IBPS - Computer Knowledge Test

Test Instructions :

1. The Test is 1hr duration.
2. The Test Paper consists of 30 questions. The maximum marks are 30.
3. All the questions are multiple choice question type with three options for each question.
4. Out of the three options given for each question, only one option is the correct answer.
5. Each question is allotted 1 mark for each correct response.
6. 0.25 will be deducted for incorrect response of each question.
Start Test

   Time Left : 00 : 30    : 00

All components of your computer are either ____________  

  

  

  

  

  

The parts of a computer system that can be touched are collectively called as

  

  

  

  

  

________ is used by public and private enterprises to publish and share financial information with each and industry analysts across all computer platforms and the Internet?

  

  

  

  

  

To change the name of an Excel worksheet

  

  

  

  

  

_________ is the process of finding errors in software code

  

  

  

  

  

Usually downloaded into folders that hold temporary internet files,______ are written to your computer's hard disk by some of the Web sites you visit.

  

  

  

  

  

A ____ shares hardware, software, and data among authorized users.  

  

  

  

  

  

A ___ contains specific rules and words that express the logical steps of an algorithm

  

  

  

  

  

You organize files by storing them in ---

  

  

  

  

  

——————controls the way in which the computer system functions and provides a means : by which users are interact with the computer.

  

  

  

  

  

The issues that deal with the collection and use of data about individuals is _____  

  

  

  

  

  

A popular way to learn about computers without ever going to a classroom is called ___

  

  

  

  

  

The part of a computer that coordinates all its functions is called its –  

  

  

  

  

  

The term ”user interface” refers to

  

  

  

  

  

_____ are symbols that represents any character or combination of characters.  

  

  

  

  

  

The contents of __________ are lost when power of the computer is turned off.   

  

  

  

  

  

Encryption and decryption are functions of

  

  

  

  

  

____________ are specially designed computers that perform complex calculations extremely rapidly.

  

  

  

  

The ___ of software contains lists of commands and options

  

  

  

  

  

Video-conferencing requires a microphone, speakers, and a ___ attached to your computer

  

  

  

  

  

Which of the following is not a type of page margin?

  

  

  

  

  

In word, you can use styles to—

  

  

  

  

  

The file span of a CD ROM is

  

  

  

  

  

Which of the following is equal to 1,048,576 byte (approx one million byte)?

  

  

  

  

  

A word in a web page that, when clicked, opens another document ?  

  

  

  

  

  

The term ___ designates equipment that might be added to a computer system to enhance its functionality

  

  

  

  

  

Array is –

  

  

  

  

  

Unauthorized copying, of software to be used for personal gain instead of for personal backups is called _______  

  

  

  

  

  

——————meAns : that the data contained in a database is accurate and reliable

  

  

  

  

  

Which of the following software could assist someone who cannot use their hands for computer input?

  

  

  

  

  

Which of the following are computers that can be carried around easily?  

  

  

  

  

  

Hackers

  

  

  

  

  

A data warehouse

  

  

  

  

  

____ is processed by the computer into information

  

  

  

  

  

_____ are words that a programming language has set aside for its own use  

  

  

  

  

  

When you save to ____ , you data will remain intact even when the computer is turned off  

  

  

  

  

The operating system is the most common type of ____________ software.

  

  

  

  

The CPU and memory are located on the:

  

  

  

  

Which of the following types of tables constraints will prevent the entry of duplicate rows?

  

  

  

  

  

Which of the following is the equipment which holds the screen of a computer?

  

  

  

  

  

The name a user assigns to a document is called a(n)-

  

  

  

  

  

A network which connects cities or states is known as:

  

  

  

  

  

How many kilobytes make a megabyte?

  

  

  

  

  

The secret code that restricts entry to some programs …………….  

  

  

  

  

  

Which of the following does not correctly explain a desk - top computer?

  

  

  

  

  

The ___ icon represents an e-mail message that has not been read

  

  

  

  

  

You can open the consolidate dialog box by choosing Consolidate from the ……. menu.

