Monday, 16 November 2015

IBPS Clerk 'V' Exam Computer Knowledge Quiz : 36



1. ______ is the process of finding errors in software code.
(1) Debugging    
(2) Compiling     
(3) interpreting
(4) testing                   
(5) None of these

2. In Excel, Chart are created using which option?
(1) chart table    
(2) pivot Table 
(3) pie Chart
(4) Bar Chart     
(5) None of these

3. Which of the following is not a common feature of software applications?
(1) Menus                    
(2) Windows      
(3) Help
(4) Search                   
(5) None of these

4. A _____ Contains buttons and menus that provide quick access to commonly used commands.
(1) too bar                  
(2) menu bar     
(3) window
(4) find             
(5) None of these


5. What is equipment used to capture information and commands?
(1) Output device                   
(2) Input device
(3) Storage device        
(4) Telecommunication device   
(5) None of these

6. A _____ contains specific rule and words that express the logical steps of an algorithm.
(1) programming language
(2) programming language structure
(3) syntax                   
(4) logic chart    
(5) None of these

7. Which key should be pressed to shat a new page is MS word?
(1) Down Cursor Key    
(2) Enter Key
(3) Shift+ Enter           
(4) Ctrl + New
(5) Shift + Ctrl + Enter

8. Which types of software is similar to an accountant’s worksheet?
(1) Word processing                
(2) Database
(3) Spreadsheets                    
(4) Graphics
(5) None of these

9. A terminal that cannot process any information is called _____ .
(1) Direct access terminal
(2) Intelligent terminal
(3) Blind terminal
(4) Blind terminal
(5) Dumb terminal

10. They keys labeled 0-9 on the keyboard are called _____.
(1) Functions keys                  
(2) Numeric Keys
(3) Typewriter Keys                
(4) Special Keys
(5) Alpha Keys

11. The blank disk into sectors and assign a unique address to each one
(1) Ver             
(2) Format        
(3) Fat
(4) Chkdsk                  
(5) None of these

12. If you need to duplicate the entire disk, which command will you use ?
(1) Copy            
(2) Diskcopy      
(3) Chkdsk
(4) Format                  
(5) None of these

13. A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk
(1) system virus          
(2) Trojan horse virus
(3) file virus                 
(4) macro virus
(5) None of these

14. A result of a computer virus can not lead to ____ .
(1) Disk Crash             
(2) Mother Board Crash
(3) Corruption o f program      
(4) Deletion of files       
(5) None of these

15. Every computer connected to an intranet or extranet must have a distinct ______ .
(1) firewall                  
(2) proxy server 
(3) IP address
(4) domain name          
(5) None of these






No comments:

Post a Comment

Advertisement