Friday, 23 June 2017

Whats-App Discussion SBI/IBPS PO Computer 23/6/2017(Friday)

Q1: In MS-Word, what's the shortcut key to spell check?
Answer: F7



Q2: ".psd" extension is associated with which application software?
Answer: Adobe Photoshop



Q3: Which of the following is not related to internet?
A) ISP
B) Modem
C) Wifi
D) VGA

Answer: D) VGA

Explanation: VGA is related to video cards 



Q4: VGA is the display hardware. What's the full form of VGA?
Answer: Video Graphics Array



Q5:  RAM is installed on ______
A) CPU
B) Motherboard
C) SMPS
D) Graphic Card

Answer: (B) Motherboard 

 RAM is installed on *Motherboard *

Explanation: RAM is a memory unit inserted in a slot present on the motherboard.



Q6: HTTP 404 error on internet while opening a webpage or file indicates _____ ?
A) Server Busy
B) File not found
C) Server unable to handle request
D) File format not correct

Answer: B) File not found




Q7: ‘Handshaking’ in Networking parlance means ____.
A) connecting computers to a hub
B) distributed networks
C) having same operating system on different computers
D) sending e-mail
E) receiving e-mails

Answer: A) connecting computers to a hub
‘Handshaking’ in Networking parlance means *connecting computers to a hub*

Explanation: Handshaking is used to connect two computers which want to share data. Before data/signals started to be transferred Handshaking is used. 



Q8: Suppose you have opened "Google Chrome". In the browser window of the chrome, you have opened many tabs. What's the shortcut key to switch from one tab to another?
Answer: Ctrl + Tab
Suppose you have opened "Google Chrome". In the browser window of the chrome, you have opened many tabs. "Ctrl + Tab" is the shortcut key to switch from one tab to another




Q9: The altering of data so that it is not usable unless the changes are undone is called ...?
Answer: Encryption 

The altering of data so that it is not usable unless the changes are undone is called *Encryption*. 

Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. 




Q10: In computer terminology, encrypted data is referred to as ... text?
Answer: Cipher 

In computer terminology, encrypted data is referred to as *cipher* text. 

No comments:

Post a Comment