1. For sound recording what is necessary?
[A]Talker
[B]Mouse
[C]Speaker
[D]Microphone
2. Life span of a CD ROM is______
[A]Approximately five year
[B]Approximately twenty five year
[C]Approximately one year
[D]Approximately two year
3. The ______settings are automatic and standard
[A]Peripheral
[B]User friendly
[C]Default
[D]CPU
4. What are the two parts of an email address?
[A]User name and domain name
[B]Initials and password
[C]User name and street address
[D]Legal name and phone number
5. Participants can see and hear each other in a/an
[A]Video conference
[B]Bulletin board
[C]E mail system
[D]Message system
6. Magnetic tapes are not practical for applications where data must be quickly recalled because tape is____
[A]A read only medium
[B]Expensive
[C]A random access medium
[D]A sequential access medium
7. Which of the following will you require to hear music on your computer?
[A]Sound card
[B]Joystick
[C]Video card
[D]Tape recorder
8. The signal that a computer is waiting for a command of the user is_____
[A]Interrupt
[B]Time slice
[C]Prompt
[D]Event
9. This software allows the user to move from page to page on the web by clicking on or selecting a hyperlink, or by typing in the address of the destination page_____
[A]Web home page
[B]Web service
[C]Web browser
[D]Web search engine
10. For viewing video CD you should use
[A]Windows Movie Player
[B]Windows Video Player
[C]CD player
[D]Windows Media Player
11. Executing more than one program concurrent program concurrently by one user on one computer is known as____
[A]Multi- tasking
[B]Time- sharing
[C]Multi- programming
[D]Multi- processing
12. Which of the following controls the manner of interaction between the user and the operating system?
[A]User interface
[B]Icon
[C]Language translator
[D]Platform
13. You can keep your personal files and folders in___
[A]My files
[B]My text
[C]My folder
[D]My documents
14. Three types of compact disks include CD- ROM, CD-R and____
[A]CD DVD
[B]CD-RW
[C]CD-W
[D]CD-RAM
15. Collecting personal information and effectively posing as another individual is known as the crime of____
[A]Hacking
[B]Identity theft
[C]Spooling
[D]Spoofing
Home
Computer Quiz
Computers
IBPS CWE Computer Awareness Model Paper for 2012 PO/Clerical Exams (Computer Quiz - 15)
IBPS CWE Computer Awareness Model Paper for 2012 PO/Clerical Exams (Computer Quiz - 15)
Subscribe to:
Post Comments (Atom)
Most Played Quizzes Last Week
-
1. Which year was the first National Technology Day celebrated in India? 1998 2000 2002 2005 2. Who is known as the "Father of India...
-
1. Which of the following is considered to be poor e-mail etiquette? [A]Have a proper sign off: Regards, Sincerely, etc. [B]Responding to me...
-
1. There are two universities which are named in honour of Ahilya Bai. One is Devi Ahilya Vishwa Vidyalaya in Indore, Madhya Pradesh and the...
-
1. What percentage of the Earth's surface is covered by water? 50% 60% 70% 75% 2. Which term refers to a large body of land? Island...
-
Mental Ability and Logical Reasoning MCQs and Aptitude Quizzes Mental reasoning and general mental ability is one of the main topics o...
-
1. Which city is called the Pink city? Lucknow Hyderabad Jaipur Kanpur 2. Which city is called the city of Lakes? Delhi Bengaluru Mumbai Uda...
-
Programming C Java Information Technology IT Aptitude Database Management System Database Computer Awareness Basic Comput...
-
1. What is Bihu? A folk song of Assam A dance form of Assam A type of traditional food A popular festival of Assam 2. How many Bihus are...
-
1. What is the significance of Budh Purnima? To celebrate Buddha's birth To commemorate Buddha's enlightenment To honor Buddha's...
-
1. When was Maharana Pratap born? [A]9th May 1540 [B] 9th June 1540 [C]9th April 1540 [D]9th August 1540 2. What was the name of Mah...
No comments:
Post a Comment