1. What is e-commerce?
1) Buying and selling of international goods
2) Buying and selling of products and services over the internet
3) Buying and selling of products having to do with computers
4) Buying and selling of products and services not found in stores
5) Buying and selling of electronic goods
2. The term user Interface refers to :
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to the user commands
3) The means by which the user interacts with the peripheral devices on the computer
4) All of these
5) None of these
3. Which of the following is not an input device?
1) Keyboard
2) Joystick
3) Monitor
4) Microphone
5) None of these
4. An error is also known as :
1) Debug
2) Bug
3) Cursor
4) Icon
5) None of these
5. Archive is :
1) Back-up Storage
2) Forward Operation
3) Primary Storage
4) Name of famous processor
5) None of these
6. Which media has the ability to have data/information written on them by users more than once
1) CD-R disks
2) CD-RW disks
3) Zip disks
4) Opti disks
5) Both CD-RW and Zip disks
7. BCC in regard to emails, stands for :
1) Best Client Copy
2) Better Communication Copy
3) Best Computer Copy
4) Better Client Copy
5) None of these
8. A(n) .................. contains text as well as information about the text
1) browser language
2) machine language
3) protocol language
4) markup language
5) annotated language
9. A pictorial representation that uses predefined symbols to describe either the logic of the computer program or the data flow and processing steps of a system is referred as :
1) Flow chart
2) Algorithm
3) Program
4) Protocol
5) None of these
10. A ........ is the term used when a search engine returns a web page that matches the search criteria
1) Blog
2) Hit
3) Link
4) View
5) None of these
11. URL stands for ........
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator
4) Uniform Research Locator
5) None of these
12. The most frequently used instructions of a computer program are likely to be fetched from:
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these
13. What is a backup?
1) Restoring the information backup
2) An exact copy of a system's information
3) The ability to get a system up and running in the event of a system crash or failure
4) All of these
5) None of these
14. Which of the following statements is FALSE concerning file names?
1) Files may share the same name or the same extension but not both
2) Every file in the same folder must have a unique name
3) File extension is another name for file type
4) The file extension comes before the dot (.) followed by the file name
5) None of these
15. Verification of a login name and password is known as:
1) authorization
2) accessibility
3) authentication
4) logging in
5) None
16. Every computer has a(n) ........; many also have .........
1) Operating System; a client system
2) Operating system; instruction sets
3) Application programs; an operating system
4) Application programs; a client system
5) Operating system; application programs
17. Which term identifies a specific computer on the web and the main page of the entire site
1) URL
2) Website Address
3) Hyperlink
4) Domain name
5) None of these
18. The altering of data so that it is not usable unless the changes are undone is ......
1) Bio metrics
2) Compression
3) Encryption
4) Ergonomics
5) None of these
19. ......... means that the data contained in a database is accurate and reliable.
1) Data redundancy
2) Data Integrity
3) Data Reliability
4) Data consistency
5) None
20. Device that take a picture of an object and convert it into a computerized image :
1) Hard drive
2) Scanner
3) Printer
4) Modem
5) Cable
21. Which of the following is not a search engine?
1) Bing
2) Baidu
3) Yahoo
4) Safari
5) Ask
22. Which of the following window allows entering values and formulas in the Excel ?
1) Title bar
2) Menu Bar
3) Formula Bar
4) Standard Tool Bar
5) None of these
23. Which of the following helps to store information in the computer?
1) Disk Drive
2) Keyboard
3) Monitor
4) Printer
5) None of these
24. A computer virus normally attaches itself to another computer program known as :
1) Target program
2) Host program
3) Bluetooth
4) Front door program
5) Trojan horse
25. A DVD is an example of a(n)
1) Hard disk
2) Optical disk
3) Output device
4) Solid-state storage device
5) None of these
26. Computer programs are written in a highlevel programming language; however, the human readable version of a program is called........
1) cache
2) instruction set
3) source code
4) word size
5) None of these
27. The software tools that enable a user to interact with a computer for specific purposes are known as
1) Hardware
2) Networked Software
3) Shareware
4) Applications
5) None of these
28. A ......... is a set of rules.
1) resource locator
2) domain
3) hypertext
4) URL
5) protocol
29. The ......... file format is a method of encoding pictures on a computer.
1) HTML
2) JPEG
3) FTP
4) URL
5) DOC
30. The shortcut key for finding a word or a part of the word in MS word is :
1) Ctrl + M
2) Ctrl + S
3) Alt + M
4) Alt + K
5) Ctrl + F
31. Storage that retains its data after the power is turned off is referred to as
1) Volatile storage
2) Non-volatile storage
3) Sequential Storage
4) Direct storage
5) None of these
32. HTML stands for:
1) Hyper Text Mark-Up language
2) High Technology Mobile Language
3) Hyper Text Mobile Language
4) High Technology Mark-up Language
5) None of these
33. Which ports connect special types of musical instruments to sound cards ?
1) BUS
2) CPU
3) USB
4) MIDI
5) MINI
34. Antivirus is an example of which of the following?
1) An operating system
2) A business software
3) A security utility
4) An office suite
5) None
35. A computer checks the ......... of user names and passwords for a match before granting access.
1) Website
2) Network
3) Backup file
4) Database
5) None of these
36. Restarting a computer that is already on is referred to as:
1) shutting down
2) cold booting
3) warm booting
4) logging off
5) None of these
ANSWERS:
1-2; 2-1; 3-3; 4-2; 5-1; 6-2; 7-5; 8-4; 9-1; 10-2; 11-3; 12-2; 13-4; 14-4; 15-3;
16-5; 17-1; 18-3; 19-2; 20-2; 21-4; 22-3; 23-1; 24-5; 25-2; 26-3; 27-4; 28-5; 29-2;
30-5; 31-2; 32-1; 33-4; 34-3; 35-4; 36-3
Visit this page for model question papers on banking awareness and general knowledge for IBPS RRB and SBI exams.
ReplyDeletehttp://gk4banking.blogspot.com/p/sbi-ibps-model-question-papers.html
This site also has good contents which will be useful in all kinds of competitive exams...
nice..........
ReplyDeleteIts Really Cool!!
ReplyDeleteIt will help beginners a lot..
Windows MAC Support
NICE
ReplyDelete