Basic Computer For Customer Engagement Operations (BPO)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Michael
M
Michael
Community Contributor
Quizzes Created: 1 | Total Attempts: 530
| Attempts: 530 | Questions: 40
Please wait...
Question 1 / 40
0 %
0/100
Score 0/100
1. Why is cheating inappropriate?

Explanation

Cheating is inappropriate because it undermines the purpose of assessments, which is to evaluate a student's understanding and progress. By cheating, the student is not demonstrating their own knowledge and skills, but rather relying on someone else's help or dishonest means to achieve a higher grade. This not only misrepresents the student's abilities, but also hinders their personal growth and development. Additionally, cheating creates an unfair advantage over other students who have worked hard and earned their grades honestly.

Submit
Please wait...
About This Quiz
Basic Computer For Customer Engagement Operations (BPO) - Quiz

This quiz assesses basic knowledge in computer operations relevant to customer engagement in BPO. It covers Microsoft Office, secure logins, data recovery, and general computer hardware, crucial for... see moreoperational efficiency and security. see less

2. _________ is a browser  

Explanation

Chrome is a browser.

Submit
3. During electrical storms all computer hardware must be  

Explanation

During electrical storms, it is recommended to shut down and disconnect all computer hardware from power and communication sources. This is because electrical storms can cause power surges and lightning strikes, which can damage the hardware. By shutting down and disconnecting the hardware, the risk of damage is minimized.

Submit
4. If a file is accidentally deleted it maybe possible to restore it from the  

Explanation

The correct answer is the Recycle bin. When a file is deleted from a computer, it is moved to the Recycle bin instead of being permanently deleted. This allows users to easily restore accidentally deleted files without the need for external backups or recovery tools. The Recycle bin acts as a temporary storage location for deleted files, giving users a chance to recover them before they are permanently removed from the system.

Submit
5. What does RAM stands for.

Explanation

RAM stands for Random Access Memory. It is a type of computer memory that allows data to be stored and retrieved in any order, rather than sequentially. This means that the computer can quickly access any piece of data stored in RAM, making it a crucial component for the smooth functioning of a computer system. RAM is volatile memory, meaning that its contents are lost when the power is turned off.

Submit
6. To log-on onto a secure network or computer a user must have a  

Explanation

To log on to a secure network or computer, a user must have both a username and a password. These credentials are used to verify the user's identity and grant them access to the system. The username identifies the user, while the password serves as a secret code that only the user should know. By requiring both the username and password, the system ensures that only authorized individuals can gain entry, enhancing the security of the network or computer.

Submit
7. The name given to the company responsible for providing users with the gateway to the internet is called a ISP.

Explanation

The company responsible for providing users with the gateway to the internet is called an ISP, which stands for Internet Service Provider. ISPs are organizations that provide internet access to individuals, businesses, and other organizations. They offer various types of internet connections, such as dial-up, broadband, or wireless, and allow users to connect to the internet by providing them with the necessary infrastructure, equipment, and services. ISPs play a crucial role in enabling individuals and businesses to access and use the internet for various purposes, such as browsing websites, sending emails, and accessing online services.

Submit
8. If a user has to shutdown his/her computer after reading an email but does not want the another user to know the the mail was read, what is the best thing the user can do to the email?

Explanation

By marking the email as unread, the user can give the impression that they have not yet read the email. This will prevent the other user from knowing that the email has been read, allowing the user to shut down their computer without arousing suspicion.

Submit
9. At bed time one must always____________ 

Explanation

At bedtime, it is important to shut down the computer. This helps to conserve energy and prevent any potential damage or overheating that could occur if the computer is left running for extended periods of time. Shutting down the computer also ensures that any unsaved work is properly closed and that the computer is ready for a fresh start the next time it is used.

Submit
10. Which of the following is not in the Microsoft Office suite.

Explanation

AutoCad is not in the Microsoft Office suite because it is a separate software developed by Autodesk, not Microsoft. Microsoft Office suite includes applications like Word, PowerPoint, and Publisher, which are commonly used for word processing, creating presentations, and designing publications respectively. AutoCad, on the other hand, is a computer-aided design (CAD) software used for creating 2D and 3D designs, primarily in the fields of architecture, engineering, and construction. Therefore, AutoCad does not belong to the Microsoft Office suite.

