Please wait...
Home
Exam Categories
Bank
SBI Clerk
SBI PO
IBPS PO
IBPS Clerk
IBPS RRB
RBI Grade B
NIACL Assistant
SSC
SSC MTS
SSC CHSL
SSC GD
SSC JE
SSC CPO
SSC Stenographer
SSC CGL
IB ACIO
Selection Post
Railway
RRB NTPC
RRB Group-D
RRB JE
RRB ALP
RPF SI
RPF Constable
RRB Technician
State
UP Police
Bihar
Haryana
Delhi
Other
FCI
IB Security Assistant
Teaching
CTET
UPTET
KVS
DSSSB
Insurance
LIC AAO
LIC ADO
Medical
NEET
AIIMS
JIPMER
Engineering
JEE Main
COMEDK
WBJEE
BITSAT
Manipal
SRMJEEE
VITEEE
AP EAMCET
TS EAMCET
GUJCET
KCET
KEAM
MHT CET
AMU
UPSEE
KIITEE
UGEE
IISER
NEST
LPU
Defence
AFCAT
CDS
NDA
DRDO
Agniveer Vayu
GATE
Mechanical
Electrical
Electronics & Communications
Civil
Computer Science
NTA CUET
CUET
UPSC
Civil Service Examination (CSE)
MBA Entrance
CAT
CMAT
SRCC GBO
XAT
SNAP
IIFT
MAT
CUET PG
MAH CET
TS ICET
AP ICET
IPMAT
TANCET
ATMA
Karnataka PGCET
NMAT
IBSAT
LAW
CLAT
Upcoming Exam
ReNEET UG 2026
CUET UG 2026
UP Police Constable 2026
SSC Selection Post (Phase 14) 2026
SSC GD 2025-26
RRB NTPC 2026
SSC CGL Tier-I 2026
SSC JE 2026
UPSC (CSE) 2026
SBI PO Prelims 2026
SSC Steno Grade C & D 2026
SBI Clerk Prelims 2026
IBPS PO Prelims 2026
IBPS Clerk Prelims 2026
SSC CPO Tier I 2026
Blog
Login/Sign Up
Profile
Sign out
Home
Exam Categories
Bank
SBI Clerk
SBI PO
IBPS PO
IBPS Clerk
IBPS RRB
RBI Grade B
NIACL Assistant
SSC
SSC MTS
SSC CHSL
SSC GD
SSC JE
SSC CPO
SSC Stenographer
SSC CGL
IB ACIO
Selection Post
Railway
RRB NTPC
RRB Group-D
RRB JE
RRB ALP
RPF SI
RPF Constable
RRB Technician
State
UP Police
Bihar
Haryana
Delhi
Other
FCI
IB Security Assistant
Teaching
CTET
UPTET
KVS
DSSSB
Insurance
LIC AAO
LIC ADO
Medical
NEET
AIIMS
JIPMER
Engineering
JEE Main
COMEDK
WBJEE
BITSAT
Manipal
SRMJEEE
VITEEE
AP EAMCET
TS EAMCET
GUJCET
KCET
KEAM
MHT CET
AMU
UPSEE
KIITEE
UGEE
IISER
NEST
LPU
Defence
AFCAT
CDS
NDA
DRDO
Agniveer Vayu
GATE
Mechanical
Electrical
Electronics & Communications
Civil
Computer Science
NTA CUET
CUET
UPSC
Civil Service Examination (CSE)
MBA Entrance
CAT
CMAT
SRCC GBO
XAT
SNAP
IIFT
MAT
CUET PG
MAH CET
TS ICET
AP ICET
IPMAT
TANCET
ATMA
Karnataka PGCET
NMAT
IBSAT
LAW
CLAT
Upcoming Exams
ReNEET UG 2026
CUET UG 2026
UP Police Constable 2026
SSC Selection Post (Phase 14) 2026
SSC GD 2025-26
RRB NTPC 2026
SSC CGL Tier-I 2026
SSC JE 2026
UPSC (CSE) 2026
SBI PO Prelims 2026
SSC Steno Grade C & D 2026
SBI Clerk Prelims 2026
IBPS PO Prelims 2026
IBPS Clerk Prelims 2026
SSC CPO Tier I 2026
Blog
Register
Home
Computer Knowledge Test 60
Computer Knowledge Test 60
Result
Computer Knowledge Test 60
/
Score
-
Rank
Time Taken:
-
Question
1/30
1 / -0
An E-mail protocol for storage, management and change, especially in corporate offices________
