Sunday, 4 September 2016

Computer Quiz for IBPS Exam

Q1. What is the term used for measurement of how fast data moves from one place to another?
(a) data per unit
(b) bits per second
(c) bits per hour
(e) ratio per bit
(d) None of the above

Q2. Functions of keys F1, F2 and F3 are _____________ respectively.
(a) activating menu bar, search and renaming selected icon
(b) search, reboot and activating menu bar
(c) activating help, renaming selected icon and search
(d) reboot, activating help and refresh
(e) activating help, reboot, renaming selected icon

Q3. What type of monitoring file is commonly used on and accepted from Internet sites?
(b) Phishes 
(c) Cookies                               
(d) Trojans
(e) None of the above

Q4. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
(a) Haptics                                        
(b) Caves
(c) Biometrics                     
(d) RFID
(e) All of above

Q5. What is Disk operating system referred for?
(a) Memory management system
(b) Operating system which contains the disk-oriented commands and uses disk devices for permanent storage
(c) DOS
(d) Both (b) and (c)
(e) None of these

Q6. What does the SMTP in an SMTP server stand for?
(a) Simple Mail Transfer Protocol 
(b) Serve Message Text Process 
(c) Short Messaging Text Process 
(d) Short Messaging Transfer Protocol
(e) Simple Messaging Text Process

Q7. Which among the following was the first graphical web browser?
(a) Mosaic 
(b) WAIS
(c) CERN
(d) Gopher
(e) None of the above

Q8. What is JDBC?
(a) Utility Software
(b) Application Software
(c) Application Programming Interface (API)
(d) Programming Language
(e) None of the above

Q9. Which of the following is any malicious computer program which is used to hack into a computer by misleading users of its true intent?
(a) Worm
(b) Spyware
(C) Trojan horse
(d) Keylogger
(e) VGA file

Q10. Which protocol is used to obtain an IP and other network configuration information from a server on local network?
(a) Transmission Control Protocol
(b) User Datagram Protocol
(c) Code division multiple access
(d) Dynamic Host Configuration Protocol
(e) None of the above

Q11. Name the first widespread computer virus for MS-DOS?
(a) Brain
(b) Handshake
(c) Code Red
(d) Melissa
(e) Sasser

Q12. A string of eight 0s and 1s is called a _______.
(a) megabyte
(b) byte 
(c) kilobyte 
(d) gigabyte
(e) bit

Q13. Name the input device from the given options, that cannot be used to work in MS Office?
(a) Scanner 
(b) Mouse 
(c) Keyboard 
(d) Joy stick 
(e) All of the above 

Q14. Which type of virus is generally scripted into common application programs like Excel and Word to infect the other documents and spreads to the other parts when the application is running.?
(a) Macro Viruses
(b) File infector virus
(c) Resident Viruses
(d) Boot virus
(e) Worms

Q15. Which of the following scrambles a message by applying a secret code?
(a) Audits
(b) Encryption 
(c) UPS
(d) Firewalls
(e) Encapsulation

Hello BA'ins, please share your SBI PO, GD and PI experience at


No comments:

Post a Comment