New
Free Workshop on RBI Grade B Descriptive Answer Writing - Join Us!
Login
Register
More Topics
Home
Questions
Computer
Computer Architecture
Practice Computer Architecture Questions and Answers
Question Listing
Which of the following is the full-form of ENIAC?
Which of the following techniques can be used to store a large number of files in a small amount of storage space?
What does DRAM stand for?
Which output device transfers processed information into a printed page?
What kind of memory is both static and non -volatile?
First page of Website is termed as-
…………….are used to identify a user who returns to a Website
Chief component of first generation computer was
CMOS stands for__
What is the shortcut key to ‘refresh the current web page ’?
What is the shortcut key for ‘Justify text Alignment’?
What is the shortcut key for ‘Close Current Tab’?
What is the shortcut key for ‘Hiding Selected row’ in Excel?
What is the shortcut key for ‘Page Break’?
What is the shortcut key for ‘Deleting One Word to the left’?
What is the shortcut key for ‘Deleting One Word to the Right’?
What is the shortcut key for inserting ‘Copyright Symbol’?
Press ____ to open the help window in MS word document.
Which file are contents readymade styles that can be used for a word document?
Zoom in and out button is available on
Junk e-mail is also called
Who among the following is known as father of Internet?
Ink Jet Printer is an example of which among the following?
Which of the following shortcut key save the open document in MS Word like ‘Ctrl + S’?
World Wide Web is a collection of all information, resources, pictures, sounds and multimedia on the internet which is accessed through
If you wish to extend the length of the network without having the signal degrade, you would use a _______.
Replace’ option is available in ________________.
Which PowerPoint view displays each slide of the presentation as a thumbnail and is useful for rearranging slides?
The common name for the crime of stealing passwords is:
What is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masqueradi...
.......... is the key we use to run the selected command.
What is the name of an application program that gathers user information and sends it to someone through the internet?
.............. file format used for data compression and archiving
In Excel how many characters can be typed in a single cell?
A modem is connected to
Snowbol is an/a---------
Switching device of fifth generation computer is--------
.......... printer is a non-impact printer and is quite in working
Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider?
A file which has not been altered, compressed, or manipulated in any way by the computer is called?
Page 2 of 3
Previous
1
2
3
Next
Last
More Topics
×
Browser Questions
Computer Awarenes Questions
Computer Book Questions
Computer Language Questions
Computer Memory Questions
Computer Miscellaneous Questions
Computer paper Questions
Database Management System Questions
Email Questions
Important Computer Questions Questions
MS Office Questions
Network Questions
Software System Questions
Today's Class
There is no live class for today.
×
I Pledged to:
callback wala button
×
Please Enter Details
Please enter Name
We'll never share your email with anyone else.
Please enter Correct Mobile Number
We'll never share your email with anyone else.
Request a Call Back
Thank You
Update Address
Please enter complete address
Please enter pincode
Please enter State
Select State
Please enter City
Add Address
Download the app
×
X
×