Submit
11. The device that is use to modulate and demodulate data that is transmitted via a communication channel is called a modem. 

Explanation

A modem is a device that is used to modulate and demodulate data, allowing it to be transmitted over a communication channel. Modulation is the process of converting digital data into analog signals for transmission, while demodulation is the process of converting the analog signals back into digital data. Therefore, a modem plays a crucial role in enabling communication between devices over a network.

Submit
12. What does CPU means?

Explanation

The term "CPU" stands for "central processing unit." It is the primary component of a computer system that performs most of the processing inside the computer. The CPU is responsible for executing instructions, performing calculations, and managing data flow between different parts of the computer. The alternative capitalization "Central Processing Unit" is also correct as it refers to the same thing.

Submit
13. If you want to close a program you can (in Windows)

Explanation

In Windows, the standard way to close a program is by clicking on the red box with an X at the top right of the screen. This is a common design convention in Windows operating systems, where the X symbol represents the action of closing or exiting a program. Clicking on this button will close the program and remove it from the screen.

Submit
14. What does ROM means?

Explanation

ROM stands for Read Only Memory. It is a type of computer memory that stores data that cannot be modified or erased. It contains permanent instructions that the computer uses during startup. The data stored in ROM remains intact even when the computer is turned off. Therefore, it is called Read Only Memory because it can only be read and not written or modified. The answer "Read Only Memory, read only memory" correctly identifies the acronym and provides the expanded form.

Submit
15. The acronym URL stands for Uniform Resource Locator

Explanation

The given statement is true. URL stands for Uniform Resource Locator. A URL is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. It is commonly used to access web pages on the internet.

Submit
16. Which of the followings are search engines?  (select any two)

Explanation

Google and Yahoo are both search engines. Google is the most popular search engine globally, while Yahoo also provides a search engine feature. Both platforms allow users to search for information on the internet by entering keywords or phrases.

Submit
17. A form of storage NOT commonly used today is a  

Explanation

Floppy disks were a popular form of storage in the past, but they are not commonly used today. They had limited storage capacity and were easily prone to damage. With the advancement in technology, other storage options like Universal Serial Bus (USB), Digital Versatile Disc (DVD), and Compact Disc-Re-writable (CD-RW) offer larger storage capacities, faster data transfer rates, and better durability compared to floppy disks.

Submit
18. What is the short-cuts CTRL - V is used for:

Explanation

The shortcut CTRL - V is used to paste the text or document. When you have copied something, you can use this shortcut to insert it at the desired location. It is a convenient way to quickly transfer or duplicate information within a document or between different documents.

Submit
19. Internet refers to the 

Explanation

The correct answer is "Interconnection of computers over the globe." This is because the term "Internet" refers to a global network of interconnected computers and devices that communicate with each other using a standardized set of protocols. It is not limited to a specific organization or company, but rather connects computers and networks worldwide, allowing for the exchange of information and communication on a global scale.

Submit
20. Computer is made up of four types of hardware, which of the following listed below is a piece of computer hardware?  

Explanation

A Dual Inline Memory Module (DIMM) is a type of computer hardware. It is a small circuit board that contains memory chips and is used to provide temporary storage for data and instructions that the computer needs to access quickly. Norton antivirus and Microsoft Office are software programs, not hardware. "Software" is a general term that refers to programs and applications that run on a computer, but it is not a specific piece of hardware. Therefore, the correct answer is Dual Inline Memory Module.

Submit
21. You use all of the following to copy except.

Explanation

The given answer is incorrect. Ctrl-V is not used for copying, but for pasting. To copy, you typically use Ctrl-C, Right click - copy, or Command-C (Mac OS X). Ctrl-V is used to paste the copied content.

Submit
22. Internal peripherals are devices that 

Explanation

The correct answer is "Attached to the inside of the system unit." Internal peripherals are devices that are connected or attached to the inside of the system unit, such as the hard drive, memory modules, and expansion cards. These components are essential for the functioning of the computer and are typically not visible from the outside.

