Wednesday, 18 April 2012

BANK EXAMS COMPUTER KNOWLEDGE PRACTICE QUESTIONS


1. Compiler is the
(a) name given to the computer operator
(b) part of the digital machine to store the information
(c) translator of source program to object
(d) part of arithmetic logic unit
(e) operator of Boolean Algebra
Ans (c)
2. Main memory is
(a) Random Access Memory
(b) Read only Memory
(c) Serial Access Memory
(d) None of these
Ans (a)
3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer
(b) Quantum Computer
(c) Param-10,000
(d) IBM chips
Ans (b)
4. A compact disc (CD) is a data storage of the type
(a) Magnetic
(b) Optical
(c) Electrical
(d) Electromechanical
Ans (a)
5. Which of the following is not as language for computer programming?
(a) WINDOWS
(b) PASCAL
(c) BASIC
(d) COBOL
Ans (a)
6. What are the two basic types of memory that your computer uses?
(a) RAM
(b) RW/RAM
(c) ROM
(d) ERAM
Ans (a)
7. The term gigabyte refers to
(a) 1024 bytes
(b) 1024 kilobytes
(c) 1024 megabytes
(d) 1024 gigabytes
Ans (c)

8. A computer with CPU speed around 100 million instructions per second & with the word length of around 64 bits is known as
(a) Super computer
(b) Mini computer
(c) Micro computer
(d) Micro computer
Ans (a)
9. What digits are representative of all binary numbers?
(a) 0
(b) 1
(c) Both (a ) and (b)
(d) 3
Ans (c)
10. To locate a data items for storage is
(a) Field
(b) Feed
(c) Database
(d) Fetch
Ans (d)
11. Off-line operation is the operation of devices without the control of
(a) Memory
(b) CPU
(c) ALU
(d) Control unit
Ans (b)
12. A type of line printer that uses an embossed steel band to form the letters printed on the paper is
(a) Golf ball printer
(b) Dot-matrix printer
(c) Laser printer
(d) Band printer
Ans (d)
13. A software used to convert source program instructions to object instruction is known as
(a) Compiler
(b) Assembler
(c) Interpreter
(d) Language processor
14. The ‘IC’ chip, used in computers, is made of
(a) Chromium
(b) Iron oxide
(c) Silica
(d) Silicon
Ans (d)
15. Name the first general purpose electronic computer
Ans : UNIVAC
16. The size of commonly used Floppy disk is
(a) 4.5
(b) 3.5
(c) 3.25
(d) 5.5
Ans (b)
17. Which of the following statement is wrong
(a) Windows XP is an operating system
(b) Linux is owned and sold by Microsoft
(c) Photoshop is a graphical design tool by Adobe
(d) Linux is free and open source software
Ans (b)
18. Operating system of a computer
(a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references
(c) Provides a layer, user friendly interface
(d) None of the above
Ans (c)
19. The term Operating System means
(a) A set of programs which control computer working
(b) The way a user operates the computer system
(c) Conversion of high level language to machine language
(d) The way computer operator works
Ans (a)
20. Wild card operators specifies
(a) can be used when writing into multiple files
(b) allows several files to be read simultaneously
(c) Provide an easy way of groups of related files
(d) Are only used when printing the contents of a file
Ans (c)
21.Which one of the following is not a broadband communication medium
(a) Microwave
(b) Fibre optic cable
(c) Twisted pair
(d) Coaxial cable
Ans (c)
22.Which of the following performs modulation and demodulation
(a) Coaxial cable
(b) Satellite
(c) Modem
(d) Optical fibre
Ans (c)
23. Which one of the following is not an application software package
(a) Redhat Linux
(b) Microsoft Office
(c) Adobe PageMaker
(d) Open Office
Ans (a)
24. Who is the father of computer
Ans : Charles Babbage
25.The function of key F4 is
Ans : To repeat the last action
26.The function of key F4 is
Ans : To repeat the last action
27. The 0 and 1 in the binary numbering system are called binary digits or …….
(a) bytes
(b) kilobytes
(c) decimal bytes
(d) bits
Ans (D)
28. A monitor’s …… is the distance between the holes in the mask
behind the screen. This helps determine how sharp the dots appear.
(a) refresh rate
(b) dot pitch
(c) resolution
(d) colour depth
Ans (B)
29. A directly accessible appointment calendar is a feature of a ……. resident package.
(a) CPU
(b) memory
(c) Buffer
(d) ALU
Ans (B)
30. Perforated paper used as input or output media is known as
(a) Paper tape
(b) Magnetic tape
(c) Punched paper tape
(d) Card punch
Ans (A)
31. The invention of the slide rule is attributed to
(a) Babbage
(b) Oughtred
(c) Pascal
(d) Napier
Ans (B)
32. Which of the following is not an advantage of magnetic disk storage.
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) All of the above
Ans (e)
33. The memory sizes in mainframe computers and advanced technology micro computer are expressed as
(a) Bytes
(b) Kilo-bytes
(c) Bits
(d) Megabytes
Ans (d)
34. A prefix for billion which is equal to …. is called as billi.
(a) 100
(b) 10000
(c) 1000
(d) 10
Ans (d)
35. Each model of a computer has a unique
(a) Assembly language
(b) Machine language
(c) High level language
(d) All of the above
Ans (b)
36. One kilobyte = ____ byte.
(a) 1250
(b) 2088
(c) 1024
(d) 1000
Ans (c)
37. Which of the following circuit is used as a ‘Memory device’ in computers?
(a) Rectifier
(b) Flip-Flop
(c) Comparator
(d) Attenuator
Ans (b)
38. To move the cursor to the end of the document press
Ans : Ctrl + End
39. In Word Processing the red underline indicates
Ans : Spelling mistakes
40. The shortcut key to print documents is
Ans : Ctrl + P
41. First layer in the OSI reference model is
(a) Data link
(b) Network
(c) Physical
(d) Application
Ans (c)
42. Viruses, Trojan horses and Worms are
(a) able to harm computer system
(b) unable to detect if affected on computer
(c) user-friendly applications
(d) harmless applications resident on computer
Ans (a)
43. Program threats are
(a) Trap doors
(b) Trojan horse
(c) Both (a) & (b)
(d) All of the above
Ans (b)
44. Failure of passwords security due to exposure can result from
(a) Electronic monitoring
(b) Visual
(c) Both (a) & (b)
(d) All of the above
Ans (c)
45. Data security threats include
(a) Hardware failure
(b) Privacy invasion
(c) Fraudulent manipulation of data
(d) All of the above
Ans (b)
46. The bar which displays information about the current page number is
Ans : Status bar
47. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar
(b) Windows
(c) Desktop
(d) Icons
Ans (d)
48. Who invented the super-computer?
(a) P.T Farnsworth
(b) J.R Whinfield
(c) J.H. Van Tassell
(d) Charles Ginsberg
Ans (c)
49. Accessing records from a file directly without searching from the beginning of the file is
(a) Time sharing
(b) Random
(c) Direct access
(d) Access time
(e) None of the above
Ans (c)
50. Time during which a job is processed by the computer is
(a) Delay time
(b) Real time
(c) Execution time
(d) Down time
Ans (c)

1 comment:

  1. Thank you 4 these precious collections.

    ReplyDelete