Computer Awareness for Upcoming Exams Set 95

 

Computer Awareness Questions for IBPS PO/Clerk, IBPS RRB, NIACL, NICL, RBI Grade B, BOI, OBC SO, BoB and other competitive exams.

  1. The icons on the __________ are organized according to function and according to the most commonly used commands in MSWord.
    A) GUI
    B) Icon layout
    C) Toolbars
    D) Windows
    E) None of these
    View Answer
      Option C
    Some Extra:
    The icons on the toolbars are organized according to function and according to the most commonly used commands in MSWord. The toolbar that usually appears directly below the menu bar is called the Standard Toolbar. The toolbar just below that is called the Formatting Toolbar.
  2. Which of the following is done to force a page break in Word?
    A) Position the cursor at the appropriate place and press F1
    B) Use the Insert —>Section Break
    C) Position the cursor at the appropriate place and press Shift + Enter
    D) Change the colour of the document
    E)  none of these
    View Answer
      Option B
    Some Extra:
    By using the Insert > Section Break (Page Break) command, the user can do a page break in Word.
  3. Which of the following ISO level is more closely related to the physical communications facilities?
    A) Application
    B) session
    C) Networking
    D) Data link
    E) None of these
    View Answer
      Option D
    Some Extra:
    The data link layer provides the functional and procedural means to transfer data between network entities and might provide the means to detect and possibly correct errors that may occur in the physical layer.
  4. A policy on firewalls needs not _____.
    A) Include log reports of database
    B) Include guidelines for assessment of logs
    C) Ensure that it is physically secured
    D) Ensure that it is logically secured
    E) None of these
    View Answer
      Option D
    Some Extra:
    A firewall policy defines how an organization’s firewalls should handle inbound and outbound network traffic for specific IP addresses and address ranges, protocols, applications, and content types based on the organization’s information security policies.
  5. The altering of data so that it is not usable unless the changes are undone is ____.
    A) Biometrics
    B) Compression
    C) Encryption
    D) Ergonomics
    E) None of these
    View Answer
      Option C
    Some Extra:
    Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor.
  6. What is the biggest number you can get with 8 bits?
    A) 257
    B) 128
    C) 1000
    D) 255
    E) 1024
    View Answer
      Option D
    Some Extra:
    The largest number you can represent with 8 bits is 11111111, or 255 in decimal notation. Since 00000000 is the smallest, you can represent 256 things with a byte. (Remember, a bite is just a pattern.
  7. What kind of lock includes a keypad that can be used to control access into areas?
    A) Cipher
    B) warded
    C) device
    D) tumbler
    E) None of these
    View Answer
      Option A
    Some Extra:
    Cipher locks are used to control access to areas of a facility that are sensitive. e.g airport research and development laboratories areas within financial institutions etc. A cipher lock may have four of five push buttons depending on the manufacture.
  8. Unlike filters queries can be saved as ………. in a database.
    A) object
    B) filters
    C) database
    D) any of the above
    E) None of these
    View Answer
      Option A
    Some Extra:
    Unlike filters queries can be saved and used as a data source for other ms access objects such reports, forms or data access pages.
  9. An essential ingredient for effective multimedia presentations incorporates user participation or_____.
    A) links
    B) buttons
    C) interactivity
    D) integration
    E) speed
    View Answer
      Option C
    Some Extra:
    Interactivity is the dialog that occurs between a human being and a computer program.
  10. Which of these languages uses both interpreter and compiler?
    A) COBOL
    B) BASIC
    C) JAVA
    D) C++
    E) None of these
    View Answer
      Option C
    Some Extra:
    Java uses a two-step compilation process. Java uses a compiler to convert source code into byte code. This byte code is not a machine code. Later for execution JVA platform uses an interpreter to convert these byte codes into machine language.

Click here for More Computer Awareness Questions

 

 

Related posts

7 Thoughts to “Computer Awareness for Upcoming Exams Set 95”

  1. Jeetesh Chandra

    8/10

  2. Chaitanya

    THanks !!

  3. IBPS RRB PO-2018

    ty

  4. Ravi Upadhyay

    thnx

Comments are closed.