1. Data or information used to run the computer is called?
a) Software
b) Hardware
c) Peripheral
d) CPU
e) None of the above
2. To memories the e- mail address one should use?
a) Browser
b) Search engine
c) Birthday list
d) Phone book
e) Add book
3. A Hardware device that converts data into meaningful information
a) Protector
b) Output device
c) Input device
d) Program
e) Processor
4. What from the following refers to the people, related to computing process?
a) Hardware
b) Human ware
c) Software
d) Firmware
e) Peripherals
5. Which of the following is not an example of storage device?
a) CD
b) Floppy
c) Hard disk
d) RAM
e) DVD
6. Today, the common form of RAM is built from?
a) Transistors
b) Vacuum tubes
c) Semiconductors IC's
d) Super conductor IC's
e) None
7. Benefit of DRAM is ___
a) It is cheaper than SRAM
b) It can store more than SRAM
c) It is faster than SRAM
d) Data in it can easily be erased than in SRAM
e) None
8. Following all are related to spread sheet except?
a) Work sheet
b) Sell
c) Formula
d) Virus detection
e) None of these
9. Which element is appropriate for the set of instructions, by which computer performs more than one task?
a) Hardware
b) Software
c) Human ware
d) Firmware
e) None of these
10. Which of the following is both output and input?
a) Printer
b) Speaker
c) Modem
d) monitor
e) Scanner
11. A Special software that is used to create a job queue is called_____
a) Drive
b) Spooler
c) Interpreter
d) Linkage editor
e) None
12. Which one of the items listed below is not one of the software engineering layers?
a) Process
b) Manufacturing
c) Method
d) Tools
e) None
13. What is the first stage in program development?
a) Specification and design
b) System Analysis
c) Testing
d) None of the above
e) All of these
14. By means of a data flow diagram the analyst can detect ____
a) Task duplication
b) Unnecessary delays
c) Task overlapping
d) All of the above
e) None of the above
15. Virtual memory is ___
a) Related to virtual reality
b) A form of ROM
c) A form of RAM
d) None of the above
e) All of these
16. What does RAM stands for?
a) Read Access Memory
b) Read Anywhere Memory
c) Random Anything Memory
d) Random Access Module
e) Random Access Memory
17. For transferring file and exchanging messages, which utility is used?
a) Web browser
b) WWW
c) e - mail
d) Hyper text
e) Search engine
18. The three main parts of a processor are..?
a) ALU, control unit and register
b) ALU, control unit and RAM
c) Case, control unit and register
d) Control unit, Register and RAM
e) RAM, ROM and CD- ROM
19. Which of the following is the second largest unit of RAM?
a) Terabyte
b) Megabyte
c) Byte
d) Giga byte
e) None of these
20. What is present in motherboard that connects CPU with other parts on motherboard?
a) Input unit
b) System bus
c) ALU
d) Primary memory
e) None of these
21. ___ servers stores and manage files for network users
a) Authentication
b) Main
c) Web
d) File
e) None of these
22. The OSI model is divided into ____ process called layers
a) five
b) six
c) seven
d) eight
e) None of these
23. System software is a set of programs that enables your computer's hardware devices and ____ software to work together.
a) management
b) Processing
c) utility
d) application
e) None of these
24. In a ring topology, the computer in possession of the ____can transmit data
a) packet
b) data
c) access method
d) token
e) None of these
25. ____ viruses are often transmitted by a floppy disk left in the floppy drive
a) Trojan horse
b) Boot sector
c) Script
d) logic bomb
e) None of the above
26. ____ controls the way in which a computer system functions and provides name by which users can interact with the computer
a) The platform
b) Application software
c) operating software
d) The Mother board
e) None
27. Servers are components that provide resources to other computers connected to a..
a) mainframe
b) network
c) super computer
d) client
e) None of these
Answers:
1) a; 2) e; 3) e; 4) b; 5) d; 6) c; 7) a; 8) d; 9) b; 10) d;
11) b; 12) b; 13) d; 14) d; 15) c; 16) e; 17) c; 18) a; 19) d; 20) b;
21) d; 22) c; 23) d; 24) d; 25) b; 26) c; 27) b.
Computer Knowledge is highly scoring section in IBPS POs and RRB (Regional Rural Banks) Examinations. All the questions will be from well known concepts such as Computer Terminology, Basic Computer Architecture, Internet, MS-Office, E-Commerce, Computer Network etc. The questions may be theoretical and also require knowledge of facts and application.
Thursday, 25 July 2013
Sunday, 21 July 2013
COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR BANK EXAMS
1. Which of the following is NOT a characteristic of E-mail?
1) Low cost
2) Record maintenance in database
3) High speed
4) Waste Reduction (writing paper)
5) None
2. What are dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information
3) A computer reserved for special task
4) Both (1) & (2)
5) None of these
3. What are non dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information only
3) A computer reserved for special task
4) Both (2) & (3)
5) None of these
4. G3 is a
1) Computer
2) Cable
3) Chip
4) Mother board
5) None of these
5. One of the oldest calculating device was?
1) Arithmometer
2) Ready reckoner
3) Abacus
4) Both (1) & (2)
5) None of these
6. The first-generation computers had?
1) Vacuum tubes and magnetic drum
2) Magnetic tape and transistors
3) Ics
4) Either (1) or (3)
5) All of these
7. Which of the following is false about change in computer from one generation to the next?
1) Computer size is decreased
2) Speed of processing increases
3) Memory / storage capacities decreases
4) Both (1) & (3) 5) None of these
8. Which of the following is NOT false about GUIs?
1) They make computers easier to use for laymen
2) Icons and menus can be selected with a mouse
3) were first introduced by MACs
4) All of these are true
5) None of these
9. To make a program safe we should take care of:
1) Strong authentication and access controls
2) Error checking controls
3) Do risk analysis
4) Either (1) or (2)
5) All of these
10. Which of them is a must for understanding the organisation's business risks associated with using router
1) Network Architecture
2) Network traffic management
3) Network security
4) Either (2) or (3)
5) All of these
11. We are shifting towards computerization because
1) Current technologies are available
2) Technologies help in meeting the business objectives
3) Hire the employees that are expert in the latest technologies are available
4) Both (1) & (2)
5) None of these
12. Who is responsible for developing the intranet strategy and monitoring its policies?
1) Intranet administrator 2) Webmaster
3) Editor 4) Both (2) & (3)
5) None of these
13. Network layers function is to
1) Select paths for data transfer
2) Break the Network in to subnet
3) Determine the IP
4) Either (2) or (3)
