-->

🖥COMPUTER AWARENESS🖥 for IBPS PO, IBPS Clerk, Bank PO, Bank Clerk and other entrance / competitive examinations.

Also Read




📷Q.1) Which command brings you to the first slide in your PowerPoint presentation? - CTRL + HOME


📷Q.2) Which of the following is not a product of Microsoft company? –Chrome


📷Q.3) In Execl sheet which of the following is the next column name after Z column? – AA


📷Q.4) Which of the following is last bar in Microsoft Excel?  - Status Bar


📷Q.5) "," Symbol is used in Microsoft Excel for which of the following purpose?- For separating cell references in formula


📷Q.6) How do you save a presentation under a new file name?- Select the File menu and choose Save As


📷Q.7) The sequence of events that occurs in the computer when it is interpreting and executing an instruction is known as a (n) __________.- instruction cycle


📷Q.8) ________ is a feature supported by many word processors that enables you to surround a picture or diagram with text.- Text Wrap


📷Q.9) The space between the margin and the text is called ________.- Indent


📷Q.10) The Zoom control slider located in _______.- Status Bar


📷Q.11) The very top of the page in a document is known as ______.- Header


📷Q.12) ________ is used to align text in centre in word document.- Ctrl + E


📷Q.13) Which of the following is not an antivirus software?- iOS


📷Q.14) Which format of email address is correct?- xyz@website.com


📷Q.15) A device which makes use of pen for drawing pictures or writing information to interact with a computer is called ______.- Stylus


📷Q.16) Which of the following refers to extracting confidential information such as credit card numbers and username password combos by masquerading as a legitimate enterprise?- Phishing


📷Q.17) Which malware was used by hackers to manipulate ATM machines and subsequently empty them?- Tyupkin


📷Q.18) A person who uses his expertise for software is known as ........- Developer


📷Q.19) Which of the following term is used for Illegal copying and distribution of software?- Software piracy


📷Q.20) Portrait and landscape are the most common types of orientation. They are found in.- PAGE LAYOUT > Orientation


📷Q.21) Attempt to gain unauthorized access to a user's system or information by pretending to be the user is known as.- Spoofing


📷Q.22) In an EBCDIC system how many possible characters are defined?- 256


📷Q.23) A computing server is connected to ___________.  - Network


📷Q.24) When the pointer is positioned on a ________, it is shaped like a hand- Hyperlink


📷Q.25) What is e-commerce?- Buying and selling products and services over the Internet

Close