Computer Awareness Quiz for SBI clerk mains

1.  To change selected text to all capital letters, click the change case button, then  click  .
(1)  UPPERCASE
(2)  UPPER ALL
(3)  CAPS LOCK
(4)  Lock Upper
(5)  Large Size

2.  A person who used his or her expertise to gain access to other people's computers to  get information illegally or do damage is a  .
(1)  Hacker
(2)  Analyst
(3)  instant messenger
(4)  programmer
(5)  spammer

3.  A device that connects to a network without the use of cables is said to be  .
(1)  distributed
(2)  free
(3)  centralized
(4)  open source
(5)  None of these

4.  Reusable optical storage will typically have the acronym  .
(1)  CD
(2)  DVD
(3)  ROM
(4)  RW
(5)  ROS

5.  The most common type of storage devices are  .
(1)  persistent
(2)  optical
(3)  magnetic
(4)  flash
(5)  steel

6.  Codes consisting of lines of varying widths or lengths that are computer-readable

are  known as  .
(1)  an ASCII code
(2)  a magnetic tape
(3)  an OCR scanner
(4)  a bar code
(5)  None of these

7.  A Web site's main page is called its  .
(1)  Home Page
(2)  Browser page
(3)  Search Page
(4)  Bookmark
(5)  None of these

8.  Part number, part description, and number of parts ordered are examples of  .
(1)  control
(2)  output
(3)  processing
(4)  feedback
(5)  input

9.  To access properties of an object, the mouse technique to use is  .
(1)  dragging
(2)  dropping
(3)  right-clicking
(4)  shift-clicking
(5)  None of these

10.  Computers use the    number system to store data and perform calculations.
(1)  binary
(2)  octal
(3)  decimal
(4)  hexadecimal
(5)  None of these

11.    are attempts by individuals to obtain confidential information from you by  falsifying their identity.
(1)  Phishing trips
(2)  Computer viruses
(3)  Spyware scams
(4)  Viruses
(5)  Phishing scams

12.  Why is it unethical to share copyrighted files with your friends?
(1)  It is not unethical, because it is legal.
(2)  It is unethical because the files are being given for free.
(3)  Sharing copyrighted files without permission breaks copyright laws.
(4)  It is not unethical because the files are being given for free.
(5)  It is not unethical - anyone can access a computer

13.  Which of the following can be used to select the entire document?
(1)  CTRL+A
(2)  ALT+F5
(3)  SHIFT+A
(4)  CTRL+K
(5)  CTRL+H

14.  To instruct Word to fit the width of a column to the contents of a table

automatically,  click the  button and then point to AutoFit Contents.
(1)  Fit to Form
(2)  Format
(3)  Auto size
(4)  Contents
(5)  AutoFit

15.  The simultaneous processing of two or more programs by multiple processors is  .
(1)  multiprogramming
(2)  multitasking
(3)  time-sharing
(4)  multiprocessing
(5)  None of these

16.  A disk's content that is recorded at the time of manufacture and that cannot be

changed  or erased by the user is  .
(1)  memory-only
(2)  write-only
(3)  once-only
(4)  run-only
(5)  read-only

17.  What is the permanent memory built into your computer called?
(1)  RAM
(2)  Floppy
(3)  CPU
(4)  CD-ROM
(5)  ROM

18.  The default view in Excel is     view.
(1)  Work
(2)  Auto
(3)  Normal
(4)  Roman
(5)  None of these

19.  What displays the contents of the active cell in Excel?
(1)  Name box
(2)  Row Headings
(3)  Formula bar
(4)  Task pane
(5)  None of these

20.  In Word you can force a page break  .
(1)  by positioning your cursor at the appropriate place and pressing the F1 key
(2)  by positioning your cursor at the appropriate place and pressing Ctrl+Enter
(3)  by using the Insert/Section Break
(4)  by changing the font size of your document
(5)  None of these

Answers :

1)  1   2)  1  3)  3   4)  4   5)  2
6)  4   7)  1  8)  5   9)  3   10)  1
11)  5  12)  3  13)  1  14)  5  15)  4
16)  5 17)  5 18)  3 19)  3 20)  3

Advertisements

0 comments:

Post a Comment

Register Here To Get Daily Bank Jobs Updates In Your Email Inbox

Enter Your E-Mail ID:

Don't Forget to Activate the Email Subscription from your Inbox