1. ……………………. are attempts by individuals to obtain confidential information from you by falsifying their identity. (1) Phishing trips (2) Computer viruses (3) Spyware scams (4) Viruses (5) Phishing scams computer knowledge for ibps 2. Why is it unethical to share copyrighted file with your friends? (1) It is not unethical because it is legal (2) It is unethical because the files are being given for free. (3) Sharing copyrighted files without permission breaks copyright laws. (4) It is not unethical because the files are being given for free (5) It is not unethical – anyone can access a computer 3. Which of the following can be used to select the entire document? (1) CTRL + A (2) CTRL + F5 (3) CTRL + K (4) SHIFT + A (5) CTRL + H 4. To instruct Word to fit the width of a column to the contents of a table automatically, click the ……………………. Button and then point to AutoFit contents. (1) Fit to Form (2) Format (3) Autosize (4) Contents (5) AutoFit


computer knowledge for ibps
computer knowledge for ibps clerical exam
computer knowledge for ibps po
computer knowledge for ibps rrb
computer knowledge for ibps exam
computer knowledge for ibps. computer knowledge for ibps clerical exam. computer knowledge for ibps po. computer knowledge for ibps exam. computer knowledge for ibps pdf. computer knowledge for ibps po exam. computer knowledge for ibps po 2013. computer knowledge for ibps rrb. computer knowledge for ibps po exam 2013. computer knowledge for ibps bank exam.