Computer Awareness-part1

40 Questions | Attempts: 551
Please wait...
Question 1 / 41
🏆 Rank #--
Score 0/100

1. A program designed to destroy data on your computer which can travel to "infect" other computers is called a...........

Submit
Please wait...
About This Quiz
Computer Awareness-part1 - Quiz

This test is designed to assess your basic understanding and knowledge of computer.
You can take help regarding this article through this link, Computer Awareness-RBI Assistant Exam

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. A device that connects to a network without the use of cables is said to be............

Submit

3. To protect yourself from computer hacker intrusions you should install a ..............

Submit

4. Files deleted from hard disc are sent to

Submit

5. Password makes users capable

Submit

6. Junk e-mail is also called..............

Submit

7. A file is often referred to as a(n)............

Submit

8. What is Backup?

Submit

9. What is the default field extension for all Word documents?

Submit

10. Full form of CD-RW is

Submit

11. Linux is an example of...........

Submit

12. To view information on the web you must have a......

Submit

13. Which one of the following software applications would be the most appropriate for performing numerical and statistical calculations?

Submit

14. A ............... is used to read handwritten or printed text to make a digital image that is stored in memory

Submit

15. The type of software that control is the internal operations in the computer, and controls how the computer works with all its parts is which of the following?

Submit

16. What happens when operating system is loaded in RAM?

Submit

17. What is an E-mail attachment?  

Submit

18. A ................... pre- designed document that aleady has coordination fonts, a layout, and a background

Submit

19. File extension is used

Submit

20. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)......

Submit

21. A collection of interrelated records is called a........

Submit

22. The legal right to use software based on specific restrictions is granted via a......

Submit

23. What is the main folder on a storage device called?

Submit

24. What is the keyboard short-cut for new slide?

Submit

25. Compiling creates a(n)...........

Submit

26. Machine language uses

Submit

27. Vertical space between lines of text in document is called

Submit

28. Expansion cards are inserted into............

Submit

29. What is Gutter margin?

Submit

30. You organize files by storing them in...........

Submit

31. Specialized programs that assist users in locating information on the web are called........

Submit

32. When data changes in multiple lists and all lists are not updated the causes................

Submit

33. Removing and replacing devices without turning off your computer is referred to as.............

Submit

34. In page preview mode

Submit

35. ................. shows the files, folders, and drives on your computer making it easy to navigate from one location to another which within the file hierarchy

Submit

36. When you will start, your computer Boot routine will perform

Submit

37. What happens when you boot up a PC?

Submit

38. What type of computer are client computers (most of the time) in a client-server system?

Submit

39. ALU of CPU has

Submit

40. The................ manual tells you how to use a software program

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (40)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A program designed to destroy data on your computer which can travel...
A device that connects to a network without the use of cables is said...
To protect yourself from computer hacker intrusions you should install...
Files deleted from hard disc are sent to
Password makes users capable
Junk e-mail is also called..............
A file is often referred to as a(n)............
What is Backup?
What is the default field extension for all Word documents?
Full form of CD-RW is
Linux is an example of...........
To view information on the web you must have a......
Which one of the following software applications would be the most...
A ............... is used to read handwritten or printed text to make...
The type of software that control is the internal operations in the...
What happens when operating system is loaded in RAM?
What is an E-mail attachment?  
A ................... pre- designed document that aleady has...
File extension is used
A complete electronic circuit with transistors and other electronic...
A collection of interrelated records is called a........
The legal right to use software based on specific restrictions is...
What is the main folder on a storage device called?
What is the keyboard short-cut for new slide?
Compiling creates a(n)...........
Machine language uses
Vertical space between lines of text in document is called
Expansion cards are inserted into............
What is Gutter margin?
You organize files by storing them in...........
Specialized programs that assist users in locating information on the...
When data changes in multiple lists and all lists are not updated the...
Removing and replacing devices without turning off your computer is...
In page preview mode
................. shows the files, folders, and drives on your...
When you will start, your computer Boot routine will perform
What happens when you boot up a PC?
What type of computer are client computers (most of the time) in a...
ALU of CPU has
The................ manual tells you how to use a software program
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!