Computer knowledge quiz for IBPS PO mains exam :-
Q1. A device used for capturing an image (any drawing or photo) so that it can be stored on a computer is _______:
Q1. A device used for capturing an image (any drawing or photo) so that it can be stored on a computer is _______:
a) Modem
b) Software
c) Scanner
d) Keyboard
e) Mouse
Q2. An error in a computer program is known as _______:
a) Crash
b) Power Failure
c) Bug
d) Virus
e) Fatal Error
Q3. Access - control based on a person's fingerprints is an example of _____:
a) Biometric Identification
b) Characteristic Identification
c) Characteristic Security
d) Fingerprint Security
e) Logitstics
Q4. The patterns of printed lines on most products are called _____:
a) Prices
b) Striping
c) Scanners
d) OCR
e) Barcodes
Q5. Most mail programs automatically complete the following two parts in an e-mail?
a) From : and Body
b) From : and Date
c) From : and To:
d) From : and Subject
e) None of The Above
Q6. The computer's capability of distinguishing spoken words is called _____:
a) voice analysis
b) speech acknowledgement
c) voice recognition
d) speech interpretation
e) vocalization
Q7. Which of the following is an advantage of mounting an application on the web?
a) The possibility of 24 hour access for users
b) Creating a system that can be extended globally
c) Standardizing the design of the interface
d) All of The Above
e) None of The Above
Q8. The first page of a website is called the _____:
a) Homepage
b) Index
c) Java Script
d) Bookmark
e) Intro Page
Q9. ERP is an acronym for ______:
a) Enterprise Retirement Planning
b) Enterprise Relationship Planning
c) Enterprise Resource Planning
d) Enterprise Reorder Planning
e) Enterprise Retention Planning
Q10. The software that allows users to surf the Internet is called a/an _____:
a) Search Engine
b) Internet Service Provider
c) Multimedia Application
d) Browser
e) Internet Surfing Provider
Q11. The issues that deal with the collection and use of data about individual is _____:
a) Access
b) Publicity
c) Accuracy
d) Property
e) Privacy
Q12. A term related to sending data to a satellite is _____:
a) down link
b) modulate
c) demodulate
d) up link
e) interrelate
Q13. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with related information is called ______:
a) Hypermedia
b) Hypertext
c) HTML
d) URL
e) FTP
Q14. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage:
a) Data
b) Cyber
c) Internet
d) Meta Physical
e) Publicity
Q15. Hackers _______:
a) all have the same motive
b) after people who maintain
c) may legally break into computers
d) are people who are allergic to computers
e) break into other people's computers
Q16. Unauthorized copying of software to be used for personal gain instead of for personal backup is called ______:
a) program thievery
b) data snatching
c) software piracy
d) program looting
e) data looting
Q17. Junk e-mail is also called _____:
a) Spam
b) Spoof
c) Cookie Crumbs
d) Sniffer Script
e) Spill
Q18. What is usually used for displaying information at public places?
a) Monitors
b) Overhead Projections
c) Monitors and Overhead Projections
d) Touch Screen Kiosks
e) Loud Speakers
Q19. What is MP3:
a) A Mouse
b) A Printer
c) A Sound Format
d) A Scanner
e) A Mobile Phone
Q20. What is the most popular hardware for multimedia creations?
a) PCs
b) Minicomputers
c) Mainframe Computers
d) WANs
e) Super Computers
Q21. For sound recording, what is necessary?
a) Speaker
b) Microphone
c) Talker
d) Mouse
e) Telephone
Q22. The life - span of a CD - ROM is _______:
a) approximately one year
b) approximately two year
c) approximately five year
d) approximately twenty - five years
e) All of The Above
Q23. The ______setting are automatic and standard:
a) Default
b) CPU
c) Peripheral
d) User Friendly
e) Defaulter
Q24. What are the two parts of an E - mail address?
a) User Name and Street Address
b) Legal Name and Phone Number
c) User Name and Domain Name
d) Initials and Password
e) User Name and Recipient Name
Q25. Participate can see and hear each other in a/an:
a) Electronic Mail System
b) Message System
c) Tele - Conference
d) Bulletin Board
d) Bulletin Board