Correct
Wrong
Skipped
A
Message handling service
Correct
Wrong
Skipped
B
Data storage
Correct
Wrong
Skipped
C
All of the above
Correct
Wrong
Skipped
D
None of these
Question
2/30
1 / -0
Multi-user systems use a single processing unit to link several _______
Correct
Wrong
Skipped
A
Personal computers
Correct
Wrong
Skipped
B
Workstations
Correct
Wrong
Skipped
C
Dumb terminals
Correct
Wrong
Skipped
D
Mainframes
Question
3/30
1 / -0
________ controls the way in which the computer system functions and providesa means by which users can.
Correct
Wrong
Skipped
A
The platform
Correct
Wrong
Skipped
B
Application software
Correct
Wrong
Skipped
C
Operating system
Correct
Wrong
Skipped
D
None of these
Question
4/30
1 / -0
Modifying data for fun and profit is defined as _____
Correct
Wrong
Skipped
A
Denial of Service (DoS) attack
Correct
Wrong
Skipped
B
Data Diddling
Correct
Wrong
Skipped
C
All of these
Correct
Wrong
Skipped
D
None of these
Question
5/30
1 / -0
_________ is a system that converts stored data directly to microfilm or microfiche.
Correct
Wrong
Skipped
A
OMR
Correct
Wrong
Skipped
B
Scanner
Correct
Wrong
Skipped
C
Barcode Reader
Correct
Wrong
Skipped
D
COM
Question
6/30
1 / -0
Which one of the following allows users to continue to operate computers whileprinting is in progress?
Correct
Wrong
Skipped
A
Spooler
Correct
Wrong
Skipped
B
Os Supervisor
Correct
Wrong
Skipped
C
compiler
Correct
Wrong
Skipped
D
None of these
Question
7/30
1 / -0
The elapsed time between the end of an inquiry on a computer system and the beginning of a response is termed as ______
Correct
Wrong
Skipped
A
Run Time
Correct
Wrong
Skipped
B
Access Time
Correct
Wrong
Skipped
C
Response Time
Correct
Wrong
Skipped
D
Seek Time
Question
8/30
1 / -0
When was the first Windows operating system launched_______
Correct
Wrong
Skipped
A
1985
Correct
Wrong
Skipped
B
1988
Correct
Wrong
Skipped
C
1989
Correct
Wrong
Skipped
D
1990
Question
9/30
1 / -0
The phrase _________describes viruses, worms, Trojan horse attack applets, and attack scripts.
Correct
Wrong
Skipped
A
malware
Correct
Wrong
Skipped
B
spam
Correct
Wrong
Skipped
C
virus
Correct
Wrong
Skipped
D
None of these
Question
10/30
1 / -0
The term bandwidth refers to _________.
Correct
Wrong
Skipped
A
How much data can be sent through a connection
Correct
Wrong
Skipped
B
How fast your computer is
Correct
Wrong
Skipped
C
How much e-mail can be sent through a connection
Correct
Wrong
Skipped
D
How much video can be sent through a connection
Question
11/30
1 / -0
In a document what is the maximum number of columns that can be inserted in MS Word Table?
Correct
Wrong
Skipped
A
35
Correct
Wrong
Skipped
B
15
Correct
Wrong
Skipped
C
63
Correct
Wrong
Skipped
D
66
Question
12/30
1 / -0
What database key links one table to another?
Correct
Wrong
Skipped
A
Primary key
Correct
Wrong
Skipped
B
Foreign key
Correct
Wrong
Skipped
C
Secondary key
Correct
Wrong
Skipped
D
None of these
Question
13/30
1 / -0
Your business has contracted with another company to have thorn host and run an application for your company over the Internet. The company providing this service to your business is called an________
Correct
Wrong
Skipped
A
internet access provider
Correct
Wrong
Skipped
B
application service provider
Correct
Wrong
Skipped
C
application access provider
Correct
Wrong
Skipped
D
None of these
Question
14/30
1 / -0
Programming language built into user programs such as Word and Excel are known as___________
Correct
Wrong
Skipped
A
Macro languages
Correct
Wrong
Skipped
B
object-oriented languages
Correct
Wrong
Skipped
C
visual programming languages
Correct
Wrong
Skipped
D
None of these
Question
15/30
1 / -0
How are data organized in a spreadsheet________
Correct
Wrong
Skipped
A
Layers and planes
Correct
Wrong
Skipped
B
Rows and columns
Correct
Wrong
Skipped
C
Height and width
Correct
Wrong
Skipped
D
None of these
Question
16/30
1 / -0
The person contributing the idea of the stored program was_________
Correct
Wrong
Skipped
A
Daniel Thomas
Correct
Wrong
Skipped
B
Charles Babbage
Correct
Wrong
Skipped
C
John Neumann
Correct
Wrong
Skipped
D
Dennis Ritenie.