  

  

  

  

  

A computer ___ is set of program instructions that can attach itself at a file, reproduce itself, and spread to other files.  

  

  

  

  

  

System Software Is the set of programs that enables your computer’s hardware devices and software to work together   

  

  

  

  

  

The ____ settings are automatic and standard.  

  

  

  

  

  

A computer cannot “boot” if it does not have the   

  

  

  

  

  

Where is newly received email store?

  

  

  

  

  

You can use the ___ bar to type a URL and display a Web page, or type a keyword to display a list of related Web pages.

  

  

  

  

  

A standard CD player accesses data information using which method?

  

  

  

  

  

A(n) —————— is aprivate corporate network,used exclusively by company employees.

  

  

  

  

  

In a computer most processing takes place in ……………………….  

  

  

  

  

  

Another word for the CPU is   

  

  

  

  

  

Special effect used to introduce slides in a presentation, are called   

  

  

  

  

  

What is the blinking symbol on computer screen?

  

  

  

  

  

 ..... is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law.      

  

  

  

  

One advantage of dial up internet access is that

  

  

  

  

  

A Web site address is a unique name that identifies a specific ____ on the Web  

  

  

  

  

  

You use a (n) _______ such as a keyboard or mouse, to input information.  

  

  

  

  

  

A Switch is a network device whose responsibility is to

  

  

  

  

What is the advantage of using basic HTML to create a document?

  

  

  

  

  

--------describe what is in database fields.

  

  

  

  

  

Cache and main memory will lose their contents when the power is off. They are___

  

  

  

  

  

Storage that retains its data after the power is turned off is referred to as

  

  

  

  

  

Microsoft Office is

  

  

  

  

  

How many megabytes make gigabytes?

  

  

  

  

  

Which ports connect special type of music instrument to sound cards?

  

  

  

  

  

Computers connected to LAN (Local Area Network) can

  

  

  

  

  

The path of creation of an executable is

  

  

  

  

  

The signal which shows that a computer is waiting for a comand from the user is

  

  

  

  

  

What is the permanent memory built into your computer called?

  

  

  

  

  

A desk to computer is also known as a   

  

  

  

  

  

After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:

  

  

  

  

Why it is unethical to share copyrighted files with your friends?

  

  

  

  

  

Oracle is an example of ___ application software

  

  

  

  

  

_______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses.

  

  

  

  

  

There are several primary categories of procedures. Which of the following is not a primary category of procedures

  

  

  

  

  

A device that connects to a network without the use of cables is called

  

  

  

  

  

ALU works on the instructions held in .......

  

  

  

  

  

RedHat Linux is an

  

  

  

  

The ___ controls a client’s computer resources

  

  

  

  

  

In the absence of parentheses, the order to operation is _________

  

  

  

  

  

Which part is the “brain” of the computer

  

  

  

  

  

The ____  becomes different shapes depending on the task you are performing   

  

  

  

  

  

Tangible parts of computer are called:  

  

  

  

  

  

____________ is data that has been organized or presented in a meaningful fashion.

  

  

  

  

What is full form of PROM?

  

  

  

  

  

A ___ is an example of an input device   

  

  

  

  

  

A term relating to sending data to a satellite is ______

  

  

  

  

  

TSO stands for

  

  

  

  

  

_____  ,  are words that a programming language has set aside for own use.

  

  

  

  

  

____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.

  

  

  

  

A ___ is the term used when a search engine returns a Web page that matches the search criteria

  

  

  

  

  

To open disk mouse the pointer is placed on disk icon and then –  

  

  

  

  

  

Which of the following can only have sequential access?

  

  

  

  

  

A _____ is a device attached to a host computer through cable.  

  

  

  

  

  

Note:
  • Click the 'Submit Test' button given in the bottom of this page to Submit your answers.
  • Test will be submitted automatically if the time expired.
  • Don't refresh the page.