Friday 27 April 2012

Allahabad Bank Clerk (Second Shift) Exam., 2011



 Computer Knowledge

(Exam Held on 8-5-2011)


1. Information on a computer is stored as what ?
(A) Analog data
(B) Digital data
(C) Modem data
(D) Watts data
(E) None of these
Ans : (B)
2. C, BASIC, COBOL and Java are examples of ……… languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)
3. Most Web sites have a main page, the ………, which acts as a doorway to the rest of the Web site pages.
(A) search engine
(B) home page
(C) browser
(D) URL
(E) None of these
Ans : (B)
4. An email account includes a storage area, often called a(n)—
(A) attachment
(B) hyperlink
(C) mailbox
(D) IP address
(E) None of these
Ans : (C)
5. The ……… is the box that houses the most important parts of a computer system.
(A) software
(B) hardware
(C) input device
(D) system unit
(E) None of these
Ans : (D)
6. What type of computer could be found in a digital watch ?
(A) Mainframe computer
(B) Supercomputer
(C) Embedded computer
(D) Notebook computer
(E) None of these
Ans : (C)
7. What is a modem connected to ?
(A) Processor
(B) Mother board
(C) Printer
(D) Phone line
(E) None of these
Ans : (D)
8. A(n) ……… is a collection of information that determines which files you can access and which settings you use.
(A) network
(B) user account
(C) operating system
(D) file system
(E) None of these
Ans : (B)
9. The space in your computer that loads and works with data—
(A) cache memory
(B) CPU
(C) megabyte
(D) RAM memory
(E) ROM memory
Ans : (D)
10. ……… hard drives are permanently located inside the system unit and are not designed to be removed, unless they need to be repaired or replaced.
(A) Static
(B) Internal
(C) External
(D) Remove
(E) None of these
Ans : (B)
11. A computer ……… consists of two or more computers and other devices that are connected for the purpose of sharing data and programs.
(A) network
(B) system
(C) workstation
(D) device
(E) None of these
Ans : (A)
12. The taskbar is located—
(A) on the Start menu
(B) at the bottom of the screen
(C) on the Quick Launch toolbar
(D) at the top of the screen
(E) None of these
Ans : (B)
13. Once information is input into a computer, it becomes—
(A) objects
(B) data
(C) ideas
(D) facts
(E) None of these
Ans : (B)
14. Generally, you access the Recycle Bin through an icon located—
(A) on the desktop
(B) on the hard drive
(C) on the shortcut menu
(D) in the Properties dialog box
(E) None of these
Ans : (A)
15. Computer programs are written in a high-level programming language; however, the humanreadable version of a program is called—
(A) cache
(B) instruction set
(C) source code
(D) word size
(E) None of these
Ans : (C)
16. The Recycle Bin stores discarded items until—
(A) another user logs on
(B) the computer is shut down
(C) the end of the day
(D) you empty it
(E) None of these
Ans : (D)
17. A ……… is a collection of information saved as a unit.
(A) folder
(B) file
(C) path
(D) file extension
(E) None of these
Ans : (B)
18. Input, output, and processing devices grouped together represent a(n)—
(A) mobile device
(B) information processing cycle
(C) circuit board
(D) computer system
(E) None of these
Ans : (D)
19. One thousand bytes is a—
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (E)
20. What part of the computer provides only temporary storage of files ?
(A) ROM memory
(B) RAM memory
(C) Hard drive
(D) Mother board
(E) Processor
Ans : (B)
21. A(n) ……… backup contains a copy of every program, data, and system file on a computer.
(A) restoration
(B) bootstrap
(C) differential
(D) full
(E) None of these
Ans : (D)
22. Every component of your computer is either—
(A) application software or system software
(B) software or CPU/RAM
(C) hardware or software
(D) input devices or output devices
(E) None of these
Ans : (C)
23. A blinking symbol on the screen that shows where the next character will appear—
(A) delete key
(B) arrow key
(C) cursor
(D) return key
(E) Esc key
Ans : (C)
24. Being ……… means being familiar enough with computers that you understand their capabilities and limitations.
(A) computer literate
(B) computer competent
(C) computer savvy
(D) technology literate
(E) None of these
Ans : (A)
25. Which of the following could you do to remove a paragraph from a report you had written ?
(A) Delete and edit
(B) Copy and paste
(C) Cut and paste
(D) Undo typing
(E) Highlight and delete
Ans : (E)
26. The computer monitor is which type of device ?
(A) Scanning
(B) Input
(C) Processor
(D) Software
(E) Output
Ans : (E)
27. The arrow keys can be used to—
(A) delete text
(B) move the cursor in the text that has already been entered
(C) save the document
(D) move the cursor while deleting text
(E) None of these
Ans : (B)
28. Numbers in table columns are usually—
(A) right-aligned
(B) left-aligned
(C) justified
(D) centered
(E) None of these
Ans : (A)
29. To indent the first paragraph of your report, you should use this key—
(A) esc
(B) space bar
(C) return key
(D) shift key
(E) tab key
Ans : (E)
30. Each box in a spreadsheet is called a—
(A) cell
(B) empty space
(C) record
(D) field
(E) table
Ans : (A)
31. A small picture that represents something on your screen…such as a(n)—
(A) table
(B) application
(C) photo
(D) modem
(E) icon
Ans : (E)
32. When a file is saved for the first time—
(A) a copy is automatically printed
(B) file name and folder name must be the same
(C) it does not need a name
(D) it only needs a name if it is not going to be printed
(E) it must be given a name to identify it
Ans : (E)
33. Example of non-numeric data is—
(A) Employee Name
(B) Test score
(C) Bank Account No.
(D) All of these
(E) None of these
Ans : (A)
34. Which type of file is created by word processing programs ?
(A) Database file
(B) Storage file
(C) Worksheet file
(D) Document file
(E) Graphical file
Ans : (D)
35. The information you put into the computer is called—
(A) directory
(B) facts
(C) data
(D) files
(E) output
Ans : (C)
36. This can be another word for program—
(A) peripheral
(B) disk
(C) floppy
(D) hardware
(E) software
Ans : (E)
37. If a previously saved file is edited—
(A) it cannot be saved again
(B) the changes will automatically be saved in the file
(C) the file will only have to be saved again if it is more than one page in length
(D) its name must be changed
(E) the file must be saved again to store the changes
Ans : (E)
38. Mr. XYZ wants to send an electronic message to a friend. He should use this type of application—
(A) word processing
(B) email
(C) spreadsheet
(D) paper and pencil
(E) None of these
Ans : (B)
39. To print a document—
(A) select the Print command and then select OK
(B) select the Ready Printer command then select OK
(C) type PRINT and then press Enter
(D) close the document, select the Print command, then select OK
(E) None of these
Ans : (A)
40. Each ……… on a menu performs a specific action.
(A) client
(B) server
(C) node
(D) command
(E) folder
Ans : (D)