Question
17/30
1 / -0
What is defined as the number of bits that the CPU processes as a unit_______
Correct
Wrong
Skipped
A
A computer word
Correct
Wrong
Skipped
B
A computer phrase
Correct
Wrong
Skipped
C
A computer term
Correct
Wrong
Skipped
D
None of these
Question
18/30
1 / -0
_________ is the disaggregation of core themes during qualitative data analysis.
Correct
Wrong
Skipped
A
Axial coding
Correct
Wrong
Skipped
B
Design flexibility
Correct
Wrong
Skipped
C
Bracketing
Correct
Wrong
Skipped
D
None of these
Question
19/30
1 / -0
When installing a peripheral you also usually need to install a__________
Correct
Wrong
Skipped
A
server
Correct
Wrong
Skipped
B
driver
Correct
Wrong
Skipped
C
password
Correct
Wrong
Skipped
D
None of these
Question
20/30
1 / -0
The ascending order of a data hierarchy is____________
Correct
Wrong
Skipped
A
Bit-byte-record-field-file-database
Correct
Wrong
Skipped
B
Byte-bit-field-record-file-database
Correct
Wrong
Skipped
C
Bit-byte-field-record-file-database
Correct
Wrong
Skipped
D
Byte-bit-record-file-field-database
Question
21/30
1 / -0
A device or system connected to a network is also called what?
Correct
Wrong
Skipped
A
Branch
Correct
Wrong
Skipped
B
Leaf
Correct
Wrong
Skipped
C
Node
Correct
Wrong
Skipped
D
Block
Question
22/30
1 / -0
An affordable technology that uses existing telephone lines to provide high-speed connections is called _______
Correct
Wrong
Skipped
A
ISDN
Correct
Wrong
Skipped
B
Cable modem
Correct
Wrong
Skipped
C
DSL
Correct
Wrong
Skipped
D
ALU
Question
23/30
1 / -0
________ is the act of copying or downloading a program from a network and making multiple copies of it
Correct
Wrong
Skipped
A
Network Piracy
Correct
Wrong
Skipped
B
Plagiarism
Correct
Wrong
Skipped
C
Software Piracy
Correct
Wrong
Skipped
D
None of the Above
Question
24/30
1 / -0
In reference to your ethical structure, how much do you identify with the person or persons who will receive the benefit or suffer the harm is called which of the following________
Correct
Wrong
Skipped
A
Consequences
Correct
Wrong
Skipped
B
Relatedness
Correct
Wrong
Skipped
C
Society’s opinion
Correct
Wrong
Skipped
D
none of these
Question
25/30
1 / -0
The unit KIPS is used to measure the speed of__________
Correct
Wrong
Skipped
A
Processor
Correct
Wrong
Skipped
B
Printer
Correct
Wrong
Skipped
C
Tape drive
Correct
Wrong
Skipped
D
None of these
Question
26/30
1 / -0
Programming language built into user programs such as Word and Excel are known as _______
Correct
Wrong
Skipped
A
Macro languages
Correct
Wrong
Skipped
B
object-oriented languages
Correct
Wrong
Skipped
C
visual programming languages
Correct
Wrong
Skipped
D
None of these
Question
27/30
1 / -0
The drawbacks of the binary tree sort are remedied by the___________
Correct
Wrong
Skipped
A
Quick sort
Correct
Wrong
Skipped
B
Heap Sort
Correct
Wrong
Skipped
C
Insertion sort
Correct
Wrong
Skipped
D
None of these
Question
28/30
1 / -0
A hacker that changes or forges information in an electronic resource, is engaging in __________.
Correct
Wrong
Skipped
A
denial of service
Correct
Wrong
Skipped
B
terrorism
Correct
Wrong
Skipped
C
data diddling
Correct
Wrong
Skipped
D
None of these
Question
29/30
1 / -0
what do we call a network elements may be separated by some distance? It usually involves two or more networks and dedicated high speed telephone lines
Correct
Wrong
Skipped
A
LAN
Correct
Wrong
Skipped
B
WAN
Correct
Wrong
Skipped
C
WWW
Correct
Wrong
Skipped
D
PAN
Question
30/30
1 / -0
Two or more computers connected to each other for sharing information form a _________
Correct
Wrong
Skipped
A
router
Correct
Wrong
Skipped
B
server
Correct
Wrong
Skipped
C
tunnel
Correct
Wrong
Skipped
D
network
Re-attempt
-
Correct (
-
)
Wrong (
-
)
Skipped (
-
)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Re-attempt
-
Correct (
-
)
Wrong (
-
)
Skipped (
-
)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Home
Upcoming Exam
Blog
Profile
Get latest Exam Updates
& Study Material Alerts!
No, Thanks
Allow
Click on Allow to receive notifications
Sign up to your account
Log in to your account
Sign Up with Google
Login with Google
New to Mockers?
Sign Up
Already have an account?
Log in
By clicking Login, you agree to our
Terms of Use
& our
Privacy Policy.
Most Loved Free Mock Test Platform
I agree to the
Terms of Use
&
Privacy Policy
Save
Sign up to your account
Log in to your account
Verify Mobile Number
Send OTP
Already have an account
Log in
New to Mockers?
Sign Up
By Log in/Sign Up, you agree to our
Terms of Use
& our
Privacy Policy.
Secure your account:
Enter OTP now.
Please enter verification code sent to
Didn’t receive the code?
Resend
Verify
By Log in/Sign Up, you agree to our
Terms of Use
& our
Privacy Policy.
×
Open Now