Submit
23. When processing information with a computer there are four main actions undertaken, which is the correct order. 

Explanation

When processing information with a computer, the first step is to input the data or information into the computer. After the input is received, the computer then processes the information by performing calculations or executing instructions. Once the processing is complete, the computer outputs the results or displays the information in a usable format. Finally, the processed information is stored in the computer's memory or storage devices for future use or reference. Therefore, the correct order of actions when processing information with a computer is input, processing, output, and storage.

Submit
24. The computer only understand two states that are known as Binary, select the to state from the list below.

Explanation

Computers only understand binary, which means they can only interpret and process information in terms of two states: 0 and 1. These two states represent the absence or presence of an electrical signal, which is the basis of all computer operations. Therefore, the correct answer is 1,0 because it represents the two binary states that a computer can understand.

Submit
25. Computers connected in a small geographical area is called a Wide Area Network

Explanation

The statement is incorrect. Computers connected in a small geographical area are actually called a Local Area Network (LAN), not a Wide Area Network (WAN). A WAN is a network that covers a large geographical area, such as multiple cities or even countries.

Submit
26. Computers connected in a Large geographical area is called a Local Area Network

Explanation

The statement is incorrect because computers connected in a large geographical area are not considered a Local Area Network (LAN). A LAN refers to a network that covers a small area, such as a home, office, or building. When computers are connected over a large geographical area, it is typically referred to as a Wide Area Network (WAN).

Submit
27. What does the acronym FTP means _____________________

Explanation

FTP stands for File Transfer Protocol. It is a standard network protocol used for the transfer of computer files between a client and a server on a computer network. FTP is commonly used to upload and download files from a remote server, making it an essential tool for file sharing and management. The acronym FTP is derived from the words "File Transfer Protocol," which accurately describes its purpose and functionality. The repetition of "file transfer protocol" in the answer reinforces the correct understanding of the acronym.

Submit
28. Which of the following is not a operating system  

Explanation

Microsoft Word is not an operating system. It is a word processing software developed by Microsoft. Operating systems like macOS Sierra, Unix, and Windows XP are responsible for managing computer hardware and software resources and providing common services for computer programs. Microsoft Word, on the other hand, is an application that runs on top of an operating system and is used for creating and editing documents.

Submit
29. The Process of accessing and saving an attachment, files, music or video from the internet is known as __________________

Explanation

The process of accessing and saving an attachment, files, music, or video from the internet is commonly referred to as downloading or saving. When we download something, we are retrieving it from the internet and storing it on our device for future use. This can include various types of content such as attachments, files, music, or videos. The terms "downloading," "download," "saving," "download saving," and "save" all describe this process of acquiring and storing data from the internet onto our devices.

Submit
30. What does the acronym HTTP means  __________________  

Explanation

The acronym HTTP stands for Hypertext Transfer Protocol. It is a protocol used for transmitting hypertext over the internet. The correct answer includes variations of the spelling and capitalization of "Hyper Text Transfer Protocol" as well as the correct spelling "hypertext transfer protocal".

Submit
31. To allow easy and efficient identification of files, you should apply some basic principles when saving. Which one listed is incorrect 

Explanation

Accepting the suggested file name the software gives you is incorrect because it may not accurately describe the content or purpose of the file. It is important to name files appropriately so that they can be easily identified and organized. Storing files in folders and sub-folders also helps in efficient file management.

Submit
32. The Process of attaching a file to an email is known as ________________________

Explanation

The process of attaching a file to an email is commonly referred to as uploading, upload, attach, or attachment. This involves selecting a file from the device's storage and including it as an attachment to the email.

Submit
33. Intranet refers to the  

Explanation

The correct answer is "Interconnection of computers limited to members or employees of an organization or company." This is because an intranet is a private network that can only be accessed by authorized individuals within a specific organization or company. It is used to share information, resources, and communication within the organization, while keeping it separate from the public internet.

Submit
34. When Sending an email you will see Address, CC and subject. What does CC means __________________

Explanation

CC stands for "Carbon Copy" in email. It is used to send a copy of the email to additional recipients without them being the primary recipients or directly involved in the conversation. When you add email addresses in the CC field, those recipients will receive a copy of the email, allowing them to be aware of the conversation and any updates or information being shared. The term "carbon copy" originates from the practice of making a duplicate copy of a document using carbon paper, and it has been adopted in email to refer to the same concept of sending a duplicate message to multiple recipients.

