Computer Awareness-part1

40 Questions | Attempts: 551
Share
Please wait...
Question 1 / 40
0 %
0/100
Score 0/100
1. A program designed to destroy data on your computer which can travel to "infect" other computers is called a...........
Submit
Please wait...
About This Quiz
Computer Awareness-part1 - Quiz

This test is designed to assess your basic understanding and knowledge of computer.
You can take help regarding this article through this link, Computer Awareness-RBI Assistant Exam

Personalize your quiz and earn a certificate with your name on it!
2. A device that connects to a network without the use of cables is said to be............
Submit
3. To protect yourself from computer hacker intrusions you should install a ..............
Submit
4. Files deleted from hard disc are sent to
Submit
5. Password makes users capable
Submit
6. Junk e-mail is also called..............
Submit
7. A file is often referred to as a(n)............
Submit
8. What is Backup?
Submit
9. What is the default field extension for all Word documents?
Submit
10. Full form of CD-RW is
Submit
11. Linux is an example of...........
Submit
12. To view information on the web you must have a......
Submit
13. Which one of the following software applications would be the most appropriate for performing numerical and statistical calculations?
Submit
14. A ............... is used to read handwritten or printed text to make a digital image that is stored in memory
Submit
15. The type of software that control is the internal operations in the computer, and controls how the computer works with all its parts is which of the following?
Submit
16. What happens when operating system is loaded in RAM?
Submit
17. What is an E-mail attachment?  
Submit
18. A ................... pre- designed document that aleady has coordination fonts, a layout, and a background
Submit
19. File extension is used
Submit
20. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)......
Submit
21. A collection of interrelated records is called a........
Submit
22. The legal right to use software based on specific restrictions is granted via a......
Submit
23. What is the main folder on a storage device called?
Submit
24. What is the keyboard short-cut for new slide?
Submit
25. Compiling creates a(n)...........
Submit
26. Machine language uses
Submit
27. Vertical space between lines of text in document is called
Submit
28. Expansion cards are inserted into............
Submit
29. What is Gutter margin?
Submit
30. You organize files by storing them in...........
Submit
31. Specialized programs that assist users in locating information on the web are called........
Submit
32. When data changes in multiple lists and all lists are not updated the causes................
Submit
33. Removing and replacing devices without turning off your computer is referred to as.............
Submit
34. In page preview mode
Submit
35. ................. shows the files, folders, and drives on your computer making it easy to navigate from one location to another which within the file hierarchy
Submit
36. When you will start, your computer Boot routine will perform
Submit
37. What happens when you boot up a PC?
Submit
38. What type of computer are client computers (most of the time) in a client-server system?
Submit
39. ALU of CPU has
Submit
40. The................ manual tells you how to use a software program
Submit
View My Results

Quiz Review Timeline (Updated): Aug 17, 2017 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 17, 2017
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 03, 2012
    Quiz Created by
    Amar3383
Cancel
  • All
    All (40)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A program designed to destroy data on your computer which can travel...
A device that connects to a network without the use of cables is said...
To protect yourself from computer hacker intrusions you should install...
Files deleted from hard disc are sent to
Password makes users capable
Junk e-mail is also called..............
A file is often referred to as a(n)............
What is Backup?
What is the default field extension for all Word documents?
Full form of CD-RW is
Linux is an example of...........
To view information on the web you must have a......
Which one of the following software applications would be the most...
A ............... is used to read handwritten or printed text to make...
The type of software that control is the internal operations in the...
What happens when operating system is loaded in RAM?
What is an E-mail attachment?  
A ................... pre- designed document that aleady has...
File extension is used
A complete electronic circuit with transistors and other electronic...
A collection of interrelated records is called a........
The legal right to use software based on specific restrictions is...
What is the main folder on a storage device called?
What is the keyboard short-cut for new slide?
Compiling creates a(n)...........
Machine language uses
Vertical space between lines of text in document is called
Expansion cards are inserted into............
What is Gutter margin?
You organize files by storing them in...........
Specialized programs that assist users in locating information on the...
When data changes in multiple lists and all lists are not updated the...
Removing and replacing devices without turning off your computer is...
In page preview mode
................. shows the files, folders, and drives on your...
When you will start, your computer Boot routine will perform
What happens when you boot up a PC?
What type of computer are client computers (most of the time) in a...
ALU of CPU has
The................ manual tells you how to use a software program
Alert!

Advertisement