Computer Knowledge for IBPS

1. ……………………. are attempts by individuals to obtain confidential information from you by falsifying their identity. (1) Phishing trips (2) Computer viruses (3) Spyware scams (4) Viruses (5) Phishing scams computer knowledge for ibps 2. Why is it unethical to share copyrighted file with your friends? (1) It is not unethical because it is legal (2) It is unethical because the files are being given for free. (3) Sharing copyrighted files without permission breaks copyright laws. (4) It is not unethical because the files are being given for free (5) It is not unethical – anyone can access a computer 3. Which of the following can be used to select the entire document? (1) CTRL + A (2) CTRL + F5 (3) CTRL + K (4) SHIFT + A (5) CTRL + H 4. To instruct Word to fit the width of a column to the contents of a table automatically, click the ……………………. Button and then point to AutoFit contents. (1) Fit to Form (2) Format (3) Autosize (4) Contents (5) AutoFit
computer knowledge for ibps rrb

computer knowledge for ibps po exam

computer knowledge for ibps

computer knowledge for ibps clerical exam

computer knowledge for ibps po

computer knowledge for ibps rrb
computer knowledge for ibps exam
computer knowledge for ibps. computer knowledge for ibps clerical exam. computer knowledge for ibps po. computer knowledge for ibps exam. computer knowledge for ibps pdf. computer knowledge for ibps po exam. computer knowledge for ibps po 2013. computer knowledge for ibps rrb. computer knowledge for ibps po exam 2013. computer knowledge for ibps bank exam.