Thursday 10 November 2011

COMPUTER KNOWLWDGE FOR BANK EXAMS


1. ----- Controls access to the resources on a network
a) Server
b) Client
c) Both (a) and (b)
d) None of the above

2. The wider the bus, the ---- the transfer of data
a) Greater the number of transfer steps required and the slower
b) Greater the number of transfer steps required and the faster
c) Fewer the number of transfer steps required and the slower
d) Fewer the number of transfer steps required and the faster

3. A micro second is --- of a second
a) One-trillionth
b) One-millionth
c) One-billionth
d) None of the above

4. The ---- format works best for images that have only a few distinct colors
a) GIF
b) MPEG
c) JPEG
d) Both (b) and (c)

5. Some large businesses use ---- to open communications among employees, customers, and/or vendors
a) Blog
b) Mails
c) LAN Network
d) None of the above

6. When the computers power is turned off ---- memory does not lose its contents
a) Volatile
b) Non-volatile
c) Cache memory
d) Flash memory

7. --- Is needed to access accounts, to pay the bills, to transfer money from one account to another account
a) On-line Banking facility
b) Good relations with customers
c) Both (a) and (b)
d) None of the above

8. Which of the following is used as storage locations both the ALU and in the control sections of a computer?
a) Accumulator
b) Register
c) Adder
d) Decoder

9. Accumulator is a ?
a) Hardwired unit
b) Sequential circuit
c) Finite state machine
d) Register

10. Which memory is non-volatile and may be written only once?
a) RAM
b) EPROM
c) EEPROM
d) PROM

11. The communication mode that supports data in both directions?
a) Simplex b) Half-duplex
c) Full-duplex
d) None of the above

12. To connect a computer with a device in the same room, you might be likely to use?
a) Coaxial cable
b) Optical fiber
c) Wireless
d) None of the above

13. A table consists of?
a) Fields and columns
b) Rows and columns
c) Rows and cells
d) None of the above

14. Which of the following is an advantage of the database approach?
a) Elimination of data redundancy
b) Ability to associate related data
c) Increase security
d) All of the above

15. When the same data field is stored more than once in a file, then it leads to?
a) Data redundancy
b) Data inconsistency
c) Both (a) and (b)
d) None of the above

16. ----Means database updating
a) Changing the file structure
b) Re-organizing the database
c) Modifying or adding records
d) All of the above

17. Which of the following is the descending order of data hierarchy?
a) File-Database-Field-Record-Byte-Bit
b) Database-File-Record-Field-Byte-Bit
c) Database-Record-File-Field-Byte-Bit
d) Database-Field-File-Record-Bit-Byte

18. Which of the following groups contains graphical file extensions
a) JPG, CPX, GCM
b) GIF, TCF, WMF
c) TCP, JPG, BMP
d) JPG, GIF, BMP

19. A package, which can be used for a short period before purchasing, it is termed as?
a) Try and Buy
b) Freeware
c) Shareware
d) Borrow ware

20. Which one of the following is the main function of a driver file?
a) Useful to open windows
b) Enables a specific device to work
c) To re-start the system
d) To activate the system

21. A proxy server is used as the computer?
a) With external access
b) Acting as a backup
c) Performing file handling
d) Access user permissions

22. ---- Prevents external access to a system
a) Gateway
b) Firewall
c) Router
d) Switcher

23. A list of rules for transferring data over a network is called?
a) Protocol
b) Program code
c) Rules
d) Flowchart

24. Which of the following is a valid e-mail address?
a) Authors.sakshi@gmail.com
b) @Gmailsakshi.authors.com
c) Both (a) and (b)
d) None of the above

25. Which of the following is not a network topology?
a) Star
b) Bus
c) Linear
d) Ring

26. ---- Types of virus that stays permanently in the RAM memory
a) Resident
b) File infectors
c) Boot virus
d) Macro virus

27. ---- Is the Virus that overwrite the files or a few parts being replaced?
a) Resident
b) File infectors
c) Boot virus
d) Macro virus

28. In 1983, this person was the first to offer a definition of the term 'computer virus'?
a) MC Fee
b) Smiths
c) Cohen
d) Norton

29. If you see a small red triangle in the top right corner of a cell, it means there is something attached to the call. What is it?
a) A comment
b) An attachment
c) An error
d) None of the above

30. Which function would be the best to use to calculate the payout value of a term deposit?
a) FV
b) NPV
c) IRR
d) PV

31. Sigma button is used for?
a) Totaling a Column or row
b) It is a mathematical function
c) Subtracting
d) None of the above

32. What is the correct syntax for typing a function into a cell?
a) Equal sign, Function Name, Matching brackets
b) Function Name, Equal sign, Matching brackets
c) Equal sign, Matching brackets, Function Name
d) None of the above

33. What does 'ctrl +esc' do if I am at the desktop?
a) Shows the start menu
b) Shows the format menu
c) Shows the tools menu
d) Shows the insert menu

34. In most Microsoft programs, what does 'alt+f4' do?
a) Ends the program
b) Opens the program
c) Run the program
d) Modify the program

35. In MS-Word 'alt+shift+d' does what?
a) Automatically inserts the date
b) Inserts the time
c) Inserts the day
d) None of the above

36. ---- Deletes an item immediately without placing it in the recycle bin.
a) Shift +enter
b) Shift +delete
c) Shift +right arrow
d) Shift +left arrow

37. --- Function key refreshes the current window
a) F5
b) F6
c) F7
d) F8

38. To minimize all open windows and display the desktop?
a) Windows logo +D
b) Windows logo + E
c) Windows logo + F
d) Windows logo + G


1 comment: