Saturday, 3 September 2016

Computer Quiz for IBPS Exam

Q1. Which bar is usually located below the Title Bar that provides categorized options?
(a) Menu Bar
(c) Toolbar
(b) Status bar
(d) Scroll Bar
(e) None of the above

Q2.  Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups? 
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting

Q3. In first generation of computers, they used ______.
(a) batch processing
(b) multithreading
(c) multiprogramming
(d) networking
(e) All of the above

Q4. A/(n) ___________ is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.
(a) email
(b) virus
(c) web beacon
(d) spam
(e) firewall

Q5. Which of the following terms is related to Internet connectivity? 
(a) IP
(b) TCP
(c) Gopher
(d) Both (a) and (b)
(e) All of the above

Q6. Which of the following is not example of Utility Software?
(a) Backup software
(b) Antivirus software
(c) Disk tools
(d) Media Players
(e) None of the above

Q7. Example of telecommunication device is a ________ .
(a) modem
(b) printer
(c) keyboard
(d) scanner
(e) mouse

Q8. What is ‘Trend Micro’?
(a) virus program
(b) anti-virus software
(c) just a program
(d) All of these
(e) None of the above

Q9. Storage of instructions in computer memory to enables it to perform a variety of tasks in sequence or intermittently. Who introduced the idea of stored program concepts?
(a) Charles Babbage
(b) Dennis Ritchie
(c) Howard Aiken
(d) John Neumann
(e) Anna Lovelace

Q10. Table of contents can be prepared by using :
(a) macros
(b) headings as H1, H2, H3 and more in the document
(c) by table of contents in tools menu
(d) (b) and (c)
(e) By File menu

Q11. Which of the following is the feature that keeps track of the right margin?
(a) Find and replace
(b) Word-wrap
(c) Right justified
(d) Left justified
(e) Ragged right

Q12. To move data from one part of the document to another, which of the following is used?
(a) Cut and Insert
(b) Copy and Paste
(c) Copy and Delete
(d) Copy and Undo
(e) Cut and Paste

Q13. Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
(a) hacker
(b) analyst
(c) instant messenger
(d) programmer
(e) spammer

Q14. To allow someone else schedule your meetings and appointments, ______ feature of Outlook is used. 
(a) Monthly calendar
(b) Event manager
(c) Appointments
(d) Delegate Access
(e) None of these

Q15. Which of the following is the valid subnet mask for class B IP Address?

Hello BA'ins, please share your SBI PO, GD and PI experience at


No comments:

Post a Comment