Computer Questions

Q:

What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity  ?

A) Spyware scams B) Phishing scams
C) Computer viruses D) None
 
Answer & Explanation Answer: B) Phishing scams

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Computer
Job Role: Bank Clerk

15 6709
Q:

To exit the PowerPoint application, you should

A) Double click the application control menu icon B) Click the application minimize button
C) Double click the document control menu icon D) Click the document close button
 
Answer & Explanation Answer: A) Double click the application control menu icon

Explanation:

To exit the PowerPoint application, you should Double click the application control menu icon or you can go to file menu and click exit button or you can close the window button.

Report Error

View Answer Report Error Discuss

1 6669
Q:

Which keystroke is used for updating a field?

A) F11 B) F12
C) F6 D) F9
 
Answer & Explanation Answer: D) F9

Explanation:

F9 keystroke is used for updating a field.

Report Error

View Answer Report Error Discuss

5 6668
Q:

Which of the following is a true statement about Intranet and Internet ?

A) Encryption is necessary B) They use similar protocol
C) Speed is slow D) They use the same protocol
 
Answer & Explanation Answer: D) They use the same protocol

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Computer
Exam Prep: AIEEE , Bank Exams , CAT , GATE
Job Role: Bank Clerk , Bank PO

16 6582
Q:

The intersection of a column and a row

A) Cell B) Menu
C) Key D) Field
 
Answer & Explanation Answer: A) Cell

Explanation:

The intersection of a column and a row in a spread sheet is called as a cell or a bon.

Report Error

View Answer Report Error Discuss

5 6509
Q:

What is "Trend Micro" ?

A) Name of an insect B) It is an electronic machine
C) It is anti-virus software D) None
 
Answer & Explanation Answer: C) It is anti-virus software

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Computer
Exam Prep: AIEEE , Bank Exams
Job Role: Bank Clerk

17 6453
Q:

The two  types of output devices are

A) Monitor and Printer B) Floppy disc and CD
C) Keyboard and Mouse D) None of these
 
Answer & Explanation Answer: A) Monitor and Printer

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Computer
Exam Prep: Bank Exams

12 6343
Q:

The depth of a complete binary tree is given by

A) Dn = log 2 (n+1) B) Dn = log 1/2 (n+1)
C) Dn = log (n+1) D) Dn = log 2 (n-1)
 
Answer & Explanation Answer: A) Dn = log 2 (n+1)

Explanation:

A complete binary tree is a binary tree where all the levels have maximum number of nodes except possibly the last level.

 

The depth of complete binary tree of n nodes will be Dn=log 2 (n+1) where Dn is the height or depth of the tree and n is the number of nodes.

Report Error

View Answer Report Error Discuss

9 6318