Thursday 25 July 2013

COMPUTER KNOWLEDGE PRACTICE MCQs FOR IBPS EXAM

1. Data or information used to run the computer is called?
a) Software
b) Hardware 
c) Peripheral
d) CPU 
e) None of the above 

2. To memories the e- mail address one should use?
a) Browser 
b) Search engine 
c) Birthday list 
d) Phone book 
e) Add book 

3. A Hardware device that converts data into meaningful information
a) Protector 
b) Output device 
c) Input device 
d) Program 
e) Processor 

4. What from the following refers to the people, related to computing process?
a) Hardware 
b) Human ware 
c) Software
 d) Firmware 
e) Peripherals 

5. Which of the following is not an example of storage device? 
a) CD 
b) Floppy 
c) Hard disk
d) RAM 
e) DVD 

6. Today, the common form of RAM is built from?
a) Transistors 
b) Vacuum tubes 
c) Semiconductors IC's 
d) Super conductor IC's 
e) None 

7. Benefit of DRAM is ___ 
a) It is cheaper than SRAM 
b) It can store more than SRAM 
c) It is faster than SRAM
d) Data in it can easily be erased than in SRAM 
e) None 


8. Following all are related to spread sheet except?
a) Work sheet 
b) Sell 
c) Formula 
d) Virus detection 
e) None of these 

9. Which element is appropriate for the set of instructions, by which computer performs more than one task?
a) Hardware 
b) Software 
c) Human ware 
d) Firmware 
e) None of these 

10. Which of the following is both output and input? 
a) Printer 
b) Speaker 
c) Modem 
d) monitor 
e) Scanner 

11. A Special software that is used to create a job queue is called_____ 
a) Drive 
b) Spooler 
c) Interpreter
d) Linkage editor 
e) None 

12. Which one of the items listed below is not one of the software engineering layers?
a) Process 
b) Manufacturing 
c) Method 
d) Tools 
e) None 

13. What is the first stage in program development? 
a) Specification and design 
b) System Analysis 
c) Testing 
d) None of the above 
e) All of these 

14. By means of a data flow diagram the analyst can detect ____ 
a) Task duplication 
b) Unnecessary delays 
c) Task overlapping 
d) All of the above 
e) None of the above 

15. Virtual memory is ___ 
a) Related to virtual reality 
b) A form of ROM 
c) A form of RAM 
d) None of the above 
e) All of these 

16. What does RAM stands for? 
a) Read Access Memory 
b) Read Anywhere Memory 
c) Random Anything Memory
d) Random Access Module 
e) Random Access Memory 

17. For transferring file and exchanging messages, which utility is used?
a) Web browser
 b) WWW 
c) e - mail 
d) Hyper text 
e) Search engine 

18. The three main parts of a processor are..? 
a) ALU, control unit and register 
b) ALU, control unit and RAM 
c) Case, control unit and register
d) Control unit, Register and RAM 
e) RAM, ROM and CD- ROM 

19. Which of the following is the second largest unit of RAM? 
a) Terabyte 
b) Megabyte 
c) Byte 
d) Giga byte 
e) None of these 

20. What is present in motherboard that connects CPU with other parts on motherboard?
a) Input unit 
b) System bus 
c) ALU 
d) Primary memory 
e) None of these 

21. ___ servers stores and manage files for network users 
a) Authentication 
b) Main 
c) Web 
d) File 
e) None of these 

22. The OSI model is divided into ____ process called layers 
a) five 
b) six 
c) seven 
d) eight 
e) None of these 

23. System software is a set of programs that enables your computer's hardware devices and ____ software to work together.
a) management
b) Processing 
c) utility 
d) application
e) None of these 

24. In a ring topology, the computer in possession of the ____can transmit data 
a) packet 
b) data 
c) access method 
d) token 
e) None of these 

25. ____ viruses are often transmitted by a floppy disk left in the floppy drive 
a) Trojan horse 
b) Boot sector 
c) Script 
d) logic bomb 
e) None of the above 

26. ____ controls the way in which a computer system functions and provides name by which users can interact with the computer 
a) The platform 
b) Application software 
c) operating software 
d) The Mother board 
e) None 

27. Servers are components that provide resources to other computers connected to a.. 
a) mainframe 
b) network 
c) super computer 
d) client 
e) None of these 

Answers:
1) a; 2) e; 3) e; 4) b; 5) d; 6) c; 7) a; 8) d; 9) b; 10) d; 
11) b; 12) b; 13) d; 14) d; 15) c; 16) e; 17) c; 18) a; 19) d; 20) b; 
21) d; 22) c; 23) d; 24) d; 25) b; 26) c; 27) b. 

Sunday 21 July 2013

COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR BANK EXAMS

1. Which of the following is NOT a characteristic of E-mail?
1) Low cost
2) Record maintenance in database
3) High speed
4) Waste Reduction (writing paper)
5) None

2. What are dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information
3) A computer reserved for special task
4) Both (1) & (2)
5) None of these

3. What are non dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information only
3) A computer reserved for special task
4) Both (2) & (3)
5) None of these

4. G3 is a
1) Computer
2) Cable
3) Chip
4) Mother board
5) None of these

5. One of the oldest calculating device was?
1) Arithmometer
2) Ready reckoner
3) Abacus
4) Both (1) & (2)
5) None of these

6. The first-generation computers had?
1) Vacuum tubes and magnetic drum
2) Magnetic tape and transistors
3) Ics
4) Either (1) or (3)
5) All of these

7. Which of the following is false about change in computer from one generation to the next?
1) Computer size is decreased
2) Speed of processing increases
3) Memory / storage capacities decreases
4) Both (1) & (3) 5) None of these

8. Which of the following is NOT false about GUIs?
1) They make computers easier to use for laymen
2) Icons and menus can be selected with a mouse
3) were first introduced by MACs
4) All of these are true
5) None of these

9. To make a program safe we should take care of:
1) Strong authentication and access controls
2) Error checking controls
3) Do risk analysis
4) Either (1) or (2)
5) All of these

10. Which of them is a must for understanding the organisation's business risks associated with using router
1) Network Architecture
2) Network traffic management
3) Network security
4) Either (2) or (3)
5) All of these

11. We are shifting towards computerization because
1) Current technologies are available
2) Technologies help in meeting the business objectives
3) Hire the employees that are expert in the latest technologies are available
4) Both (1) & (2)
5) None of these

12. Who is responsible for developing the intranet strategy and monitoring its policies?
1) Intranet administrator 2) Webmaster
3) Editor 4) Both (2) & (3)
5) None of these

13. Network layers function is to
1) Select paths for data transfer
2) Break the Network in to subnet
3) Determine the IP
4) Either (2) or (3)
5) All of these

14. Which of the following makes a network insecure?
1) Encryption
2) Network Interface Card (NIC)
3) Static keys
4) Both (2) & (3)
5) None of these

15. If the network of the company is to be protected from remote access that may damage company's reputation due to misuse of information then security policy would/ should include
1) All employees
2) Only the employer
3) Contractors
4) Either (1) or (2)
5) All of these

16. Project management will be made a separate division on the basis of:
1) Interdependencies among departments
2) Sharing of resources
3) Size of the project
4) Either (2) or (3)
5) All of these

17. Various kinds of e-mail threats-mails containing racist, sexual content are example of .....
1) Spam
2) International leakage
3) International tampering
4) Offensive contents
5) None of these

18. Artificial Intelligence can be used in everysphere of life because of its....
1) Ability to work in hazardous places
2) Ability to think like human beings
3) Ability to work in artificial environments
4) All of the above
5) None of these

19. The Steering Committee is made for
1) Reviewing user requirements and ensuring that all controls are considered.
2) Strategic planning for computer installation
3) Evaluating specific project plans for systems
4) Both (1) and (2)
5) None of these

20. In an IT division specific measures were introduced to improve on quality. However effectiveness of these measures can't be ascertained by simply
1) Increased user satisfaction
2) An increase in the quality assurance budget
3) A reduction in the maintenance cost ofthe application
4) Either (1) or (2)
5) All of these

21. Efficient system requirement analysis is required for:
1) Reverse engineering
2) Joint Application Design (JAD)
3) Traditional System development life cycle
4) Either (1) or (3)
5) All of these

22. Which of the following statements is NOT correct for structured programming concepts and modularity?
1) Interaction between modules should be minimal
2) Modules should have only one entry and one exit point
3) Modularity means program segmentation
4) Both (1) and (2)
5) None of these

23. Software quality assurance is for
1) Error prevention
2) Error detection
3) Error correction 4) Either (1) or (3)
5) All of these

24. Which of the following methods is NOT required for telecommunication continuity?
1) Alternative routing
2) Diverse routing
3) Satellite routing
4) All of these
5) None of these

25. The client is called .... in 2 tier architecture.
1) Fat client
2) Thin client
3) Very thin client
4) Either (1) or (2)
5) Cannot say

ANSWERS:
1-2, 2-3, 3-1, 4-3, 5-3, 6-1, 7-3, 8-4, 9-5, 10-4
11-4, 12-2, 13-4, 14-1, 15-1, 16-5, 17-1, 18-4, 19-4, 20-3
21-5, 22-4, 23-5, 24-2, 25-1

Saturday 20 July 2013

COMPUTER KNOWLEDGE PRACTICE MCQs

1. Computer network is a? 
a) A distributed data processing system 
b) Multiple computers are linked together for the purpose of data communication and reso-urce sharing 
c) Both (A) & (B) are false 
d) Both (A) & (B) are true 
e) None of these 

2. Which of the following will be used for checking spelling? 
a) Dictionary Disk 
b) Index disk 

c) Directory Disk 
d) None of these 
e) All the above 

3. Internet Banking is an example of? 
a) Electronic funds transfer (EFT) 
b) EDP (electronic data processing) 
c) EBCDIC 

d) ASCII 
e) None of these 

4. Anonymous FTP is? 
a) Internet file transfer protocol 
b) Protocol that requires password 
c) Not access to the files 
d) None

e) All of the above 

5. Archive is a? 
a) Backup storage 
b) Forward operation 
c) Primary storage 
d) None 

e) All the above

6. CPU performs read/write opera-tions at any point of time in? 
a) ROM b) PROM
c) EPROM d) RAM 
e) None of these

7. BIOS is an abbreviation for? 
a) Binary Input/Binary Output 
b) Binary synchronous 
c) Binary digit 
d) None of these 
e) All the above 

8. Most common channel used by networks today is?
a) Internet 

b) Telephone lines
c) Satellite 

d) Mail 
e) None of these 

9. What is the product of data processing? 
a) Data 

b) Information 
c) Software 

d) A computer 
e) None of these 

10. A source program is the program written in which language? 
a) English 

b) Symbolic 
c) High - level 

d) Machine 
e) None of these 

11. To be information, data must be? 
a) factual 

b) relevant 
c) news 

d) All the above 
e) None of these

12. Thick - film ICs use ____ technique?
a) Screen printing 
b) Cathode sputtering 
c) Monolithic 
d) Hybrid 

e) None 

13. A collection of Eight bits is called? 

a) byte 
b) word 
c) record
 d) file 
e) None of these 

14. What is a microprocessor? 
a) Same as a micro computer 
b) A small piece of equipment
c) A small device that controls other equipment 
d) A way of doing something fast 
e) None of these 

15. The microelectronics is the technology of?
a) microprocessor 
b) microcomputers 
c) Chips 
d) automatic processing 
e) None of these 

16. The processor of a computer system is called it's?
a) Nerve centre 
b) Eye 

c) Brain 
d) Ear 

e) None of these 

17. What are the two major types of computer chips? 
a) External memory 
b) Primary memory chip 
c) Microprocessor chip 
d) Both (B) and (C) 
e) None of these 

18. Who built the first computer mouse?
a) Doughlas Engelbart
b) William English 
c) Daniel Cougher 
d) Robert Zawacki 

e) None 

19. What is a Kimball tag? 
a) An address label 
b) A gift token 
c) A security key 
d) An input medium 
e) None 

20. Dot - matrix is a type of? 
a) tape 

b) printer 
c) Disk

d) Bus 
e) None of these 

21. What are the concentric circles on floppy disks know as? 
a) Tracks 

b) Cylinders 
c) Sectors 
d) Segments 
e) None of these 

22. What does the disk drive of a computers do? 
a) Rotate the disk 
b) Read the disk
c) Load a program from the disk into the memory 
d) Both (B) and (C) 
e) None of these 

23. A ___ is a computer connected to two networks? 
a) link

b) server 
c) gateway 

d) bridge way 
e) None of these 

Answers:

1) d; 2) a; 3) a; 4) a; 5) a; 6) c; 7) a; 8) b; 9) b; 10) c; 

11) b; 12) a; 13) a; 14) c; 15) c; 16) c; 17) d; 18) b; 19) d; 20) b; 21) a; 22) d; 23) b; 

Thursday 18 July 2013

COMPUTER AWARENESS PRACTICE QUESTIONS

1. The part of a computer that coordinates all its functions is called ________ 
a) ROM program 
b) System Board 
c) Arithmetic logic unit 
d) Control unit 

e) None 

2. A computer cannot boot if it does not have the _____
a) Compiler

b) Loader 
c) Operating System 
d) Assembler

e) None 

3. Any data or instructions entered into the memory of a computer are considered ____ 
a) Storage 

b) Output 
c) Input

d) Information 
e) None of these 


4. A right click on the desktop itself will?
a) Open the display properties dialogue box 
b) Show a context - sensitive menu
c) Open the control panel 
d) Minimize all open applications 
e) None of these 


5. The process of starting or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called? 
a) Duping 

b) Booting 
c) Padding

d) CPS 
e) None of these


6. ___ is known as unauthorized access into others system?
a) Hacking

b) Encryption
c) Decryption

d) trafficking
e) None of these 


7. When creating a computer program, the ___ designs the structure of the program
a) End user 

b) System analyst 
c) Programmer 
d) All of the above 

e) None
 
8. Which commands divides the surface of the blank disk into sector and assign a unique address to each one 
a) Ver 

b) Format 
c) Fat 
d) Chkdsk

 e) None of these 

9. When you turn on the computer, the boot routine will perform this test: 

a) RAM test 
b) Disk drive test 
c) Memory test 
d) Power on self test 

e) None 

10. Which of the following perip-heral devices displays information to a user ?
a) Monitor 

b) Keyboard c) Secondary Storage Devices 
d) Secondary Storage Media 
e) None of these


11. Band width refers to: 
a) The cost of the cable required to implement a WAN
b) The cost of the cable required to implement a LAN
c) The amount of information a peer-to-peer network can store 
d) The amount of information a communication medium can transfer in a given amount of time 
e) None of these


12. If the computer keeps rebooting itself, it is likely that:
a) It is effected with virus 
b) It does not have enough memory 
c) There is no printer 
d) There has been a sudden power rise 
e) It needs a CD-ROM


13. Devices that enter information and let you communicate with the computer are called: 
a) Software 

b) Output Devices
c) Hardware 

d) Input Devices 
e) Input / Output Devices


14. An integrated circuit is ____ 
a) A complicated circuit 
b) An integrating device 
c) Much costlier than a single transistor 
d) Fabricated on a tiny silicon chip 
e) None of the above 


15. The computer connected to a LAN (Local Area Network) can
a) Run faster 

b) Go online 
c) Share information and/or share peripheral equipment 
d) E - Mail

e) None of these 

16. Which device can not be shared in network? 
a) Floppy

 b) Key board 
c) Computer

 d) Printer 
e) Hard Disk 


17. A printer is a type of device used for ____ 
a) Input b) Word processing
c) Processing 

d) Output 
e) None of these
 
18. The basic goal of computer process is to convert data into ____ 
a) Files b) Tables
c) Information 
d) Graphs 
e) None of these

 
19. The name that user gives to a document is referred to as ____ 
a) Document name 

b) File name
c) Name given 
d) Document identity 

e) None 

20. The person who writes and tests computer program is called a ___
a) Programmer 
b) Computer scientist 
c) Software engineer 
d) Project developer 

e) None 

21. DNS is the abbreviation of: 
a) Domain Name Service
b) Domain Name System
c) Direct Network Service
d) Direct Network System
e) None of these


22. Which of the following is not true as regards primary storage? 

a) It is a part of the CPU 
b) It allows very fast access to data 
c) It is relatively more expensive 
d) Information must be transf-erred to primary storage 
e ) None of these 


23. Which of the following is the most powerful type of computer? 

a) Super micro 
b) Super conductor 
c) Micro computer 
d) Super computer 
e) Mega frame 


24. Which of the following isn't a type of computer facility?
a) Decentralized 

b) Centralized 
c) De - distributed 
d) Distributed 

e) None 

Answers
1) d; 2) c; 3) c; 4) a; 5) b; 6) a; 7) b; 8) b; 9) b; 10) a; 

11) d; 12) a; 13) d; 14) d; 15) c; 16) b; 17) d; 18) c; 19) b; 20) a; 
21) b; 22) e; 23) d; 24) c. 

Friday 5 July 2013

COMPUTER AWARENESS PRACTICE MCQs

1. The ______ of a system includes the program or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these

2. In order to save a word document as a web page you need to?
1) Put the appropriate graphic and links on the document
2) Save the document in the simple text format
3) Use your web browser as an editor and save as URL
4) Save as HTML
5) None of these

3. Something which is easily understood instructions is said to be?
1) User friendly
2) Information
3) Word processing 
4) Icon
5) None of these

4. The copy command saves the data to which of the following?
1) The desktop
2) The clipboard
3) Microsoft word 
4) Paste
5) None of these

5. Arranging the data in a sequence is known as?
1) Classifying 
2) Searching
3) Sorting
4) Reproducing
5) None of these

6. Find the Mis-Matched pair ?
1) Chrome - Google
2) Opera - Opera Software
3) Internet Explorer - Microsoft
4) Safari - Net Scape Commu-nications
5) None of these

7. In order to save an existing document with a different name you need to?
1) Retype the document and give it a different name
2) Use the Save as command
3) Copy it to a new folder and then save
4) Use Windows Explorer to save
5) None of these

8. Which of the following is a graphics package?
1) Adobe page maker
2) Acrobat Reader
3) Microsoft word
4) Corel Draw
5) None of these

9. Plotter is very useful in applica-tions such as?
1) Computer aided design
2) Word processing
3) Financial accounting
4) Spell checking 
5) None

10. Data processing cycle consists of?
1) Input and output
2) Output and processing
3) Input, processing and output
4) Only input
5) None

11. 'MICR' technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition
2) Magnetic Intelligence Chara-cter Recognition
3) Magnetic Information Cable Recognition
4) Magnetic Cable Recognition
5) None of these

12. All the information collected during database development is stored in a?
1) Repository
2) Data warehouse 
3) RAD
4) CASE 
5) None of these

13. ___ is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit making it an efficient way to store data in memory.
1) DRAM
2) PRAM
3) NRAM
4) NORAM
5) None of these

14. What is the symbol for attachments in yahoo mail :
1) Envelope
2) Letter A
3) Paper Clip
4) Pen
5) None of these

15. To cover files from a backup you perform________ option
1) Scan 
2) Move
3) Copy 
4) Restore
5) None of these

16. The internet began with the development of?
1) Ethernet 
2) Internet
3) USENET
4) Extranet
5) ARPANET

17. Select the odd man out
1) Interpreter 
2) Programmer
3) Operating system
4) Assembler 
5) Utility 

18. The number of pixels displayed on a screen is known as the screen?
1) Resolution
2) Color depth
3) Refresh rate
4) Viewing size
5) None of these

19. Name the certifying authority of digital signatures in banking and financial sector?
1) The IDRBT Certifying Auth-ority
2) Individual Banks
3) Reserve Bank of India
4) Indian Bank's Association
5) None of these

20. Firewall in parlance of computer science is a method of?
1) Stopping unauthorized access
2) Making network more secure against banking attempts
3) Filtering the data that is going out of the network and coming in the network.
4) All the above 
5) None

21. Encryption is used in computers to?
1) Protect data from unauthor-ized access
2) Protect data from damaging
3) Prevent the computer from unauthorized users
4) All the above
5) None

Answers
1) 4; 2) 4; 3) 1; 4) 2; 5) 3; 6) 4; 7) 2; 8) 4; 9) 1; 10) 3;
11) 1; 12) 2; 13) 1; 14) 3; 15) 4; 16) 5; 17) 2; 18) 1; 19) 1; 20) 4; 21) 1.

Wednesday 3 July 2013

COMPUTER KNOWLEDGE PRACTICE MCQs FOR RBI EXAM

1. Which computer has been designed to be as compact as possible?
1) Mini
2) Super computer
3) Micro computer
4) Mainframe
5) None of the above

2. The symbols used in an assembly language are
1) Codes
2) Mnemonics
3) Assembler
4) Literals
5) All of the above

3. Portrait and Landscape are
1) Page Orientation
2) Paper Size
3) Page Layout
4) Margin type
5) All of the above

4.Any storage device added to a computer beyond the immediately usable main storage is known as
1) Floppy disk
2) Hard disk
3) Backing store
4) Punched card
5) Magnetic Tape

5. Which output device is used for translating information from a computer into pictorial form on paper
1) Mouse
2) Plotter
3) Touch panel
4) Card punch
5) Keyboard

6.A computer assisted method for the recording and analyzing of existing or hypothetical systems is
1) Data transmission
2) Data flow
3) Data capture
4) Data processing
5) Data validation

7. Which access method is used for obtaining a record from a cassette tape?
1) Direct
2) Sequential
3) Random
4) ISAM
5) VSAM

8. Find the ODD one.
1) JAVA
2) Cobol
3) Fortran
4) Linux
5) ADA

9. The 2's compliment of a binary no. is obtained by adding.....to its 1's compliment.
1) 0
2) 1
3)10
4) 12
5) 13

10. With respect to a network interface card, the term 10/100 refers to
1) protocol speed
2) a fiber speed
3) megabits per seconds
4) minimum and maximum server speed
5) data capacity

11. The terms "red book", "yellow book", and "orange book" refer to:
1) SCSI
2) IDE
3) floppy drive technology
4) CD-ROM standards
5) SATA

12. In ROM BIOS, the acronym BIOS stands for:
1) Basic Intuitive Output Set
2) Basic Input Organizational System
3) Basic Input Output System
4) Basic Industry Operating System
5) Basic Input Output Set

13. Which DOS command will format a floppy disk and transfer the system files
1) SYS C: A:
2) SYS A:
3) FORMAT A: /S
4) FORMAT A: /T
5) SYS C:

14. Which command will be used to display file and directory names only, without size, date, and time information?
1) DIR/W
2) DIR A:
3) DIR/B
4) DIR/S
5) DIR

15. Which of the following is not a logical data-base structure?
1) tree
2) relational
3) network
4) chain
5) None of the above

16. Updating a database means
1) revising the file structure
2) reorganizing the database
3) modifying or adding record occurrences
4) Sorting
5) Indexing

17.Any and every command can be found on the
1) Drawing toolbar
2) Formatting toolbar
3) Standard toolbar
4) Menu bar
5) View toolbar

18. Which of the following should be used when you want to add a slide to an existing presentation?
1) File, add a new slide
2) Insert, new slide
3) File, open
4) File, new
5) None of the above

19. Which of the following items are examples of storage devices?
1) Floppy disks
2) CD-ROMs
3) Tape devices
4) Hard Disk
5) All of the above

20. The original ASCII code used .... bits of each byte, reserving that last bit for error checking
1) 5
2) 6
3) 7
4) 8
5) 16

21. Word length of a computer is measured in
1) Bytes
2) Millimeters
3) Meters
4) Bits
5) All the above

22. Which type of computers uses the 8-bit code called EBCDIC?
1) Minicomputers
2) Microcomputers
3) Mainframe computers
4) Super computer
5) Lap Tops

23. ATM terminals are example for
1) Smart Terminals
2) Intelligent terminals
3) Dumb terminals
4) Offline terminals
5) None of the above

24.A name or number used to identify a storage location is called
1) A byte
2) A record
3) An address
4) An instruction
5) All of above

25. The difference between memory and storage is that memory is .... and storage is .....
1) temporary, permanent
2) permanent, temporary
3) slow, fast
4) big, Small
5) None of the above

26. Offline device is
1) A device which is not  connected to CPU
2) A device which is connected to CPU
3) A direct access storage device
4) An I/O device
5) None of the above

27. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?
1) Memory address register
2) Memory data register
3) Instruction register
4) Program counter
5) Flag Register

28. Which American Computer Company is called Big Blue?
1) Microsoft
2) Compaq Corp
3) IBM
4) Tandy Stevenson
5) DELL

29.A term associated with the comparison of processing speeds of different computer system is:
1) EFTS
2) MPG
3) MIPS
4) CFPS
5) Bps

30. Daisy wheel printer is a type of
1) Matrix printer
2) Impact printer
3) Laser printer
4) Manual printer
5) Non impact printer

31. Serial access memories are useful in applications where
1) Data consists of numbers
2) Short access time is required
3) Each stored word is processed differently
4) Data naturally needs to flow in and out in a serial form
5) Data naturally needs to flow in
and out in a Random form

32. One of the main feature that distinguish microprocessors from micro-computers is
1) Words are usually larger in microprocessors
2) Words are shorter in microprocessors
3) Microprocessor does not contain I/O devices
4) Exactly the same as the machine cycle time
5) None of the above

33. Example of non-numeric data is..
1) Employee Name
2) Test score
3) Bank Account No.
4) Phone No
5) All the above

34. Numbers in table columns are usually...
1) right-aligned
2) left-aligned
3) justified
4) centered
5) None of the above

35. Most Web sites have a main page known as ........, which acts as a doorway to the rest of the Website pages.
1) search engine
2) home page
3) browser
4) URL
5) Domain

36.A software program that extends the capabilities of your browser in a specific way is known as
1) Plugin
2) Browser software
3) Cookies
4) Applets
5) None of the above

37. Internet is example of
1) LAN
2) MAN
3) WAN
4) SAN
5) CAN

38. ......... refers to maintaining and assuring the accuracy and consistency of data
1) Data redundancy
2) Data inconsistency
3) Data integrity
4) Data independence
5) All the above

39. ........... is a data model for describing a database in an abstract way
1) Data Flow Diagram
2) Flow chart
3) ER-Diagram
4) System chart
5) Network chart

40. Mechanism to protect private network from outside attack is
1) Firewall
2) Antivirus
3) Digital Signature
4) Formatting
5) Tunneling

41. The concept of electronic cash is execute payment by
1) Credit card
2) ATM card
3) Using computers over Network
4) Cheque
5) Debit card

42.Amazon.com comes under the following model
1) B2B
2) B2C
3) C2C
4) C2B
5) None of the above

43. A device that forwards data packets from one network to another is called a
1) Bridge
2) Router
3) Gateway
4) Switch
5) Repeaters

44. Tool that is used to transfer data/ files among computers on the internet
1) FTP
2) TCP
3) Archie
4) Gopher
5) POP

45. ........... is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication
1) Spoofing
2) Hacking
3) Phishing
4) Whaling
5) None of the above

46.A huge collection of information arranged for quick retrieval by computer is known as a
1) Deep web
2) Search Engine
3) Data base
4) URL
5) All the above

47. When using Internet sources, asking whether the site is inwardfocused or outward - focused helps to determine
1) Expertise
2) Objectivity
3) Accuracy
4) Purpose
5) Functionality

48. Network Interface card address is known as
1) IP address
2) MAC address
3) FTP address
4) LAN address
5) System address

49. In keyboard modifier keys are
1) Alt, Shift, Ctrl
2) PgUP, Alt, Ctrl
3) Home, Alt, Ctrl
4) Del, End, Alt
5) Tab, End, Alt

50. ASCII value of ‘D’ is
1) 66
2) 68
3) 74
4) 65
5) 64

51. In SD memory cards SD stands for
1) Standard Digital
2) Secure Digital
3) Secondary
4) Standard Data
5) Secure Data

52. What is the short cut key to open the Open dialog box?
1) F12
2) Shift F12
3) Alt + F12
4) Ctrl + F12
5) F11


ANSWERS:

1-3, 2-2, 3-1, 4-3, 5-2, 6-2, 7-2, 8-4, 9-2, 10-3
11-4, 12-3, 13-3, 14-3, 15-4, 16-3, 17-4, 18-2, 19-5, 20-3
21-4, 22-3, 23-1, 24-3, 25-1, 26-1, 27-4, 28-3, 29-3, 30-2
31-4, 32-3, 33-1, 34-1, 35-2, 36-1, 37-3, 38-3, 39-3, 40-1
41-3, 42-2, 43-2, 44-1, 45-3, 46-3, 47-3,  48-2, 49-1 50-2, 51-2, 52-4.