Total 36 questions found in this category.

Submit Question   Show By Status: New Submissions   Pending   Deleted   Approved   


QuestionSubjectCategory
Instead of function keys which keys are used to create shortcut?Computer BasicsComputer Basics
Which of the following device is not from pointing type of device? Computer BasicsComputer Basics
What do you mean by Ra.One from the film RAONE?Computer BasicsComputer Basics
After copying the content how many times can you paste? Computer BasicsComputer Basics
1 nibble equals to Computer BasicsComputer Basics
1 nibble equals to Computer BasicsComputer Basics
A scanner transforms data on paper in to Computer BasicsComputer Basics
What is a proper method of opening a file for writing as binary file? Computer BasicsComputer Basics
#define MAX_NUM 15 Referring to the sample above, what is MAX_NUM? Computer BasicsComputer Basics
What function will read a specified number of elements from a file? Computer BasicsComputer Basics
Which of the following is the correct way to increment the variable "ptr"? Computer BasicsComputer Basics
With every use of a memory allocation function, what function should be used to release allocated memory which is no longer needed? Computer BasicsComputer Basics
Who Is the Developer Of C++Computer BasicsComputer Basics
Fifth generation computing is based onComputer BasicsComputer Basics
Actual execution of instruction in a computer can be done byComputer BasicsComputer Basics
The brain of computer program?Computer BasicsComputer Basics
Who was the founder of computer?Computer BasicsComputer Basics
What was UNIVAC?Computer BasicsComputer Basics
What is HTTP 404?Computer BasicsComputer Basics
What is the ultimate purpose of Defragmentation?Computer BasicsComputer Basics
What is Office Open XML?Computer BasicsComputer Basics
What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode?Computer BasicsComputer Basics
While browsing the internet , which of the following key is used for full screen view?Computer BasicsComputer Basics
Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry?Computer BasicsComputer Basics
In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits?Computer BasicsComputer Basics
Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider?Computer BasicsComputer Basics
Which among the following is the most common source of Viruses to the hard disk of your computer?Computer BasicsComputer Basics
Which of the following term is used for the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge?Computer BasicsComputer Basics
Firewall technology is designed to block unauthorized access while permitting authorized communications. Which among the following is the most advanced in firewall technology?Computer BasicsComputer Basics
Who is the founder of Cisco System?Computer BasicsComputer Basics
In which year Intel was founded?Computer BasicsComputer Basics
Who is the co-founder of Intel?Computer BasicsComputer Basics
Who was the founder of Intel ?Computer BasicsComputer Basics
Who invented facebook ?Computer BasicsComputer Basics
Who invented the first computer in 1786 ?Computer BasicsComputer Basics
It was acknowledged as the second-most dangerous computer virus in history, after the Love Bug virus. Name this virus, which struck in 2001Computer BasicsComputer Basics



Submit Interview/Test Questions with Answers and make money from adsense revenue sharing program



Online Users

 
Copyright © SpiderWorks Technologies Pvt Ltd., Kochi, India. All Rights Reserved.