Computer Awareness-part1

40 Questions | Total Attempts: 550

SettingsSettingsSettings
Please wait...
Computer Awareness-part1

This test is designed to assess your basic understanding and knowledge of computer. You can take help regarding this article through this link, Computer Awareness-RBI Assistant Exam


Questions and Answers
  • 1. 
    What is Backup?
    • A. 

      Adding more components to your network

    • B. 

      Protecting data by coping it from the original source to a different destination

    • C. 

      Filtering old data from the new data

    • D. 

      Accessing data on tape

  • 2. 
    The legal right to use software based on specific restrictions is granted via a......
    • A. 

      Software privacy policy

    • B. 

      Software password manager

    • C. 

      Software license

    • D. 

      Software log

  • 3. 
    What is an E-mail attachment?  
    • A. 

      A list of CC : or BCC : recipients

    • B. 

      A malicious parasite that feeds off of your messages and destroys the contents

    • C. 

      A separate document from another program sent along with an E-mail message

    • D. 

      A receipt sent by the recipient

  • 4. 
    The type of software that control is the internal operations in the computer, and controls how the computer works with all its parts is which of the following?
    • A. 

      Shareware

    • B. 

      Public domain software

    • C. 

      Application software

    • D. 

      Operating system software

  • 5. 
    When data changes in multiple lists and all lists are not updated the causes................
    • A. 

      Data redundancy

    • B. 

      Information overload

    • C. 

      Duplicate data

    • D. 

      Data consistency

  • 6. 
    What is the main folder on a storage device called?
    • A. 

      Root directory

    • B. 

      Interface

    • C. 

      Device driver

    • D. 

      Platform

  • 7. 
    To view information on the web you must have a......
    • A. 

      Cable modem

    • B. 

      Web browser

    • C. 

      Domain Name Server

    • D. 

      Hypertext viewer

  • 8. 
    A file is often referred to as a(n)............
    • A. 

      Wizard

    • B. 

      Document

    • C. 

      Pane

    • D. 

      Device

  • 9. 
    To protect yourself from computer hacker intrusions you should install a ..............
    • A. 

      Firewall

    • B. 

      Mailer

    • C. 

      Macro

    • D. 

      Script

  • 10. 
    What type of computer are client computers (most of the time) in a client-server system?
    • A. 

      Mainframe

    • B. 

      Mini-computer

    • C. 

      Microcomputer

    • D. 

      PDA

  • 11. 
    What happens when you boot up a PC?
    • A. 

      Portions of the operation system are copied from disk into memory

    • B. 

      Portions of the operating system are copied from memory onto disk

    • C. 

      Portions of the operating system are compiled

    • D. 

      Portions of the operating system are emulated

  • 12. 
    Linux is an example of...........
    • A. 

      Freeware

    • B. 

      Open source software

    • C. 

      Shareware

    • D. 

      Complimentary

  • 13. 
    Which one of the following software applications would be the most appropriate for performing numerical and statistical calculations?
    • A. 

      Database

    • B. 

      Document Processor

    • C. 

      Graphics package

    • D. 

      Spreadsheet

  • 14. 
    A ............... is used to read handwritten or printed text to make a digital image that is stored in memory
    • A. 

      Printer

    • B. 

      Laser beam

    • C. 

      Scanner

    • D. 

      Touch pad

  • 15. 
    You organize files by storing them in...........
    • A. 

      Guide

    • B. 

      Model

    • C. 

      Ruler

    • D. 

      Template

  • 16. 
    What is the default field extension for all Word documents?
    • A. 

      WD

    • B. 

      TXT

    • C. 

      WRD

    • D. 

      DOC

  • 17. 
    Removing and replacing devices without turning off your computer is referred to as.............
    • A. 

      Hot swapping

    • B. 

      Plug-N-Play

    • C. 

      Bay swap

    • D. 

      USB swapping

  • 18. 
    Specialized programs that assist users in locating information on the web are called........
    • A. 

      Locator engines

    • B. 

      Web browsers

    • C. 

      Resource locators

    • D. 

      Search engines

  • 19. 
    Compiling creates a(n)...........
    • A. 

      Program specification

    • B. 

      Subroutine

    • C. 

      Algorithm

    • D. 

      Executable program

  • 20. 
    Expansion cards are inserted into............
    • A. 

      Slots

    • B. 

      Peripheral devices

    • C. 

      The CPU

    • D. 

      The back of the computer

  • 21. 
    A device that connects to a network without the use of cables is said to be............
    • A. 

      Non-Wired

    • B. 

      Centralized

    • C. 

      Open source

    • D. 

      Wireless

  • 22. 
    A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)......
    • A. 

      CPU

    • B. 

      Magnetic disk

    • C. 

      Integrated circuit

    • D. 

      Complex circuit

  • 23. 
    Junk e-mail is also called..............
    • A. 

      Spoof

    • B. 

      Sniffer script

    • C. 

      Spool

    • D. 

      Spam

  • 24. 
    A program designed to destroy data on your computer which can travel to "infect" other computers is called a...........
    • A. 

      Disease

    • B. 

      Infector

    • C. 

      Hurricane

    • D. 

      Virus

  • 25. 
    ................. shows the files, folders, and drives on your computer making it easy to navigate from one location to another which within the file hierarchy
    • A. 

      Windows Explorer

    • B. 

      My computer

    • C. 

      Folders Manager

    • D. 

      Windows Locator