Category Archives: DATA ENTRY OPERATORS IN PUNJAB POLICE DEPARTMENT 2015

Half of 1 percent written as a decimal is

A. 0.005
B. 0.05
C. 0.02
D. 0.2

What should come in the place of question mark in the following series? 3,8,6, 14, ?,20

A. 11
B. 10
C. 8
D. 9

What is the most likely cause of an erratic mouse cursor?

A. An’unplugged mouse cable
B. A broken wire in the mouse cable.
C. A dirty ball and roller in the mouse
D. An incorrectly installed mouse driver

Which text formatting feature changes the thickness of the letters?

A. Bold
B. Italic
C. Underline
D. Alignment

Bold Italics and Underline are features In many programs. To which of the following items these features can be applied?.

A. Files
B. Pictures
C. Text
D. Windows

A block of the text automatically added to the end of an outgoing email is called____

A. An attachment
B. A signature
C. A footer
D. an encryption

Viruses are often contained in email attachments. The virus infects the computer when attachment is opened. Which of the following attachment is least likely to carry a virus?

A. A text file
B. A screensaver
C. A program
D. EXE file

What information would be safe to include In a public profile on a social networking site?

A. User name
B. Date of birth
C. Home address
D. Mobile phone number.

What is the clip board?

A. A list of the recently accessed files.
B. A place where you can post messages
C. A temporary storage location for items that have been cut or copied
D. A gallery of graphics, movies, pictures and sounds for any application:

‘Strong ‘passwords are used and recommended when using internet banking. A ‘Strong’ password is one which is difficult to guess. Which of the following would be the ‘Strongest’ password?

A. e7 Jm51
B. nothahks
C. xyz123456
D. 123456