]Keyboard
[C]Modem
[D]Software
13. An error in a computer program is_________
[A]Crash
[B]Power failure
[C]Virus
[D]Bug
14. Access control based on a person’s finger prints is an example of _________
[A]Characteristic security
[B]Finger print security
[C]Biometric identification
[D]Characteristic identification
15. The patterns of printed lines on the most products are called_________
[A]Barcodes
[B]Scanners
[C]Prices
[D]Scanner
Home
Computer Quiz
Computers
Computer Awareness for Upcoming Banking Exams 2012 ( Computer Quiz - 13)
Computer Awareness for Upcoming Banking Exams 2012 ( Computer Quiz - 13)
Subscribe to:
Post Comments (Atom)
Most Played Quizzes Last Week
-
1. There are two universities which are named in honour of Ahilya Bai. One is Devi Ahilya Vishwa Vidyalaya in Indore, Madhya Pradesh and the...
-
1. What was the old name of Varanasi(Banaras)? [A]Patliputra [B]Magadh [C]Indraprastha [D]Kashi 2. On which river bank Varanasi is situated...
-
1. Ratan Tata was the Chairman of which of the following conglomerates? Reliance Industries Aditya Birla Group Infosys Tata Group 2. ...
-
1. _________ and oxygen are two gases which make up the bulk of the atmosphere. Carbon Dioxide Nitrogen Carbon Monoxide Hydrogen 2. Is glo...
-
1. Which of the following is considered to be poor e-mail etiquette? [A]Have a proper sign off: Regards, Sincerely, etc. [B]Responding to me...
-
1. If you want to borrow a book, where will you go? Bookstore Library Museum Stationary 2. If you want to have a little fun in the water, th...
-
1. Which among the following books are not written by Sister Nivedita? [A]Kali the mother [B]The Webo Of Indian Life [C]The Religio...
-
1. Veer Savarkar is also known as _____? [A]Father of the Nation [B]Father Of Hindutva [C]Father of Bombay [D]Father of Jainism 2...
-
1. What is the original name of Bangalore in Kannada language? [A]Begur [B]Bangaru [C]Bengaluru [D]None of the above 2. Once called a pens...
-
1. Memento [A]Respectful; Worshipful [B]Token Reminder [C]Impose (A Fine); Collect (A Payment) [D]Old-Fashioned; Past The Prime 2. Migrant...
No comments:
Post a Comment