Please wait...

Computer Knowledge Test 61
Menu grid icon
Result Result point icon
Computer Knowledge Test 61
  • Goals icon

    /

    Score
  • Trophy icon

    -

    Rank
White alarm icon Time Taken: -
Result frame illustration
  • Question 1/30
    1 / -0

    ______ is a network authentication protocol which is designed to provide strong authentication for client/server applications by using secret-key cryptography.
  • Question 2/30
    1 / -0

    A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is ______
  • Question 3/30
    1 / -0

    What is the other name for programmed chip________
  • Question 4/30
    1 / -0

    How can you disable extended selection mode_________
  • Question 5/30
    1 / -0

    Which type of memory cannot be erased and reprogrammed?
  • Question 6/30
    1 / -0

    Select the Odd one_________
  • Question 7/30
    1 / -0

    The term _______ designates equipment that might be added to a computer system to enhance its functionality.
  • Question 8/30
    1 / -0

    What type of resource is most likely to be a shared common resource in a computer Network?
  • Question 9/30
    1 / -0

    How is power supplied to a low-power___________
  • Question 10/30
    1 / -0

    When typing in a word field manually, what must you press to insert the Curly Braces?
  • Question 11/30
    1 / -0

    Which of the following programme that has been physically etched onto a chip________
  • Question 12/30
    1 / -0

    _____ are provided with operating systems to facilitate editing of text and data.
  • Question 13/30
    1 / -0

    Internet Safety relates to_________
  • Question 14/30
    1 / -0

    Which of the following systems helps you with making a decision about a non-structured problem?
  • Question 15/30
    1 / -0

    To fit in notebook and many handheld computers, the keyboards usually are ________
  • Question 16/30
    1 / -0

    Font type, Font size, Bold, Underline, Bullets, Alignment display on________
  • Question 17/30
    1 / -0

    A device that is used to transmit data from one location to another is known as ________
  • Question 18/30
    1 / -0

    Which of the following activity can be termed as software piracy?
  • Question 19/30
    1 / -0

    If you are struck on a page of website on Internet Explorer and you want to get the update frequently, What will you do?
  • Question 20/30
    1 / -0

    Which of the following devices can be sued to directly image printed text________
  • Question 21/30
    1 / -0

    A connection from one HTML document to another HTML document is called __________
  • Question 22/30
    1 / -0

    Which of the following is true about URL________
  • Question 23/30
    1 / -0

    Which is a device that is attached to a microprocessor chip to keep it from overheating by absorbing its heat and dissipating it into the air?
  • Question 24/30
    1 / -0

    The secret code that restricts entry to some programs
  • Question 25/30
    1 / -0

    The horizontal and vertical lines on a worksheet are called________
  • Question 26/30
    1 / -0

    Accumulator is a ________
  • Question 27/30
    1 / -0

    The point at which the flow of text in a document moves to the top of a new page_______
  • Question 28/30
    1 / -0

    Which of the following is not a storage medium?
  • Question 29/30
    1 / -0

    In MS word short cut key CTRL W is used for_______
  • Question 30/30
    1 / -0

    to find a saved document in the computer’s memory and bring it up on the screen to view______
Close button icon
User Profile
-

Correct (-)

Wrong (-)

Skipped (-)


  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
Mockers logo Get latest Exam Updates
& Study Material Alerts!
No, Thanks
Arrow pointer icon
Click on Allow to receive notifications
Notification bell icon ×
Open Now