Question answer related to basic computer awareness for banking and insurance tests. Prepare for the computer with these quizzes.

In a database, a field is a

  1. Label
  2. Table of information
  3. Group of related records
  4. Category of information

Option C
The secret code that restricts entry to some program is

  1. Entry – Code
  2. Passport
  3. Password
  4. Access – code

Option C
A temporary storage area, attached to the CPU for I/O operations, is a

  1. Channel
  2. Buffer
  3. Register
  4. Core

Option B
The altering of data so that it is not usable unless the changes are undone is

  1. Biometrics
  2. Compression
  3. Encryption
  4. Ergonomics

Option C
The ______ is the term used to describe the window that is currently being used.

  1. Web Window
  2. Display Area
  3. WordPad Window
  4. active window

Option D
The computer industry uses prefixes of Greek origin to measure large amounts of data. Which term describes 1024 bytes.

  1. Kilobyte
  2. Megabyte
  3. Gigabyte
  4. Terabyte
  5. None of the above

Option A
The default extension of Access database file is?

  1. db
  2. adb
  3. dba
  4. mdb
  5. None of these

Option D
_____________ is the process of carrying out commands.

  1. Fetching
  2. Storing
  3. Executing
  4. Decoding

Option C
When you purchase a product over a Mobile Phone, the transaction is called ___

  1. POS
  2. e-Commerce
  3. m-Commerce
  4. Mobile Purchases
  5. None of these.

Option C
Errors in a computer program are referred to as

  1. Bugs
  2. Mistakes
  3. Item overlooked
  4. Blunders

Option A
Which of the following is true?

  1. Byte is a single digit a binary number
  2. Bit represents a grouping of digital numbers
  3. Eight digit binary number is called a byte
  4. Eight digit binary number is called a bit

Option C
Easy to use______

  1. User friendly
  2. Select
  3. Helpful
  4. Ever ready

Option A
For printing a document you have to put on

  1. printer
  2. monitor
  3. scanner
  4. All of these
  5. None of these

Option A
Computer systems are comprised of

  1. Hardware, programs, information, people and networks
  2. Hardware, software, procedures, networks and people
  3. Hardware, programs, information, people and procedures
  4. Hardware, programs, processors, procedures, networks and people
  5. Hardware, programs, processors, procedures and people

Option B
Any latter, number or symbol found on the keyboard that you can type into the computer is called a/an

  1. Output
  2. Character
  3. Type
  4. Print
  5. None of these

Option B
The process of transferring files form a computer on the Internet to you computer is called

  1. Downloading
  2. Uploading
  3. FTP
  4. JPEG

Option B
Mozilla Firefox is _________

  1. Browser
  2. Editor
  3. Compiler
  4. None of Above

Option A
Which key do you press to check spelling?

  1. F3
  2. F5
  3. F7
  4. F9
  5. None of these

Option C
The process by which a computer receives information form a server on the internet is known as ___

  1. Pulling
  2. Pushing
  3. Downloading
  4. Transferring

Option C
Unwanted repetitious messages, such as unsolicited bulk e-mail is known as ______.

  1. Spam
  2. Trash
  3. Calibri
  4. Courier
  5. None

Option A