💻
Coding

FIA Assistant Computer & IT

Computer & IT for FIA BPS-15 — MS Office, internet, networks, hardware, software and cyber basics (20% weightage)

40
Questions
⚡ 150
Max XP
Intermediate
Difficulty
20m 0s/Q
Per Question
💡
Playing as guest — your score won't be saved. Create a free account to earn XP, badges, and track your progress!
Question 1 of 40 10 pts
The full form of CPU is:
Question 2 of 40 10 pts
Which Microsoft Office application is best for creating spreadsheets?
Question 3 of 40 10 pts
RAM stands for:
Question 4 of 40 10 pts
Which shortcut key is used to 'Save' a document in MS Word?
Question 5 of 40 10 pts
The Internet Protocol (IP) address is used to:
Question 6 of 40 10 pts
What does 'WWW' stand for?
Question 7 of 40 10 pts
Which of the following is an example of an operating system?
Question 8 of 40 10 pts
The shortcut key to 'Undo' the last action is:
Question 9 of 40 10 pts
1 Gigabyte (GB) is equal to:
Question 10 of 40 10 pts
A firewall is used to:
Question 11 of 40 10 pts
Which file extension is used for MS Word documents (2007 onwards)?
Question 12 of 40 15 pts
Phishing is a type of:
Question 13 of 40 10 pts
The function key used to access 'Help' in most Windows applications is:
Question 14 of 40 10 pts
An email's 'CC' field stands for:
Question 15 of 40 10 pts
Which of the following is malware?
Question 16 of 40 10 pts
The shortcut to select all content in a document is:
Question 17 of 40 10 pts
HTTPS is more secure than HTTP because it uses:
Question 18 of 40 10 pts
Which MS Office tool is used for creating presentations?
Question 19 of 40 10 pts
What is the purpose of an antivirus program?
Question 20 of 40 10 pts
In MS Excel, which symbol is used to start a formula?
Question 21 of 40 10 pts
A VPN (Virtual Private Network) is used to:
Question 22 of 40 10 pts
Which shortcut key prints a document?
Question 23 of 40 10 pts
The main circuit board of a computer is called the:
Question 24 of 40 10 pts
What does PDF stand for?
Question 25 of 40 15 pts
Cybercrime that involves gaining unauthorised access to computer systems is called:
Question 26 of 40 10 pts
Which of the following is a cloud storage service?
Question 27 of 40 10 pts
In MS Word, 'Find and Replace' is accessed using:
Question 28 of 40 10 pts
What is a strong password?
Question 29 of 40 10 pts
Binary code uses only the digits:
Question 30 of 40 10 pts
Email stands for ___ mail.
Question 31 of 40 10 pts
The term 'bandwidth' in networking refers to:
Question 32 of 40 10 pts
MS Excel function '=SUM(A1:A5)' will:
Question 33 of 40 10 pts
Which of the following is NOT an input device?
Question 34 of 40 10 pts
Data encryption is used to:
Question 35 of 40 10 pts
What does 'Ctrl + C' do?
Question 36 of 40 10 pts
The internet was originally known as:
Question 37 of 40 10 pts
Which tab in MS Word contains 'Font' and 'Paragraph' settings?
Question 38 of 40 15 pts
Ransomware is a type of malware that:
Question 39 of 40 10 pts
What is the function of a router in a network?
Question 40 of 40 15 pts
Digital forensics is the process of: