Basic Computer For Customer Engagement Operations (BPO)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Michael
M
Michael
Community Contributor
Quizzes Created: 1 | Total Attempts: 278
Questions: 40 | Attempts: 278

SettingsSettingsSettings
Basic Computer For Customer Engagement Operations (BPO) - Quiz

The pass mark for this test is 75%


Questions and Answers
  • 1. 

    Which of the following is not in the Microsoft Office suite.

    • A.

      AutoCad

    • B.

      Words

    • C.

      Publisher

    • D.

      PowerPoint

    Correct Answer
    A. AutoCad
    Explanation
    AutoCad is not in the Microsoft Office suite because it is a separate software developed by Autodesk, not Microsoft. Microsoft Office suite includes applications like Word, PowerPoint, and Publisher, which are commonly used for word processing, creating presentations, and designing publications respectively. AutoCad, on the other hand, is a computer-aided design (CAD) software used for creating 2D and 3D designs, primarily in the fields of architecture, engineering, and construction. Therefore, AutoCad does not belong to the Microsoft Office suite.

    Rate this question:

  • 2. 

    What is the short-cuts CTRL - V is used for:

    • A.

      Print the document

    • B.

      Cut the document

    • C.

      Paste the text/document

    • D.

      Copy the document

    Correct Answer
    C. Paste the text/document
    Explanation
    The shortcut CTRL - V is used to paste the text or document. When you have copied something, you can use this shortcut to insert it at the desired location. It is a convenient way to quickly transfer or duplicate information within a document or between different documents.

    Rate this question:

  • 3. 

    To log-on onto a secure network or computer a user must have a  

    • A.

      Username

    • B.

      Password

    • C.

      Username & password

    • D.

      User Pin code

    Correct Answer
    C. Username & password
    Explanation
    To log on to a secure network or computer, a user must have both a username and a password. These credentials are used to verify the user's identity and grant them access to the system. The username identifies the user, while the password serves as a secret code that only the user should know. By requiring both the username and password, the system ensures that only authorized individuals can gain entry, enhancing the security of the network or computer.

    Rate this question:

  • 4. 

    If a file is accidentally deleted it maybe possible to restore it from the  

    • A.

      WINDOWS folder

    • B.

      Recycle bin

    • C.

      Drive C:

    • D.

      Trash Can

    Correct Answer
    B. Recycle bin
    Explanation
    The correct answer is the Recycle bin. When a file is deleted from a computer, it is moved to the Recycle bin instead of being permanently deleted. This allows users to easily restore accidentally deleted files without the need for external backups or recovery tools. The Recycle bin acts as a temporary storage location for deleted files, giving users a chance to recover them before they are permanently removed from the system.

    Rate this question:

  • 5. 

    If you want to close a program you can (in Windows)

    • A.

      Click on the red box with a X at the top left of the screen

    • B.

      Click on the red box with a X at the top right of the screen

    • C.

      Click on the start at the bottom of the screen and chose shut down

    • D.

      Hold in the power button on the system box

    Correct Answer
    B. Click on the red box with a X at the top right of the screen
    Explanation
    In Windows, the standard way to close a program is by clicking on the red box with an X at the top right of the screen. This is a common design convention in Windows operating systems, where the X symbol represents the action of closing or exiting a program. Clicking on this button will close the program and remove it from the screen.

    Rate this question:

  • 6. 

    Computer is made up of four types of hardware, which of the following listed below is a piece of computer hardware?  

    • A.

      Norton antivirus

    • B.

      Microsoft Office

    • C.

      Software

    • D.

      Dual Inline Memory Module

    Correct Answer
    D. Dual Inline Memory Module
    Explanation
    A Dual Inline Memory Module (DIMM) is a type of computer hardware. It is a small circuit board that contains memory chips and is used to provide temporary storage for data and instructions that the computer needs to access quickly. Norton antivirus and Microsoft Office are software programs, not hardware. "Software" is a general term that refers to programs and applications that run on a computer, but it is not a specific piece of hardware. Therefore, the correct answer is Dual Inline Memory Module.

    Rate this question:

  • 7. 

    A monitor can also be called a  

    • A.

      TV

    • B.

      VDU

    • C.

      Display Board

    • D.

      Digitizer

    Correct Answer
    B. VDU
    Explanation
    A monitor can also be called a VDU, which stands for Visual Display Unit. This term is commonly used to refer to the device that displays visual output from a computer. It is an alternative term to "monitor" and is widely recognized in the field of computing.

