Banking Awareness Computer quiz 112. Free computer knowledge quiz online. Test your knowledge about computer with these quizzes. Computer quiz competition.

1. Which of the following is an example of non volatile memory?
1) VLSI
2) LSI
3) ROM
4) RAM
5) Hard disk

2. IEEE 802.16 popularly called ___
1) Ethernet
2) Wi-Fi
3) WIMAX
4) Wireless Network
5) None of these

3. To protect system, there are how many security levels?
1) One
2) Two
3) Three
4) Four
5) Five

4. Java was originally invented by
1) Oracle
2) Microsoft
3) Novell
4) Sun
5) IBM

5. Asmall network making up the internet and also having a small number of computers with in it is called ___
1) Host
2) Address
3) Sub domain
4) Domain
5) URL

6. The operating system of a computer serves as a software interface between the user and ___
1) Software
2) Hardware
3) Processor
4) Compiler
5) RAM

7. Both the ALU and control section of CPU employ special purpose storage locations called:
1) Decoders
2) Buffers
3) Multiplexer
4) Registers
5) Flip flops

8. The address of the next instruction to be executed by the current process is provided by the ___
1) CPU registers
2) program counter
3) process stack
4) pipe
5) coding counter

9. Which command combines the contents of one file with another?
1) Restore
2) Rename
3) Append
4) Add
5) Store

10. The ___ is the administrative section of the computer system.
1) Memory Unit
2) Input Unit
3) Central Processing Unit
4) Control Unit
5) Logic Unit

11. Coded entries which are used to gain access to a computer system are called
1) Codeword’s
2) Entry codes
3) Entry words
4) Security commands
5) Data codes

12. What is the primary requisite of a good computer programmer?
1) Mathematical mind
2) Artistic mind
3) Logical mind
4) Scientific knowledge
5) Memory Knowledge

13. The errors that can be pointed out by the compiler:
1) Syntax errors
2) Internal errors
3) Semantic errors
4) Coding errors
5) Logical errors

14. Which of the following is an advantage to using fibre optics data transmission?
1) Resistance to data theft
2) Fast data transmission rate
3) Few transmission errors
4) Low noise level
5) All the above

15. Which one of the following when added can reduce the processing time of a computer?
1) A buffer
2) A co-processor
3) 1024 megabyte
4) A converter
5) 1064 megabyte

16. A program that neither replicates or copies itself, but does damage or compromises the security of the computer. Which ‘Computer Virus’ it is?
1) Hoax
2) Worm
3) Trojan
4) Joke program
5) Juke program

17. ‘DB’ computer abbreviation usually means?
1) Driver Boot
2) Double Byte
3) Data Block
4) Database
5) None of these

18. What do we call a network whose elements may be separated by some distance? It usually involves two or more small networks and dedicated high-speed telephone lines.
1) WAN (Wide Area Network)
2) World Wide Web
3) URL (Universal Resource Locator)
4) LAN (Local Area Network)
5) All the above

19. Hardware devices that are not part of the main computer system and are often added later to the system.
1) Execute
2) Highlight
3) Peripheral
4) Clip art
5) Insert

20. ‘.BAK’ extension refers usually to what kind of file?
1) Audio file
2) MS Encarta document
3) Backup file
4) Animation/ movie file
5) Restore file

21. The main computer that stores the files that can be sent to computers that are networked together is ___
1) Clip art
2) File server
3) Peripheral
4) Mother board
5) IC

22. Which of the following word processors came first?
1) MS Word
2) Lotus Notes
3) WordPerfect
4) WordStar
5) WordPad

23. Which of the following operating systems is produced by IBM?
1) UNIX
2) Windows
3) DOS
4) OS-2
5) OS-3

24. Computers calculate numbers in what mode?
1) Decimal
2) Octal
3) Binary
4) Primary
5) Secondary

25. Which of the following software is used to view web pages?
1) Web Browser
2) Internet Browser
3) Page Browser
4) Crème Browser
5) All the above

26. ____ is the process in which a user sends computer information from his computer to another computer through modem.
1) Downloading
2) Uploading
3) Processing
4) Programming
5) Seeding

27. Which of the following is used to save the frequently visited web sites?
1) Frequent List
2) Favourites List
3) Explorer List
4) File list
5) Data list

28. Which of the following performs arithmetic and logical operations?
1) CU
2) PU
3) ALU
4) Memory
5) CPU

29. A ____ is a group of independent computers attached to one another through communication media.
1) Internet
2) E-mail
3) Network
4) Software
5) Hard ware

30. Which of the following is a presentation program?
1) MS-Word
2) MS-Excel
3) MS-Power Point
4) MS- Access
5) MS-Outlook

31. Collection of 1024 Bytes:
1) 1MB
2) 1KB
3) 1TB
4) 1GB
5) 100 MB

32. How would you be able to protect yourself from phishing?
1) Call your local fish store.
2) Get an Anti-Virus Program
3) Change Passwords Every 4-6 months
4) 2 & 3
5) All the above

33. Why is identity theft something hackers usually go for?
1) Personal Information
2) Being able to have another name
3) Send them emails
4) Take their victim’s address for future use
5) All the above

34. This type of software is on computers and collects small pieces of information from users. It is also difficult to detect, what is it?
1) Spam
2) Malware
3) Phishing
4) Spyware
5) Under ware

35. Many malware programs gather information that leads to loss of privacy. How can you generally be protected from this?
1) Close window
2) Never use your computer
3) Anti-Virus Program
4) Turn Off Computer
5) Restart Computer

36. Older networks often use another type of cable, called ________
1) Unshielded twisted-pair cable
2) Coaxial cable
3) Optical Fibre
4) Twisted-pair cable
5) Data cable

37. Which device can understand difference between data & programs?
1) Input device
2) Output device
3) Memory
4) Microprocessor
5) RAM

38. Total keys keyboard is most popular
1) 123
2) 111
3) 101
4) 134
5) 143

39. What is the name of the software that allows us to browse through web pages?
1) Mail Client
2) FTP Client
3) Messenger
4) Browser
5) Server

40. Which of the following best suits the statement below? It’s the main memory of the computer system and is volatile.
1) RAM
2) ROM
3) PROM
4) Primary storage
5) Secondary storage

ANSWERS:
1) 3; 2) 3; 3) 4; 4) 4 ; 5) 1; 6) 2 ; 7) 4; 8) 2; 9) 3; 10) 3;
11) 4; 12) 3; 13) 5 14) 2; 15) 2; 16) 3; 17) 4; 18) 1; 19) 3; 20) 3;
21) 2; 22) 4; 23) 4; 24) 3; 25) 1; 26) 2; 27) 2; 28) 3; 29) 3; 30) 3;
31) 2; 32) 4; 33) 1; 34) 4; 35) 3; 36) 2; 37) 4; 38) 3; 39) 4; 40) 1;