Wednesday, 30 May 2012

Computer Awareness Quiz -32 Ibps exam

1.Most mail programs automatically complete the following two pain an e-mail:
A) From: and Body:
B)From: and Date:
C) From: and Tl:
D)From: and Subject:
E) None of these


2. The computer's capability of distinguishing spoken words is called
A) voice analysis
B) speech acnowledgment
C) voice recognition
D) speech interpretation
E) vocalisation


3. Which of the following is an advantage of mounting an application on the Web ?
A) The possibility of 24-hour access for users
B) Creating a system that can extend globally
C) Standardising the design of the interface
D) All of these
E) None of these


4. The first page of a Web site is called the
A) Home page
B) Index
C) java script
D) Book mark
E) Intropage


5. ERP is an acronym for
A) Enterprise Retirement Planning
B) Enterprise Relationship Planning
C) Enterprise Resource Planning
D) Enterprise Reorder Planning
E) Enterprise Retention Planning


6. The a/an software that alows users to surf the Internet is called
A.)Search engine
B) Internet Service Provider (ISP)
C) Multimedia application
D) Browser
E) Internet Surfing provider


7. The issues that deal with the collection and use of data about individuals is
A) access
B) publicity
C) accuracy
D) property
E) privacy


8. A term related to sending data to a satellite is
A)downlink
B) modulate
C) demodulate
D) uplink
E) inter-relate


9. Online document containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with relative information are called
A) hypermedia
B) hypertext
C) HTML
D) URL
E) FTP


10. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and ____ security is concerned with protecting software from unauthorised tampering or damage.
A) data
B) cyber
C) Internet
D) metaphysical
E)publicity


11. Hackers
A) all have the same motive
B) are people who maintain computers
C) may legally break into computers as long as they do not do any damage
D) are people who are allergic to computers
E) break into other people's computers


12. Unauthorised copying of software to be used for personal gain instead of for personal backups is called
A) program thievery
B) data snatching
C) software piracy
D) program looting
E) data looting


13. Junk e-mail is also called
A) spam
B) spoof
C) cooke crumb
D) sniffer script
E) spill


14. What is usually used for displaying information at pulic places ?
A) Monitors
B) Overhead Projections
C) Monitors and Overhead Projections
D) Touch screen Kiosks
E) Loud Speakers


15. What is MP3 ?
A) A Mobile Phone
B) A Mouse
C) A sound format
D) A scanner
E) A Printer

Computer Awareness Quiz -32

No comments:

Post a Comment