5) All of these
14. Which of the following makes a network insecure?
1) Encryption
2) Network Interface Card (NIC)
3) Static keys
4) Both (2) & (3)
5) None of these
15. If the network of the company is to be protected from remote access that may damage company's reputation due to misuse of information then security policy would/ should include
1) All employees
2) Only the employer
3) Contractors
4) Either (1) or (2)
5) All of these
16. Project management will be made a separate division on the basis of:
1) Interdependencies among departments
2) Sharing of resources
3) Size of the project
4) Either (2) or (3)
5) All of these
17. Various kinds of e-mail threats-mails containing racist, sexual content are example of .....
1) Spam
2) International leakage
3) International tampering
4) Offensive contents
5) None of these
18. Artificial Intelligence can be used in everysphere of life because of its....
1) Ability to work in hazardous places
2) Ability to think like human beings
3) Ability to work in artificial environments
4) All of the above
5) None of these
19. The Steering Committee is made for
1) Reviewing user requirements and ensuring that all controls are considered.
2) Strategic planning for computer installation
3) Evaluating specific project plans for systems
4) Both (1) and (2)
5) None of these
20. In an IT division specific measures were introduced to improve on quality. However effectiveness of these measures can't be ascertained by simply
1) Increased user satisfaction
2) An increase in the quality assurance budget
3) A reduction in the maintenance cost ofthe application
4) Either (1) or (2)
5) All of these
21. Efficient system requirement analysis is required for:
1) Reverse engineering
2) Joint Application Design (JAD)
3) Traditional System development life cycle
4) Either (1) or (3)
5) All of these
22. Which of the following statements is NOT correct for structured programming concepts and modularity?
1) Interaction between modules should be minimal
2) Modules should have only one entry and one exit point
3) Modularity means program segmentation
4) Both (1) and (2)
5) None of these
23. Software quality assurance is for
1) Error prevention
2) Error detection
3) Error correction 4) Either (1) or (3)
5) All of these
24. Which of the following methods is NOT required for telecommunication continuity?
1) Alternative routing
2) Diverse routing
3) Satellite routing
4) All of these
5) None of these
25. The client is called .... in 2 tier architecture.
1) Fat client
2) Thin client
3) Very thin client
4) Either (1) or (2)
5) Cannot say
ANSWERS:
1-2, 2-3, 3-1, 4-3, 5-3, 6-1, 7-3, 8-4, 9-5, 10-4
11-4, 12-2, 13-4, 14-1, 15-1, 16-5, 17-1, 18-4, 19-4, 20-3
21-5, 22-4, 23-5, 24-2, 25-1
1) Low cost
2) Record maintenance in database
3) High speed
4) Waste Reduction (writing paper)
5) None
2. What are dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information
3) A computer reserved for special task
4) Both (1) & (2)
5) None of these
3. What are non dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information only
3) A computer reserved for special task
4) Both (2) & (3)
5) None of these
4. G3 is a
1) Computer
2) Cable
3) Chip
4) Mother board
5) None of these
5. One of the oldest calculating device was?
1) Arithmometer
2) Ready reckoner
3) Abacus
4) Both (1) & (2)
5) None of these
6. The first-generation computers had?
1) Vacuum tubes and magnetic drum
2) Magnetic tape and transistors
3) Ics
4) Either (1) or (3)
5) All of these
7. Which of the following is false about change in computer from one generation to the next?
1) Computer size is decreased
2) Speed of processing increases
3) Memory / storage capacities decreases
4) Both (1) & (3) 5) None of these
8. Which of the following is NOT false about GUIs?
1) They make computers easier to use for laymen
2) Icons and menus can be selected with a mouse
3) were first introduced by MACs
4) All of these are true
5) None of these
9. To make a program safe we should take care of:
1) Strong authentication and access controls
2) Error checking controls
3) Do risk analysis
4) Either (1) or (2)
5) All of these
10. Which of them is a must for understanding the organisation's business risks associated with using router
1) Network Architecture
2) Network traffic management
3) Network security
4) Either (2) or (3)
5) All of these
11. We are shifting towards computerization because
1) Current technologies are available
2) Technologies help in meeting the business objectives
3) Hire the employees that are expert in the latest technologies are available
4) Both (1) & (2)
5) None of these
12. Who is responsible for developing the intranet strategy and monitoring its policies?
1) Intranet administrator 2) Webmaster
3) Editor 4) Both (2) & (3)
5) None of these
13. Network layers function is to
1) Select paths for data transfer
2) Break the Network in to subnet
3) Determine the IP
4) Either (2) or (3)
5) All of these
14. Which of the following makes a network insecure?
1) Encryption
2) Network Interface Card (NIC)
3) Static keys
4) Both (2) & (3)
5) None of these
15. If the network of the company is to be protected from remote access that may damage company's reputation due to misuse of information then security policy would/ should include
1) All employees
2) Only the employer
3) Contractors
4) Either (1) or (2)
5) All of these
16. Project management will be made a separate division on the basis of:
1) Interdependencies among departments
2) Sharing of resources
3) Size of the project
4) Either (2) or (3)
5) All of these
17. Various kinds of e-mail threats-mails containing racist, sexual content are example of .....
1) Spam
2) International leakage
3) International tampering
4) Offensive contents
5) None of these
18. Artificial Intelligence can be used in everysphere of life because of its....
1) Ability to work in hazardous places
2) Ability to think like human beings
3) Ability to work in artificial environments
4) All of the above
5) None of these
19. The Steering Committee is made for
1) Reviewing user requirements and ensuring that all controls are considered.
2) Strategic planning for computer installation
3) Evaluating specific project plans for systems
4) Both (1) and (2)
5) None of these
20. In an IT division specific measures were introduced to improve on quality. However effectiveness of these measures can't be ascertained by simply
1) Increased user satisfaction
2) An increase in the quality assurance budget
3) A reduction in the maintenance cost ofthe application
4) Either (1) or (2)
5) All of these
21. Efficient system requirement analysis is required for:
1) Reverse engineering
2) Joint Application Design (JAD)
3) Traditional System development life cycle
4) Either (1) or (3)
5) All of these
22. Which of the following statements is NOT correct for structured programming concepts and modularity?
1) Interaction between modules should be minimal
2) Modules should have only one entry and one exit point
3) Modularity means program segmentation
4) Both (1) and (2)
5) None of these
23. Software quality assurance is for
1) Error prevention
2) Error detection
3) Error correction 4) Either (1) or (3)
5) All of these
24. Which of the following methods is NOT required for telecommunication continuity?
1) Alternative routing
2) Diverse routing
3) Satellite routing
4) All of these
5) None of these
25. The client is called .... in 2 tier architecture.
1) Fat client
2) Thin client
3) Very thin client
4) Either (1) or (2)
5) Cannot say
ANSWERS:
1-2, 2-3, 3-1, 4-3, 5-3, 6-1, 7-3, 8-4, 9-5, 10-4
11-4, 12-2, 13-4, 14-1, 15-1, 16-5, 17-1, 18-4, 19-4, 20-3
21-5, 22-4, 23-5, 24-2, 25-1
Saturday, 20 July 2013
COMPUTER KNOWLEDGE PRACTICE MCQs
1. Computer network is a?
a) A distributed data processing system
b) Multiple computers are linked together for the purpose of data communication and reso-urce sharing
c) Both (A) & (B) are false
d) Both (A) & (B) are true
e) None of these
2. Which of the following will be used for checking spelling?
a) Dictionary Disk
b) Index disk
c) Directory Disk
d) None of these
e) All the above
3. Internet Banking is an example of?
a) Electronic funds transfer (EFT)
b) EDP (electronic data processing)
c) EBCDIC
d) ASCII
e) None of these
4. Anonymous FTP is?
a) Internet file transfer protocol
b) Protocol that requires password
c) Not access to the files
d) None
e) All of the above
5. Archive is a?
a) Backup storage
b) Forward operation
c) Primary storage
d) None
e) All the above
6. CPU performs read/write opera-tions at any point of time in?
a) ROM b) PROM
c) EPROM d) RAM
e) None of these
7. BIOS is an abbreviation for?
a) Binary Input/Binary Output
b) Binary synchronous
c) Binary digit
d) None of these
e) All the above
8. Most common channel used by networks today is?
a) Internet
b) Telephone lines
c) Satellite
d) Mail
e) None of these
9. What is the product of data processing?
a) Data
b) Information
c) Software
d) A computer
e) None of these
10. A source program is the program written in which language?
a) English
b) Symbolic
c) High - level
d) Machine
e) None of these
11. To be information, data must be?
a) factual
b) relevant
c) news
d) All the above
e) None of these
12. Thick - film ICs use ____ technique?
a) Screen printing
b) Cathode sputtering
c) Monolithic
d) Hybrid
e) None
13. A collection of Eight bits is called?
a) byte
b) word
c) record
d) file
e) None of these
14. What is a microprocessor?
a) Same as a micro computer
b) A small piece of equipment
c) A small device that controls other equipment
d) A way of doing something fast
e) None of these
15. The microelectronics is the technology of?
a) microprocessor
b) microcomputers
c) Chips
d) automatic processing
e) None of these
16. The processor of a computer system is called it's?
a) Nerve centre
b) Eye
c) Brain
d) Ear
e) None of these
17. What are the two major types of computer chips?
a) External memory
b) Primary memory chip
c) Microprocessor chip
d) Both (B) and (C)
e) None of these
18. Who built the first computer mouse?
a) Doughlas Engelbart
b) William English
c) Daniel Cougher
d) Robert Zawacki
e) None
19. What is a Kimball tag?
a) An address label
b) A gift token
c) A security key
d) An input medium
e) None
20. Dot - matrix is a type of?
a) tape
b) printer
c) Disk
d) Bus
e) None of these
21. What are the concentric circles on floppy disks know as?
a) Tracks
b) Cylinders
c) Sectors
d) Segments
e) None of these
22. What does the disk drive of a computers do?
a) Rotate the disk
b) Read the disk
c) Load a program from the disk into the memory
d) Both (B) and (C)
e) None of these
23. A ___ is a computer connected to two networks?
a) link
b) server
c) gateway
d) bridge way
e) None of these
Answers:
1) d; 2) a; 3) a; 4) a; 5) a; 6) c; 7) a; 8) b; 9) b; 10) c;
11) b; 12) a; 13) a; 14) c; 15) c; 16) c; 17) d; 18) b; 19) d; 20) b; 21) a; 22) d; 23) b;
a) A distributed data processing system
b) Multiple computers are linked together for the purpose of data communication and reso-urce sharing
c) Both (A) & (B) are false
d) Both (A) & (B) are true
e) None of these
2. Which of the following will be used for checking spelling?
a) Dictionary Disk
b) Index disk
c) Directory Disk
d) None of these
e) All the above
3. Internet Banking is an example of?
a) Electronic funds transfer (EFT)
b) EDP (electronic data processing)
c) EBCDIC
d) ASCII
e) None of these
4. Anonymous FTP is?
a) Internet file transfer protocol
b) Protocol that requires password
c) Not access to the files
d) None
e) All of the above
5. Archive is a?
a) Backup storage
b) Forward operation
c) Primary storage
d) None
e) All the above
6. CPU performs read/write opera-tions at any point of time in?
a) ROM b) PROM
c) EPROM d) RAM
e) None of these
7. BIOS is an abbreviation for?
a) Binary Input/Binary Output
b) Binary synchronous
c) Binary digit
d) None of these
e) All the above
8. Most common channel used by networks today is?
a) Internet
b) Telephone lines
c) Satellite
d) Mail
e) None of these
9. What is the product of data processing?
a) Data
b) Information
c) Software
d) A computer
e) None of these
10. A source program is the program written in which language?
a) English
b) Symbolic
c) High - level
d) Machine
e) None of these
11. To be information, data must be?
a) factual
b) relevant
c) news
d) All the above
e) None of these
12. Thick - film ICs use ____ technique?
a) Screen printing
b) Cathode sputtering
c) Monolithic
d) Hybrid
e) None
13. A collection of Eight bits is called?
a) byte
b) word
c) record
d) file
e) None of these
14. What is a microprocessor?
a) Same as a micro computer
b) A small piece of equipment
c) A small device that controls other equipment
d) A way of doing something fast
e) None of these
15. The microelectronics is the technology of?
a) microprocessor
b) microcomputers
c) Chips
d) automatic processing
e) None of these
16. The processor of a computer system is called it's?
a) Nerve centre
b) Eye
c) Brain
d) Ear
e) None of these
17. What are the two major types of computer chips?
a) External memory
b) Primary memory chip
c) Microprocessor chip
d) Both (B) and (C)
e) None of these
18. Who built the first computer mouse?
a) Doughlas Engelbart
b) William English
c) Daniel Cougher
d) Robert Zawacki
e) None
19. What is a Kimball tag?
a) An address label
b) A gift token
c) A security key
d) An input medium
e) None
20. Dot - matrix is a type of?
a) tape
b) printer
c) Disk
d) Bus
e) None of these
21. What are the concentric circles on floppy disks know as?
a) Tracks
b) Cylinders
c) Sectors
d) Segments
e) None of these
22. What does the disk drive of a computers do?
a) Rotate the disk
b) Read the disk
c) Load a program from the disk into the memory
d) Both (B) and (C)
e) None of these
23. A ___ is a computer connected to two networks?
a) link
b) server
c) gateway
d) bridge way
e) None of these
Answers:
1) d; 2) a; 3) a; 4) a; 5) a; 6) c; 7) a; 8) b; 9) b; 10) c;
11) b; 12) a; 13) a; 14) c; 15) c; 16) c; 17) d; 18) b; 19) d; 20) b; 21) a; 22) d; 23) b;
Thursday, 18 July 2013
COMPUTER AWARENESS PRACTICE QUESTIONS
1. The part of a computer that coordinates all its functions is called ________
a) ROM program
b) System Board
c) Arithmetic logic unit
d) Control unit
e) None
2. A computer cannot boot if it does not have the _____
a) Compiler
b) Loader
c) Operating System
d) Assembler
e) None
3. Any data or instructions entered into the memory of a computer are considered ____
a) Storage
b) Output
c) Input
d) Information
e) None of these
4. A right click on the desktop itself will?
a) Open the display properties dialogue box
b) Show a context - sensitive menu
c) Open the control panel
d) Minimize all open applications
e) None of these
5. The process of starting or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called?
a) Duping
b) Booting
c) Padding
d) CPS
e) None of these
6. ___ is known as unauthorized access into others system?
a) Hacking
b) Encryption
c) Decryption
d) trafficking
e) None of these
7. When creating a computer program, the ___ designs the structure of the program
a) End user
b) System analyst
c) Programmer
d) All of the above
e) None
8. Which commands divides the surface of the blank disk into sector and assign a unique address to each one
a) Ver
b) Format
c) Fat
d) Chkdsk
e) None of these
9. When you turn on the computer, the boot routine will perform this test:
a) RAM test
b) Disk drive test
c) Memory test
d) Power on self test
e) None
10. Which of the following perip-heral devices displays information to a user ?
a) Monitor
b) Keyboard c) Secondary Storage Devices
d) Secondary Storage Media
e) None of these
11. Band width refers to:
a) The cost of the cable required to implement a WAN
b) The cost of the cable required to implement a LAN
c) The amount of information a peer-to-peer network can store
d) The amount of information a communication medium can transfer in a given amount of time
e) None of these
12. If the computer keeps rebooting itself, it is likely that:
a) It is effected with virus
b) It does not have enough memory
c) There is no printer
d) There has been a sudden power rise
e) It needs a CD-ROM
13. Devices that enter information and let you communicate with the computer are called:
a) Software
b) Output Devices
c) Hardware
d) Input Devices
e) Input / Output Devices
14. An integrated circuit is ____
a) A complicated circuit
b) An integrating device
c) Much costlier than a single transistor
d) Fabricated on a tiny silicon chip
e) None of the above
15. The computer connected to a LAN (Local Area Network) can
a) Run faster
b) Go online
c) Share information and/or share peripheral equipment
d) E - Mail
e) None of these
16. Which device can not be shared in network?
a) Floppy
b) Key board
c) Computer
d) Printer
e) Hard Disk
17. A printer is a type of device used for ____
a) Input b) Word processing
c) Processing
d) Output
e) None of these
18. The basic goal of computer process is to convert data into ____
a) Files b) Tables
c) Information
d) Graphs
e) None of these
19. The name that user gives to a document is referred to as ____
a) Document name
b) File name
c) Name given
d) Document identity
e) None
20. The person who writes and tests computer program is called a ___
a) Programmer
b) Computer scientist
c) Software engineer
d) Project developer
e) None
21. DNS is the abbreviation of:
a) Domain Name Service
b) Domain Name System
c) Direct Network Service
d) Direct Network System
e) None of these
22. Which of the following is not true as regards primary storage?
a) It is a part of the CPU
b) It allows very fast access to data
c) It is relatively more expensive
d) Information must be transf-erred to primary storage
e ) None of these
23. Which of the following is the most powerful type of computer?
a) Super micro
b) Super conductor
c) Micro computer
d) Super computer
e) Mega frame
24. Which of the following isn't a type of computer facility?
a) Decentralized
b) Centralized
c) De - distributed
d) Distributed
e) None
Answers
1) d; 2) c; 3) c; 4) a; 5) b; 6) a; 7) b; 8) b; 9) b; 10) a;
11) d; 12) a; 13) d; 14) d; 15) c; 16) b; 17) d; 18) c; 19) b; 20) a;
21) b; 22) e; 23) d; 24) c.
a) ROM program
b) System Board
c) Arithmetic logic unit
d) Control unit
e) None
2. A computer cannot boot if it does not have the _____
a) Compiler
b) Loader
c) Operating System
d) Assembler
e) None
3. Any data or instructions entered into the memory of a computer are considered ____
a) Storage
b) Output
c) Input
d) Information
e) None of these
4. A right click on the desktop itself will?
a) Open the display properties dialogue box
b) Show a context - sensitive menu
c) Open the control panel
d) Minimize all open applications
e) None of these
5. The process of starting or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called?
a) Duping
b) Booting
c) Padding
d) CPS
e) None of these
6. ___ is known as unauthorized access into others system?
a) Hacking
b) Encryption
c) Decryption
d) trafficking
e) None of these
7. When creating a computer program, the ___ designs the structure of the program
a) End user
b) System analyst
c) Programmer
d) All of the above
e) None
8. Which commands divides the surface of the blank disk into sector and assign a unique address to each one
a) Ver
b) Format
c) Fat
d) Chkdsk
e) None of these
9. When you turn on the computer, the boot routine will perform this test:
a) RAM test
b) Disk drive test
c) Memory test
d) Power on self test
e) None
10. Which of the following perip-heral devices displays information to a user ?
a) Monitor
b) Keyboard c) Secondary Storage Devices
d) Secondary Storage Media
e) None of these
11. Band width refers to:
a) The cost of the cable required to implement a WAN
b) The cost of the cable required to implement a LAN
c) The amount of information a peer-to-peer network can store
d) The amount of information a communication medium can transfer in a given amount of time
e) None of these
12. If the computer keeps rebooting itself, it is likely that:
a) It is effected with virus
b) It does not have enough memory
c) There is no printer
d) There has been a sudden power rise
e) It needs a CD-ROM
13. Devices that enter information and let you communicate with the computer are called:
a) Software
b) Output Devices
c) Hardware
d) Input Devices
e) Input / Output Devices
14. An integrated circuit is ____
a) A complicated circuit
b) An integrating device
c) Much costlier than a single transistor
d) Fabricated on a tiny silicon chip
e) None of the above
15. The computer connected to a LAN (Local Area Network) can
a) Run faster
b) Go online
c) Share information and/or share peripheral equipment
d) E - Mail
e) None of these
16. Which device can not be shared in network?
a) Floppy
b) Key board
c) Computer
d) Printer
e) Hard Disk
17. A printer is a type of device used for ____
a) Input b) Word processing
c) Processing
d) Output
e) None of these
18. The basic goal of computer process is to convert data into ____
a) Files b) Tables
c) Information
d) Graphs
e) None of these
19. The name that user gives to a document is referred to as ____
a) Document name
b) File name
c) Name given
d) Document identity
e) None
20. The person who writes and tests computer program is called a ___
a) Programmer
b) Computer scientist
c) Software engineer
d) Project developer
e) None
21. DNS is the abbreviation of:
a) Domain Name Service
b) Domain Name System
c) Direct Network Service
d) Direct Network System
e) None of these
22. Which of the following is not true as regards primary storage?
a) It is a part of the CPU
b) It allows very fast access to data
c) It is relatively more expensive
d) Information must be transf-erred to primary storage
e ) None of these
23. Which of the following is the most powerful type of computer?
a) Super micro
b) Super conductor
c) Micro computer
d) Super computer
e) Mega frame
24. Which of the following isn't a type of computer facility?
a) Decentralized
b) Centralized
c) De - distributed
d) Distributed
e) None
Answers
1) d; 2) c; 3) c; 4) a; 5) b; 6) a; 7) b; 8) b; 9) b; 10) a;
11) d; 12) a; 13) d; 14) d; 15) c; 16) b; 17) d; 18) c; 19) b; 20) a;
21) b; 22) e; 23) d; 24) c.
Friday, 5 July 2013
COMPUTER AWARENESS PRACTICE MCQs
1. The ______ of a system includes the program or instructions.
1) Hardware
1) Hardware
2) Icon
3) Information
3) Information
4) Software
5) None of these
2. In order to save a word document as a web page you need to?
1) Put the appropriate graphic and links on the document
2) Save the document in the simple text format
3) Use your web browser as an editor and save as URL
4) Save as HTML
5) None of these
3. Something which is easily understood instructions is said to be?
1) User friendly
2) Information
3) Word processing
5) None of these
2. In order to save a word document as a web page you need to?
1) Put the appropriate graphic and links on the document
2) Save the document in the simple text format
3) Use your web browser as an editor and save as URL
4) Save as HTML
5) None of these
3. Something which is easily understood instructions is said to be?
1) User friendly
2) Information
3) Word processing
4) Icon
5) None of these
4. The copy command saves the data to which of the following?
1) The desktop
2) The clipboard
3) Microsoft word
5) None of these
4. The copy command saves the data to which of the following?
1) The desktop
2) The clipboard
3) Microsoft word
4) Paste
5) None of these
5. Arranging the data in a sequence is known as?
1) Classifying
5) None of these
5. Arranging the data in a sequence is known as?
1) Classifying
2) Searching
3) Sorting
4) Reproducing
5) None of these
6. Find the Mis-Matched pair ?
1) Chrome - Google
2) Opera - Opera Software
3) Internet Explorer - Microsoft
4) Safari - Net Scape Commu-nications
5) None of these
7. In order to save an existing document with a different name you need to?
1) Retype the document and give it a different name
2) Use the Save as command
3) Copy it to a new folder and then save
4) Use Windows Explorer to save
5) None of these
8. Which of the following is a graphics package?
1) Adobe page maker
2) Acrobat Reader
3) Microsoft word
4) Corel Draw
5) None of these
9. Plotter is very useful in applica-tions such as?
1) Computer aided design
2) Word processing
3) Financial accounting
4) Spell checking
6. Find the Mis-Matched pair ?
1) Chrome - Google
2) Opera - Opera Software
3) Internet Explorer - Microsoft
4) Safari - Net Scape Commu-nications
5) None of these
7. In order to save an existing document with a different name you need to?
1) Retype the document and give it a different name
2) Use the Save as command
3) Copy it to a new folder and then save
4) Use Windows Explorer to save
5) None of these
8. Which of the following is a graphics package?
1) Adobe page maker
2) Acrobat Reader
3) Microsoft word
4) Corel Draw
5) None of these
9. Plotter is very useful in applica-tions such as?
1) Computer aided design
2) Word processing
3) Financial accounting
4) Spell checking
5) None
10. Data processing cycle consists of?
1) Input and output
2) Output and processing
3) Input, processing and output
4) Only input
10. Data processing cycle consists of?
1) Input and output
2) Output and processing
3) Input, processing and output
4) Only input
5) None
11. 'MICR' technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition
2) Magnetic Intelligence Chara-cter Recognition
3) Magnetic Information Cable Recognition
4) Magnetic Cable Recognition
5) None of these
12. All the information collected during database development is stored in a?
1) Repository
2) Data warehouse
11. 'MICR' technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition
2) Magnetic Intelligence Chara-cter Recognition
3) Magnetic Information Cable Recognition
4) Magnetic Cable Recognition
5) None of these
12. All the information collected during database development is stored in a?
1) Repository
2) Data warehouse
3) RAD
4) CASE
4) CASE
5) None of these
13. ___ is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit making it an efficient way to store data in memory.
1) DRAM
13. ___ is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit making it an efficient way to store data in memory.
1) DRAM
2) PRAM
3) NRAM
3) NRAM
4) NORAM
5) None of these
14. What is the symbol for attachments in yahoo mail :
1) Envelope
5) None of these
14. What is the symbol for attachments in yahoo mail :
1) Envelope
2) Letter A
3) Paper Clip
3) Paper Clip
4) Pen
5) None of these
15. To cover files from a backup you perform________ option
1) Scan
5) None of these
15. To cover files from a backup you perform________ option
1) Scan
2) Move
3) Copy
3) Copy
4) Restore
5) None of these
16. The internet began with the development of?
1) Ethernet
5) None of these
16. The internet began with the development of?
1) Ethernet
2) Internet
3) USENET
3) USENET
4) Extranet
5) ARPANET
17. Select the odd man out
1) Interpreter
5) ARPANET
17. Select the odd man out
1) Interpreter
2) Programmer
3) Operating system
4) Assembler
3) Operating system
4) Assembler
5) Utility
18. The number of pixels displayed on a screen is known as the screen?
1) Resolution
2) Color depth
3) Refresh rate
3) Refresh rate
4) Viewing size
5) None of these
19. Name the certifying authority of digital signatures in banking and financial sector?
1) The IDRBT Certifying Auth-ority
2) Individual Banks
3) Reserve Bank of India
4) Indian Bank's Association
5) None of these
20. Firewall in parlance of computer science is a method of?
1) Stopping unauthorized access
2) Making network more secure against banking attempts
3) Filtering the data that is going out of the network and coming in the network.
4) All the above
5) None of these
19. Name the certifying authority of digital signatures in banking and financial sector?
1) The IDRBT Certifying Auth-ority
2) Individual Banks
3) Reserve Bank of India
4) Indian Bank's Association
5) None of these
20. Firewall in parlance of computer science is a method of?
1) Stopping unauthorized access
2) Making network more secure against banking attempts
3) Filtering the data that is going out of the network and coming in the network.
4) All the above
5) None
21. Encryption is used in computers to?
1) Protect data from unauthor-ized access
2) Protect data from damaging
3) Prevent the computer from unauthorized users
4) All the above
5) None
Answers
1) 4; 2) 4; 3) 1; 4) 2; 5) 3; 6) 4; 7) 2; 8) 4; 9) 1; 10) 3;
11) 1; 12) 2; 13) 1; 14) 3; 15) 4; 16) 5; 17) 2; 18) 1; 19) 1; 20) 4; 21) 1.
21. Encryption is used in computers to?
1) Protect data from unauthor-ized access
2) Protect data from damaging
3) Prevent the computer from unauthorized users
4) All the above
5) None
Answers
1) 4; 2) 4; 3) 1; 4) 2; 5) 3; 6) 4; 7) 2; 8) 4; 9) 1; 10) 3;
11) 1; 12) 2; 13) 1; 14) 3; 15) 4; 16) 5; 17) 2; 18) 1; 19) 1; 20) 4; 21) 1.
Wednesday, 3 July 2013
COMPUTER KNOWLEDGE PRACTICE MCQs FOR RBI EXAM
1. Which computer has been designed to be as compact as possible?
1) Mini
2) Super computer
3) Micro computer
4) Mainframe
5) None of the above
2. The symbols used in an assembly language are
1) Codes
2) Mnemonics
3) Assembler
4) Literals
5) All of the above
3. Portrait and Landscape are
1) Page Orientation
2) Paper Size
3) Page Layout
4) Margin type
5) All of the above
4.Any storage device added to a computer beyond the immediately usable main storage is known as
1) Floppy disk
2) Hard disk
3) Backing store
4) Punched card
5) Magnetic Tape
5. Which output device is used for translating information from a computer into pictorial form on paper
1) Mouse
2) Plotter
3) Touch panel
4) Card punch
5) Keyboard
6.A computer assisted method for the recording and analyzing of existing or hypothetical systems is
1) Data transmission
2) Data flow
3) Data capture
4) Data processing
5) Data validation
7. Which access method is used for obtaining a record from a cassette tape?
1) Direct
2) Sequential
3) Random
4) ISAM
5) VSAM
8. Find the ODD one.
1) JAVA
2) Cobol
3) Fortran
4) Linux
5) ADA
9. The 2's compliment of a binary no. is obtained by adding.....to its 1's compliment.
1) 0
2) 1
3)10
4) 12
5) 13
10. With respect to a network interface card, the term 10/100 refers to
1) protocol speed
2) a fiber speed
3) megabits per seconds
4) minimum and maximum server speed
5) data capacity
11. The terms "red book", "yellow book", and "orange book" refer to:
1) SCSI
2) IDE
3) floppy drive technology
4) CD-ROM standards
5) SATA
12. In ROM BIOS, the acronym BIOS stands for:
1) Basic Intuitive Output Set
2) Basic Input Organizational System
3) Basic Input Output System
4) Basic Industry Operating System
5) Basic Input Output Set
13. Which DOS command will format a floppy disk and transfer the system files
1) SYS C: A:
2) SYS A:
3) FORMAT A: /S
4) FORMAT A: /T
5) SYS C:
14. Which command will be used to display file and directory names only, without size, date, and time information?
1) DIR/W
2) DIR A:
3) DIR/B
4) DIR/S
5) DIR
15. Which of the following is not a logical data-base structure?
1) tree
2) relational
3) network
4) chain
5) None of the above
16. Updating a database means
1) revising the file structure
2) reorganizing the database
3) modifying or adding record occurrences
4) Sorting
5) Indexing
17.Any and every command can be found on the
1) Drawing toolbar
2) Formatting toolbar
3) Standard toolbar
4) Menu bar
5) View toolbar
18. Which of the following should be used when you want to add a slide to an existing presentation?
1) File, add a new slide
2) Insert, new slide
3) File, open
4) File, new
5) None of the above
19. Which of the following items are examples of storage devices?
1) Floppy disks
2) CD-ROMs
3) Tape devices
4) Hard Disk
5) All of the above
20. The original ASCII code used .... bits of each byte, reserving that last bit for error checking
1) 5
2) 6
3) 7
4) 8
5) 16
21. Word length of a computer is measured in
1) Bytes
2) Millimeters
3) Meters
4) Bits
5) All the above
22. Which type of computers uses the 8-bit code called EBCDIC?
1) Minicomputers
2) Microcomputers
3) Mainframe computers
4) Super computer
5) Lap Tops
23. ATM terminals are example for
1) Smart Terminals
2) Intelligent terminals
3) Dumb terminals
4) Offline terminals
5) None of the above
24.A name or number used to identify a storage location is called
1) A byte
2) A record
3) An address
4) An instruction
5) All of above
25. The difference between memory and storage is that memory is .... and storage is .....
1) temporary, permanent
2) permanent, temporary
3) slow, fast
4) big, Small
5) None of the above
26. Offline device is
1) A device which is not connected to CPU
2) A device which is connected to CPU
3) A direct access storage device
4) An I/O device
5) None of the above
27. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?
1) Memory address register
2) Memory data register
3) Instruction register
4) Program counter
5) Flag Register
28. Which American Computer Company is called Big Blue?
1) Microsoft
2) Compaq Corp
3) IBM
4) Tandy Stevenson
5) DELL
29.A term associated with the comparison of processing speeds of different computer system is:
1) EFTS
2) MPG
3) MIPS
4) CFPS
5) Bps
30. Daisy wheel printer is a type of
1) Matrix printer
2) Impact printer
3) Laser printer
4) Manual printer
5) Non impact printer
31. Serial access memories are useful in applications where
1) Data consists of numbers
2) Short access time is required
3) Each stored word is processed differently
4) Data naturally needs to flow in and out in a serial form
5) Data naturally needs to flow in
and out in a Random form
32. One of the main feature that distinguish microprocessors from micro-computers is
1) Words are usually larger in microprocessors
2) Words are shorter in microprocessors
3) Microprocessor does not contain I/O devices
4) Exactly the same as the machine cycle time
5) None of the above
33. Example of non-numeric data is..
1) Employee Name
2) Test score
3) Bank Account No.
4) Phone No
5) All the above
34. Numbers in table columns are usually...
1) right-aligned
2) left-aligned
3) justified
4) centered
5) None of the above
35. Most Web sites have a main page known as ........, which acts as a doorway to the rest of the Website pages.
1) search engine
2) home page
3) browser
4) URL
5) Domain
36.A software program that extends the capabilities of your browser in a specific way is known as
1) Plugin
2) Browser software
3) Cookies
4) Applets
5) None of the above
37. Internet is example of
1) LAN
2) MAN
3) WAN
4) SAN
5) CAN
38. ......... refers to maintaining and assuring the accuracy and consistency of data
1) Data redundancy
2) Data inconsistency
3) Data integrity
4) Data independence
5) All the above
39. ........... is a data model for describing a database in an abstract way
1) Data Flow Diagram
2) Flow chart
3) ER-Diagram
4) System chart
5) Network chart
40. Mechanism to protect private network from outside attack is
1) Firewall
2) Antivirus
3) Digital Signature
4) Formatting
5) Tunneling
41. The concept of electronic cash is execute payment by
1) Credit card
2) ATM card
3) Using computers over Network
4) Cheque
5) Debit card
42.Amazon.com comes under the following model
1) B2B
2) B2C
3) C2C
4) C2B
5) None of the above
43. A device that forwards data packets from one network to another is called a
1) Bridge
2) Router
3) Gateway
4) Switch
5) Repeaters
44. Tool that is used to transfer data/ files among computers on the internet
1) FTP
2) TCP
3) Archie
4) Gopher
5) POP
45. ........... is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication
1) Spoofing
2) Hacking
3) Phishing
4) Whaling
5) None of the above
46.A huge collection of information arranged for quick retrieval by computer is known as a
1) Deep web
2) Search Engine
3) Data base
4) URL
5) All the above
47. When using Internet sources, asking whether the site is inwardfocused or outward - focused helps to determine
1) Expertise
2) Objectivity
3) Accuracy
4) Purpose
5) Functionality
48. Network Interface card address is known as
1) IP address
2) MAC address
3) FTP address
4) LAN address
5) System address
49. In keyboard modifier keys are
1) Alt, Shift, Ctrl
2) PgUP, Alt, Ctrl
3) Home, Alt, Ctrl
4) Del, End, Alt
5) Tab, End, Alt
50. ASCII value of ‘D’ is
1) 66
2) 68
3) 74
4) 65
5) 64
51. In SD memory cards SD stands for
1) Standard Digital
2) Secure Digital
3) Secondary
4) Standard Data
5) Secure Data
52. What is the short cut key to open the Open dialog box?
1) F12
2) Shift F12
3) Alt + F12
4) Ctrl + F12
5) F11
ANSWERS:
1-3, 2-2, 3-1, 4-3, 5-2, 6-2, 7-2, 8-4, 9-2, 10-3
11-4, 12-3, 13-3, 14-3, 15-4, 16-3, 17-4, 18-2, 19-5, 20-3
21-4, 22-3, 23-1, 24-3, 25-1, 26-1, 27-4, 28-3, 29-3, 30-2
31-4, 32-3, 33-1, 34-1, 35-2, 36-1, 37-3, 38-3, 39-3, 40-1
41-3, 42-2, 43-2, 44-1, 45-3, 46-3, 47-3, 48-2, 49-1 50-2, 51-2, 52-4.
1) Mini
2) Super computer
3) Micro computer
4) Mainframe
5) None of the above
2. The symbols used in an assembly language are
1) Codes
2) Mnemonics
3) Assembler
4) Literals
5) All of the above
3. Portrait and Landscape are
1) Page Orientation
2) Paper Size
3) Page Layout
4) Margin type
5) All of the above
4.Any storage device added to a computer beyond the immediately usable main storage is known as
1) Floppy disk
2) Hard disk
3) Backing store
4) Punched card
5) Magnetic Tape
5. Which output device is used for translating information from a computer into pictorial form on paper
1) Mouse
2) Plotter
3) Touch panel
4) Card punch
5) Keyboard
6.A computer assisted method for the recording and analyzing of existing or hypothetical systems is
1) Data transmission
2) Data flow
3) Data capture
4) Data processing
5) Data validation
7. Which access method is used for obtaining a record from a cassette tape?
1) Direct
2) Sequential
3) Random
4) ISAM
5) VSAM
8. Find the ODD one.
1) JAVA
2) Cobol
3) Fortran
4) Linux
5) ADA
9. The 2's compliment of a binary no. is obtained by adding.....to its 1's compliment.
1) 0
2) 1
3)10
4) 12
5) 13
10. With respect to a network interface card, the term 10/100 refers to
1) protocol speed
2) a fiber speed
3) megabits per seconds
4) minimum and maximum server speed
5) data capacity
11. The terms "red book", "yellow book", and "orange book" refer to:
1) SCSI
2) IDE
3) floppy drive technology
4) CD-ROM standards
5) SATA
12. In ROM BIOS, the acronym BIOS stands for:
1) Basic Intuitive Output Set
2) Basic Input Organizational System
3) Basic Input Output System
4) Basic Industry Operating System
5) Basic Input Output Set
13. Which DOS command will format a floppy disk and transfer the system files
1) SYS C: A:
2) SYS A:
3) FORMAT A: /S
4) FORMAT A: /T
5) SYS C:
