Dear Readers, we are presenting Computer Quiz for Bank exams. Computer section play important role in scoring.
Try to solve these computer questions. If any doubt ask in comment section. We will provide more questions in upcoming posts.
1. In addition to keying data directly into a database, data entry can be done from a(n)
1) input form
2) table
3) field
4) data dictionary
5) None of these
2. What is an e-mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an e-mail message
3) A malicious parasite that feeds off your messages and destroys the contents
4) A list of CC or BCC recipients
5) None of these
3. SMTP, FTP and DNS are applications of the ____ layer.
1) data link
2) network
3) transport
4) application
5) None of these
4. In a database, information should be organised and accessed according to which of the following?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these
5. A _______ is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these
6. A file extension is separated from the main file name with a(n) _______, but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these
7. A telephone number, a birth date, and a customer name are all examples of
1) a record
2) data
3) a file
4) a database
5) None of these
8. The term _______ designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
9. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these
10. The real business and competitive value of information technology lies in
1) The software applications that are used by many companies
2) The capabilities of the software and value of the information, a business acquires and uses
3) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
4) The capabilities of the hardware and the speed at which it processes information
5) None of these
Answers
1- 1
2- 2
3-4
4- 2
5- 4
6- 4
7- 1
8- 4
9- 2
10- 2
Try to solve these computer questions. If any doubt ask in comment section. We will provide more questions in upcoming posts.
1. In addition to keying data directly into a database, data entry can be done from a(n)
1) input form
2) table
3) field
4) data dictionary
5) None of these
2. What is an e-mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an e-mail message
3) A malicious parasite that feeds off your messages and destroys the contents
4) A list of CC or BCC recipients
5) None of these
3. SMTP, FTP and DNS are applications of the ____ layer.
1) data link
2) network
3) transport
4) application
5) None of these
4. In a database, information should be organised and accessed according to which of the following?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these
5. A _______ is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these
6. A file extension is separated from the main file name with a(n) _______, but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these
7. A telephone number, a birth date, and a customer name are all examples of
1) a record
2) data
3) a file
4) a database
5) None of these
8. The term _______ designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
9. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these
10. The real business and competitive value of information technology lies in
1) The software applications that are used by many companies
2) The capabilities of the software and value of the information, a business acquires and uses
3) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
4) The capabilities of the hardware and the speed at which it processes information
5) None of these
Answers
1- 1
2- 2
3-4
4- 2
5- 4
6- 4
7- 1
8- 4
9- 2
10- 2
Dear Readers, we are presenting Computer Quiz for Bank exams. Computer section play important role in scoring.
Try to solve these computer questions. If any doubt ask in comment section. We will provide more questions in upcoming posts.
1. In addition to keying data directly into a database, data entry can be done from a(n)
1) input form
2) table
3) field
4) data dictionary
5) None of these
2. What is an e-mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an e-mail message
3) A malicious parasite that feeds off your messages and destroys the contents
4) A list of CC or BCC recipients
5) None of these
3. SMTP, FTP and DNS are applications of the ____ layer.
1) data link
2) network
3) transport
4) application
5) None of these
4. In a database, information should be organised and accessed according to which of the following?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these
5. A _______ is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these
6. A file extension is separated from the main file name with a(n) _______, but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these
7. A telephone number, a birth date, and a customer name are all examples of
1) a record
2) data
3) a file
4) a database
5) None of these
8. The term _______ designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
9. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these
10. The real business and competitive value of information technology lies in
1) The software applications that are used by many companies
2) The capabilities of the software and value of the information, a business acquires and uses
3) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
4) The capabilities of the hardware and the speed at which it processes information
5) None of these
Answers
1- 1
2- 2
3-4
4- 2
5- 4
6- 4
7- 1
8- 4
9- 2
10- 2
Try to solve these computer questions. If any doubt ask in comment section. We will provide more questions in upcoming posts.
1. In addition to keying data directly into a database, data entry can be done from a(n)
1) input form
2) table
3) field
4) data dictionary
5) None of these
2. What is an e-mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an e-mail message
3) A malicious parasite that feeds off your messages and destroys the contents
4) A list of CC or BCC recipients
5) None of these
3. SMTP, FTP and DNS are applications of the ____ layer.
1) data link
2) network
3) transport
4) application
5) None of these
4. In a database, information should be organised and accessed according to which of the following?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these
5. A _______ is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these
6. A file extension is separated from the main file name with a(n) _______, but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these
7. A telephone number, a birth date, and a customer name are all examples of
1) a record
2) data
3) a file
4) a database
5) None of these
8. The term _______ designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
9. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these
10. The real business and competitive value of information technology lies in
1) The software applications that are used by many companies
2) The capabilities of the software and value of the information, a business acquires and uses
3) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
4) The capabilities of the hardware and the speed at which it processes information
5) None of these
Answers
1- 1
2- 2
3-4
4- 2
5- 4
6- 4
7- 1
8- 4
9- 2
10- 2