IBPS Computer Quiz

1.         
The altering of data so that it is not
usable unless the changes are undone is—

(1) Biometrics                          (2) Compression
(3) Encryption                          (4) Ergonomics
(5) None of these

2.         
A communication processor that connects
dissimilar networks by providing the translation from one set of protocol to
another is—

About Course:

This package Includes IBPS PO Study Material -  Subscribe Now

About Bank Mahapack
If you are preparing for more than 1 Banking & Insurance exams then this is the pack we recommend you buy.

It is most cost effective and you get access to 100% digital content for Bank & Insurance exams on Adda247.

Banking & Insurance Exams Covered in this Pack

IBPS RRB Mains, IBPS CLERK, IBPS PO, LIC ASSISTANT, IBPS SO, IBPS PO Mains, SBI PO, SBI Clerk, Assistant, IBPS RRB PO Prelims etc. 

Additionally you can crack any private bank job exam with content in this pack.

What all You Get

  • All Interactive Live Classes by best teachers
  • All Recorded Video Courses designed by experts
  • All Tests Series
  • All eBooks
  • Doubt Clearing by experts
  • Personality Development Courses like Spoken English, Interview Techniques and more...

Bank & Insurance Mahapack Highlights 

  • Structured course content
  • Recorded classes available if you miss any live class
  • Previous Years’ Papers of all upcoming exams.
  • Full Length Mocks based on the latest pattern with detailed solutions (video solutions for certain topics)
  • Topic level knowledge tests
  • Strategy sessions, time management & Preparation tips from the experts
  • Language: English & Hindi Medium

MPN: BA-E-LC-3935

Bank Maha Pack
  1. Unlimited Live Classes & Recorded Video Courses
  2. Unlimited Tests and eBooks
  3. 1 Lakh+ Selections
Validity
  1. 6 Months
  2. 1 Month
  3. 3 Months
5499 458/month
BUY NOW
(1) Bridge                                  (2) Gateway
(3) Router                                 (4) Modem
(5) All of these
3.         
 COBOL
is widely used in _________ applications
(1) Commercial                       (2)
Scientific
(3) Space                                   (4)
Mathematical
(5) None
4.         
Unwanted repetitious messages, such as
unsolicited bulk e-mail is known as
(1) Spam                                    (2)
Trash
(3) Calibri                                   (4)
Courier
(5) None
5.         
…………….are used to identify a user who
returns to a Website.
(1) Cookies                               (2) Plug-ins
(3) Scripts                                  (4) ASPs
(5) None of these
6.         
When a computer runs a program, the ____
progresses through the program’s sequence of instructions.
(1) AMD                                     (2) ASCII
(3) CPU                                       (4) transistor
(5) None of these
7.         
The computer needs additional components called
___ to accomplish its input, output, and storage functions.
(1) Mice                                     (2) specifications
(3) architecture                       (4) peripherals
(5) None of these
8.         
To contact people using the Internet, you most
often use their
(1)
Domain names                 (2) e-mail
addresses
(3)
usernames                         (4) passwords   
(5)
None of these
9.         
The trend of digital electronic devices becoming
smaller and increasingly powerful has fully supported the move to an
increasingly ____workforce.
(1)
desktop                               (2) intelligent
(3)
server                                  (4)
mobile          
(5)
None of these
10.     
___hard drives are permanently located inside
the system unit and are not designed to be removed, unless they need to be
repaired or replaced.
(1)
Static                                    (2) Internal
(3)
External                               (4)
Remove
(5) None of these
Answer
Qns
Ans
Qns
Ans
1
3
6
3
2
2
7
4
3
1
8
2
4
1
9
4
5
1
10
2