Submit
35. A monitor can also be called a  

Explanation

A monitor can also be called a VDU, which stands for Visual Display Unit. This term is commonly used to refer to the device that displays visual output from a computer. It is an alternative term to "monitor" and is widely recognized in the field of computing.

Submit
36. Data on a computer is stored is quantities called Bits and Bytes. Which is the largest unit of measurement for computer data  

Explanation

The largest unit of measurement for computer data is the petabyte (PB). A petabyte is equal to 1,000 terabytes or 1,000,000 gigabytes. It is used to measure very large amounts of data, such as in big data analytics, scientific research, or large-scale storage systems.

Submit
37. Which of the following has a higher transmission speed

Explanation

A DSL modem (Digital Subscriber Line) has a higher transmission speed compared to the other options listed. DSL technology uses existing telephone lines to provide high-speed internet access. It offers faster download and upload speeds than ISDN modems, NET Speed dongles, and T1 lines. ISDN modems use digital telephony to transmit data but have slower speeds. NET Speed dongles are portable devices that connect to the internet via cellular networks and typically have lower speeds. T1 lines are dedicated high-speed connections but have slower speeds compared to DSL modems. Therefore, the DSL modem is the correct answer as it provides a higher transmission speed.

Submit
38. What does DIMM means?

Explanation

DIMM stands for Dual Inline Memory Module. It is a type of computer memory module that is used to store data and instructions that the computer processor can access quickly. DIMMs are commonly used in desktop and server computers, and they provide a higher memory capacity and faster data transfer rates compared to older memory technologies. The term "dual inline" refers to the physical layout of the memory module, which has a series of pins on both sides of the module that connect it to the motherboard.

Submit
39. Ports on a computer allow for external input and output devices to be attached to the motherboard of a computer. Which one of the following is an external input port  

Explanation

A power port is an external input port on a computer that allows for the connection of the power adapter or cord. This port is used to provide electrical power to the computer, allowing it to function properly. Without a power port, the computer would not be able to receive the necessary power supply and would not be able to operate. Therefore, the power port is an essential external input port that enables the computer to be powered on and used.

Submit
40. Match the following
Submit
View My Results

Quiz Review Timeline (Updated): Jan 17, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 17, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 12, 2018
    Quiz Created by
    Michael
Cancel
  • All
    All (40)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Why is cheating inappropriate?
_________ is a browser  
During electrical storms all computer hardware must be  
If a file is accidentally deleted it maybe possible to restore it from...
What does RAM stands for.
To log-on onto a secure network or computer a user must have...
The name given to the company responsible for providing users with ...
If a user has to shutdown his/her computer after reading an ...
At bed time one must always____________ 
Which of the following is not in the Microsoft Office suite.
The device that is use to modulate and demodulate data that is...
What does CPU means?
If you want to close a program you can (in Windows)
What does ROM means?
The acronym URL stands for Uniform Resource Locator
Which of the followings are search engines?  (select any two)
A form of storage NOT commonly used today is a  
What is the short-cuts CTRL - V is used for:
Internet refers to the 
Computer is made up of four types of hardware, which of the following...
You use all of the following to copy except.
Internal peripherals are devices that 
When processing information with a computer there are four main...
The computer only understand two states that are known as Binary,...
Computers connected in a small geographical area is called a Wide Area...
Computers connected in a Large geographical area is called a Local...
What does the acronym FTP means _____________________
Which of the following is not a operating system  
The Process of accessing and saving an attachment, files, music or...
What does the acronym HTTP...
To allow easy and efficient identification of files, you should apply...
The Process of attaching a file to an email is known as...
Intranet refers to the  
When Sending an email you will see Address, CC and subject. What does...
A monitor can also be called a  
Data on a computer is stored is quantities called Bits and Bytes....
Which of the following has a higher transmission speed
What does DIMM means?
Ports on a computer allow for external input and output devices to be ...
Match the following
Alert!

Advertisement