Latest Banking jobs   »   Computer Quiz for IBPS Exam

Computer Quiz for IBPS Exam

Computer Quiz for IBPS Exam |_2.1

Q1. Which action can a user perform using an output device?
(a) input data
(b) store data
(c) scan data
(d) view or print data
(e) None of these 

Q2. Which among the following statement is closely related
to secondary storage?
(a) It is non-volatile and its content remains after power
is switched off
(b) It does not use magnetic media
(c) It consists of four main types of devices
(d) It does not store information for later retrieval
(e) It’s main purpose is to make interconnections of
networks
Q3. Which one of the following statements is not true for
data Buffer?
(a) A data buffer is a region of a physical memory storage
used to temporarily store data
(b) A buffer often adjusts timing by implementing a queue
(or FIFO) algorithm in memory
(c) A majority of buffers are implemented in software, which
typically use the ROM to store temporary data
(d) Buffers are often used in conjunction with I/O to
hardware, such as disk drives, sending or receiving data to or from a network
(e) None of the above
Q4. Which among the following is software application
commonly used to prepare a presentation/slide show?
(a) Adobe
(b) Power Point
(c) Outlook Express
(d) Internet Explorer
(e) Windows Explorer
Q5. A CD player can access data/information using which
method?
(a) Sequential access
(b) Random access
(c) Multivariate access
(d) All of these
(e) None of these
Q6. Each box in a spreadsheet is called a ________.
(a) Cell
(b) Block
(c) Field
(d) Table
(e) Empty space
Q7. ________key is the example of Toggle key
(a) Alt
(b) Shift
(c) Control
(d) Escape
(e) Caps Lock
Q8. Which among the following is one of the category of the
programs of system software?
(a) Utility Programs
(b) Operating System
(c) Language Translator
(d) All of the above
(e) None of these
Q9. Why is it unethical to share copyrighted files with your
friends?
(a) It is not unethical, because it is legal.
(b) It is unethical because the files are being given for
free.
(c) Sharing copyrighted files without permission breaks
copyright laws.
(d) It is not unethical because the files are being given
for free.
(e) It is not unethical – anyone can access a computer
Q10. Some viruses have delayed payload, which is sometimes
called a ____.
(a) time
(b) anti-virus
(c) bomb
(d) action
(e) call
Q11. Which computer was the first to use the magnetic drum
for memory?
(a) IBM – 650
(b) IBM – 7090
(c) IBM – 701
(d) IBM – 360
(e) None of these
Q12. Network Firewalls are used to protect against _________.
(a) Unauthorised Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) None of these
Q13. Which is the best definition among the given options of
a software package?
(a) A peripheral for computer system
(b) A set of computer programs used for a certain function
(c) A protection you can buy for a computer
(d) The box, manual and license agreement that accompany
commercial software
(e) None of these
Q14. The process that deals with the technical and
management issues of software development is ______.
(a) Delivery process
(b) Control process
(c) Software process
(d) Testing process
(e) Monitoring process
Q15. Which among the following property is of a disk’s
content that is recorded at the time of manufacture and that cannot be changed
or erased by the user?
(a) memory-only
(b) write-only
(c) once-only
(d) run-only

(e) read-only

Computer Quiz for IBPS Exam |_3.1

Computer Quiz for IBPS Exam |_4.1
Computer Quiz for IBPS Exam |_5.1
Computer Quiz for IBPS Exam |_6.1
Computer Quiz for IBPS Exam |_7.1

Leave a comment

Your email address will not be published. Required fields are marked *