Computer Quiz for IBPS | | GovernmentAdda
Home / Computer Awareness / Computer Quiz for IBPS

Computer Quiz for IBPS

IB Security Assistant Complete Free Study Material PDF Free Download Now
SSC CGL,CPO,GD 2018 Study Material & Book Free PDF Free Download Now
IBPS Clerk 2018 Study Material & Book Free PDF Free Download Now
Quant Booster – A Complete Maths Shortcut Book (850+ Pages) Download Now
Reasoning & GI Booster -Power Bank Book (1200+ Pages)  Free Download Now

 

Print Friendly, PDF & Email

1. In addition to keying data directly into a database, data entry can be done from a(n)
1) input form
2) table
3) field
4) data dictionary
5) None of these

2. What is an e-mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an e-mail message
3) A malicious parasite that feeds off your messages and destroys the contents
4) A list of CC or BCC recipients
5) None of these

3. SMTP, FTP and DNS are applications of the ____ layer.
1) data link
2) network
3) transport
4) application
5) None of these

4. In a database, information should be organised and accessed according to which of the following?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these

5. A _______ is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these

6. A file extension is separated from the main file name with a(n) _______, but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these

7. A telephone number, a birth date, and a customer name are all examples of
1) a record
2) data
3) a file
4) a database
5) None of these

8. The term _______ designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these

9. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these

10. The real business and competitive value of information technology lies in
1) The software applications that are used by many companies
2) The capabilities of the software and value of the information, a business acquires and uses
3) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
4) The capabilities of the hardware and the speed at which it processes information
5) None of these

ANSWER:-

1) input form

2) A separate document from another program sent along with an e-mail message

3)application

4)Logical structure

5) bridge way

6)) period

7) a record

8) peripheral device

9)Control

10)2) The capabilities of the software and value of the information, a business acquires and uses

 

 Download English Power Book (2000+ Pages)  Free Download Now
Download Quant Power Bank (1000+ Pages)  Free Download Now

 

About Burning Desire

Check Also

1000+ Computer Awareness Questions pdf for banking ssc railway state pcs & other govt exams download free pdf

IB Security Assistant Complete Free Study Material PDF Free Download Now SSC CGL,CPO,GD 2018 Study …

error: