Wednesday 24 September 2014

COMPUTER KNOWLEDGE PRACTICE MCQs FOR SBI P.O. EXAM

1. The memory address of the first element of an array is called ___
a) floor address
b) foundation address
c) first address
d) base address
e) second address

2. The term "push" and "pop" is related to the ___
a) Array
b) Lists
c) Stacks
d) All the above
e) None of these

3. A data structure where elements can be added or removed at either end but not in the middle:
a) Linked lists
b) Deque
c) Stacks
d) Queues
e) Bugs

4. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Null case
d) Average case
e) Middle case

5. The operation of processing each element in the list is known as ___
a) Traversal
b) Sorting
c) Merging
d) Inserting
e) Layout

6. Human beings are referred to as Homo Sapiens, which device is called Sillico Sapien?
a) Hardware
b) Robot
c) Computer
d) Monitor
e) RAM

7. Asmall or intelligent device is so called because it contains within it a ___
a) Computer
b) Microcomputer
c) Programmable
d) Sensor
e) Cursor

8. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) Floppies
b) RAM
c) Counter Wheels
d) Cards
e) Wires

9. Which of the following devices is specially designed to forward packets to specific ports based on the packet's address?
a) Switching hub
b) Specialty hub
c) Filtering hub
d) Port hub
e) Pin hub

10. What is the Operating System used in ATM machine?
a) Windows XP
b) Windows 7
c) Linux
d) Windows 8.1
e) Windows XP or Linux based

11. BOSS is developed in which country?
a) Japan
b) USA
c) UK
d) India
e) China

12. A system call is a method by which a program makes a request to the ____
a) Input Management
b) Interrupt processing
c) Output Management
d) Operating system
e) Operating Management

13. Which of the following is the older high-level (non-assembler) programming language?
a) C
b) LISP
c) FORTRAN
d) BASIC
e) C++

14. Which device is used as the standard pointing device in a Graphical User Environment?
a) Keyboard
b) Mouse
c) Joystick
d) Trackball
e) Printer

15. The section of the CPU that is responsible for performing mathematical operations:
a) Memory
b) Register Unit
c) Control Unit
d) ALU
e) None of the above

16. Which of the following might be used by a company to satisfy its growing communication needs?
a) Front end processor
b) Multiplexer
c) Controller
d) Concentrator
e) All of the above

17. Microsoft .NET is ___
a) Open Source
b) Closed Source
c) Browser
d) Middle Source
e) All the above

18. Technical documentation is prepared by?
a) Users
b) Coders
c) Mangers
d) Marketing & sales people
e) Students

19. Comments can be added using __
a) \comments
b) /* */
c) //
d) %
e) $

20. What are the three main types of computer programming languages?
a) Machine language, assembly language, high level language
b) Imperative language, functional language, declarative language
c) COBOL, FORTRAN-77, C++
d) a and c
e) None of these

21. Which of the following network access standard is used for connecting stations to a circuitswitched network?
a) X.3
b) X.21
c) X.25
d) X.75
e) X.8

22. Which of the following is usually a special one-time operation that must be completed over a limited time period?
a) Batch
b) Patch
c) Project
d) Word
e) File

23. The latest PC keyboards use a circuit that senses the movement by the change in its capacitance. What are these keyboards called?
a) Capacitance keyboards
b) Mechanical keyboards
c) Qwerty keyboards
d) Dvorak keyboards
e) Normal keyboard

24. An IC contains 50 gates each of which consists of 6 components. Its belong to:
a) VLSI
b) LSI
c) MSI
d) SSI
e) SSC

25. Controls of data communication deal with ___
a) the communication channel
b) the computer
c) terminals
d) All of the above
e) None of the above

26. Inventory is also referred to as:
a) Stock
b) Warehouse capacity
c) Materials
d) Materials in hand
e) Storage

27. A server that can perform no other task besides network services is called ___
a) Uno server
b) Dedicated server
c) Committed server
d) Service server
e) Client server

28. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Del + P
d) Ctrl + Shift + P
e) Ctrl + P

29. The processing of an application takes place between a client and a ___ processor.
a) Front end
b) Back end
c) Middle end
d) Only a and b
e) a, b and c

30. ___ transforms one interface into another interface.
a) Program
b) Software
c) Data
d) File
e) Data Base

31. What is the full form of CRT?
a) Current Ray Tube
b) Current Ray Technology
c) Cathode Ray Tube
d) Cathode Ray Technology
e) Cat Ray Tube

32. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) ROM

33. Which of the following companies is a leader in manufacture of Hard Disk Drives?
a) Samsung
b) IBM
c) Fujitsu
d) Seagate
e) Acer

34. ____ store data or information temporarily and pass it on as directed by the control unit?
a) Address
b) Register
c) Number
d) Memory
e) None of these

35. In ___ mode, the communication channel is used in both directions at the same time?
a) Full-duplex
b) Simplex
c) Half-duplex
d) Duplex
e) None of these

36. "New Comment" option can be found under ___ tab?
a) Insert
b) Data
c) Review
d) View
e) File

37. Which key moves the cursor to the beginning of the next line of text?
a) Shift
b) Enter/ return
c) Tab
d) Backspace/ delete
e) None of these

38. Identify the IP address from the following:
a) 300.215.317.3
b) 302.215@417.5
c) 202.50.20.148
d) 202-50-20-148
e) 101.50. 2 0.148

39. Which one of the following is not a/an image/ graphic file format?
a) PNG
b) GIF
c) BMP
d) GUI
e) None of these

40. In a client/ server model, a client program ___
a) asks for information
b) provides information and files
c) serves software files to other computers
d) distributes data files to other computers
e) All the above

41. Dot-matrix, DeskJet, Inkjet and Laser are all types of which computer peripherals?
a) Keyboard
b) Software
c) Monitor
d) Hardware
e) Printer

42. What is the meaning of 'Hibernate' in Windows XP / Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications.
e) None of these

ANSWERS:
1) d; 2) c; 3) b; 4) c; 5) a; 6) c; 7) d; 8) c; 9) a; 10) e;
11) c; 12) d; 13) c; 14) b; 15) d; 16) e; 17) b; 18) b; 19) d; 20) a;
21) b; 22) c; 23) a; 24) c; 25) d; 26) a; 27) b; 28) e; 29) d; 30) b;
31) c; 32) d; 33) d; 34) b; 35) a; 36) c; 37) b; 38) c; 39) d; 40) a;
41) e; 42) d.

Tuesday 16 September 2014

COMPUTER AWARENESS PRACTICE MCQs FOR ALL BANK EXAMS

1. ROM stands for
A. Random Only Memory 

B. Readable Only Memory
C. Real Online Memory 

D. Random Other Memory
E. Read Only Memory

2. Another name for a logic chip is
A. PROM 

B. Memory 
C. Microprocessor
D. ROM 

E. None of these

3. The Number System based on 0 and 1 only is known as..........................
A. Binary System 

B. Barter System
C. Number System

D. Hexadecimal System
E. Special System
4. The capacity of 0.5 inch floppy disk is.....
A. 1.40MB 

B. 1.44GB
C. 1.40GB 

D. 1.45MB 
E. 1.44MB

5. Which of the following is not an integral part of computer ?
A. CPU

B. Mouse
C. Monitor
D. UPS

E. None of these

6. Which of the following is/are not part of the CPU ?
A. Primary storage

B. Registers
C. Control unit

D. ALU
E. None of these

7. The device that reconciles the differences between computers and phones is the ......
A. LAN 

B. Wand reader
C. TCP/IP 

D. scanner 
E. modem

8. A combination of hardware and software that allows communication and electronic transfer of information between computers
A. Network 

B. Backup System 
C. Server

D. Peripheral 
E. Modem

9. Which of the following represents the fastest data transmission speed ?
A. bandwidth

B. bps
C. gbps 
D. kbps

E. mbps

10. What is a major feature of the World Wide Web that makes it simple to learn and use ?
A. Database interface
B. Graphical text interface
C. Graphical user interface
D. Point-to-Point Protocol 

E. None of these

11. Which of the following is an input device that, when moved by the user on a flat surface, causes a pointer on the screen to move accordingly ?
A. Wand reader 

B. Mouse
C. Keyboard 

D. Bar code reader
E. Scanner

12. A bar code reader is an example of a(n}.......
A. processing device
B. storage device 

C. input device
D. output device 

E. printer

13. If your regularly send letters to people, what type of program would you use to create the letters ?
A. Hardware 

B. System software
C. Utility software 
D. Application software
E. None of these

14. Computer gets && with the help of mouse or keyboard.
A. insert 

B. instructions
C. guides 

D. input 
E. None 

15. Dot-matrix is a type of ................
A. Tape

B. Printer
C. Disk 
D. Bus 
E. None 

16. Which of the following represents one billion characters ?
A. Byte

B. Gigabyte 
C. Kilobyte 

D. Megabyte
E. Terabyte

17. Which of the following menu types is also called a drop-down menu ?
A. Fly-down 

B.Pop-down 
C. Pop-up
D. Pull-up

E. Pull-down

18. What is an onscreen picture that represents an object, such as a program or file ?
A. Spool

B. NOS
C. Page

D. Pointer
E. Icon

19. Which of the following is not necessary to be considered computer literate ?
A. The ability to write the instructions that direct a computer
B. An awareness of the computers importance, versatility, and pervasiveness in society
C. Knowledge of what computers are and how they work
D. The ability to interact with computers using simple applications 
E. None of these

20. An area of the microprocessor chip used to temporarily store instructions and data that the processor is likely to use frequently is termed a(n)....
(A) ALL

(B) Bus
(C) Cache
(D) CPU 

(E) Flash

21. Kilobyte equals to how many bytes?
(A) 1000 

(B) 1035 
(C) 100 

(D) 1008 
(E) 1024

22. The central processing unit is an ex-ample of
A. peripheral 
(B) an output unit

(C) software 
(D) a program
(E) hardware

23. CD-ROM stands for ........
(A) Compactable Read Only Memory 

(B) Compact Data Read Only Memory 
(C) Compactable Disk Read Only Memo ry 
(D) Compact Disk Read Only Memory 

(E) Connected Disk Read Only Memory


24. Which of the following terms refers to the ability of a computer to automatically configure a new hardware component that is added to it ?
(A) Formatting 
(B) Multiprocessing

(C) Multiprogramming
(D) Multitasking
(E) Plug and Play

25. Free hard-disk space used to extend the capacity of RAM is ten:
(A) Cache 
(B) Flash memory 
(C) ROM
(D) Virtual memory 
(E) Volatile

26. Making illegal copies of copy-righted software is called ......
(A) Collaboration 
(B) software piracy
(C) electronic distribution
(D) Browsing
(E) software legacy

27. What is loading the operating system into a personal computer called ?
(A) Booting
(B) Prompting

(C) Paging
(D) Interrupting

(E) Readying

28. Which of the following is not an example of application software ?
(A) Database software
(B) Graphics software
(C) Operating system software
(D) Spreadsheet software
(E) Word processing software

29. Pie charts are typically created by using which of the follow ing ?
(A) browser software
(B) database software
(C) desk-top publishing software
(D) word-processing software
(E) spreadsheet software

