Computer Quiz for Bank, Railway & Other Competitive Exams

Computer Quiz for Bank, Railway and Other Competitive Exams
1. Modem stands for–
(A) type of secondary memory (B) modulator demodulator
(C) mainframe operating device memory (D) none of these
Check Answer:

2. Operating system is–
(A) a collection of hardware components (B) a collection of input-output devices
(C) a collection of software routines (D) none of the above
Check Answer:

3. Execution of two or more programs by a single CPU is know as–
(A) multiprocessing (B) time sharing
(C) multiprogramming (D) none of these
Check Answer:

4. Which of the following dose not represent on I/O device?
(A) speaker with beep (B) joystick
(C) ALU (D) scanner
Check Answer:

5. Memories which can be read only are called …………………..memories.
Check Answer:

6. A result of a computer virus can NOT lead to–
(A) Disk Crash (B) Mother Board Crash
(C) Corruption of program (D) Deletion of files
Check Answer:

7. The network interface card of LAN is related to following layer of OSI Model–
(A) Transport (B) Network
(C) Data Link (D) All of these
Check Answer:

8. Which of the following does NOT describe a data warehouse?
(A) Subject-oriented (B) Integrated
(C) Time-variant (D) Updateable
Check Answer:

9. Which of the following is TRUE ?
(A) Logical design is software-dependent
(B) In a distributed database, database is stored in one physical location
(C) Conceptual design translates the logical design into internal model
(D) Logical design is software independent
Check Answer:

10. A range check–
(A) ensures that only the correct data type is entered into a field
(B) verifies that all required data is present
(C) determines whether a number is within a specified limit
(D) tests if the data in two or more associated fields is logical
Check Answer:

11. A person who used his or her expertise to gain access to other people’s’ computers to get information illegally or do damage is a–
(A) hacker (B) analyst
(C) instant messenger (D) programmer
Check Answer:

12. To access properties, of an object, the mouse technique to use is–
(A) dragging (B) dropping
(C) right-clicking (D) shift-clicking
Check Answer:

13. To change selected text to all capital letters, click the change case button, then click–
(C) CAPS LOCK (D) Lock Upper
Check Answer:

14. The basic unit of a worksheet into which you enter data in Excel is called a–
(A) tab (B) cell
(C) box (D) range
Check Answer:

15. You can keep your personal files / folders in–
(A) My folder (B) My Documents
(C) My Files (D) My Text
Check Answer:

16. URL stands for–
(A) Universal Research List (B) Universal Resource List
(C) Uniform Resource Locator (D) Uniform Research Locator
Check Answer:

17. NT classifies–
(A) container objects (B) non container objects
(C) both ‘A’ and ‘B’ (D) display objects
Check Answer:

18. The design of the network is called the network–
(A) architecture (B) server
(C) transmission (D) type
Check Answer:

19. A Proxy server is used for which of the following–
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To provide TCP/IP
(D) To process client requests for database access
Check Answer:

20. When data changes in multiple lists and all lists are not updated, this causes–
(A) data redundancy (B) information overload
(C) duplicate data (D) data inconsistency
Check Answer:

Comments & Contact Form


Email *

Message *