Tuesday 24 April 2012

COMPUTER KNOWLEDGE PRACTICE MCQs

1. The ________ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule

(b) referential integrity constraint

(c) action assertion

(d) composite attribute

(e) None of these

2. An applet ________

(a) is an interpreted program that runs on the client

(b) tracks the number of visitors to a Website

(c) is a compiled program that usually runs on the client

(d) collects data from visitors to a Website

(e) None of these

3. A ________ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus

(b) Trojan horse virus

(c) file virus

(d) macro virus

(e) None of these

4. Which error detection method uses one's complement arithmetic?

(a) Simply parity check

(b) Checksum

(c) Two-dimensional parity check

(d) CRC

(e) None of these

5. A result of a computer virus can NOT lead to ________ .

(a) Disk Crash

(b) Mother Board Crash

(c) Corruption of program

(d) Deletion of files

(e) None of these

6. The network interface card of LAN is related to following layer of OSI Model

(a) Transport

(b) Network

(c) Data Link

(d) Physical

(e) All of these

7. Which of the following does NOT describe a data warehouse?

(a) Subject-oriented

(b) Integrated

(c) Time-variant

(d) Updateable

(e) None of these

8. Which of the following is TRUE ?

(a) Logical design is software-dependent

(b) In a distributed database, database is stored in one physical location

(c) Conceptual design translates the logical design into internal model

(d) Logical design is software independent

(e) None of these

9. A range check ________

(a) ensures that only the correct data type is entered into a field

(b) verifies that all required data is present

(c) determines whether a number is within a specified limit

(d) tests if the data in two or more associated fields is logical

(e) None of these

10. The total set of interlinked hypertext documents worldwide is-

(a) HTTP

(b) Browser

(c) WWW

(d) B2B

(e) None of these

11. With the object-oriented (OO) approach, an object encapsulates, or ________ .a programmer.

(a) carries out, the details of an object for

(b) hides, the details of an object from

(c) reveals, the details of an object to

(d) extends, the details of an object beyond

(e) None of these

12. Every computer connected to an intranet or extranet must have a distinct ________

(a) firewall

(b) proxy server

(c) IP address

(d) domain name

(e) None of these

13. A table of bits in which each row represents the distinct values of a key?

(a) Join index

(b) Bitmap index

(c) B + Tree

(d) Hierarchical index

(e) None of these

14. The degree of detail that should be incorporated into a database depends on what?

(a) Data integrity

(b) The type of database

(c) The user's perspective

(d) The business practices and policies

(e) None of these

15. The ________ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem

(b) Router

(c) Gateway

(d) Bridge

(e) All of these

16. Before a package can be used in a java program it must be ________ .

(a) executed

(b) referenced

(c) imported

(d) declared

(e) None of these

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction ________ .

(a) begin the line with a # sign

(b) begin the line with double slashes (/ /)

(c) begin and end the line with double hyphens (- _ -)

(d) indent the line

(e) None of these

18. Programming language built into user programs such as Word and Excel are known as ________

(a) 4GLs

(b) macro languages

(c) object-oriented languages

(d) visual programming languages

(e) None of these

19. Firewalls are used to protect against ________ .

(a) Unauthorized Attacks

(b) Virus Attacks

(c) Data Driven Attacks

(d) Fire Attacks

(e) All of these

20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-

(a) Interrupt request

(b) Forward DNS lookup

(c) Data-Link layer

(d) File Transfer Protocol

(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are ________ .

(a) Schema, Base and Table

(b) Base, Table and Schema

(c) Key, Base and Table

(d) Schema, Table and View

(e) None of these

22. Data are ________ in client/server computing.

(a) never sent to the client machine

(b) sent in very large sections to save processing time

(c) sent only upon the client's request

(d) sent in complete copies for the client to filter and sort

(e) sent from the client to the server for processing

23. Which of the following will NOT eliminates the ambiguities of a null value?

(a) Define the attribute as required

(b) Define subtypes

(c) Define each attribute as having an initial value that is recognized as blank

(d) Define supertypes

(e) None of these

24. The ________ directory is mandatory for every disk.

(a) Root

(b) Base

(c) Sub

(d) Case

(e) None of these

25. This is a group of servers that share work and may be able to back each other up if one server fails.

(a) Channel bank

(b) Cluster

(c) Tiger team

(d) Serverless backup

(e) Logical unit

ANSWERS

1. (a), 2. (c), 3. (e), 4. (b), 5. (b)
6. (e), 7. (d), 8. (a), 9. (c), 10. (a)
11. (b), 12. (c), 13. (b), 14. (b), 15. (a)
16. (c), 17. (b), 18. (d), 19. (a), 20. (e)
21. (d), 22. (c), 23. (d), 24. (c), 25. (b)

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. The ________ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule

(b) referential integrity constraint

(c) action assertion

(d) composite attribute

(e) None of these

2. An applet ________

(a) is an interpreted program that runs on the client

(b) tracks the number of visitors to a Website

(c) is a compiled program that usually runs on the client

(d) collects data from visitors to a Website

(e) None of these

3. A ________ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus

(b) Trojan horse virus

(c) file virus

(d) macro virus

(e) None of these

4. Which error detection method uses one's complement arithmetic?

(a) Simply parity check

(b) Checksum

(c) Two-dimensional parity check

(d) CRC

(e) None of these

5. A result of a computer virus can NOT lead to ________ .

(a) Disk Crash

(b) Mother Board Crash

(c) Corruption of program

(d) Deletion of files

(e) None of these

6. The network interface card of LAN is related to following layer of OSI Model

(a) Transport

(b) Network

(c) Data Link

(d) Physical

(e) All of these

7. Which of the following does NOT describe a data warehouse?

(a) Subject-oriented

(b) Integrated

(c) Time-variant

(d) Updateable

(e) None of these

8. Which of the following is TRUE ?

(a) Logical design is software-dependent

(b) In a distributed database, database is stored in one physical location

(c) Conceptual design translates the logical design into internal model

(d) Logical design is software independent

(e) None of these

9. A range check ________

(a) ensures that only the correct data type is entered into a field

(b) verifies that all required data is present

(c) determines whether a number is within a specified limit

(d) tests if the data in two or more associated fields is logical

(e) None of these

10. The total set of interlinked hypertext documents worldwide is-

(a) HTTP

(b) Browser

(c) WWW

(d) B2B

(e) None of these

11. With the object-oriented (OO) approach, an object encapsulates, or ________ .a programmer.

(a) carries out, the details of an object for

(b) hides, the details of an object from

(c) reveals, the details of an object to

(d) extends, the details of an object beyond

(e) None of these

12. Every computer connected to an intranet or extranet must have a distinct ________

(a) firewall

(b) proxy server

(c) IP address

(d) domain name

(e) None of these

13. A table of bits in which each row represents the distinct values of a key?

(a) Join index

(b) Bitmap index

(c) B + Tree

(d) Hierarchical index

(e) None of these

14. The degree of detail that should be incorporated into a database depends on what?

(a) Data integrity

(b) The type of database

(c) The user's perspective

(d) The business practices and policies

(e) None of these

15. The ________ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem

(b) Router

(c) Gateway

(d) Bridge

(e) All of these

16. Before a package can be used in a java program it must be ________ .

(a) executed

(b) referenced

(c) imported

(d) declared

(e) None of these

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction ________ .

(a) begin the line with a # sign

(b) begin the line with double slashes (/ /)

(c) begin and end the line with double hyphens (- _ -)

(d) indent the line

(e) None of these

18. Programming language built into user programs such as Word and Excel are known as ________

(a) 4GLs

(b) macro languages

(c) object-oriented languages

(d) visual programming languages

(e) None of these

19. Firewalls are used to protect against ________ .

(a) Unauthorized Attacks

(b) Virus Attacks

(c) Data Driven Attacks

(d) Fire Attacks

(e) All of these

20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-

(a) Interrupt request

(b) Forward DNS lookup

(c) Data-Link layer

(d) File Transfer Protocol

(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are ________ .

(a) Schema, Base and Table

(b) Base, Table and Schema

(c) Key, Base and Table

(d) Schema, Table and View

(e) None of these

22. Data are ________ in client/server computing.

(a) never sent to the client machine

(b) sent in very large sections to save processing time

(c) sent only upon the client's request

(d) sent in complete copies for the client to filter and sort

(e) sent from the client to the server for processing

23. Which of the following will NOT eliminates the ambiguities of a null value?

(a) Define the attribute as required

(b) Define subtypes

(c) Define each attribute as having an initial value that is recognized as blank

(d) Define supertypes

(e) None of these

24. The ________ directory is mandatory for every disk.

(a) Root

(b) Base

(c) Sub

(d) Case

(e) None of these

25. This is a group of servers that share work and may be able to back each other up if one server fails.

(a) Channel bank

(b) Cluster

(c) Tiger team

(d) Serverless backup

(e) Logical unit

ANSWERS

1. (a), 2. (c), 3. (e), 4. (b), 5. (b)
6. (e), 7. (d), 8. (a), 9. (c), 10. (a)
11. (b), 12. (c), 13. (b), 14. (b), 15. (a)
16. (c), 17. (b), 18. (d), 19. (a), 20. (e)
21. (d), 22. (c), 23. (d), 24. (c), 25. (b)

Wednesday 18 April 2012

BANK EXAMS COMPUTER KNOWLEDGE PRACTICE QUESTIONS


1. Compiler is the
(a) name given to the computer operator
(b) part of the digital machine to store the information
(c) translator of source program to object
(d) part of arithmetic logic unit
(e) operator of Boolean Algebra
Ans (c)
2. Main memory is
(a) Random Access Memory
(b) Read only Memory
(c) Serial Access Memory
(d) None of these
Ans (a)
3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer
(b) Quantum Computer
(c) Param-10,000
(d) IBM chips
Ans (b)
4. A compact disc (CD) is a data storage of the type
(a) Magnetic
(b) Optical
(c) Electrical
(d) Electromechanical
Ans (a)
5. Which of the following is not as language for computer programming?
(a) WINDOWS
(b) PASCAL
(c) BASIC
(d) COBOL
Ans (a)
6. What are the two basic types of memory that your computer uses?
(a) RAM
(b) RW/RAM
(c) ROM
(d) ERAM
Ans (a)
7. The term gigabyte refers to
(a) 1024 bytes
(b) 1024 kilobytes
(c) 1024 megabytes
(d) 1024 gigabytes
Ans (c)

8. A computer with CPU speed around 100 million instructions per second & with the word length of around 64 bits is known as
(a) Super computer
(b) Mini computer
(c) Micro computer
(d) Micro computer
Ans (a)
9. What digits are representative of all binary numbers?
(a) 0
(b) 1
(c) Both (a ) and (b)
(d) 3
Ans (c)
10. To locate a data items for storage is
(a) Field
(b) Feed
(c) Database
(d) Fetch
Ans (d)
11. Off-line operation is the operation of devices without the control of
(a) Memory
(b) CPU
(c) ALU
(d) Control unit
Ans (b)
12. A type of line printer that uses an embossed steel band to form the letters printed on the paper is
(a) Golf ball printer
(b) Dot-matrix printer
(c) Laser printer
(d) Band printer
Ans (d)
13. A software used to convert source program instructions to object instruction is known as
(a) Compiler
(b) Assembler
(c) Interpreter
(d) Language processor
14. The ‘IC’ chip, used in computers, is made of
(a) Chromium
(b) Iron oxide
(c) Silica
(d) Silicon
Ans (d)
15. Name the first general purpose electronic computer
Ans : UNIVAC
16. The size of commonly used Floppy disk is
(a) 4.5
(b) 3.5
(c) 3.25
(d) 5.5
Ans (b)
17. Which of the following statement is wrong
(a) Windows XP is an operating system
(b) Linux is owned and sold by Microsoft
(c) Photoshop is a graphical design tool by Adobe
(d) Linux is free and open source software
Ans (b)
18. Operating system of a computer
(a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references
(c) Provides a layer, user friendly interface
(d) None of the above
Ans (c)
19. The term Operating System means
(a) A set of programs which control computer working
(b) The way a user operates the computer system
(c) Conversion of high level language to machine language
(d) The way computer operator works
Ans (a)
20. Wild card operators specifies
(a) can be used when writing into multiple files
(b) allows several files to be read simultaneously
(c) Provide an easy way of groups of related files
(d) Are only used when printing the contents of a file
Ans (c)
21.Which one of the following is not a broadband communication medium
(a) Microwave
(b) Fibre optic cable
(c) Twisted pair
(d) Coaxial cable
Ans (c)
22.Which of the following performs modulation and demodulation
(a) Coaxial cable
(b) Satellite
(c) Modem
(d) Optical fibre
Ans (c)
23. Which one of the following is not an application software package
(a) Redhat Linux
(b) Microsoft Office
(c) Adobe PageMaker
(d) Open Office
Ans (a)
24. Who is the father of computer
Ans : Charles Babbage
25.The function of key F4 is
Ans : To repeat the last action
26.The function of key F4 is
Ans : To repeat the last action
27. The 0 and 1 in the binary numbering system are called binary digits or …….
(a) bytes
(b) kilobytes
(c) decimal bytes
(d) bits
Ans (D)
28. A monitor’s …… is the distance between the holes in the mask
behind the screen. This helps determine how sharp the dots appear.
(a) refresh rate
(b) dot pitch
(c) resolution
(d) colour depth
Ans (B)
29. A directly accessible appointment calendar is a feature of a ……. resident package.
(a) CPU
(b) memory
(c) Buffer
(d) ALU
Ans (B)
30. Perforated paper used as input or output media is known as
(a) Paper tape
(b) Magnetic tape
(c) Punched paper tape
(d) Card punch
Ans (A)
31. The invention of the slide rule is attributed to
(a) Babbage
(b) Oughtred
(c) Pascal
(d) Napier
Ans (B)
32. Which of the following is not an advantage of magnetic disk storage.
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) All of the above
Ans (e)
33. The memory sizes in mainframe computers and advanced technology micro computer are expressed as
(a) Bytes
(b) Kilo-bytes
(c) Bits
(d) Megabytes
Ans (d)
34. A prefix for billion which is equal to …. is called as billi.
(a) 100
(b) 10000
(c) 1000
(d) 10
Ans (d)
35. Each model of a computer has a unique
(a) Assembly language
(b) Machine language
(c) High level language
(d) All of the above
Ans (b)
36. One kilobyte = ____ byte.
(a) 1250
(b) 2088
(c) 1024
(d) 1000
Ans (c)
37. Which of the following circuit is used as a ‘Memory device’ in computers?
(a) Rectifier
(b) Flip-Flop
(c) Comparator
(d) Attenuator
Ans (b)
38. To move the cursor to the end of the document press
Ans : Ctrl + End
39. In Word Processing the red underline indicates
Ans : Spelling mistakes
40. The shortcut key to print documents is
Ans : Ctrl + P
41. First layer in the OSI reference model is
(a) Data link
(b) Network
(c) Physical
(d) Application
Ans (c)
42. Viruses, Trojan horses and Worms are
(a) able to harm computer system
(b) unable to detect if affected on computer
(c) user-friendly applications
(d) harmless applications resident on computer
Ans (a)
43. Program threats are
(a) Trap doors
(b) Trojan horse
(c) Both (a) & (b)
(d) All of the above
Ans (b)
44. Failure of passwords security due to exposure can result from
(a) Electronic monitoring
(b) Visual
(c) Both (a) & (b)
(d) All of the above
Ans (c)
45. Data security threats include
(a) Hardware failure
(b) Privacy invasion
(c) Fraudulent manipulation of data
(d) All of the above
Ans (b)
46. The bar which displays information about the current page number is
Ans : Status bar
47. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar
(b) Windows
(c) Desktop
(d) Icons
Ans (d)
48. Who invented the super-computer?
(a) P.T Farnsworth
(b) J.R Whinfield
(c) J.H. Van Tassell
(d) Charles Ginsberg
Ans (c)
49. Accessing records from a file directly without searching from the beginning of the file is
(a) Time sharing
(b) Random
(c) Direct access
(d) Access time
(e) None of the above
Ans (c)
50. Time during which a job is processed by the computer is
(a) Delay time
(b) Real time
(c) Execution time
(d) Down time
Ans (c)

