Monday 22 December 2014

COMPUTER AWARENESS PRACTICE QUESTIONS

1. UNIVAC stands for?
A) Universal Automatic Computer
B) Universal Array Computer
C) Unique Automatic Computer
D) Unvalued Automatic Computer
E) None of these

2. The basic operation performed by a computer is ____
A) Arithmetic operation
B) Logical operation
C) Storage and relative
D) All the above
E) None of these

3. The two major types of computer chips are:
A) External memory chip
B) Primary memory chip
C) Microprocessor chip
D) Both b and c
E) Both a and b

4. Microprocessors as switching devices are for which generation computers?
A) First Generation
B) Second Generation
C) Third Generation
D) Fourth Generation
E) None of the above

5. What is the main difference between a mainframe and a super computer?
A) Super computer is much larger than mainframe computers
B) Super computers are much smaller than mainframe computers
C) Super computers are focused to execute few programs as fast as possible while mainframe
uses its power to execute as many programs concurrently
D) Super computers are focused to execute as many programs as possible while mainframe
uses its power to execute few programs as fast as possible
E) None of the above

6. ASCII and EBCDIC are the popular character coding systems. What does EBCDIC stand for?
A) Extended Binary Coded Decimal Interchange Code
B) Extended Bit Code Decimal Interchange Code
C) Extended Bit Case Decimal Interchange Code
D) Extended Binary Case Decimal Interchange Code
E) None of the above

7. The brain of any computer system is ___
A) ALU
B) Memory
C) CPU
D) Control unit
E) Keyboard

8. Storage capacity of magnetic disk depends on ___
A) tracks per inch of surface
B) bits per inch of tracks
C) disk pack in disk surface
D) All of the above
E) Only A and B

9. The two kinds of main memory are:
A) Primary and Secondary
B) Random and Sequential
C) ROM and RAM
D) All of the above
E) None of these

10. A storage area used to store data to compensate for the difference in speed at which the different units can handle data is ___
A) Memory
B) Buffer
C) Accumulator
D) Address
E) None of these

11. Computer is free from tiresome and boardroom. We call it ___
A) accuracy
B) reliability
C) diligence
D) versatility
E) programmability

12. Integrated Circuits (ICs) are related to which generation of computers?
A) First generation
B) Second generation
C) Third generation
D) Fourth generation
E) Fifth generation

13. CD-ROM is a ___
A) Semiconductor memory
B) Memory register
C) Magnetic memory
D) All of the above
E) None of the above

14. A hybrid computer:
A) Resembles digital computer
B) Resembles analogue computer
C) Resembles both a digital and analogue computer
D) Converts digital to analog
E) None of the above

15. Which type of computers uses the 8-bit code called EBCDIC?
A) Mini computers
B) Micro computers
C) Mainframe computers
D) Super computer
E) None of these

16. The ALU of a computer responds to the commands coming from:
A) Primary memory
B) Control section
C) External memory
D) Cache memory
E) None of these

17. Chief component of first generation computer was ___
A) Transistors
B) Vacuum Tubes and Valves
C) Integrated Circuits
D) All of the above
E) None of the above

18. To produce high quality graphics (hardcopy) in color, you would want to use a/an ___
A) RGB monitors
B) Plotter
C) Ink-jet printer
D) Laser printer
E) None of these

19. What are the stages in the compilation process?
A) Feasibility study, system design and testing
B) Implementation and documentation
C) Lexical Analysis, syntax analysis, and code generation
D) Both A and B
E) None of the above

20. Which of the following IC was used in third generation of computers?
A) SSI
B) MSI
C) LSI
D) Both a and b
E) None of these

ANSWERS:
1) A 2) D 3) D 4) D 5) C 6) A 7) C 8) D 9) C 10) B
11) C 12) C 13) E 14) C 15) C 16) B 17) B 18) B 19) C 20) D

Friday 5 December 2014

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. The right click option of mouse is NOT used in which of the following?
1) To copy selected text into the clipboard
2) To rename file
3) To cut the selected text
4) To access properties of an object
5) None of these

2. .......... is the process of dividing the disk into tracks and sectors.
1) Tracking
2) Formatting
3) Crashing
4) Allotting
5) None of these

3. A place in the computer system where data and programs are temporarily stored is called....
1) paste
2) open
3) memory
4) pocket
5) None of these

4. Correcting errors in a program is referred to as...
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these

5. Graphical diagrams are used to represent multiple perspectives of a system which include
1) use-case, class and state diagrams
2) state, interaction and derivative diagrams
3) interaction, relationship and class diagrams
4) deployment, relationship and use-case diagrams
5) None of these

6. Which is the best view for representing your thoughts as a presentation of a computer?
1) Outline view
2) Notes page view
3) Slide sorter view
4) Slide view
5) None of these

7. What does SMPS stand for?
1) Switched Mode Power Supply
2) Single Mode Power Supply
3) Simple Mode Power Supply
4) Synchronous Mode Power Supply
5) None of these

8. RSA is........
1) Symmetric Cryptosystem
2) Digital Signature
3) Asymmetric Cryptosystem
4) Block Cypher
5) None of these

9. ......... hardware technology was used to fifth-generation computers.
1) Transistors
2) Valves
3) ICS
4) ULSI
5) VLSI

10. For each instruction in program memory the CPU goes through a ........
1) decode - fetch - execute sequence
2) fetch - decode - execute sequence
3) fetch - execute - decode sequence
4) execute - store - decode sequence
5) fetch - store - decode sequence

11. A proxy server is used for which of the following?
1) To provide security against unauthorised users
2) To process client requests for web pages
3) To process client requests for database access
4) To provide TCP / IP
5) None of these

12. A repair for a known software bug, usually available at no charge on the Internet, is called a(n).....
1) Version
2) Patch
3) Tutorial
4) FAQ
5) None of these

13. A modem performs.....
1) Modulation
2) Demodulation
3) Data compression
4) All of these
5) None of these

14. Which access method is used for obtaining a record from a cassette tape?
1) Direct
2) Sequential
3) Random
4) All of the above
5) None of these

15. A failure that occurs in an Oracle program when there is a logical failure in handling of a statement is called.........
1) Instance failure
2) Media failure
3) Process failure
4) Statement failure
5) User error

16. Which of the following represents the size of a floppy?
1) 3.5 inches
2) 5.25 inches
3) 8.0 inches
4) All the above
5) None of these

17. To format a number in date format, press..
1) Ctrl + Shift + @
2) Ctrl + Shift + #
3) Ctrl + Shift + %
4) Ctrl + Shift + $
5) Ctrl + Shift + ∗

18. ........ uses an embossed steel band to form the letters printed on the paper.
1) Laser printer
2) Dot-matrix printer
3) Daisy wheel printer
4) Band printer
5) Ink-jet printer

19. OR, XOR and AND functions can be performed by .............. of a computer in the CPU.
1) Memory
2) CU
3) Register
4) ALU
5) Processor

20. Internet provides....
1) Online communication
2) Software sharing
3) Customer support service
4) Online journals and magazines
5) All of the above

21. System software is the set of programs that enables your computer's hardware devices and ................ software to work together.
1) Management
2) Processing
3) Utility
4) Application
5) None of these

22. ............................ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these

23. SMPT, FTP and DNS are applications of the ............. layer.
1) data link
2) network
3) transport
4) application
5) None of these

24. According to which of the following, in a database, should information be organised and accessed?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these

25. WORM stands for ....
1) Wanted One Read Memory
2) Write Once Read Many
3) Write Original Read Many
4) All the above
5) None of these

26. Which of the following is separate software layer that acts as 'glue' between the client and the server parts of an application and provides a programming abstraction?
1) Freeware
2) Firmware
3) Shareware
4) User-supported software
5) Middleware

27. Which of the following is a must for a computer?
1) Chip
2) Data
3) Mouse
4) Processor
5) None of these

28. Disk can be used to store.......
1) Random files
2) Sequential files
3) Both (1) and (2)
4) Horizontal files
5) None of these

29. A derived class may also be called as.....
1) sub-class
2) super class
3) parent class
4) deprived class
5) None of these

30. The capacity of program counter is.......
1) 8 bits
2) 14 bits
3) 16 bits
4) 12 bits
5) 32 bits

31. In ........... generation computer the speed was measured in nanoseconds.
1) first
2) second
3) third
4) fourth
5) fifth

32. The process of transferring of files from your computer to the computer on the internet is called .......
1) downloading
2) uploading
3) FTP
4) JPEG
5) downsizing

33. Timing and control unit is a part of a(n)....
1) ALU
2) Processor
3) Memory
4) CMOS
5) BIOS

34. Chip is the common name for a(n)....
1) transistor
2) resistor
3) integrated circuit
4) semiconductor
5) None of these

35. ................. is developed specifically for a distinct industry.
1) Personal productivity software
2) Application software
3) Decision support system
4) Vertical market software
5) System software

36. Which of the following services is not provided by Internet service provider?
1) Internet transit
2) Domain name registration
3) Hosting
4) Dial-up access
5) None

37. A source program is written in a ............. language.
1) high-level
2) low-level
3) binary
4) All the above
5) None of these

38. The transfer rate of a standard USB 2.0 Device is .....
1) 100 M bit/s
2) 250 M bit/s
3) 480 M bit/s
4) 500 M bit/s
5) 1 G bit/s

39. The control part of a disk is known as
1) surface
2) hub
3) cylinder
4) cluster
5) None of these

40. Which of the following languages is used for process control?
1) ADA
2) COBOL
3) BASIC
4) PASCAL
5) LISP

ANSWERS:
1-5, 2-2, 3-3, 4-1, 5-1, 6-1, 7-1, 8-2, 9-4, 10-2
11-1, 12-2, 13-4, 14-2, 15-4, 16-4, 17-2, 18-4, 19-4, 20-5
21-4, 22-2, 23-4, 24-2, 25-2, 26-5, 27-4, 28-3, 29-1, 30-3
31-3, 32-2, 33-2, 34-3, 35-4, 36-5, 37-1, 38-3, 39-2, 40-1.

Thursday 20 November 2014

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. Auxiliary storage is—
(A) Secondary storage (B) Primary storage
(C) Processing device (D) None of these
Ans : (A)

2. Archive is?
(A) Backup storage (B) Forward operation
(C) Primary storage (D) None of these
Ans : (A)

3. A branch of computer science that deals with computers that possess reasoning, learning and thinking capabilities that resemble those of human beings is recognized as?
(A) Software engineering (B) Artificial intelligence
(C) Hardware engineering (D) None of these
Ans : (B)

4. ASCII is—
(A) A standard coding system for computers (B) Hardware device
(C) Software (D) None of these
Ans : (A)

5. Following is true for Bandwidth?
(A) The wider the bandwidth of a communications system the more data it can transmit in a given period of time.
(B) The narrow the bandwidth of a communications system the more data it can transmit in a given period of time.
(C) The wider the bandwidth of a communications system the less data it can transmit in a given period of time.
(D) None is true
Ans : (A)

6. An operation in which data is moved to a different location is referred as—
(A) Block move (B) Street move
(C) Delete (D) None of these
Ans : (A)

7. The following is responsible for number of logical records in a physical record—
(A) Blocking factor (B) Block
(C) Boolean algebra (D) None of these
Ans : (A)

8. Boolean variable assumes—
(A) Values that are true only (B) Values that are false only
(C) Values that are either true or false (D) None of these
Ans : (C)

9. Bubble Memory is—
(A) nonvolatile (B) volatile
(C) permanent (D) None of these
Ans : (A)

10. In Nonvolatile memory device—
(A) Data contained in them is not lost when the power turned off
(B) Data contained in them is lost when the power turned off.
(C) data contained in them is permanent and not be rewrite
(D) None of these
Ans : (A)

11. A fixed number of adjacent bits that represent a particular character or symbol are referred as—
(A) Byte (B) Octal
(C) Bubble (D) None of these
Ans : (A)

12. Cache memory is a—
(A) Small buffer storage (B) Permanent storage
(C) Main memory (D) None of these
Ans : (A)

13. The total number of digits (symbols) available to represent numbers in a positional number system is referred as—
(A) Number system (B) Base
(C) Power (D) None of these
Ans : (B)

14. Cache memory is—
(A) Smaller and faster than main storage
(B) Bigger and slower then main storage
(C) Smaller but slower than main memory
(D) Bigger and faster than main memory
Ans : (A)

15. Cache memory—
(A) Is a Static RAM
(B) Increases the speed of processing by making current programs and data available to the CPU at a rapid rate
(C) Both A and B true
(D) Both A and B false
Ans : (C)

16. A sequential electronic circuit which can be placed in one out of two stable states where each state may be used to represent a binary digit is stated as—
(A) Integrated circuit (B) Firmware
(C) Flip-flop (D) None of these
Ans : (C)

17. A sequence of instruction (software) that is substituted for hardware and stored in readonly memory (ROM) is called—
(A) Integrated circuit (B) Firmware
(C) Flip-flop (D) None of these
Ans : (B)

18. Anonymous FTP is the—
(A) Internet file transfer protocol (B) Protocol that requires password
(C) None access files (D) None of these
Ans : (A)

19. EFF sites allows anonymous FTP that—
(A) Do not require a password or access (B) Requires password or access
(C) Is a none access file (D) None of these
Ans : (A)

20. ANSI is—
(A) American National Standards Institute
(B) A USA based national organization that establishes uniform standards in several fields of computers.
(C) A and B both true
(D) None is true
Ans : (C)

Thursday 13 November 2014

Computer Abbreviations and Meanings

A
ACE – Access Control Entry
ACL – Access Control List
ADO – Active Data Objects
ADSL – Asymmetric Digital Subscriber Line
AGP – Accelerated Graphics Port
AI – Artificial Intelligence
ALGOL – Algorithmic Language
ALU – Arithmetic Logic Unit
ANSI – American National Standards Institute
AOL – America Online
API – Application Program Interface
APIPA – Automatic Private Internet Protocol Addressing
APT – Automatically Programmed Tooling
ARP – Address Resolution Protocol
ARPANET – Advanced Research Projects Agency Network
ASCII – American Standard Code for Information Interchange
ASF – Advanced Streaming Format
ASM – Association for Systems Management
ASP – Active Server Pages
ATAPI – Advanced Technology Attachment Packet Interface
ATM – Asynchronous Transfer Mode
AUI – Attachment Unit Interface
AVI – Audio Video Interleave

B
B2B – Business to Business
B2C – Business to Commerce
BASIC – Beginner's All Purpose Symbolic Instruction Code
BCD – Binary Coded Decimal
BDPS – Business Data Processing Systems
BHTML – Broadcast Hyper Text Markup Language
BIOS – Basic Input Output System
BIU – Bus Interface Unit
BMP – Bitmap
BPS – Bytes Per Seconds

C
CAD – Computer Aided Design
CADD – Computer Added Drafting and Design
CAI – Computer Aided Instructuion
CAM – Computer Aided Manufacturing
CAR – Control Address Register
CASE – Computer Aided Software Engineering
CCIS – Common Channel Interoffice Signaling
CCNA – Cisco Certified Network Associate
CD–WORM – Compact Disc – Write Once Read Many
CD RW – Compact Disc ReWritable
CD – Compact Disc
C-DAC – Centre for Development of Advanced Computing
CDMA – Code Division Multiple Access
CDONTS – Collabaration on Data Objects for Windows NT Server
CDROM – Compact Disc Read Only Memory
CFG – Control Flow Graph
CGI – Common Gateway Interface
CGM – Computer Graphics Metafile
CIDR – Classless Inter–Domain Routing 
CIM– Computer Integrated Manufacture
CISC – Complex Instruction Set Computers
CIX – Commercial Internet Exchange
CLR – Common Language Runtime
CMOS – Complementary Metal Oxide Semiconductor
CMS – Content Management System
CMYK – Cyan, Magenta, Yellow, Key (black)
COBOL – Common Business Oriented Language
COM – Component Object Model
CORBA – Common Object Request Broker Architecture
CPI – Clock Cycle Per Instruction
CPU – Central Processing Unit
CRC – Cyclic Redundancy Check
CRM – Customer Relationship Management
CROM – Control Read Only Memory
CRT – Cathode Ray Tube
CUI – Character User Interface

D
DAC – Digital to Analog Converter
DAO – Data Access Objects
DARPANET – Defense Advanced Research Projects Agency Network
DAT – Digital Audio Tape
DBA – Data Base Administrator
DBMS – Data Base Management System
DCA – Defence Communication Agency
DCL – Data Control Language
DCOM – Distributed Component Object Model
DCP – Data Communication Processor
DDL – Data Definition Language
DDOS – Distributed Denial of Service
DDP – Distributed Data Processing
DFD – Data Flow Diagram
DFS – Distributed File System
DHCP – Domain Host Configuration Protocol
DHTML – Dynamics Hyper Text Markup Language
DLC – Data Link Control
DLL– Dynamic Link Library
DMA – Direct Memory Access
DML – Data Manipulation Language
DMTF – Distributed Management Test Force
DNA – Distributed Internet Architecture
DNS – Domain Name System
DOM – Document Object Model
DOS – Disk Operating System, Denial Of Service
DPI – Dots Per Inch
DRAM – Dynamic Random Access Memory
DSL – Digital Subscriber Line
DSN – Digital Subscriber Network
DTD – Document Type Definition
DVD – Digital Versatile Disc

E
E – Electronic
EAROM – Electrically Alterable Read Only Memory
EBCDIC – Extended Binary Coded Decimal Interchange Code
EDC – Electronic Digital Computer
EDCDIC – Extended Binary Coded Decimal Interchange Code
EEPROM – Electrically Erasable Programmable Read Only Memory
EFS – Encrypted File System
EJB – Enterprise Java Beans
ENIAC – Electronics Numerical Integrator and Calculator
EPROM – Erasable Programmable Read Only Memory
EROM – Erasable Read Only Memory
ERP – Enterprise Resource Planning
EULA – End User License Agreement

F
FAT – File Allocation Table
FDD – Floppy Disk Drive
FDDI – Fiber Distributed Data Interface
FDMA – Frequency Division Multiple Access
FIFO – First In First Out
FLOPS – Floating Point Operations Per Second
FO – Fiber Optics
FORTRAN – Formula Translation
FPS – Frames Per Second
FRAM – Ferro–electric Random Access Memory
FTP – File Transfer Protocol

G
GB – Giga Bytes
GIF – Graphic Interchange Format
GIGO – Garbage In Garbage Out
GML – General Markup Language
GNU – GNU's Not Unix
GPL – General Public License
GUI – Graphical User Interface

H
HDD – Hard Disk Drive
HFS – Hierarchical File System
HP – Hewlett Packard
HPC – High Performance Computing
HPFS – High Performance File System
HSR – Horizontal Scan Rate
HTML – Hyper Text Markup Language
HTTP – Hyper Text Transfer Protocol

I
IBM – International Business Machines
IC – Integrated Circuit
ICMP – Internet Control Message Protocol
ICS – Reduce Instruction Set Computer
ICT – Information and Communication Technology
IDE – Integrated Development Environment
IE – Internet Explorer
IGMP – Internet Group Management Protocol
IIS – Internet Information Server
IL – Intermediate Language
IO – Input Output
IOP – Input Output Processor
IP – Internet Protocol
IPX – Internetworked Packet Exchange
IRAM – Integration Ram
IRC – Internet Relay Chat
IrDA – Infrared Data Association
IRQ – Interrupt Request
ISAPI – Internet Server Application Program Interface
ISDN – Integrated Services Digital Network
ISO – International Standard Organization
ISP – Internet Service Provider
ISR – Interrupt Service Routine
IT – Information Technology
ITPL – Information Technology Park Limited (India)

J
JCL – Job Control Language
JDBC – Java Data Base Connectivity
JHTML – Java within Hyper Text Markup Language
JPEG – Joint Photographic Experts Group
JSP – Java Server Pages

K
KB – Kilo Bytes
KBPS – Kilo Bytes Per Second

L 
L2TP – Layer Two Tunneling Protocol
LAN – Local Area Network
LCD – Liquid Crystal Display
LDAP – Light Weight Directory Access Control
LIFO – Last In First Out
LIPS – Logical Interfaces Per Second
LOC – Lines Of Code
LSI – Large Scale Integration
LSP – Layered Service Provider

M
MAC
 – Media Access Control
MAN – Metropolitan Area Network 
MAU – Multi–station Access Unit
MB – Mega Bytes
MBONE – Multicast Backbone
MBPS – Mega Bytes Per Second
MBR – Master Boot Record
MCP – Microsoft Certified Professional
MCS – Multicast Server
MCSA – Microsoft® Certified Systems Administrator
MCSD – Microsoft® Certified Solution Developer 
MCSE – Microsoft® Certified System Engineer
MDI – Multiple Document Interface
MDS– Microcomputer Development System
MFC – Microsoft Foundation Classes
MFT – Master File Table
MG – Mega Bytes
MICR – MagneticInk Characters Reader
MIDI – Musical Instrument Digital Interface
MIMD – Multiple Instruction Multiple Data
MIME – Multipurpose Internet Mail Extensions
MIPS – Millions of Instructions Per Second
MISD – Multiple Instruction Single Data
MODEM – Modulator and Demodulator
MP3 – Motion Pictures Experts Group Layer – 3
MPEG – Motion Pictures Experts Group
MS – MicroSoft
MSDN – MicroSoft Developer Network
MSIIS – Microsoft Internet Information Server
MSIL – Microsoft Intermediate Language
MSMQ – Microsoft Message Queue
MSN – MicroSoft Network
MSRAP – Microsoft Remote Administration Protocol
MSRPC – Microsoft Remote Procedure Call
MTS – Microsoft Transaction Server
MTU – Maximum Transmission Unit
MUDS – MultiUser Dungeons

N
NAS – Network Attached Storage
NASSCOM – National Association of Software and Service Companies
NCP – Network Control Protocol
NDIS – Network Driver Interface Specification
NDRO – Nondestructive Read Out
NetBEUI – NetBIOS Enhanced User Interface
NIC – National Informatics Centre, 
NIIT – National Institute of Information Technology
NNTP – Network News Transfer Protocol
NOW – Network Of Workstations
NSFNET – National Science Foundation Network
NT (Windows) – New Technology
NTFS – New Technology File System
NTP – Network Time Protocol

O
OCP – Oracle Certified Professional
OCR – Optical Character Readers
ODBC – Open Data Base Connectivity
OLE – Object Linking and Embedding
OMR – Optical Mark Reader
ONE – Open Network Architecture
OOA – Object Orient Analysis
OOAD – Object Oriented Analysis and Design
OOP – Object Oriented Programming
OOPS – Object Oriented Programming System
OPEN GL – Open Graphics Library
OS – Operating System
OSI – Open System Interconnection

P
PC – Personal Computer
PCI – Peripheral Component Interconnect
PCMCIA – Personal Computer Memory Card International Association
PDA – Personal Digital Assistant
PDF – Portable Document Format
PDL – Page Description Language
PDU – Protocol Data Unit
PHP – PHP Hypertext Processor
PIC – Programming Interrupt Control
PILOT – Programmed Inquiry Learning Or Teaching
PLA – Programmable Logic Array
PLC – Programmable Logic Controller
PNG – Portable Network Graphics
PNP – Plug And Play
POP – Post Office Protocol
POST – Power On Self Test
PPP – Peer to Peer Protocol
PPTP – Point To Point Tunneling Protocol
PROM – Programmable Read Only Memory
PS – Post Script
PSN – Processor Serial Number

Q 
QoS – Quality of Service

R
RADSL – RateAdaptive Digital Subscribes Line
RAID – Redundant Array of Independent Disks
RAM – Random Access Memory
RAMDAC – Random Access Memory Digital to Analog Converter
RAS – Remote Access Network
RD RAM – Rambus Dynamic Random Access Memory
R-DAT – Rotating Digital Audio Tape
RDBMS – Relational Data Base Management System
RDO – Remote Data Objects
RDP – Remote Desktop Protocol
RFC – Request for Comments
RGB – Red Green Blue
RICS – Reduced Instruction Set Computer
RIP – Raster Image Processor
RISC – Reduced Instruction Set Computer
ROM – Read Only Memory
RPC – Remote Procedure Call
RTC – Real Time Clock
RTF – Rich Text Format
RTOS – Real Time Operating System


S-DAT – Stationary Digital Audio Tape
SACK – Selective Acknowledgements
SAM – Security Access Manager
SAP – Service Access Point, Systems Applications Products
SCMP – Software Configuration Management Plan
SCSI – Small Computers Systems Interface
SD RAM – Synchronous Dynamic Random Access Memory
SDD – Software Design Description
SDK – Software Development Kit
SDL – Storage Definition Language
SDN – Integrated Service Digital Network
SDRAM – Static Dynamic Random Access Memory
SDSL – Symmetric Digital Subscribes Line
SG RAM – Synchronous Graphics Random Access Memory
SGML – Standard Generalized Markup Language
SIM – Subscriber Identification Module
SIMD – Single Instruction Multiple Data
SISD – Single Instruction Single Data
SIU – Serial Interface Unit
SMP – Symmetric Multi Process
SMS – Short Message Service
SMTP – Simple Mail Transfer Protocol
SNA – System Network Architecture
SNAP – Sub Network Access Protocol
SNMP – Simple Network Management Protocol
SNOBOL – String Oriented Symbolic Language
SOAP – Simple Object Access Protocol
SPX – Sequenced Packet Exchange
SQA – Statistical Quality Assurance
SQL – Structured Query Language
SRAM – Static Random Access Memory
SRS – Software Requirements Specification
STP – Shielded Twisted Pair
SVVP – Software Verification and Validation Plan
SW – Software

T
TAPI – Telephony Application Program Interface
TB – Tera Bytes
TCP – Transmission Control Protocol
TCP/IP – Transmission Control Protocol / Internet Protocol
TDI – Transport Data Interface
TDMA – Time Division Multiple Access
TPM – Transactions Processing Monitor
TSR – Terminate and Stay Residents

U
UDD – User Datagram Protocol
UDP – User Datagram Protocol
UI – User Interface
UML – Unified Modelling Language
UNC – Universal Naming Convention
UNIX – Uniplexed Information and Computer Systems
URL – Universal Resource Locator
USB – Universal Serial Bus
USRT– Universal Synchronous Receiver Transmitted
UTP – Unshielded Twisted Pair

V
VAN – Virtual Area Network
VAST– Very Small Aperture Terminal
VB – Visual Basic
VC++ – Visual C++
VCD – Video Compact Disc
VDL – View Definition Language
VGA – Video Graphics Array
VHS – Video Home System
VLIW – Very Long Instruction Words
VLSI – Very Large Scale Integrated Circuits
VPN – Virtual Private Network
VRAM – Video Random Access Memory
VRML – Virtual Reality Modelling Language
VS – Visual Studio
VSNL – Videsh Sanchar Nigam Limited
VVR – Software Validation and Validation Report
VXD – Virtual Device Driver

W
W3C – World Wide Web Consortium
WAIS – Wide Area Information Servers
WAN – Wide Area Network
WAP – Wireless Application Protocol
WBEM – Web Base Enterprise Management
WDM – Wave Division Multiplexing
WHQL – Windows Hardware Quality Lab
Windows ME – Windows Millennium Edition
Windows NT – Windows New Technology
Windows XP – Windows eXPerienced
WINS – Windows Internet Name Services
WMI – Windows Management Instrumentation
WML – Wireless Markup Language
WORM – Write Once Read Many
WSH – Windows Script Host
WWW – World Wide Web
WYSIWYG – What You See Is What You Get


XHTML – eXtensible Hyper Text Markup Language
XML – eXtensible Markup Language
XSL – eXtensible Style Sheet language

Y
Y2K – Year 2000

Z

ZIF – Zero Insertion Force

Sunday 26 October 2014

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. If you are working in English (US), Chinese or Japanese, Excel 2002 can speak data as you enter it, to help you verify accuracy. How do you activate the feature?
1) Point to Speech on the Tool menu, and then click Show Text To Speech Toolbar.
2) Click validation on the data menu.
3) Point to speech on the tools menu, and then click speech recognition.
4) All of the above
5) None of these

2. ...... are a type of inexpensive digital camera that remains tethered to a computer and are used for video conferencing, video chatting and live web broadcast.
1) Webcams
2) Webpicks
3) Browser cams
4) Browser pics
5) None

3. Which of the following statements is true?
1) To insert link in Ms Excel, Ctrl + K is used.
2) One can edit selected cell in Excel by pressing the F2 key.
3) Shift + space is used to select the entire row in Excel.
4) Ctrl + space is used to select the entire column in Excel.
5) All 1), 2), 3) and 4) are true

4. For multiple selection in any file system you have..
1) Radio button
2) Local area network
3) Notification area
4) Yes/ No box
5) None

5. A(n) ...... is a private corporate network used exclusively by company employees.
1) Internet
2) Local area network
3) Peer-to-peer
4) Intranet
5) None

6. Which of the following is the characteristic of a file server?
1) It manages file operations and is shared on a network.
2) It manages file operations and is limited to one PC.
3) It acts as fat client and is shared on a network.
4) It acts as fat client and is limited to one PC.
5) None of these

7. The && and operators.........
1) compare two numeric values
2) combine two numeric values
3) combine two Boolean values
4) All the above
5) None of these

8. Advantage of X.25 network is that...
1) frame delivery is more reliable
2) frames are delivered in order
3) flow control is provided
4) All the above
5) None of these

9. A ........ is a pre-designed document that already has co-ordinating fonts, a layout, and
a background.
1) guide
2) model
3) ruler
4) template
5) None of these

10. An output device that lets you see what the computer is doing is called....
1) a disk drive
2) monitor screen
3) shift key
4) printer
5) None of these

11. Computer's hard disk is....
1) an arithmetic and logical unit
2) computer software
3) operating system
4) computer hardware
5) None of these

12. To make a notebook act as a desktop model, the notebook can be connected to a ...... which
is connected to a monitor and other devices.
1) bay
2) docking station
3) port
4) network
5) None of these

13. Each cell in a Microsoft Office Excel document is referred to by its cell address, which
is the...
1) cell's column label
2) cell's column label and worksheet tab menu
3) cell's row
4) cell's row and column labels
5) None

14. The secret code that restricts entry to some programs is called.....
1) password
2) passport
3) entry-code
4) access-code
5) None of these

15. ...... is a field that uniquely identifies which person, thing or event the record describes
1) File
2) Data
3) Folder
4) Key
5) None

16. The .... directory is mandatory for every disk.
1) Root
2) Base
3) Sub
4) Case
5) None of these

17. You must install a ..... on a network if you want to share a Broadband Internet connection.
1) router
2) modem
3) node
4) cable
5) None of these

18. This can be another word of a program...
1) software
2) disk
3) floppy
4) hardware
5) None of these

19. First Technopark in India is in....
1) Bangalore
2) Kolkata
3) Thiruvananthapuram
4) Delhi
5) None

20. The simultaneous processing of two or more programs by a multiple processor is known as
1) Multiprogramming
2) Multitasking
3) Time sharing
4) Multiprocessing
5) None of these

ANSWERS:

1-1, 2-1, 3-5, 4-2, 5-4, 6-1, 7-3, 8-4, 9-4, 10-2
11-4, 12-2, 13-4, 14-1, 15-4, 16-1, 17-1, 18-1, 19-3, 20-4

Sunday 19 October 2014

COMPUTER AWARENESS PRACTICE MCQs FOR ALL BANK EXAMS

1. We cannot delete the ____ icon, but we can made it invisible.
a) Recycle
b) My Computer
c) Internet explorer
d) All the above
e) None of the above

2. What is the meaning of 'Hibernate' in Windows XP/ Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications
e) Restart the computers all the running applications

3. The RF communication can be broadly classified in how many types?
a) Three
b) Four
c) Two
d) Six
e) Ten

4. _____ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by invoking methods on their handles.
a) Windows NT
b) Windows XP
c) Windows VISTA
d) Windows 95/98
e) Windows 7

5. Which of the following is not available on the Ruler of MS Word screen?
a) Tab stop box
b) Left Indent
c) Right Indent
d) Center Indent
e) All of them are available on ruler

6. In OSI network architecture, the dialogue control and token management are responsibility of __
a) session layer
b) network layer
c) transport layer
d) data link layer
e) None of the above

7. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Average case
d) Null case
e) All of the above

8. A computer program that converts an entire program into machine language is called a/ an
a) Interpreter
b) Simulator
c) Compiler
d) Commander
e) Proposer

9. Which of the following formulas will Excel not be able to calculate?
a) =SUM(Sales)−A3
b) =SUM(A1:A5)*.5
c) =SUM(A1:A5)/(10−10)
d) =SUM(A1:A5)−10
e) = SUM(A1:A5)−A5

10. What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?
a) Customer relationship management systems cards
b) E-government identity cards
c) FEDI cards
d) Smart cards
e) Aadhar card

11. What is the shortcut key you can press to create a copyright symbol?
a) Alt+Ctrl+C
b) Alt + C
c) Ctrl + C
d) Ctrl + Shift + C
e) Ctrl + Shift + D

12. During software development which factor is most crucial?
a) People
b) Process
c) Product
d) Project
e) Purpose

13. How many OSI layers are covered in the X.25 standard?
a) Two
b) Three
c) Seven
d) Six
e) eight

14. The transmission signal coding method of TI carrier is called ___
a) Bipolar
b) NRZ
c) Manchester
d) Binary
e) Bit

15. The idea of MFC document architecture was created by:
a) Microsoft
b) Oracle
c) Xerox
d) IBM
e) Java

16. What is the name of the display feature that highlights are of the screen which requires operator
attention?
a) Pixel
b) Reverse video
c) Touch screen
d) Cursor
e) Image

17. What kind of architecture does mobile computing deploy?
a) Two layered
b) Three layered
c) Four layered
d) Five layered
e) Six layered

18. A word processor would most likely be used to do ___
a) Keep an account of money spent
b) Do a computer search in media center
c) Maintain an inventory
d) Type a biography
e) All the above

19. SDLC stands for?
a) Software Design Life Cycle
b) Software Development Life Cycle
c) System Design Life Cycle
d) System Development Life Cycle
e) None of these

20. When a subroutine is called, the address of the instruction following the CALL instructions
stored in/ on the ___
a) stack pointer
b) accumulator
c) program counter
d) stack
e) pointer

21. What component of .NET includes services used to support web services?
a) Platform
b) Framework
c) Visual Studio
d) System
e) Mather board

22. Which of the following is not one of the four primary focuses of e-government?
a) G2G
b) G2B
c) IG2B
d) IG2G
e) IG2I

23. ____is not a category of EPS.
a) E banking
b) Direct payments
c) Retailing payments
d) Cash on delivery
e) All of these

24. One of the distinguished features of super-computer over other category of computer is ____
a) parallel processing
b) highest accuracy level
c) more speed
d) more capacity
e) less speed

25. Which class is used to control the data being used by application?
a) Document class
b) View class
c) Frame class
d) Application class
e) Software class

26. What is the control unit's function in the CPU?
a) Transfers data to primary storage
b) Stores program instruction
c) Performs logic operations
d) Decodes program instruction
e) Performs logic storage

27. Which of the following is the most common method for online payment?
a) Card based system
b) Cheque based system
c) e cash system
d) All the above
e) None of the above

28. Which of the following is not a product matrix?
a) Size
b) Reliability
c) Productivity
d) Functionality
e) Quality

29. Which of the following transmission systems provide the highest data rate in individual device?
a) Computer bus
b) Telephone lines
c) Voice and mode
d) Lease lines
e) Only voice

30. The most common addressing techniques employed by a CPU is ___
a) Immediate
b) Direct
c) Indirect
d) Register
e) All of the above

31. The key F12 opens a:
a) Save As dialog box
b) Open dialog box
c) Save dialog box
d) Close dialog box
e) Edit dialog box

32. Which of the following signal is not standard RS-232-C signal?
a) VDR
b) RTS
c) CTS
d) DSR
e) DLR

33. The indirect change of the values of a variable in one module by another module is called ___
a) internal change
b) inter-module change
c) side effect
d) side-module update
e) internal effect

34. Operating system is also known as:
a) Database
b) System software
c) Hardware
d) Printer
e) Operating system

35. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
a) Leech
b) Squid
c) Slug
d) Glitch
e) Bug

36. What happens if you press Ctrl + Shift + F8?
a) It activates extended selection
b) It activates the rectangular selection
c) It selects the paragraph on which the insertion line is
d) All of the above
e) None of the above

37. Which of the following is the latest version of Excel?
a) Excel 2000
b) Excel 2002
c) Excel ME
d) Excel 7
e) Excel XP

38. Which of the following statement is correct?
a) Terminal section of a synchronous modem contains the scrambler
b) Receiver section of a synchronous modem contains the scrambler
c) Transmission section of a synchronous modem contains the scrambler
d) Control section of a synchronous modem contains the scrambler
e) None of the above

39. Human beings are referred to as Homo sapiens, which device is called Silico Sapiens?
a) Monitor
b) Hardware
c) Robot
d) Computer
e) Mouse

40. ____ share characteristics with both hardware and software.
a) Operating system
b) Software
c) Data
d) File
e) None


ANSWERS: 
1) a 2) d 3) a 4) a 5) d 6) a 7) d 8) c 9) a 10) d
11) a 12) a 13) b 14) a 15) c 16) b 17) b 18) d 19) b 20) d
21) b 22) c 23) d 24) c 25) a 26) d 27) a 28) c 29) a 30) e
31) a 32) a 33) c 34) b 35) d 36) b 37) e 38) c 39) d 40) a 

Monday 13 October 2014

Computer Knowledge Practice Questions for Bank Exams

1. What is an 'internet'?
1) Internal internet used to transfer information internally.
2) Internal internet used to transfer information to the outside company.
3) Internal network designed to serve the internal informational needs of a single organisation.
4) Internal network designed to transfer the information between two organisations.
5) None of the above

2. To send another station a message, the main thing a user has to know is
1) how the network works
2) the other station's address
3) whether the network is packet-switched or circuit - switched
4) whether this is a voice or data network
5) None of the above

3. The data base administrator's function in an organization is
1) to be responsible for the more technical aspects of managing the information contained in organizational databases.
2) to be responsible for the executive level aspects of decisions regarding the information management
3) to show the relationship among entity classes in a data warehouse
4) to define which data mining tools must be used to extract data
5) None of the above

4. A ...... is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these

5. Each of the following is a true statement except
1) online systems continually update the master file
2) in online processing, the user enters transactions into a device that is directly connected to the computer system
3) batch processing is still used today in older systems or in some systems with massive volumes of transactions
4) information in batch systems will always be up-to-date
5) None of the above

6. When you save a presentation, ............
1) all slides in a presentation are saved in the same file
2) two files are created; one for graphics and one for content
3) a file is created for each slide
4) a file is created for each animation or graphic
5) None of the above

7. In a client/ server model, a client program
1) asks for information
2) provides information and files
3) serves software files to other computers
4) distributes data files to other computers
5) None of the above

8. Every device on the internet has a unique ....... address (also called an ‘Internet address’) that identifies it in the same way that a street address identifies the location of a house.
1) DH
2) DA
3) IP
4) IA
5) None

9. In a customer data base a customer’s surname would be keyed into a...
1) row
2) text field
3) record
4) computed field
5) None of these

10. A set of interrelated components that collect, process, store and distribute information to support decision making and control in an organization best defines
1) communications technology
2) a network
3) an information system
4) hardware
5) None of the above

11. Control in design of an information system is used to
1) inspect the system and check that it is built as per specifications
2) ensure that the system processes data as it was designed to and that the results are reliable
3) ensure privacy of data processed by it
4) protect data from accidental or intentional loss
5) None of the above

12. Storing same data in many places is called
1) iteration
2) concurrency
3) redundancy
4) enumeration
5) None of these

13. Which of the following is the first step in the 'transaction processing cycle', which captures business data through various modes such as optical scanning or at an electronic commerce website?
1) Document and report generation
2) Database maintenance
3) Transaction processing
4) Data Entry
5) None of the above

14. What is part of a database that holds only one type of information?
1) Report
2) Field
3) Record
4) File
5) None

15. 'MPG' extension refers usually to what kind of file?
1) Word Perfect Document file
2) MS Office document
3) Animation/ movie file
4) Image file
5) None of these

16. If you want to secure a message, use a(n):
1) cryptology source
2) encryption key
3) encryption software package
4) cryptosystem
5) None of these

17. Which key do you press to check spelling?
1) F3
2) F5
3) F7
4) F9
5) None

18. Which area in an Excel window allows entering values and formulas?
1) Title Bar
2) Menu Bar
3) Formula Bar
4) Standard Tool Bar
5) None of these

19. Which of the following helps to reduce spelling error in the document?
1) Auto Format
2) Auto Correct
3) Smart Tags
4) Auto Text
5) None

20. Which of the following is valid IP address?
1) 984.12.787.76
2) 192.168.321.10
3) 1.888.234.3456
4) 192.168.56.115
5) None of these

ANSWERS:
1-1, 2-2, 3-1, 4-2, 5-4, 6-1, 7-4, 8-3, 9-3, 10-3
11-2, 12-3, 13-4, 14-2, 15-3, 16-4, 17-3, 18-3, 19-2, 20-4.

Wednesday 1 October 2014

COMPUTER AWARENESS PRACTICE QUESTIONS FOR ALL BANK EXAMS

1. India's largest wide area network is:
a) INDONET
b) NICNET
c) INET
d) SWIFT
e) Beam

2. A computer system consists of several devices like CPU, monitor, mouse etc. together they are called:
a) computer peripherals
b) computer components
c) computer bits
d) computer equipments
e) none of the above

3. Number of devices supported by LAN can be maximum of:
a) 7
b) 12
c) 100
d) 1000
e) 25

4. An information system that immediately responds to the physical systems is called:
a) Live system
b) On-line System
c) Off-line system
d) Real time system
e) none

5. Route adopted by large companies for payment of dividends to shareholders is called
a) ECS Debit
b) RTGS
c) ECS Credit
d) either (b) or (c)
e) either (a) or (c)

6. Which combination of keys needs to be pressed to make a percent sign?
a) Shift+2
b) Shift+3
c) Shift+4
d) Shift+5
e) Shift+9

7. Which function calculates the largest value in a set of numbers?
a) Average
b) Count
c) Minimum
d) Maximum
e) None of these

8. Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?
a) Daughter board
b) Motherboard
c) Father board
d) Breadboard
e) CPU

9. MB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tan don, operating system from Microsoft, the printer from Epson and the application
software from everywhere. Can you name the country which contributed the video display?
a) India
b) China
c) Germany
d) Taiwan
e) Japan

10. What is meant by a dedicated computer?
a) Which is used by one person only
b) Which is assigned one and only one task
c) Which uses one kind of software
d) Which is meant for application software
e) All the above

11. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
a) 1978
b) 1984
c) 1990
d) 1989
e) 1991

12. The information stored in storage devices can be accessed in ______
a) RAM access & ROM access
b) Memory access & Disk access
c) Random access & shift access
d) Sequential access & Direct access
e) All the above

13. Which of the following is the most commonly used encoding standard of Unicode?
a) UTF-6
b) UTF-7
c) UTF-5
d) UTF-9
e) UTF-8

14. UML is stands for
a) Universal Modelling Language
b) Unified Modelling Language
c) United Modelling Language
d) Unit Modelling Language
e) Uni Modelling Language

15. Which of the following translator program converts assembly language program to object program?
a) assembler
b) compiler
c) microprocessor
d) linker
e) sender

16. Which protocol is used to transfer web pages?
a) TCP/IP
b) SMTP
c) POP3
d) HTTP
e) HPTP

17. A self-sufficient computer that acts as both a server and a client is known as
a) Host
b) Client
c) Server
d) Terminal
e) Peer

18. The interactive transmission of data within a time sharing system may be best suited to
a) simplex lines
b) half-duplex lines
c) full duplex lines
d) bi flex-lines
e) tri flex lines

19. A system program that sets up an executable program in main memory ready for execution is
a) assembler
b) linker
c) compiler
d) Coding
e) loader

20. A table can be logically connected to another table by defining a
a) Super key
b) Candidate key
c) Primary key
d) Unique key
e) Common attribute.

21. Missing slot covers on a computer can cause?
a) Over heat
b) Power surges
c) EMI
d)Incomplete path for ESD
e) None of the above

22. From what location are the 1st computer instructions available on boot up?
a) ROM BIOS
b) CPU
c) boot.ini
d) CONFIG.SYS
e) .bat

23. Acollaborative network that uses Internet Technology to link business with their suppliers is ---
a) Internet
b) Intranet
c) Extranet
d) WAN
e) LAN

24. Open Systems Interconnection (OSI) Model consists of -
a) 5-layers
b) 6-layers
c) 7-layers
d) 8-layers
e) 9-layers

25. A communication processor that connects dissimilar networks by providing the translation from
one set of protocol to another is -
a) Bridge
b) Gateway
c) Router
d) Modem
e) CPU

26. A collection of raw facts is called -
a) Output
b) Information
c) Bits
d) Data
e) Files

27. A __ is an additional set of commands that the computer displays after you make a selection from the main menu.
a) dialog box
b) submenu
c) menu selection
d) all the above
e) None

28. What is the permanent memory built into your computer called?
a) RAM
b) Floppy
c) CPU
d) ROM
e) Hard disk

29. Storage that retains its data after the power is turned off is referred to as
a) volatile storage
b) non-volatile storage
c) sequential storage
d) direct storage
e) indirect storage

30. Which of the following is an example of connectivity?
a) internet
b) floppy disk
c) power card
d) data
e) file

31. ___ is the process of finding errors in software code.
a) Compiling
b) Testing
c) Running
d) Debugging
e) Marking

32. Which of the following is not as language for computer programming
a) Windows
b) PASCAL
c) BASIC
d) COBOL
e) .net

33. ____is the process of dividing the disk into tracks and sectors.
a) Tracking
b) Formatting
c) Crashing
d) Allotting
e) Storing

34. What is the shortcut key to "Undo" the last action in a document?
a) Ctrl + X
b) Ctrl + y
c) Ctrl + Z
d) Ctrl + U
e) Ctrl + V

35. The language that the computer can understand and execute is called
a) machine language
b) application software
c) system program
d) all of these
e) none of these

36. Which of the following is not hardware
a) magnetic tape
b) printer
c) VDU terminal
d) assembler
e) pointer

37. What are the basic types of memory that your computer uses
a) RAM
b) RW/RAM
c) ROM
d) both A and C
e) both A,B and C

38. The total set of interlinked hypertext documents worldwide is
a) HTTP
b) Browser
c) WWW
d) B2B
e) B2A

39. The ___ enables you to simultaneously keep multiple Web pages open in one browser window.
a) tab box
b) pop-up helper
c) tab row
d) address bar
e) none

40. Which ports connect special types of music instruments to sound cards?
a) BUS
b) CPU
c) USB
d) MIDI
e) RAM

41. You can ____ a search by providing more information the search engine can use to select a smaller, more useful set of results.
a) refine
b) expand
c) load
d) query
e) unload

42. The primary purpose of software is to turn data into
a) web sites
b) information
c) programs
d) objects
e) web engines

43. The metal or plastic case that holds all the physical parts of the computer is the:
a) Hard disk
b) CPU
c) Mainframe
d) Platform
e) System unit

44. The difference between people with access to computers and the Internet and those without this access is known as the:
a) Digital divide
b) Internet divides
c) Web divides
d) Broadband divide
e) None

45. DSL is an example of a(n) _____ connection.
a) Network
b) Wireless
c) Slow
d) Cable
e) Broadband

46. The Analytical Engine developed during First Generation of computers used ___ as a memory unit?
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) Rooms

47. Which type of DOS program can you run to see which serial ports are detected?
a) combing
b) MSD
c) command.com
d) SDET
e) serial.chk

ANSWERS:
1) b 2) a 3) b 4) d 5) c 6) d 7) d 8) b 9) d 10) b
11) e 12) d 13) e 14) b 15) b 16) d 17) e 18) c 19) e 20) c
21) a 22) a 23) c 24) c 25) b 26) d 27) a 28) d 29) b 30) a
31) b 32) a 33) b 34) c 35) a 36) d 37) d 38) a 39) c 40) b
41) a 42) b 43) e 44) a 45) e 46) d 47) b