14. Which command will be used to display file and directory names only, without size, date, and time information?
1) DIR/W
2) DIR A:
3) DIR/B
4) DIR/S
5) DIR
15. Which of the following is not a logical data-base structure?
1) tree
2) relational
3) network
4) chain
5) None of the above
16. Updating a database means
1) revising the file structure
2) reorganizing the database
3) modifying or adding record occurrences
4) Sorting
5) Indexing
17.Any and every command can be found on the
1) Drawing toolbar
2) Formatting toolbar
3) Standard toolbar
4) Menu bar
5) View toolbar
18. Which of the following should be used when you want to add a slide to an existing presentation?
1) File, add a new slide
2) Insert, new slide
3) File, open
4) File, new
5) None of the above
19. Which of the following items are examples of storage devices?
1) Floppy disks
2) CD-ROMs
3) Tape devices
4) Hard Disk
5) All of the above
20. The original ASCII code used .... bits of each byte, reserving that last bit for error checking
1) 5
2) 6
3) 7
4) 8
5) 16
21. Word length of a computer is measured in
1) Bytes
2) Millimeters
3) Meters
4) Bits
5) All the above
22. Which type of computers uses the 8-bit code called EBCDIC?
1) Minicomputers
2) Microcomputers
3) Mainframe computers
4) Super computer
5) Lap Tops
23. ATM terminals are example for
1) Smart Terminals
2) Intelligent terminals
3) Dumb terminals
4) Offline terminals
5) None of the above
24.A name or number used to identify a storage location is called
1) A byte
2) A record
3) An address
4) An instruction
5) All of above
25. The difference between memory and storage is that memory is .... and storage is .....
1) temporary, permanent
2) permanent, temporary
3) slow, fast
4) big, Small
5) None of the above
26. Offline device is
1) A device which is not connected to CPU
2) A device which is connected to CPU
3) A direct access storage device
4) An I/O device
5) None of the above
27. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?
1) Memory address register
2) Memory data register
3) Instruction register
4) Program counter
5) Flag Register
28. Which American Computer Company is called Big Blue?
1) Microsoft
2) Compaq Corp
3) IBM
4) Tandy Stevenson
5) DELL
29.A term associated with the comparison of processing speeds of different computer system is:
1) EFTS
2) MPG
3) MIPS
4) CFPS
5) Bps
30. Daisy wheel printer is a type of
1) Matrix printer
2) Impact printer
3) Laser printer
4) Manual printer
5) Non impact printer
31. Serial access memories are useful in applications where
1) Data consists of numbers
2) Short access time is required
3) Each stored word is processed differently
4) Data naturally needs to flow in and out in a serial form
5) Data naturally needs to flow in
and out in a Random form
32. One of the main feature that distinguish microprocessors from micro-computers is
1) Words are usually larger in microprocessors
2) Words are shorter in microprocessors
3) Microprocessor does not contain I/O devices
4) Exactly the same as the machine cycle time
5) None of the above
33. Example of non-numeric data is..
1) Employee Name
2) Test score
3) Bank Account No.
4) Phone No
5) All the above
34. Numbers in table columns are usually...
1) right-aligned
2) left-aligned
3) justified
4) centered
5) None of the above
35. Most Web sites have a main page known as ........, which acts as a doorway to the rest of the Website pages.
1) search engine
2) home page
3) browser
4) URL
5) Domain
36.A software program that extends the capabilities of your browser in a specific way is known as
1) Plugin
2) Browser software
3) Cookies
4) Applets
5) None of the above
37. Internet is example of
1) LAN
2) MAN
3) WAN
4) SAN
5) CAN
38. ......... refers to maintaining and assuring the accuracy and consistency of data
1) Data redundancy
2) Data inconsistency
3) Data integrity
4) Data independence
5) All the above
39. ........... is a data model for describing a database in an abstract way
1) Data Flow Diagram
2) Flow chart
3) ER-Diagram
4) System chart
5) Network chart
40. Mechanism to protect private network from outside attack is
1) Firewall
2) Antivirus
3) Digital Signature
4) Formatting
5) Tunneling
41. The concept of electronic cash is execute payment by
1) Credit card
2) ATM card
3) Using computers over Network
4) Cheque
5) Debit card
42.Amazon.com comes under the following model
1) B2B
2) B2C
3) C2C
4) C2B
5) None of the above
43. A device that forwards data packets from one network to another is called a
1) Bridge
2) Router
3) Gateway
4) Switch
5) Repeaters
44. Tool that is used to transfer data/ files among computers on the internet
1) FTP
2) TCP
3) Archie
4) Gopher
5) POP
45. ........... is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication
1) Spoofing
2) Hacking
3) Phishing
4) Whaling
5) None of the above
46.A huge collection of information arranged for quick retrieval by computer is known as a
1) Deep web
2) Search Engine
3) Data base
4) URL
5) All the above
47. When using Internet sources, asking whether the site is inwardfocused or outward - focused helps to determine
1) Expertise
2) Objectivity
3) Accuracy
4) Purpose
5) Functionality
48. Network Interface card address is known as
1) IP address
2) MAC address
3) FTP address
4) LAN address
5) System address
49. In keyboard modifier keys are
1) Alt, Shift, Ctrl
2) PgUP, Alt, Ctrl
3) Home, Alt, Ctrl
4) Del, End, Alt
5) Tab, End, Alt
50. ASCII value of ‘D’ is
1) 66
2) 68
3) 74
4) 65
5) 64
51. In SD memory cards SD stands for
1) Standard Digital
2) Secure Digital
3) Secondary
4) Standard Data
5) Secure Data
52. What is the short cut key to open the Open dialog box?
1) F12
2) Shift F12
3) Alt + F12
4) Ctrl + F12
5) F11
ANSWERS:
1-3, 2-2, 3-1, 4-3, 5-2, 6-2, 7-2, 8-4, 9-2, 10-3
11-4, 12-3, 13-3, 14-3, 15-4, 16-3, 17-4, 18-2, 19-5, 20-3
21-4, 22-3, 23-1, 24-3, 25-1, 26-1, 27-4, 28-3, 29-3, 30-2
31-4, 32-3, 33-1, 34-1, 35-2, 36-1, 37-3, 38-3, 39-3, 40-1
41-3, 42-2, 43-2, 44-1, 45-3, 46-3, 47-3, 48-2, 49-1 50-2, 51-2, 52-4.
Subscribe to:
Posts (Atom)