    Rate this question:

  • 8. 

    At bed time one must always____________ 

    • A.

      Lock the computer

    • B.

      Shut-down the computer

    • C.

      Log-in to the computer

    • D.

      Log-off the computer

    Correct Answer
    B. Shut-down the computer
    Explanation
    At bedtime, it is important to shut down the computer. This helps to conserve energy and prevent any potential damage or overheating that could occur if the computer is left running for extended periods of time. Shutting down the computer also ensures that any unsaved work is properly closed and that the computer is ready for a fresh start the next time it is used.

    Rate this question:

  • 9. 

    Which of the following is not a operating system  

    • A.

      MacOS Sierra

    • B.

      Unix

    • C.

      Microsoft Word

    • D.

      Windows XP

    Correct Answer
    C. Microsoft Word
    Explanation
    Microsoft Word is not an operating system. It is a word processing software developed by Microsoft. Operating systems like macOS Sierra, Unix, and Windows XP are responsible for managing computer hardware and software resources and providing common services for computer programs. Microsoft Word, on the other hand, is an application that runs on top of an operating system and is used for creating and editing documents.

    Rate this question:

  • 10. 

    What does RAM stands for.

    • A.

      Red Alert Memory

    • B.

      Read Always Memory

    • C.

      Random Alert Memory

    • D.

      Random Access Memory

    Correct Answer
    D. Random Access Memory
    Explanation
    RAM stands for Random Access Memory. It is a type of computer memory that allows data to be stored and retrieved in any order, rather than sequentially. This means that the computer can quickly access any piece of data stored in RAM, making it a crucial component for the smooth functioning of a computer system. RAM is volatile memory, meaning that its contents are lost when the power is turned off.

    Rate this question:

  • 11. 

    Internal peripherals are devices that 

    • A.

      Attached to the outside of the system unit.

    • B.

      Parts that make up the monitor

    • C.

      The keys on your keyboard

    • D.

      Attached to the inside of the system unit.

    Correct Answer
    D. Attached to the inside of the system unit.
    Explanation
    The correct answer is "Attached to the inside of the system unit." Internal peripherals are devices that are connected or attached to the inside of the system unit, such as the hard drive, memory modules, and expansion cards. These components are essential for the functioning of the computer and are typically not visible from the outside.

    Rate this question:

  • 12. 

    When processing information with a computer there are four main actions undertaken, which is the correct order. 

    • A.

      Input, Output, Processing, Storage

    • B.

      Output, Processing, Storage, Input

    • C.

      Input, Storage, Output, Processing

    • D.

      Input, Processing, Output, Storage

    Correct Answer
    D. Input, Processing, Output, Storage
    Explanation
    When processing information with a computer, the first step is to input the data or information into the computer. After the input is received, the computer then processes the information by performing calculations or executing instructions. Once the processing is complete, the computer outputs the results or displays the information in a usable format. Finally, the processed information is stored in the computer's memory or storage devices for future use or reference. Therefore, the correct order of actions when processing information with a computer is input, processing, output, and storage.

    Rate this question:

  • 13. 

    You use all of the following to copy except.

    • A.

      Ctrl-C

    • B.

      Right click - copy

    • C.

      Command-C (Mac OS X)

    • D.

      Ctrl-V

    Correct Answer
    D. Ctrl-V
    Explanation
    The given answer is incorrect. Ctrl-V is not used for copying, but for pasting. To copy, you typically use Ctrl-C, Right click - copy, or Command-C (Mac OS X). Ctrl-V is used to paste the copied content.

    Rate this question:

  • 14. 

    A form of storage NOT commonly used today is a  

    • A.

      Universal Serial Bus

    • B.

      Digital Versatile Disc

    • C.

      Floppy Disk

    • D.

      Compact Disc-Re-writable

    Correct Answer
    C. Floppy Disk
    Explanation
    Floppy disks were a popular form of storage in the past, but they are not commonly used today. They had limited storage capacity and were easily prone to damage. With the advancement in technology, other storage options like Universal Serial Bus (USB), Digital Versatile Disc (DVD), and Compact Disc-Re-writable (CD-RW) offer larger storage capacities, faster data transfer rates, and better durability compared to floppy disks.

    Rate this question:

  • 15. 

    During electrical storms all computer hardware must be  

    • A.

      Left running

    • B.

