6
Q:

In order to e-mail a Word document from within Word _______ 

A) Go to file/Send To/Mail Recipient B) Save the file as an e-mail attachment
C) Start outlook and attach the file while open in word D) This is an impossible operation

Answer:   A) Go to file/Send To/Mail Recipient



Explanation:
Subject: Computer
Exam Prep: Bank Exams
Q:

The popular Access Method for computer network is

A) Ethernet B) Token Ring
C) Bus Token D) None
 
Answer & Explanation Answer: B) Token Ring

Explanation:
Report Error

View Answer Workspace Report Error Discuss

2 22
Q:

What could cause a Fixed Disk Error?

A) Slow Processor Speed B) RAM Space
C) Incorrect CMOS Settings D) None
 
Answer & Explanation Answer: C) Incorrect CMOS Settings

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Filed Under: Computer
Exam Prep: Bank Exams , CAT , GATE
Job Role: Analyst , Bank PO , Database Administration , IT Trainer

6 143
Q:

What are the four main functions of a computer?

A) Data, information, bits and bytes B) Hardware, software, modeling and operations
C) Input, processing, output and storage D) Learning, thinking, intelligence and virtuosity
 
Answer & Explanation Answer: C) Input, processing, output and storage

Explanation:

The four main functions of a computer are ::

 

1. Input,

2. Processing,

3. Output and

4. Storage

Report Error

View Answer Workspace Report Error Discuss

Filed Under: Computer
Exam Prep: AIEEE , Bank Exams , CAT
Job Role: Analyst , Bank PO

5 75
Q:

Expansion cards are inserted into

A) Peripheral Devices B) Pegs
C) Slots D) The back of the computer
 
Answer & Explanation Answer: C) Slots

Explanation:

In computing, the expansion card or board or accessory card is a printed circuit board that can be inserted into an electrical connector or expansion slot, on a computer motherboard, to add functionality to a computer system via the expansion bus.

Report Error

View Answer Workspace Report Error Discuss

4 245
Q:

The common name for the crime of stealing passwords is

A) Spoofing B) Surfing
C) Identity Theft D) Speeling
 
Answer & Explanation Answer: A) Spoofing

Explanation:

A spoofing attack is a situation in which one individual or program effectively disguises or mask as another by falsifying information and thereby gaining up an ill-conceived advantage. It may use for stealing password or IP addresses.

Report Error

View Answer Workspace Report Error Discuss

4 232
Q:

Where is RAM located?

A) Mother Board B) Expansion Board
C) External Drive D) None
 
Answer & Explanation Answer: A) Mother Board

Explanation:

RAM is located in The central processing unit (CPU), also called a processor, is located inside the computer case on the motherboard. It is sometimes called the brain of the computer, and its job is to carry out commands.

Report Error

View Answer Workspace Report Error Discuss

9 175
Q:

What Does BIOS Stand For

A) Backup Input Output System B) Battery Integrated Operating Setup
C) Basic Input Output System D) Better Integrated Operating System
 
Answer & Explanation Answer: C) Basic Input Output System

Explanation:

BIOS in computers stands for Basic Input Output System.

 

BIOS is a set of computer instructions in firmware which control input and output operations.

Report Error

View Answer Workspace Report Error Discuss

12 225
Q:

The first mechanical computer designed by Charles Babbage was called?

A) Super Computer B) Abacus
C) Calculator D) Analytical Engine
 
Answer & Explanation Answer: D) Analytical Engine

Explanation:
Report Error

View Answer Workspace Report Error Discuss

9 572