🖥COMPUTER AWARENESS🖥 for IBPS PO, IBPS Clerk, Bank PO, Bank Clerk and other entrance / competitive examinations.

Also Read

📷Q.1) Which command brings you to the first slide in your PowerPoint presentation? - CTRL + HOME

📷Q.2) Which of the following is not a product of Microsoft company? –Chrome

📷Q.3) In Execl sheet which of the following is the next column name after Z column? – AA

📷Q.4) Which of the following is last bar in Microsoft Excel?  - Status Bar

📷Q.5) "," Symbol is used in Microsoft Excel for which of the following purpose?- For separating cell references in formula

📷Q.6) How do you save a presentation under a new file name?- Select the File menu and choose Save As

📷Q.7) The sequence of events that occurs in the computer when it is interpreting and executing an instruction is known as a (n) __________.- instruction cycle

📷Q.8) ________ is a feature supported by many word processors that enables you to surround a picture or diagram with text.- Text Wrap

📷Q.9) The space between the margin and the text is called ________.- Indent

📷Q.10) The Zoom control slider located in _______.- Status Bar

📷Q.11) The very top of the page in a document is known as ______.- Header

📷Q.12) ________ is used to align text in centre in word document.- Ctrl + E

📷Q.13) Which of the following is not an antivirus software?- iOS

📷Q.14) Which format of email address is correct?- xyz@website.com

📷Q.15) A device which makes use of pen for drawing pictures or writing information to interact with a computer is called ______.- Stylus

📷Q.16) Which of the following refers to extracting confidential information such as credit card numbers and username password combos by masquerading as a legitimate enterprise?- Phishing

📷Q.17) Which malware was used by hackers to manipulate ATM machines and subsequently empty them?- Tyupkin

📷Q.18) A person who uses his expertise for software is known as ........- Developer

📷Q.19) Which of the following term is used for Illegal copying and distribution of software?- Software piracy

📷Q.20) Portrait and landscape are the most common types of orientation. They are found in.- PAGE LAYOUT > Orientation

📷Q.21) Attempt to gain unauthorized access to a user's system or information by pretending to be the user is known as.- Spoofing

📷Q.22) In an EBCDIC system how many possible characters are defined?- 256

📷Q.23) A computing server is connected to ___________.  - Network

📷Q.24) When the pointer is positioned on a ________, it is shaped like a hand- Hyperlink

📷Q.25) What is e-commerce?- Buying and selling products and services over the Internet