      Shutdown and if possible disconnected from any power or communication sources

    • C.

      The system box turn off and all other hardware left on

    • D.

      Just the monitor turned off

    Correct Answer
    B. Shutdown and if possible disconnected from any power or communication sources
    Explanation
    During electrical storms, it is recommended to shut down and disconnect all computer hardware from power and communication sources. This is because electrical storms can cause power surges and lightning strikes, which can damage the hardware. By shutting down and disconnecting the hardware, the risk of damage is minimized.

    Rate this question:

  • 16. 

    To allow easy and efficient identification of files, you should apply some basic principles when saving. Which one listed is incorrect 

    • A.

      Store files in folders

    • B.

      Accept the suggested file name the software gives you

    • C.

      Name files appropriately

    • D.

      Store files in sub-folders

    Correct Answer
    B. Accept the suggested file name the software gives you
    Explanation
    Accepting the suggested file name the software gives you is incorrect because it may not accurately describe the content or purpose of the file. It is important to name files appropriately so that they can be easily identified and organized. Storing files in folders and sub-folders also helps in efficient file management.

    Rate this question:

  • 17. 

    Data on a computer is stored is quantities called Bits and Bytes. Which is the largest unit of measurement for computer data  

    • A.

      Kilobyte (KB)

    • B.

      Petabyte (PB)

    • C.

      Terabyte (TB)

    • D.

      Megabyte (MB)

    Correct Answer
    B. Petabyte (PB)
    Explanation
    The largest unit of measurement for computer data is the petabyte (PB). A petabyte is equal to 1,000 terabytes or 1,000,000 gigabytes. It is used to measure very large amounts of data, such as in big data analytics, scientific research, or large-scale storage systems.

    Rate this question:

  • 18. 

    Ports on a computer allow for external input and output devices to be attached to the motherboard of a computer. Which one of the following is an external input port  

    • A.

      Memory

    • B.

      Power port

    • C.

      Processor

    • D.

      CD/DVD Rom

    Correct Answer
    B. Power port
    Explanation
    A power port is an external input port on a computer that allows for the connection of the power adapter or cord. This port is used to provide electrical power to the computer, allowing it to function properly. Without a power port, the computer would not be able to receive the necessary power supply and would not be able to operate. Therefore, the power port is an essential external input port that enables the computer to be powered on and used.

    Rate this question:

  • 19. 

    Which of the following has a higher transmission speed

    • A.

      ISDN Modem (Integrated Services Digital Network)

    • B.

      NET Speed (dongles)

    • C.

      DSL Modem (Digital subscriber line)

    • D.

      T1 line

    Correct Answer
    C. DSL Modem (Digital subscriber line)
    Explanation
    A DSL modem (Digital Subscriber Line) has a higher transmission speed compared to the other options listed. DSL technology uses existing telephone lines to provide high-speed internet access. It offers faster download and upload speeds than ISDN modems, NET Speed dongles, and T1 lines. ISDN modems use digital telephony to transmit data but have slower speeds. NET Speed dongles are portable devices that connect to the internet via cellular networks and typically have lower speeds. T1 lines are dedicated high-speed connections but have slower speeds compared to DSL modems. Therefore, the DSL modem is the correct answer as it provides a higher transmission speed.

    Rate this question:

  • 20. 

    _________ is a browser  

    • A.

      Hotmail

    • B.

      Chrome

    • C.

      Gmail

    • D.

      Window Interface

    Correct Answer
    B. Chrome
    Explanation
    Chrome is a browser.

    Rate this question:

  • 21. 

    The device that is use to modulate and demodulate data that is transmitted via a communication channel is called a modem. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A modem is a device that is used to modulate and demodulate data, allowing it to be transmitted over a communication channel. Modulation is the process of converting digital data into analog signals for transmission, while demodulation is the process of converting the analog signals back into digital data. Therefore, a modem plays a crucial role in enabling communication between devices over a network.

    Rate this question:

  • 22. 

    The acronym URL stands for Uniform Resource Locator

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true. URL stands for Uniform Resource Locator. A URL is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. It is commonly used to access web pages on the internet.

    Rate this question:

  • 23. 