30. The computer to which a users computer connects in order to access the Internet is called a ........
(A) notebook 

(B) PDA
(C) supercomputer 

(D) server
(E) laptop

31. Which of the following domains is used by for-profit businesses ?
(A) .com

(B) .edu
(C) .mil

(D) .net 
(E) .org

32. WAN stands for ...................
(A) Wired Area Network
(B) Wide Area Network
(C) Wide Array Net
(D) Wireless Area Network
(E) Wanted Area Network

33. What are lists of programs waiting to be run called ?
(A) Shells 

(B) The background
(C) Queues 

(D) Page frames 
(E) Lists

34. An example of peripheral equipm-ent is the
(A) printer 

(B) CPU 
(C) spreadsheet 
(D) microcomputer 
(E) ALU

35. Which of the following commercial software products are examples of operating system software and application soft-ware, respectively ?
(A) Microsoft Windows XP and Microsoft Word
(B) Microsoft Office XP and Micro soft Windows XP
(C) MS DOS and Microsoft Windows XP
(D) UNIX and LINUX 
(E) UNIX and Java

36. MS Excel is used for ?
(A) Letter writing
(B) Spread Sheet Calculation
(C) Presentation
(D) Painting 
(E) None of these

37. Computer users who are not; computer professionals, are someti-mes called.....
(A) peripheral users
(B) programmers 
(C) librarians
(D) information officers 
(E) end-users

38. Desktop and personal computers are also known as.....
(A) supercomputers
(B) servers 

(C) mainframes
(D) peripheral equipment
(E) microcomputers

39. The ability to exchange information through the use of computer equipment and software is
(A) Data entry
(B) The Internet 
(C) Data retrieval
(D) Electronic communication

(E) None 

40. A computer professional who writes and tests software is called a /an .....
(A) hardware consultant 

(B) librarian 
(C) programmer
(D) computer operator
(E) data entry operator


ANSWERS:
1-E, 2-C, 3-A, 4-E, 5-D, 6-E, 7-E, 8-A, 9-C, 10-C
11-B, 12-D, 13-D, 14-D, 15-B, 16-B, 17-E, 18-E, 19-E, 20-C
21-E, 22-E, 23-D, 24-E, 25-B, 26-B, 27-A, 28-C, 29-E, 30-D
31-E, 32-B, 33-D, 34-A, 35-A, 36-B, 37-E, 38-E, 39-D, 40-C

Saturday 13 September 2014

COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR ALL BANK EXAMS

1. Which of the following is an example of non volatile memory?
1) VLSI
2) LSI
3) ROM
4) RAM
5) Hard disk

2. IEEE 802.16 popularly called ___
1) Ethernet
2) Wi-Fi
3) WIMAX
4) Wireless Network
5) None of these

3. To protect system, there are how many security levels?
1) One
2) Two
3) Three
4) Four
5) Five

4. Java was originally invented by
1) Oracle
2) Microsoft
3) Novell
4) Sun
5) IBM

5. Asmall network making up the internet and also having a small number of computers with in it is called ___
1) Host
2) Address
3) Sub domain
4) Domain
5) URL

6. The operating system of a computer serves as a software interface between the user and ___
1) Software
2) Hardware
3) Processor
4) Compiler
5) RAM

7. Both the ALU and control section of CPU employ special purpose storage locations called:
1) Decoders
2) Buffers
3) Multiplexer
4) Registers
5) Flip flops

8. The address of the next instruction to be executed by the current process is provided by the ___
1) CPU registers
2) program counter
3) process stack
4) pipe
5) coding counter

9. Which command combines the contents of one file with another?
1) Restore
2) Rename
3) Append
4) Add
5) Store

10. The ___ is the administrative section of the computer system.
1) Memory Unit
2) Input Unit
3) Central Processing Unit
4) Control Unit
5) Logic Unit

11. Coded entries which are used to gain access to a computer system are called
1) Codeword's
2) Entry codes
3) Entry words
4) Security commands
5) Data codes

12. What is the primary requisite of a good computer programmer?
1) Mathematical mind
2) Artistic mind
3) Logical mind
4) Scientific knowledge
5) Memory Knowledge

13. The errors that can be pointed out by the compiler:
1) Syntax errors
2) Internal errors
3) Semantic errors
4) Coding errors
5) Logical errors

14. Which of the following is an advantage to using fibre optics data transmission?
1) Resistance to data theft
2) Fast data transmission rate
3) Few transmission errors
4) Low noise level
5) All the above

15. Which one of the following when added can reduce the processing time of a computer?
1) A buffer
2) A co-processor
3) 1024 megabyte
4) A converter
5) 1064 megabyte

16. A program that neither replicates or copies itself, but does damage or compromises the security of the computer. Which 'Computer Virus' it is?
1) Hoax
2) Worm
3) Trojan
4) Joke program
5) Juke program

17. 'DB' computer abbreviation usually means?
1) Driver Boot
2) Double Byte
3) Data Block
4) Database
5) None of these

18. What do we call a network whose elements may be separated by some distance? It usually involves two or more small networks and dedicated high-speed telephone lines.
1) WAN (Wide Area Network)
2) World Wide Web
3) URL (Universal Resource Locator)
4) LAN (Local Area Network)
5) All the above

19. Hardware devices that are not part of the main computer system and are often added later to the system.
1) Execute
2) Highlight
3) Peripheral
4) Clip art
5) Insert

20. '.BAK' extension refers usually to what kind of file?
1) Audio file
2) MS Encarta document
3) Backup file
4) Animation/ movie file
5) Restore file

21. The main computer that stores the files that can be sent to computers that are networked together is ___
1) Clip art
2) File server
3) Peripheral
4) Mother board
5) IC

22. Which of the following word processors came first?
1) MS Word
2) Lotus Notes
3) WordPerfect
4) WordStar
5) WordPad

23. Which of the following operating systems is produced by IBM?
1) UNIX
2) Windows
3) DOS
4) OS-2
5) OS-3

24. Computers calculate numbers in what mode?
1) Decimal
2) Octal
3) Binary
4) Primary
5) Secondary

25. Which of the following software is used to view web pages?
1) Web Browser
2) Internet Browser
3) Page Browser
4) Crème Browser
5) All the above

26. ____ is the process in which a user sends computer information from his computer to another computer through modem.
1) Downloading
2) Uploading
3) Processing
4) Programming
5) Seeding

27. Which of the following is used to save the frequently visited web sites?
1) Frequent List
2) Favourites List
3) Explorer List
4) File list
5) Data list

28. Which of the following performs arithmetic and logical operations?
1) CU
2) PU
3) ALU
4) Memory
5) CPU

29. A ____ is a group of independent computers attached to one another through communication media.
1) Internet
2) E-mail
3) Network
4) Software
5) Hard ware

30. Which of the following is a presentation program?
1) MS-Word
2) MS-Excel
3) MS-Power Point
4) MS- Access
5) MS-Outlook

31. Collection of 1024 Bytes:
1) 1MB
2) 1KB
3) 1TB
4) 1GB
5) 100 MB

32. How would you be able to protect yourself from phishing?
1) Call your local fish store.
2) Get an Anti-Virus Program
3) Change Passwords Every 4-6 months
4) 2 & 3
5) All the above

33. Why is identity theft something hackers usually go for?
1) Personal Information
2) Being able to have another name
3) Send them emails
4) Take their victim's address for future use
5) All the above

34. This type of software is on computers and collects small pieces of information from users. It is also difficult to detect, what is it?
1) Spam
2) Malware
3) Phishing
4) Spyware
5) Under ware

35. Many malware programs gather information that leads to loss of privacy. How can you generally be protected from this?
1) Close window
2) Never use your computer
3) Anti-Virus Program
4) Turn Off Computer
5) Restart Computer

36. Older networks often use another type of cable, called ________
1) Unshielded twisted-pair cable
2) Coaxial cable
3) Optical Fibre
4) Twisted-pair cable
5) Data cable

37. Which device can understand difference between data & programs?
1) Input device
2) Output device
3) Memory
4) Microprocessor
5) RAM

38. Total keys keyboard is most popular
1) 123
2) 111
3) 101
4) 134
5) 143

39. What is the name of the software that allows us to browse through web pages?
1) Mail Client
2) FTP Client
3) Messenger
4) Browser
5) Server

40. Which of the following best suits the statement below? It's the main memory of the computer system and is volatile.
1) RAM
2) ROM
3) PROM
4) Primary storage
5) Secondary storage


ANSWERS:
1) 3; 2) 3; 3) 4; 4) 4 ; 5) 1; 6) 2 ; 7) 4; 8) 2; 9) 3; 10) 3;
11) 4; 12) 3; 13) 5 14) 2; 15) 2; 16) 3; 17) 4; 18) 1; 19) 3; 20) 3;
21) 2; 22) 4; 23) 4; 24) 3; 25) 1; 26) 2; 27) 2; 28) 3; 29) 3; 30) 3;
31) 2; 32) 4; 33) 1; 34) 4; 35) 3; 36) 2; 37) 4; 38) 3; 39) 4; 40) 1;

Sunday 7 September 2014

COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR SBI P.O. EXAM

1. Which of the following condition is used to transmit two packets over a medium at the same time?
1) Contention
2) Collision
3) Synchronous
3) Asynchronous
5) None of the above

2. Which of the following is not an option of the spelling dialog box?
1) Ignore
2) Ignore all
3) Edit
4) Change
5) Select

3. Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
1) 4
2) 8
3) 16
4) 15
5) 32

4. A message with replies on a newsgroup is often called a _____
1) post
2) list
3) thread
4) comment
5) format

5. Which of the following network is used to connect a number of computers to each other by cables in a single location?
1) WAN
2) LAN
3) GAN
4) PAN
5) MAN

6. News servers utilize _____ to distribute documents to readers.
1) NNTP
2) NEWS
3) HTTP
4) FTP
5) HTML

7. The Software which contains rows and columns is called ___
1) Database
2) Drawing
3) Word processing
4) Spreadsheet
5) All the above

8. Addresses separate the user name from the ISP using the ____ symbol.
1) &
2) @
3) %
4) *
5) $

9. The ___ layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames
a) Data Link
b) Physical
c) Network
d) Session
e) MAC

10. The spelling tool is placed on ___ toolbar
1) Standard
2) Formatting
3) Drawing
4) Reviewing
5) Viewing

11. The maximum size of the window in a Sliding Window Protocol is _____
1) 2m + 1
2) 2m
3) 2(m-1)
4) 2m*1
5) 2m - 1

12. A name in the ____ name space is a sequence of characters without structure
1) address
2) oman
3) flat
4) Both a and b
5) location

13. Which of the following is not a valid Zoom percentage in Excel?
1) 10
2) 100
3) 300
4) 500
5) 750

14. Distance Vector Routing is a ____ routing algorithm; it consists of a data structure called a ____
1) Static, routing table
2) Dynamic, look-up table
3) Dynamic, routing table
4) Static, look-up table
5) dynamic, less table

15. What is the short cut key to replace a data with another in sheet?
1) Ctrl + R
2) Ctrl + Shift + R
3) Ctrl + H
4) Ctrl + F
5) Ctrl + V

