Monday, 30 July 2012

SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER AWARENESS PRACTICE QUESTIONS



1. What is e-commerce?
1) Buying and selling of international goods
2) Buying and selling of products and services over the internet
3) Buying and selling of products having to do with computers
4) Buying and selling of products and services not found in stores
5) Buying and selling of electronic goods

2. The term user Interface refers to :
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to the user commands
3) The means by which the user interacts with the peripheral devices on the  computer
4) All of these
5) None of these

3. Which of the following is not an input device?
1) Keyboard
2) Joystick
3) Monitor
4) Microphone

5) None of these

4. An error is also known as :
1) Debug
2) Bug
 3) Cursor
4) Icon
5) None of these

5. Archive is :
1) Back-up Storage
2) Forward Operation
3) Primary Storage
4) Name of famous processor
5) None of these

6. Which media has the ability to have data/information written on them by users more than once
1) CD-R disks
2) CD-RW disks
3) Zip disks
4) Opti disks
5) Both CD-RW and Zip disks

7. BCC in regard to emails, stands for :
1) Best Client Copy
2) Better Communication Copy
3) Best Computer Copy
4) Better Client Copy
5) None of these



8. A(n) .................. contains text as well as information about the text
1) browser language
2) machine language
3) protocol language
4) markup language
5) annotated language

9. A pictorial representation that uses predefined symbols to describe either the logic of the computer program or the data flow and processing steps of a system is referred as :
1) Flow chart
2) Algorithm
3) Program
4) Protocol
5) None of these

10. A ........ is the term used when a search engine returns a web page that matches the search criteria
1) Blog
2) Hit
3) Link
4) View
 5) None of these

11. URL stands for ........
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator
4) Uniform Research Locator
5) None of these

12. The most frequently used instructions of a computer program are likely to be fetched from:
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these

13. What is a backup?
1) Restoring the information backup
2) An exact copy of a system's information
3) The ability to get a system up and running in the event of a system crash or failure
4) All of these
5) None of these

14. Which of the following statements is FALSE concerning file names?
1) Files may share the same name or the same extension but not both
2) Every file in the same folder must have a unique name
3) File extension is another name for file type
4) The file extension comes before the dot (.) followed by the file name
5) None of these

15. Verification of a login name and password is known as:
1) authorization  
2) accessibility
3) authentication
4) logging in  
5) None


16. Every computer has a(n) ........; many also have .........
1) Operating System; a client system
2) Operating system; instruction sets
3) Application programs; an operating  system
4) Application programs; a client system
5) Operating system; application programs

17. Which term identifies a specific computer on the web and the main page of the entire site
1) URL
2) Website Address
3) Hyperlink
4) Domain name
5) None of these

18. The altering of data so that it is not usable unless the changes are undone is ......
1) Bio metrics
2) Compression
3) Encryption
4) Ergonomics
5) None of these

19. ......... means that the data contained in a database is accurate and reliable.
1) Data redundancy
2) Data Integrity
3) Data Reliability
4) Data consistency
5) None

20. Device that take a picture of an object and convert it into a computerized image :
1) Hard drive
2) Scanner
3) Printer
4) Modem
5) Cable

21. Which of the following is not a search engine?
1) Bing
2) Baidu  
 3) Yahoo
4)  Safari
5) Ask

22. Which of the following window allows  entering values and formulas in the Excel ?
1) Title bar
2) Menu Bar
3) Formula Bar
4) Standard Tool Bar
5) None of these

23. Which of the following helps to store information in the computer?
1) Disk Drive
 2) Keyboard
3) Monitor
4) Printer
5) None of these

24. A computer virus normally attaches itself to another computer program known as :
1) Target program
2) Host program
3) Bluetooth
4) Front door program      
5) Trojan horse

25. A DVD is an example of a(n)
1) Hard disk
2) Optical disk
3) Output device
4) Solid-state storage device
5) None of these

26. Computer programs are written in a highlevel programming language; however, the human readable version of a program is called........
1) cache
2) instruction set
3) source code
4) word size
5) None of these

27. The software tools that enable a user to interact with a computer for specific  purposes are known as

1) Hardware
2) Networked Software
3) Shareware        
4) Applications    
5) None of these

28. A ......... is a set of rules.
1) resource locator
2) domain
3) hypertext
4) URL
5) protocol

29. The ......... file format is a method of encoding pictures on a computer.
1) HTML
2) JPEG
3) FTP
4) URL
5) DOC

30. The shortcut key for finding a word or a part of the word in MS word is :
1) Ctrl + M
2) Ctrl + S
3) Alt + M
4) Alt + K
5) Ctrl + F

31. Storage that retains its data after the power is turned off is referred to as
1) Volatile storage
2) Non-volatile storage
3) Sequential Storage
4) Direct storage
5) None of these

32. HTML stands for:
1) Hyper Text Mark-Up language
2) High Technology Mobile Language
3) Hyper Text Mobile Language
4) High Technology Mark-up Language
5) None of these

33. Which ports connect special types of  musical instruments to sound cards ?
1) BUS
2) CPU
3) USB
4) MIDI
5) MINI

34. Antivirus is an example of which of the  following?
1) An operating system
2) A business software
3) A security utility
4) An office suite
5) None


35. A computer checks the ......... of user names and passwords for a match before granting access.
1) Website
2) Network
3) Backup file
4) Database
5) None of these

36. Restarting a computer that is already on is referred to as:
1) shutting down
2) cold booting
3) warm booting
4) logging off
5) None of these

ANSWERS:


1-2; 2-1; 3-3; 4-2;  5-1;  6-2;  7-5;  8-4; 9-1;  10-2; 11-3;  12-2;  13-4;  14-4; 15-3;
16-5; 17-1; 18-3; 19-2;  20-2;  21-4;  22-3; 23-1;  24-5;  25-2;  26-3;  27-4;  28-5;  29-2;
30-5;  31-2;  32-1;  33-4;  34-3;  35-4;  36-3





4 comments:

  1. Visit this page for model question papers on banking awareness and general knowledge for IBPS RRB and SBI exams.

    http://gk4banking.blogspot.com/p/sbi-ibps-model-question-papers.html

    This site also has good contents which will be useful in all kinds of competitive exams...

    ReplyDelete
  2. Its Really Cool!!
    It will help beginners a lot..

    Windows MAC Support

    ReplyDelete