    The name given to the company responsible for providing users with the gateway to the internet is called a ISP.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The company responsible for providing users with the gateway to the internet is called an ISP, which stands for Internet Service Provider. ISPs are organizations that provide internet access to individuals, businesses, and other organizations. They offer various types of internet connections, such as dial-up, broadband, or wireless, and allow users to connect to the internet by providing them with the necessary infrastructure, equipment, and services. ISPs play a crucial role in enabling individuals and businesses to access and use the internet for various purposes, such as browsing websites, sending emails, and accessing online services.

    Rate this question:

  • 24. 

    Computers connected in a small geographical area is called a Wide Area Network

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is incorrect. Computers connected in a small geographical area are actually called a Local Area Network (LAN), not a Wide Area Network (WAN). A WAN is a network that covers a large geographical area, such as multiple cities or even countries.

    Rate this question:

  • 25. 

    Computers connected in a Large geographical area is called a Local Area Network

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is incorrect because computers connected in a large geographical area are not considered a Local Area Network (LAN). A LAN refers to a network that covers a small area, such as a home, office, or building. When computers are connected over a large geographical area, it is typically referred to as a Wide Area Network (WAN).

    Rate this question:

  • 26. 

    What does the acronym HTTP means  __________________  

    Correct Answer
    Hypertext Transfer Protocol, Hyper Text Transfer Protocol, hypertext transfer protocal, hyper text transfer protocol
    Explanation
    The acronym HTTP stands for Hypertext Transfer Protocol. It is a protocol used for transmitting hypertext over the internet. The correct answer includes variations of the spelling and capitalization of "Hyper Text Transfer Protocol" as well as the correct spelling "hypertext transfer protocal".

    Rate this question:

  • 27. 

    What does the acronym FTP means _____________________

    Correct Answer
    File Transfer Protocol, file transfer protocol
    Explanation
    FTP stands for File Transfer Protocol. It is a standard network protocol used for the transfer of computer files between a client and a server on a computer network. FTP is commonly used to upload and download files from a remote server, making it an essential tool for file sharing and management. The acronym FTP is derived from the words "File Transfer Protocol," which accurately describes its purpose and functionality. The repetition of "file transfer protocol" in the answer reinforces the correct understanding of the acronym.

    Rate this question:

  • 28. 

    The Process of accessing and saving an attachment, files, music or video from the internet is known as __________________

    Correct Answer
    Downloading, Download, Saving, downloading, download saving save
    Explanation
    The process of accessing and saving an attachment, files, music, or video from the internet is commonly referred to as downloading or saving. When we download something, we are retrieving it from the internet and storing it on our device for future use. This can include various types of content such as attachments, files, music, or videos. The terms "downloading," "download," "saving," "download saving," and "save" all describe this process of acquiring and storing data from the internet onto our devices.

    Rate this question:

  • 29. 

    The Process of attaching a file to an email is known as ________________________

    Correct Answer
    Uploading, Upload, Attach, uploading, upload, attach, attachment, Attachment
    Explanation
    The process of attaching a file to an email is commonly referred to as uploading, upload, attach, or attachment. This involves selecting a file from the device's storage and including it as an attachment to the email.

    Rate this question:

  • 30. 

    When Sending an email you will see Address, CC and subject. What does CC means __________________

    Correct Answer
    Carbon Copy, carbon copy
    Explanation
    CC stands for "Carbon Copy" in email. It is used to send a copy of the email to additional recipients without them being the primary recipients or directly involved in the conversation. When you add email addresses in the CC field, those recipients will receive a copy of the email, allowing them to be aware of the conversation and any updates or information being shared. The term "carbon copy" originates from the practice of making a duplicate copy of a document using carbon paper, and it has been adopted in email to refer to the same concept of sending a duplicate message to multiple recipients.

    Rate this question:

  • 31. 

    Which of the followings are search engines?  (select any two)

    • A.

      Google

    • B.

      Mail.yahoo.com

    • C.

      Hotmail

    • D.

      Google Mail

    • E.

      Yahoo

    Correct Answer(s)
    A. Google
    E. Yahoo
    Explanation
    Google and Yahoo are both search engines. Google is the most popular search engine globally, while Yahoo also provides a search engine feature. Both platforms allow users to search for information on the internet by entering keywords or phrases.

    Rate this question:

  • 32. 

    Internet refers to the 

    • A.

      Interconnection of computers limited to members or employees of an organization or company

    • B.

      Interconnection of computers limited to members of an organisation or company with the exception of temporary connection for a person from a another company with a special password access.

    • C.

      Interconnection of computers over the globe.