16. The ___ protocol is based on end-toend delivery.
1) SCTP
2) TCP
3) SMTP
4) SCTP
5) HTTP

17. If you need to change the typeface of a document, which menu will you choose?
1) Edit
2) View
3) Tools
4) File
5) Format

18. What is the size of Network bits & Host bits of Class A of IP address?
1) Network bits 7, Host bits 24
2) Network bits 8, Host bits 24
3) Network bits 7, Host bits 23
4) Network bits 8, Host bits 23
5) Network bits 4, Host bits 25

19. ____ is a uniform naming scheme for locating resources on the web.
1) URI
2) HTTP
3) WEBNAME
4) RESOURCENAME
5) URL

20. The options like Relationship, SQL Server etc. are found in ___
1) External data tab
2) Database tools tab
3) Create tab
4) Home tab
5) Format tab

21. A Database Language Concerned with the Definition of the Whole Database Structure and Schema is ____
1) DCL
2) DML
3) DDL
4) DCO
5) DDI

22. A ____ Enables You To View Data From A Table Based On A Specific Criterion
1) Form
2) Query
3) Macro
4) Report
5) Bug

23. A____ normal form normalization will be needed where all attributes in relation tuple are not functionally dependent only on the key attribute.
1) First
2) Second
3) Third
4) Fourth
5) Fifth

24. An outstanding functionality of SQL is its support for automatic ____ to the target data.
1) programming
2) functioning
3) navigation
4) notification
5) none of these

25. The hardware component used to control the operation of a computer system is:
1) Ram
2) Processor
3) Keyboard
4) Hard disk
5) Monitor

26. Which output device is suited to presenting information that is likely to change very frequently?
1) Sound card
2) Monitor
3) Plotter
4) Printer
5) COM

27. Which is the most difficult environmentally to dispose of?
1) Floppy drives
2) Hard drives
3) Power supplies
4) CRTs
5) System boards

28. Which type of system hoard is the MOST likely candidate for processor upgrading if you want maximum performance and future compatibility?
1) ML
2) PCI
3) ISA
4) EISA
5) ISO

29. Which of the following is a type of preventative maintenance used on a hard drive?
1) Disk check diagnostics
2) Head alignment diagnostics
3) Initializing
4) Uninstalling programs
5) None of the above

30. How many IRQs does a chain of USB devices require?
1) 1
2) 2
3) 3
4) 4
5) 5

31. Which of the following addressing modes, facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears?
1) ascending
2) sorting
3) index
4) indirect
5) direct

32. Which command will be used with vi editor to replace text from cursor to right?
1) r
2) R
3) s
4) S
5) Q

33. Which of the following is not a filter?
1) cat
2) grep
3) wc
4) sort
5) None of the above

34. Which of the following commands is used to view your file 24 lines at a time?
1) pg
2) cat
3) //p
4) /p
5) ///p

35. The rise time of a pulse waveform is the time required for the voltage to rise:
1) from zero to its rms value
2) from zero to its peak value
3) from 10% of the peak value to 70.7% of the peak value
4) from 10% of the peak value to 90% of the peak value
5) from 10% of the peak value to 80% of the peak value

36. Holes are the minority carriers in which type of semiconductor?
1) Extrinsic
2) Intrinsic
3) n-type
4) p-type
5) m-type

37. While working with MS-DOS, which command is used to restore files that were backed up using the BACKUP command?
1) COPY
2) DISKCOPY
3) RESTORE
4) STORE
5) DELETE

38. Which of the following commands will take you directly to the root directory no matter what subdirectory you are currently in?
1) CD \root
2) CD\
3) CD\..
4) CD..
5) CD\\..

39. Batch files contain a group of MSDOS commands that are run in successive order. What filename extension identifies batch files?
1) COM
2) BAT
3) EXE
4) SYS
5) DOC

40. The _____ command allows you to modify the default prompt to provide other information
1) prompt
2) windows
3) cursor
4) click
5) double click

ANSWERS:
1) 2; 2) 3; 3) 4; 4) 3; 5) 5; 6) 1; 7) 4; 8) 2; 9) 1; 10) 1 ;
11) 5; 12) 3; 13) 4; 14) 3; 15) 3; 16) 3; 17) 5; 18) 1; 19) 1: 20) 2;
21) 3; 22) 2; 23) 3; 24) 3; 25) 2; 26) 2; 27) 4; 28) 2; 29) 1; 30) 1;
31) 3; 32) 2; 33) 5; 34) 1; 35) 4; 36) 3; 37) 3; 38) 2; 39) 2; 40) 1;

Wednesday 3 September 2014

COMPUTER AWARENESS PRACTICE MCQs FOR SBI P.O. EXAM 2014

1. Person, who design, program, operates and maintains computer equipment refers to:
a) Console-operator
b) Programmer
c) People ware
d) System Analyst
e) User

2. Who invented the high level language C?
a) Dennis M. Ritchie
b) Niklaus Writh
c) Seymour Papert
d) Donald Kunth
e) A.R John

3. Which of the following is the product of data processing?
a) Information
b) Data
c) Software program
d) System
e) Hardware program

4. How many units in a single bus structure will communicate at a time?
a) 1
b) 2
c) 3
d) 16
e) 32

5. A microcomputer consists of at least an input unit, an output unit, microprocessor unit and a ___
a) stabilizer
b) memory unit
c) printer
d) network
e) monitor

6. For each instructions of program in memory the CPU goes through a ___
a) decode - fetch - execute sequence
b) execute - store - decode sequence
c) fetch - decode - execute sequence
d) fetch - execute - decode sequence
e) None of these

7. The database environment has all of the following components except:
a) Users
b) Database
c) Database administrator
d) Database programmer
e) Separate files

8. Which of the following technique provides dedicated communication channel between two stations?
a) Circuit switching
b) Packet switching
c) Network switching
d) Switch network
e) Modem switching

9. End-to-end connectivity is provided from host-to-host in ___
a) Network layer
b) Session layer
c) Data link layer
d) Transport layer
e) Mac layer

10. A source program is the program written in ____ language.
a) English
b) symbolic
c) high level
d) object
e) French

11. Which of the following is a computer device that primarily used to provide hardcopy?
a) CRT
b) Line printer
c) Computer console
d) Card reader
e) Pen drive

12. In magnetic disks data is organized on the platter in a concentric sets or rings called ___
a) sector
b) track
c) head
d) block
e) bug

13. The memory which is programmed at the time it is manufactured is ___
a) ROM
b) RAM
c) PROM
d) EPROM
e) PRAM

14. In comparison to the internal (main) memory, tape or disk memory is ___
a) slower and more expensive
b) slower and less expensive
c) faster and more expensive
d) faster and less expensive
e) None of these

15. A distributed network configuration in which all data/ information pass through a central computer is ___
a) bus network
b) duplex
c) multiplex
d) multiple
e) star network

16. The process of copying data from a memory location is called ___
a) reading
b) writing
c) controlling
d) booting
e) calling

17. Which of the following is true about primary storage?
a) It is a part of the CPU
b) It allows very fast access to data
c) It is relatively more expensive
d) All of the above
e) None of these

18. 100110 - This binary representation is numerically equivalent to:
a) The decimal representation 46
b) The hexadecimal representation 46
c) The binary representation 26
d) The octal representation 26
e) The octal representation 46

19. Administrative supervision of database activities is the responsibility of ___
a) Data base administrator
b) DP Manager
c) DB Manager
d) VP-DP administrator
e) DO Manager

20. Transmission of computerised data from one location to another is called ___
a) data transfer
b) data flow
c) data communication
d) data management
e) Any of the above

21. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Average case
d) a, b and c
e) Null case

22. The indirect change of the values of a variable in one module by another module is called ___
a) Internal change
b) Inter-module change
c) Side effect
d) Side-module update
e) Top-module update

23. By default, your documents print in ____ mode.
a) landscape
b) portrait
c) page setup
d) print view
e) page layout

24. Which of the following is not available on the Ruler of MS Word screen?
a) Tab stop box
b) Left Indent
c) Right Indent
d) Canter Indent
e) All of them are available on ruler

25. Which American Computer Company is called big blue?
a) Microsoft
b) Compaq Corp
c) IBM
d) Tandy Stevenson
e) Samsung

26. Which of the following is a computer package for preparing/ typing letters/ documents?
a) Word
b) Excel
c) Power Point
d) Windows
e) Adobe Reader

27. Which of the following is true regarding Referential Integrity?
a) Every primary-key value must match a primary-key value in an associated table
b) Every primary-key value must match a foreign-key value in an associated table
c) Every foreign-key value must match a primary-key value in an associated table
d) Every foreign-key value must match a foreign-key value in an associated table
e) None of these

28. If every non-key attribute is functionally dependent on the primary key, the relation will be in ___
a) First Normal Form
b) Second Normal Form
c) Second Formal Form
d) First Formal Form
e) Third Normal Form

29. A desktop computer is also known as a ___
a) PC
b) Laptop
c) Palmtop
d) Mainframe
e) System

30. What does the DOCTYPE declaration defines in HTML?
a) It defines the document Property
b) It defines the document Type
c) It defines the document Size
d) It defines the document Style
e) It defines the document colour

31. In which mode Windows starts with only the core drivers and services?
a) Safe Mode
b) Quick Mode
c) Normal Mode
d) Repair Mode
e) Continue Mode

32. To "Debug" the System means:
a) Find the Correct Software
b) Find the Correct Hardware
c) Find and Install correct System
d) Find and Correct Errors on System
e) Find and fix the Errors on System

33. In Computer Architecture a Bus is ____
a) A collection of various software
b) A collection of various computers
c) A collection of shared communication wires
d) A collection of chairs where the user sits
e) All the above

34. While starting Window XP/7 extra booting options can be shown by pressing
a) F1
b) F8
c) F9
d) F12
e) F11

35. Which of the following is used to add comments in PHP?
a) //
b) /* … */
c) & … &
d) Only a & b
e) All the above

36. How PHP files can be accessed?
a) Through Web Browser
b) Through HTML files
c) Through Web Server
d) Through Internet Server
e) Through .Net Server

37. The first network that planted the seeds of network was?
a) ARPANET
b) NSF net
c) I net
d) V net
e) N net

38. The small size animated pictures moving on WebPages are called?
a) Media
b) Flash
c) Podcast
d) Kris
e) Drag

39. Which of the following is a domain name?
a) .NET
b) .ORG
c) .GOV
d) .IN
e) All the above

40. Firewall is used to prevent unauthorized access from both the sides as software and ___
a) Hardware
b) Malware
c) Spyware
d) Freeware
e) Menswear

41. The unsolicited and bulk mails in e-Mail is called?
a) Spam
b) Scan
c) Storm
d) Virus
e) Trash

42. Graphical pictures that represent an object file, folder, ... are called ___
a) Desktop
b) Icons
c) Windows
d) Taskbar
e) Menus

43. Which of the following keys create symbol copyright as ©?
a) Alt + ctrl + d
b) Alt + Shift + c
c) Ctrl + alt + c
d) Alt +del+ c
e) Alt+ break +c

