Computer Awareness - SPLessons

Computer Awareness Practice Set 45

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

Computer Awareness Practice Set 45

shape Introduction

Computer Awareness Practice Set 45 presents multiple choice Q & A for basics of computers and applications. Computer Awareness Practice Set 45 article, is exceedingly important for candidates preparing for RRB ALP/Technical Exams/Junior Engineer Recruitment, SSC CGL, UPSC (Civil services exam including IAS) Exams and etc.

shape Quiz

1. Which among the following was the first network with which the idea of internet began?
    A. RAPANET B. PARANET C. ARPANET D. APARANET

Answer: Option C
2. Which of the following is the coding language used to create documents for use on the Internet?
    A. HTML B. HSMT C. HLTM D. All of these

Answer: Option A
3. The main agenda for Encryption/decryption is to provide a network with strict ___________.
    A. Privacy B. Authenticity C. Integrity D. Non-repudiation

Answer: Option A
4. Smart card is:
    A. Special purpose cards B. Microprocessor cards C. Processing unit contains memory for storing data D. Processing unit for software handling

Answer: Option B
5. To justify the selected text, the shortcut key is __________.
    A. Ctrl + 1 B. Ctrl + J C. Ctrl + U D. Ctrl + Alt + K

Answer: Option B
1. In www.yahoo.com, www stands for:
    A. Web World Wide B. World Wide Web C. Wide World Web D. Worlds Wide Weblinks

Answer: Option B
2. __________ is the basic communication language or protocol of the Internet.
    A. TCTP/ITP B. TCDP/IEP C. TCP/IP D. TCMP/IKP

Answer: Option C
3. Which of the following is related with 192.9.200.155?
    A. Hardware address B. Monitor address C. IP address D. All of these

Answer: Option C
4. Which among the following term is used for Unauthorized copying of software to be used for personal gain instead of personal backups?
    A. program thievery B. data snatching C. software piracy D. program looting

Answer: Option C
5. In first generation of computers, they used ______.
    A. batch processing B. multi threading C. multi programming D. networking

Answer: Option A
1. Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
    A. hacker B. analyst C. instant messenger D. programmer

Answer: Option A
2. A Bug can be called an error which generally comes in software or hardware. Which among the following is another name that may refer to bugs in computers?
    A. Leech B. Squid C. Slug D. Glitch

Answer: Option D
3. Which of the following general-purpose software allows you to do the mathematical or financial calculations?
    A. Word processing program B. Spreadsheet program C. Presentation program D. Media Player

Answer: Option B
4. What are those programs collectively called which are created for performing particular tasks in the computer system?
    A. hacker B. analyst C. instant messenger D. programmer

Answer: Option A
5. Computer language COBOL is appropriate for—
    A. System software B. Application software C. Utility software D. Operating system

Answer: Option B

Computer Awareness - Related Information
IBPS RRB Clerk Computer Awareness Quiz 1
IBPS RRB Clerk Computer Awareness Quiz 2
IBPS RRB Clerk Computer Awareness Quiz 3
Computer Awareness Book for Bank Exams