    Correct Answer
    C. Interconnection of computers over the globe.
    Explanation
    The correct answer is "Interconnection of computers over the globe." This is because the term "Internet" refers to a global network of interconnected computers and devices that communicate with each other using a standardized set of protocols. It is not limited to a specific organization or company, but rather connects computers and networks worldwide, allowing for the exchange of information and communication on a global scale.

    Rate this question:

  • 33. 

    Intranet refers to the  

    • A.

      Interconnection of computers limited to members or employees of an organization or company

    • B.

      Interconnection of computers limited to members of an organisation or company with the exception of temporary connection for a person from a another company with a special password access.

    • C.

      Interconnection of computers over the globe.

    Correct Answer
    A. Interconnection of computers limited to members or employees of an organization or company
    Explanation
    The correct answer is "Interconnection of computers limited to members or employees of an organization or company." This is because an intranet is a private network that can only be accessed by authorized individuals within a specific organization or company. It is used to share information, resources, and communication within the organization, while keeping it separate from the public internet.

    Rate this question:

  • 34. 

    If a user has to shutdown his/her computer after reading an email but does not want the another user to know the the mail was read, what is the best thing the user can do to the email?

    • A.

      Mark as UNREAD

    • B.

      Mark as READ

    • C.

      Flag for Follow UP

    Correct Answer
    A. Mark as UNREAD
    Explanation
    By marking the email as unread, the user can give the impression that they have not yet read the email. This will prevent the other user from knowing that the email has been read, allowing the user to shut down their computer without arousing suspicion.

    Rate this question:

  • 35. 

    Why is cheating inappropriate?

    • A.

      I do not think it is wrong if I help my neighbour with one or two questions

    • B.

      I do not think it is wrong if my neighbour help me with one or two questions

    • C.

      It will not give a true assessment on the student's learning progress

    Correct Answer
    C. It will not give a true assessment on the student's learning progress
    Explanation
    Cheating is inappropriate because it undermines the purpose of assessments, which is to evaluate a student's understanding and progress. By cheating, the student is not demonstrating their own knowledge and skills, but rather relying on someone else's help or dishonest means to achieve a higher grade. This not only misrepresents the student's abilities, but also hinders their personal growth and development. Additionally, cheating creates an unfair advantage over other students who have worked hard and earned their grades honestly.

    Rate this question:

  • 36. 

    What does CPU means?

    Correct Answer
    central processing unit, Central Processing Unit
    Explanation
    The term "CPU" stands for "central processing unit." It is the primary component of a computer system that performs most of the processing inside the computer. The CPU is responsible for executing instructions, performing calculations, and managing data flow between different parts of the computer. The alternative capitalization "Central Processing Unit" is also correct as it refers to the same thing.

    Rate this question:

  • 37. 

    What does ROM means?

    Correct Answer
    Read Only Memory, read only memory
    Explanation
    ROM stands for Read Only Memory. It is a type of computer memory that stores data that cannot be modified or erased. It contains permanent instructions that the computer uses during startup. The data stored in ROM remains intact even when the computer is turned off. Therefore, it is called Read Only Memory because it can only be read and not written or modified. The answer "Read Only Memory, read only memory" correctly identifies the acronym and provides the expanded form.

    Rate this question:

  • 38. 

    What does DIMM means?

    Correct Answer
    Dual inline memory module, Dual in line memory module, Dual in-line memory module, dual inline memory module, dual in line memory module, dual in-line memory module
    Explanation
    DIMM stands for Dual Inline Memory Module. It is a type of computer memory module that is used to store data and instructions that the computer processor can access quickly. DIMMs are commonly used in desktop and server computers, and they provide a higher memory capacity and faster data transfer rates compared to older memory technologies. The term "dual inline" refers to the physical layout of the memory module, which has a series of pins on both sides of the module that connect it to the motherboard.

    Rate this question:

  • 39. 

    The computer only understand two states that are known as Binary, select the to state from the list below.

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    • E.

      5

    • F.

      6

    • G.

      7

    • H.

      8

    • I.

      9

    • J.

      0

    Correct Answer(s)
    A. 1
    J. 0
    Explanation
    Computers only understand binary, which means they can only interpret and process information in terms of two states: 0 and 1. These two states represent the absence or presence of an electrical signal, which is the basis of all computer operations. Therefore, the correct answer is 1,0 because it represents the two binary states that a computer can understand.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 14, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 12, 2018
    Quiz Created by
    Michael
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.