44. To move to the beginning of a line of text, press the ___ key.
a) Home
b) A
c) Page up
d) Enter
e) Page down

45. Who is responsible for "traffic directing" on Internet?
a) Hub
b) Repeater
c) Router
d) Switch
e) Gateway

ANSWERS:
1) c; 2) a; 3) a; 4) b; 5) b; 6) c; 7) e; 8) a; 9) d; 10) c;
11) b; 12) b; 13) a; 14) b; 15) e; 16) a; 17) d; 18) e; 19) a; 20) c;
21) e; 22) c; 23) b; 24) d; 25) c; 26) a; 27) c; 28) e; 29) a; 30) b;
31) a; 32) d; 33) c; 34) b; 35) d; 36) c; 37) a 38) b; 39) e; 40) a;
41) a; 42) b 43) c; 44) a; 45) c;

Sunday 17 August 2014

COMPUTER KNOWLEDGE PRACTICE MCQs FOR ALL BANK EXAMS

1. What is required when more than one person uses a central computer at the same time?
a) Light pen
b) Mouse
c) Digitizer
d) Terminal
e) None of the above

2. One nibble is equal to ___
a) 4 bits
b) 8 bits
c) 16 bits
d) 32bits
e) None of the above

3. Which of the following terms is the most closely related to main memory?
a) Non-volatile
b) Permanent
c) Control unit
d) Temporary
e) None of the above

4. A picture, map or graphics or image that can be used in a document is known as ___
a) Hypertext
b) Clipboard
c) Object
d) Drag drop
e) None of these

5. The amount of vertical space between lines of text in a document is called:
a) Double spacing
b) Line spacing
c) Single space
d) Vertical spacing
e) None of these

6. Which of the following is a smallest dot that can be uniquely drawn on a computer screen?
a) Bexel
b) Computer dot
c) Cursor
d) Pixel
e) None of these

7. _____means to enlarge a window to its maximum area so that it will fill entire desktop.
a) Maximise
b) Zoom
c) Enlarge
d) Extend
e) None of these

8. The computer's capability of distinguishing spoken words is called ___
a) voice analysis
b) speech acknowledgement
c) voice recognition
d) speech interpretation
e) none of these

9. Which of the following is the process of getting access to the computer?
a) Sign up
b) Log in
c) Log off
d) Enter
e) None of these

10.Aseries of instructions that tells a computer what to do and how to do it, is called a ____
a) program
b) command
c) user response
d) processor
e) None of these

11. The full step wise process of closing a computer is called _____
a) Hibernating
b) Closing
c) Log off
d) Shut down
e) None of these

12. Which key combination is used for special tasks?
a) Insert, Delete
b) Ctrl, Shift
c) Left Arrow, Right Arrow
d) Page up, Page Down
e) None of These

13. ____ allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.
a) TCP/ IP
b) Ethernet
c) WAP
d) Token ring
e) Internet

14. The _____ enables you to simultaneously keep multiple Web pages open in one browser window.
a) Tab box
b) Pop-up helper
c) Tab row
d) Address bar
e) None of these

15. The most important or powerful computer in a typical network is ____
a) Desktop
b) Network client
c) Network server
d) Network station
e) None of these

16. The primary purpose of software is to turn data into ____
a) Websites
b) Information
c) Programs
d) Objects
e) None of these

17. Grouping and processing all of a firm's transactions at one time is called ___
a) a database management system
b) a real-time system
c) an on-line system
d) batch processing
e) None of these

18. Which of the following is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user?
a) Interrupt request
b) Forward DNS lookup
c) Data-Link layer
d) Common gateway interface
e) None of these

19. What is the shortcut key to “Undo” the last action in a document?
a) Ctrl + X
b) Ctrl + Y
c) Ctrl + U
d) Ctrl + N
e) Ctrl + Z

20. The errors that can be pointed out by the compiler:
a) Syntax errors
b) Semantic errors
c) Logic errors
d) System errors
e) All of the above

21. Pick out the wrong definition.
a) COBOL : A language used for business data processing
b) CPU: Is the brain of computer
c) LAN: Is used in local areas
d) FORTRAN: Is used for logical processing
e) None of these

22. Modulator is a device that converts:
a) Digital signal into Ana log signal
b) Ana log signal into digital signal
c) Both A and B
d) Sometimes only A and B
e) None of the above

23. What is the capacity of a 3.5” Floppy Disk?
a) 360 KB
b) 720 KB
c) 1.2 MB
d) 1.44 MB
e) 1.8 MB

24. Which command of MS-DOS is used to copy only files that have been modified on or after the date you specify?
a) XCOPY/D : date
b) COPY/D : date
c) COPY/M
d) XCOPY/V
e) None of the above

25. If the processor of a computer does not have a direct and unassisted access to data items, these items are said to be ___
a) Offline
b) Remote
c) Disconnected
d) Detached
e) None of the above

26. The input and output devices are located away from the central computer facility in which particular type of processing?
a) Time sharing
b) Batch processing
c) Interactive mode
d) Real time processing
e) None of the above

27. What is the minimum number of operations required, for a microprocessor with 8 data  pins, to read a 32-bit word?
a) 1
b) 2
c) 4
d) 8
e) 16

28. Which of the following is a special purpose language used to describe to a computer's operating system?
a) LOGO
b) APL
c) ICU
d) CORAL
e) ICL

29. The part of machine level instruction, which tells the central processor what has to be done, is ___
a) Operation code
b) Address
c) Locator
d) Flip-Flop
e) None of the above

30. A system program that sets up an executable program in main memory ready for execution:
a) Assembler
b) Linker
c) Loader
d) Compiler
e) None of the above

31. Which of the following are loaded into main memory when the computer is booted?
a) External command instructions
b) Internal command instructions
c) Utility programs
d) Word processing instructions
e) None of the above

