Computer Awareness Quiz For IBPS RBI & Insurance Exam Answers

Q1. Which among the following is the extension of font file?
(a) .ff
(b) .fnf
(c) .fnt
(d) .font
(e) .fn

S1. Ans.(c)
Sol. The file extension for a font file is .fnt

Q2. Which among the given options in Microsoft PowerPoint will allow you to select more than one slide in a presentation?
(a) Alt + Click each slide
(b) Shift + drag each slide
(c) Shift + Click each slide
(d) Ctrl + Click each slide
(e) Alt + Drag each slide

S2. Ans.(c)
Sol. Shift + Click each slide is the appropriate action to be performed to select more than one slide in a presentation.

Q3. What is the smallest and largest font size available in Font Size tool of MS World on formatting toolbar?
(a) 8 and 72
(b) 8 and 68
(c) 6 and 72
(d) 6 and 68
(e) 9 and 90

S3. Ans.(a)
Sol. 8 and 72 are the smallest and the largest font size available in Word for formatting.

Q4. A character that is raised and smaller above the baseline is known as _______________.
(a) Raised
(b) Outlined
(c) Capscript
(d) Superscript
(e) Highscript

S4. Ans.(d)
Sol. The following text is written in superscript: Superscripts
Here the text is raised and smaller above the baseline.

Q5. In MS-Word, a ruler can help to perform which of the following actions?
(a) to set tabs
(b) to set indents
(c) to change page margins
(d) All of the above
(e) None of the above

S5. Ans.(d)
Sol. All the given activities can be performed by using a ruler in MS Word.

Q6. Which key should be pressed to start a new paragraph in MS-Word?
(a) Down Cursor Key
(b) Enter Key
(c) Shift + Enter
(d) Ctrl + Enter
(e) Ctrl + N

S6. Ans.(b)
Sol. You can press enter key and start a new paragraph while typing on MS Word.

Q7 . Which bar is usually located below that Title Bar that provides categorised options?
(a) Menu bar
(b) Status Bar
(c) Tool bar
(d) Scroll bar
(e) None of the above

S7. Ans.(a)
Sol. Menu Bar is located below title bar.

Q8. What is the maximum zoom percentage in Microsoft PowerPoint?  
(a) 100%
(b) 200%
(c) 400%
(d) 500%
(e) None of these

S8. Ans.(c)
Sol. 400% is the max. zoom percentage in PowerPoint.

Q9. Which among the following option does DBMS helps to achieve?
(a) Data independence
(b) More redundancy
(c) Centralised manner to control of data
(d) Both (a) and (c)
(e) None of the above

S9. Ans.(d)
Sol.  DBMS reduces data redundancy, provide a centralised manner to control of data and enabled data independence.

Q10. What is Telnet? 
(a) Network or Telephones
(b) Television Network
(c) Remote Login
(d) All of these
(e) None of these

S10. Ans.(c)
Sol.  Telnet is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

Q11. What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
(a) CMOS
(b) RAM
(c) DRAM
(d) CPU
(e) None of these

S11. Ans.(a)
Sol. The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the on board battery. The CMOS is reset and loses all custom settings in case the battery runs out of energy. Additionally, the system clock resets when the CMOS loses power.

Q12. Which of the following is a machine independent program? 
(a) High level language
(b) Low level language
(c) Assembly language
(d) Machine language
(e) None of these

S12. Ans.(a)
Sol. It is a machine independent language. It enables user to write programs in a language which resemble English words and familiar mathematical symbols.

Q13.  Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups? 
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting

S13. Ans.(c)
Sol. Software piracy is the illegal copying, distribution, or use of software.

Q14. In first generation of computers, they used ______.
(a) batch processing
(b) multithreading
(c) multiprogramming
(d) networking
(e) All of the above

S14. Ans.(a)
Sol. In First Generation mainly batch processing operating system were used.

Q15. Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
(a) hacker
(b) analyst
(c) instant messenger
(d) programmer
(e) spammer

S15. Ans.(a)
Sol.  Hacker is someone who seeks and exploits weaknesses in a computer system.