SBI CLERKS EXAM COMPUTER KNOWLEDGE QUESTIONS

1. A keyboard is this kind of device—
(A) black
(B) input
(C) output
(D) word Processing
(E) None of these
Ans : (B)
2. IT stands for—
(A) information Technology
(B) integrated Technology
(C) intelligent Technology
(D) interesting Technology
(E) None of these
Ans : (A)
3. Which of the following refers to the fastest, biggest and most expensive computers ?
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
Ans : (B)
4. A collection of related information sorted and dealt with as a unit is a—
(A) disk
(B) data
(C) file
(D) floppy
(E) None of these
Ans : (C)
5. The process of a computer receiving information from a server on the Internet is known as—
(A) pulling
(B) pushing
(C) downloading
(D) transferring
(E) None of these
Ans : (C)
6. Which part of the computer helps to store information ?
(A) Disk drive
(B) Keyboard
(C) Monitor
(D) Printer
(E) None of these
Ans : (A)

7. ………………is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)
8. The role of a………generally is to determine a buyer’s needs and match it to the correct hardware and software.
(A) computer Scientist
(B) computer sales representative
(C) computer consultant
(D) corporate trainer
(E) None of these
Ans : (B)
9. Which of the following groups consist of only output devices ?
(A) Scanner, Printer, Monitor
(B) Keyboard, Printer, Monitor
(C) Mouse, Printer, Monitor
(D) Plotter, Printer, Monitor
(E) None of these
Ans : (D)
10. The rectangular area of the screen that displays a program, data, and/or information is a—
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)
11. A(n)………contains commands that can be selected.
(A) pointer
(B) menu
(C) icon
(D) button
(E) None of these
Ans : (B)
12. An error is also known as—
(A) bug
(B) debug
(C) cursor
(D) icon
(E) None of these
Ans : (A)
13. Arithmetic Operations—
(A) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item
(B) sort data items according to standard, predefined criteria in ascending order or descending order
(C) use conditions with operators such as AND, OR and NOT
(D) include addition, subtraction, multiplication and division
(E) None of these
Ans : (D)
14. Sending an e-mail is similar to—
(A) picturing an event
(B) narrating a story
(C) writing a letter
(D) creating a drawing
(E) None of these
Ans : (C)
15. Promotion in Marketing means—
(A) passing an examination
(B) elevation from one grade to another
(C) selling the products through various means
(D) selling the product in specific areas
(E) None of these
Ans : (C)
16. Microsoft Word is an example of—
(A) an operating system
(B) a processing device
(C) application software
(D) an input device
(E) None of these
Ans : (B)
17. Sources of Sales Leads are—
(A) Data Mining
(B) Market Research
(C) Media Outlets
(D) Promotional Programs
(E) All of these
Ans : (E)
18. Any data or instruction entered into the memory of a computer is considered as—
(A) storage
(B) output
(C) input
(D) information
(E) None of these
Ans : (A)
19. Which is the part of a computer that one can touch and feel ?
(A) Hardware
(B) Software
(C) Programs
(D) Output
(E) None of these
Ans : (A)

Monday 16 April 2012

COMPUTER KNOWLEDGE PRACTICE MCQs

Question 1: Which key should be pressed to start a new paragraph in MS-Word?
1. Down cursor key
2. Shift+Enter key
3. Enter key
4. Control+Enter key
Answer: 3.

Question 2: Which of the following is the correct syntax for CompactRepair method?
1. expression. CompactRepair
2. expression (SourceFile, DestinationFile, LogFile)
3. CompactRepair(SourceFile, DestinationFile, LogFile)
4. expression. CompactRepair(SourceFile, DestinationFile, LogFile) 
Answer: 4.


Question 3: Consider the following statements: Statement A: The write access to a file system is possible while using the growfs command. Statement B: The growfs command increases the size of the UFS file system in a volume without causing data loss. Which of the following is true about the statements?
1. Statement A is true, and Statement B is false.
2. Statement A is false, and Statement B is true.
3. Both Statement A and Statement B are true.
4. Both Statement A and Statement B are false.
Answer: 2.

Question 4: Multiple items can be selected by pressing
1. CTRL key
2. ALT key
3. Shift key
4. CTRL, ALT & DEL key
Answer: 1.

Question 5: Susan needs to use a set of hidden tools frequently. To do this, she would:
1. select the tool from the pop-up toolbar.
2. detach the toolbar.
3. dock the toolbar.
4. group the toolbox.
Answer: 2.

Question 6: To test the IP stack on your local host, which IP address would you ping?
1. 127.0.0.0
2. 1.0.0.127
3. 127.0.0.1
4. 127.0.0.255
5. 255.255.255.25
Answer: 3.

Question 7: CHECK constraint is used to enforce:
1. entity integrity.
2. domain integrity.
3. referential integrity.
4. user-defined integrity.
Answer: 2.

Question 8: The horizontal and vertical lines on a worksheet are called ___
1. cells 
2. sheets
3. gridlines
4. blocklines
Answer: 3.

Question 9: Which is not a type of anti-virus?
1. Norton
2. McAfee
3. STD
4. Symantec
Answer: 3.

Question 10: Which computer language is preferred for data processing ?
1. APL
2. Pascal
3. BASIC
4. none of the above
Answer: 1.

Question 11: What is the extention of Australia
1. .au
2. .in
3. .uk
4. .us
Answer: 1.

Question 12: What is the abbreviation of SATA
1. Serial Advanced Technology Attachment
2. Sedentary Advanced Technology Attachment
3. Secondary Advanced Technology Attachment
4. Secondary Aerial Technology Attachment
Answer: 1.

Question 13: What does XHTML stand for?
1. EXtra Hyperlinks and Text Markup Language
2. EXtreme HyperText Markup Language
3. EXtensible HyperText Marking Language
4. EXtensible HyperText Markup Language
Answer: 4.

Question 14: Which of the following cannot be the status of a task?
1. Finished 
2. In Progress 
3. Waiting on someone else 
4. Deferred 
Answer: 1.

Question 15: An n element AVL tree with height h can be searched in
1. o(log h)
2. O(h)
3. O(h log h)
4. O(n)
Answer: 2.

Question 16: A monitor with high dot pitch will have:
1. a relatively large number of pixels.
2. a high number of possible colors in its display.
3. wide gaps between pixels.
4. relatively fast recharging of the pixels illumination.
Answer: 3.

Question 17: List the results that will be displayed for each of the following lines: msgbox Int(-5.5) msgbox Fix(-5.5) msgbox Cint(-5.5)
1. Line 1: -6 Line 2: -5 Line 3: -6
2. Line 1: -5 Line 2: -5 Line 3: -6
3. Line 1: -5 Line 2: -6 Line 3: -6
4. Line 1: -6 Line 2: -6 Line 3: -5
Answer: 1.

Question 18: The PC and the Apple Macintosh are examples of two different
1. platforms
2. programs
3. input devices
4. storage devices
Answer: 1.

Question 19: In B-tree of order m all external nodes are _ _ _ _ _ _
1. at different levels
2. have 1 child node
3. at same levels
4. have two child nodes
Answer: 3.

Question 20: Jim wants to create an object of the ItemEvent class. Which one of the following options represents the constructor for the ItemEvent class?
1. ItemEvent(ItemSelectable source, int id, Object item) 
2. ItemEvent(ItemSelectable source, boolean id, Object item) 
3. ItemEvent(ItemSelectable source, int id, Object item, int stateChange) 
4. ItemEvent(ItemSelectable source, boolean id, Object item, int stateChange) 
Answer: 3.

Question 21: Two cards have been drawn successively from a pack without replacing the first. Find the probability that 2nd card is spade, if the first card is spade?
1. 4/17
2. 5/17
3. 6/17
4. 7/17
Answer: 1.

Question 22: What type of PCMCIA card is used for modems and network cards. What type of PCMCIA card is used for modems and network cards.
1. Type 1
2. Type II
3. Type III
Answer: 2.

Question 23: What connector on a network card is associated with a 10BASE2 cable? What connector on a network card is associated with a 10BASE2 cable?
1. RJ11 
2. BNC 
3. RJ45 
4. DB25
Answer: 2.

Question 24: A java Class can have two methods provided the return types are different!
1. true
2. false
3. depends on operating system
4. depends on coding style
Answer: 1.

Question 25: A file contains characters a,e,i,o,u,s and t with frequencies 10,15,12,3,4,13 and 1 respectively. If we use Huffman coding for data compression then the average code length will be:
1. 140/58
2. 146/58
3. 150/58
4. 174/58
Answer: 3.

BANK EXAMS COMPUTER KNOWLEDGE PRACTICE QUESTIONS

Question 1: Name the device that provides attachment points for RAM, Video Cards, Graphics card, Modem etc.
1. processor
2. father board
3. motherboard
4. modem
Answer: 3.

Question 2: Which term identifies a specific computer on the web and main page of the entire site
1. None
2. URL
3. Website address
4. Hyperlink
5. Domain name
Answer: 2.

Question 3: In C, An array that uses more than two subscripts is known as
1. One dimentional Array
2. Two Dimentional Array
3. Three Dimentional Array
4. Multi Dimentional Array
Answer: 4.

Question 4: Predict the output or error(s) for the following:
void main()
{
int const * p=5;
printf("%d",++(*p));
}
1. Compiler error: Cannot modify a constant value.
2. 5
3. 6
4. 7
5.
Answer: 1.

Question 5: Which command is used to undelete delete a bunch of files with extension doc that you have just deleted
1. Undelete
2. Undelete *.doc
3. Undelete/all
4. All of the above
Answer: 2.

Question 6: In the SAR sub layer of _ _ _ _ _ _ _ _ _ , the payload is 48 bytes and there is no added header or trailer
1. AAL1
2. AAL2
3. AAL3/4
4. AAL5
Answer: 4.

Question 7: Special I/O instruction r required for
1. a. Memory mapped I/O
2. b. I/O mapped I/O
3. c. both of these
4. d. none of these
Answer: 1.

Question 8: Which of the following is not a type of UNIX shell?
1. KORN SHELL
2. BOURNE SHELL
3. C SHELL
4. JOIN SHELL
Answer: 4.

Question 9: The key idea behind ISDN is that of the _ _ _ _ _ _ _ _ _, a conceptual pipe between the customer and the carrier through which bits flow
1. digital byte pipe
2. analog bit pipe
3. digital pipe
4. digital bit pipe
Answer: 4.

Question 10: You use the History panel to:
1. insert Flash buttons.
2. insert images.
3. format text.
4. display the actions performed.
Answer: 4.

Question 11: What was the first ARPANET message?
1. "lo"
2. "hello world"
3. "mary had a little lamb"
4. "cyberspace, the final frontier"
Answer: 1.

Question 12: The name for the way that computers manipulate data into information is called:
1. Programming
2. Processing
3. Storing
4. Organizing
Answer: 2.

Question 13: The information related to multi-programmed hosts is placed in the header of _ _ _ _ _ _ _ Layer
1. Application layer
2. Transport Layer
3. Session layer
4. Network Layer.
Answer: 2.

Question 14: Which is not true for primary storage?
1. Information must be transferred to primary storage
2. It is relatively more expensive and it is a part of the CPU
3. It allows very fast access to data
4. All the above
Answer: 4.

Question 15: At which OSI layer does data translation and code formatting occur?
1. Network
2. Physical
3. Data link
4. Transport
5. Presentation
Answer: 5.

Question 16: Purpose of PC (Program Counter) in a Microprocessor is
1. To store address of TOS (Top Of Stack)
2. To store address of next instruction to be executed.
3. Count the number of instructions.
4. To store base address of the stack.
Answer: 2.

Question 17: In Photoshop You want to specify a halftone screen frequency when you print your image. Which command should you choose to access this option?
1. File > Print with Preview
2. File > Print
3. File > Page Setup
4. File > Print One Copy
Answer: 1.

Question 18: What command is used to partition a hard drive?
1. Fdisk
2. Format
3. Chkdsk
Answer: 1.

Question 19: For most of computers,the number of scan lines varies between
1. 100 and 1000
2. 200 and 2000
3. 300 and 3000
4. None of these
Answer: 1.

Question 20: The ..... tells the rest of the computer how to carry out a program's instructions.
1. ALU
2. System Unit
3. Control Unit
4. Motherboard
Answer: 2.

Question 21: You are working on a complex marketing problem and want to use the Solver feature of Excel. What are the three pieces of information that must be provided to the Solver to solve the problem?
1. Your data, variables, and constraints.
2. Your target, variables and data range.
3. Your target, variables and constraints.
4. Your target, subtotals and constraints.
Answer: 3.

