Computer Awareness for Upcoming Exams Set 85

Latest Pattern Computer Awareness Questions IBPS PO, NICL AO, Dena Bank PO PGDBF, NIACL Assistant/AO, BoB PO, IBPS Clerk, BOI, and other competitive exams.

  1. A symbol or question on the screen that prompts you to take action and tells the computer what to do next________.
    A) scanner
    B) questionnaire
    C) prompt and dialog box
    D) information seeker
    View Answer
     Option C
    Explanation:
    The graphical control element dialog box (also called dialogue box or just dialog) is a small window that communicates information to the user and prompts them for a response. Dialog boxes are classified as “modal” or “modeless”, depending on whether they block interaction with the software that initiated the dialog. The type of dialog box displayed is dependent upon the desired user interaction.
  2. Which of the following is a term related with scanner?
    A) Laser
    B) TWAIN
    C) Cartridge
    D) Browser
    E) Both (a) and (b)
    View Answer
     Option E
    Explanation:
    Laser is the term related with scanner as there are laser scanners. TWAIN is an applications programming interface (API) and communications protocol that regulates communication between software and digital imaging devices, such as image scanners. It is a widely-used program that lets you scan an image (using a scanner) directly into the application.
  3. In DHCP, C stands for?.
    A) Centralised
    B) Centered
    C) Cut
    D) Common
    E) Configuration
    View Answer
     Option E
    Explanation:
    DHCP stands for Dynamic Host Configuration Protocol.
  4. Switch is a network device whose responsibility is to_______.
    A) Protect from virus attack
    B) turn of the power to network
    C) Connect Network devices
    D) Boot the network
    E) None of these
    View Answer
     Option C                 Explanation :
    A network switch is a computer networking device that connects devices together on a computer network, by using packet switching to receive, process and forward data to the destination device.
  5. Verification of a login name and password is known as_____.
    A) configuration
    B) accessibility
    C) authentication
    D) logging in
    E) none of these
    View Answer
     Option C
    Explanation:
    Authentication is a process in which the credentials provided are compared to those on file in a database of authorized users’ information on a local operating system or within an authentication server.
  6. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is _____.
    A) copy and paste
    B) copy and cut
    C) cut and copy
    D) cut and paste
    E) None of these
    View Answer
     Option D Explanation:
    Microsoft Word allows you to select text or a graphic, cut it and paste it somewhere else in the same document or another document.
  7. The most widely used code that represents each character as a unique 8-bit code is _______.
    A) ASCII
    B) Unicode
    C) Binary numbering system
    D) EBCDIC
    E) None of these
    View Answer
     Option A
    Explanation:
    Most modern character-encoding schemes are based on ASCII (American Standard Code for Information Interchange), although they support many additional characters.
  8. ___________are attempts by individuals to obtain confidential information from you by falsifying their identity.
    A) Phishing trips
    B) Computer viruses
    C) spyware scams
    D) viruses
    E) Pushing scams
    View Answer
     Option A
    Explanation:
    Phishing trips are attempts by individuals to obtain confidential information from you by falsifying their identity.
  9. The altering of data so that it is not usable unless the changes are undone is _______.
    A) Biometrics
    B) Compression
    C) Encryption
    D) Ergonomics
    E) Spamming
    View Answer
     Option C
    Explanation:
    Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.
  10. What does BASIC stands for?
    A) Beginner’s All-purpose Simple Instruction Code
    B) Beginner’s All-purpose Symbolic Intention Code
    C) Beginner’s All-purpose symbolic Instruction code
    D) Beginner’s All-purpose Symbolic Instruction Cell
    E) Basic All-purpose System Instruction Cell
    View Answer
     Option C
    Explanation:
    BASIC stands for Beginner’s All-purpose symbolic Instruction code.

Click here for More Computer Awareness Questions

 

 

 

Related posts

7 Thoughts to “Computer Awareness for Upcoming Exams Set 85”

  1. kumkum ahuja

    thank u 🙂

  2. Ittu Si Barbie (。♥‿♥。)

    Thanku AZ 🙂

Comments are closed.