Thursday 28 April 2016

Computer quiz - 37 | SBI | IBPS


1.__________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
a)Phishing trips
b)Computer viruses
c)Spyware scams
d)Viruses
e)Phishing scams

2.Why is it unethical to share copyrighted files with your friends?
a)It is not unethical, because it is legal.
b)It is unethical because the files are being given for free
c)Sharing copyrighted files without permission breaks copyright laws
d)It is not ethical because the files are being given for free
e)It is not unethical - anyone can access a computer

3.A _________ is approximately a million bytes
a)gigabyte
b)kilobyte
c)megabyte
d)terabyte
e)None of these

4.The time a device takes to locate data and instructions and make them available to the CPU is known as
a)clock speed
b)a processing cycle
c)CPU speed
d)access time
e)None of these

5.Which of the following tools is normally not used during system analysis?
a)Program Flow Chart
b)Grid Chart
c)System Flow Chart
d)Question Check-list
e)None of these

6.A single application that combines the major features of several types of applications is called
a)integrated software
b)a suite
c)a combo package
d)high end
e)None of these

7.The data command at the DOS prompt enables you to
a)view the date and time
b)change the date
c)change the date and time
d)change the day only
e)None of these

8.Format command
a)formats the CPU
b)formats floppy drives only
c)should be left to the engineers to use
d)formats a disk to receive files
e)formats the selected file

9.Which of the following is a graphic package?
a)Adobe PageMaker
b)Acrobat Reader
c)Microsoft word
d)CorelDraw
e)None of these

10.Hardware that adds two numbers is
a)the control unit
b)an internal CPU register
c)arithmetic logic unit
d)browser
e)None of these

Answers 
1.a
2.c
3.c
4.d
5.b
6.a
7.b
8.d
9.d
10.c

No comments:

Post a Comment