Question 22: Default line spacing in Word is
1. Single
2. Double
3. 1.5
4. Multiple
Answer: 1.

Question 23: The computer code for interchange of information between terminals is
1. ASCII
2. BCD
3. BCDIC
4. Hollerith
Answer: 1.

Question 24: Which of the following command is used to count just the number of lines contained in a file ?
1. wc-1
2. wc-w
3. wc-c
4. wc-r
Answer: 1.

Question 25: One of the major components of a PC is the Central Processing Unit (CPU) which can be best described as:
1. The device that sends the bus signals telling it what to do.
2. The area that regulates all of the system power usage
3. The area where all the of the Basic input/output routines are stored
4. The area where all of the processing takes place
Answer: 4.

IBPS COMPUTER KNOWLEDGE PRACTICE MCQs

Question 1: Which of the following is not part of the data link layer?
1. Transports data across the physical link
2. Performs physical addressing
3. Performs flow control
4. Determines network topology
5. Terminates a session
Answer: 5.

Question 2: A sensor that informs a body computer about temperature, such as an ambient air temperature sensor for A/C is a:
1. potentiometer.
2. hall-effect switch.
3. thermistor.
4. thermodiode.
Answer: 3.

Question 3: Which of the following is single user computer with many features and good processing power?
1. Minicomputer
2. Workstation
3. Macintosh
4. None of these
Answer: 2.

Question 4: Computer ethics has its own roots in the work of ________during the World War II
1. Nobert Wiener
2. Herman Hollerith
3. Robert Wiener
4. Herman Wiener
Answer: 1.

Question 5: The windows registry consists of which two files?
1. autoexec.bat and config.sys
2. user.dat and win.ini
3. user.dat and system.dat
4. win.reg and user.dat
Answer: 3.

Question 6: Which Open Systems Interconnections (OSI) layer does IP belong to?
1. Session layer
2. Data link layer
3. Transport layer
4. Network layer
Answer: 4.

Question 7: Keyboard is an ............
1. Input device
2. Memory device
3. Output device
4. None of the above
Answer: 1.

Question 8: The destroyList() member function deletes the contents of the linked list and
1. does not delete the linked list itself
2. delete the linked list itself
3. adds the linked list itself
4. None of the above
Answer: 1.

Question 9: The Objective of testing is-
1. Debugging
2. To uncover errors
3. To gain modularity
4. To analyze system
Answer: 2.



Question 10: In token Ring , when a frame reaches its destination station, which of the following occurs?
1. the message is copied
2. four bits in the packet are not changed
3. the message is take off the ring and replaced by the token
4. the message is removed from the buffer
Answer: 1.

Question 11: MSword what is the short cut of paste
1. CTRL+V
2. CTRL+A
3. CTRL+C
4. CTRL+F
Answer: 1.

Question 12: In digital computer, all the expressions are coded into ...........
1. Octal digits
2. Binary digits
3. Hexadecimal digits
4. Decimal digits
Answer: 2.

Question 13: The purpose of the _______ layer is to transport a raw bit stream from one machine to another
1. Physical Layer
2. Data Link Layer
3. Network layer
4. Application Layer
Answer: 1.

Question 14: Register is a
1. Set of capacitors used to register input instructions in a digital computer
2. Set of paper tapes and cards put in a file
3. Temporary storage unit within the CPU having dedicated or general purpose use
4. part of the auxiliary memory
Answer: 3.

Question 15: Identify the directives of JSP.
1. page, include, and taglib
2. include, autoFlush, and taglib
3. page, import, taglib, and buffer
4. contentType, include, and taglib
Answer: 1.

Question 16: A(n) ____________ system is a small, wireless handheld computer that scans an item̢۪s tag and pulls up the current price (and any special offers) as you shop
1. PSS
2. POS
3. inventory
4. data mining
Answer: 1.

Question 17: Which one of the following is the valid SAX enabled parser?
1. XML4J
2. XML Parser
3. DTD Parser
4. Tool Parser
Answer: 1.

Question 18: In the following the fastest computer constituent is
1. CPU
2. Magnetic Tape
3. Video Terminal
4. Sensors and Mechanical controllers
Answer: 1.

Question 19: DSDD is
1. Double Sided Double Density
2. Dual Sided Double Density
3. Double Sided Dual Density
4. Dual Sided Dual Density
Answer: 1.

Question 20: Which among the following is a software based virtual computer
1. Digital immune module
2. CPU emulator
3. Virus signature scanner
4. Emulation control module
Answer: 2.

Question 21: The operation of subnet is controlled by _ _ _ _ _ _ _ _
1. Network Layer.
2. Data Link Layer
3. Data Layer
4. Transport Layer
Answer: 1.

Question 22: Which one of the following files forms a link to the physical devices and peripherals on a system?
1. Regular files
2. Directory files
3. Device special files
4. Link files
Answer: 3.

Question 23: Name the latest version of Windows
1. Windows 3.1
2. Windows NT
3. Windows 98
4. Windows Vista
Answer: 4.

Question 24: A trie structure is a complete _ _ _ _ _ _ _ _ _ _ _ _ _ tree [19S04]
1. binary
2. search
3. B-tree
4. m- ary
Answer: 4.