32. In which addressing mode the contents of a register specified in the instruction are first decremented and then these contents are used as the effective address of the operands?
a) Index addressing
b) Indirect addressing
c) Auto increment
d) Auto decrement
e) None of the above

33. From what location are the 1st computer instructions available on boot up?
a) ROM BIOS
b) CPU
c) boot.ini
d) CONFIG.SYS
e) None of the above

34. You were installing an application in Windows 95, and the computer crashes, what do you do?
a) Press alt + Ctrl + delete, twice
b) Press alt + Ctrl + delete and end task
c) Press the reset button on the computer
d) Turn off computer and boot from a floppy disk
e) None of the above

35. Each of data files has a _____ that describe the way the data is stored in the file.
a) File structure
b) Records
c) Fields
d) Database
e) None of the above

36. In a ___ a parent record type can be linked to one or more "child" record types, but a child record type can have only one parent.
a) Network database
b) Relational database
c) Distributed database
d) Hierarchical database
e) None of the above

37. In the accompanying figure, the _____ is a special toolbar that displays a series of names, each of which represents a list of commands that can be used to perform tasks.
a) Scroll bar
b) Status bar
c) Title bar
d) Menu bar
e) None of these

38. When the Language bar is _____, it means that you do not see it on the screen but it will be displayed the next time you start your computer.
a) Restored
b) Hidden
c) Minimized
d) Closed
e) All of the above

39. What is the name of the memory card which is conceptually related to the smart card but is similar to the video disk?
a) Laser card
b) Master card
c) Visa
d) Optical card
e) None of the above

40. Which of the following is not an alternative name for primary memory?
a) Main memory
b) Primary storage
c) Internal storage
d) Mass storage
e) None of the above


ANSWERS:
1) d; 2) a; 3) d; 4) c; 5) b; 6) d; 7) a; 8) c; 9) b; 10) a;
11) d; 12) b; 13) c; 14) c; 15) c; 16) b; 17) d; 18) d; 19) e; 20) a;
21) d; 22) c; 23) d; 24) a; 25) a; 26) b; 27) c; 28) e; 29) a; 30) c;
31) b; 32) d; 33) a; 34) d; 35) a; 36) d; 37) d; 38) b; 39) a; 40) d;

Wednesday 6 August 2014

COMPUTER AWARENESS PRACTICE MCQs FOR ALL BANK EXAMINATIONS 2014

1. The MS-DOS file extension usually attached to a file containing backup data is ...........
1) DOCX
2) BAK
3) BAC
4) DOC
5) MSD
2. The amount of data that can flow through a channel is called ...........
1) Bandlength
2) Capacity
3) Bandwidth
4) Digital Speed
5) None

3. ........ is made of static RAM
1) Cache memory
2) Buffer space
3) Clipboard
4) Virtual memory
5) None

4. COBOL, a high level programming language developed for ...........
1) Teaching children in schools
2) Designing plan for buildings
3) Maintaining the data of a firm
4) Business data processing applications
5) None

5. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ...........
1) Copy and paste
2) Copy, cut and paste
3) Cut, copy and paste
4) Cut and paste
5) None of these

6. The software tools that enable a user to interact with a computer for specific purposes
are known as ...........
1) Hardware
2) Network Software
3) Shareware
4) Applications
5) None of these

7. A(n) ......... backup contains a copy of every program, data, and system file on a computer
1) Restoration
2) Bootstrap
3) Differential
4) Full
5) None of these

8. Where is data saved permanently?
1) Memory
2) Storage device
3) CPU
4) Printer
5) None of these
9. Which is not a basic function of a computer?
1) Copy text 2) Accept input
3) Process data 4) Store data
5) None of these

10. A MODEM is connected in between a telephone line and a ...........
1) Network
2) Computer
3) Communication Adapter
4) Serial Port
5) All of these

11. The ........... is the box that houses the most important parts of a computer system.
1) Software
2) Hardware
3) Input device
4) System unit
5) None of these

12. The first computer introduced in Nepal was
1) IBM 1400
2) IBM 1401
3) IBM 1402
4) IBM 1403
5) None of these

13. Data that is copied from an application is stored in the ...........
1) Driver
2) Terminal
3) Prompt
4) Clipboard
5) None of these

14. In a spreadsheet program the ....... contains related work sheets and documents.
1) Workbook
2) Column
3) Cell
4) Formula
5) None of these

15. What is the permanent memory built into your computer called?
1) RAM
2) ROM
3) CPU
4) CD-ROM
5) None of these

16. Another word for software is....
1) input
2) output
3) program
4) system
5) None of these

17. An input device that can interpret pencil marks on paper media is called as ...........
1) Pencil Mark Reader
2) Scanner
3) Optical Character Reader
4) Overlapped Pencil Marker
5) Optical Mark Reader

18. A register in CPU that is used to store the address of the next instruction to be executed
is ...........
1) Program runner
2) Next program data counter
3) Program counter
4) Processing desk
5) Cache memory

19. An electronic circuit with about 10,000 transistors fabricated in a single silicon chip is...
1) Valves
2) Mega Transistor
3) VLSI
4) SMEP
5) IC

20. Which of the following is not a set of instructions?
1) Program
2) Program File
3) Software
4) Data File
5) None

21. CP/M stands for ___
1) Command Program /Management
2) Control Program / Micro Computer
3) Control Program / Mini Computer
4) Control Program / Super Computer
5) None of these

22. Find the odd man out.
1) Internet
2) Intranet
3) RING
4) MID
5) None

23. What does 'S' stand for in ISP?
1) Service
2) Sources
3) Select
4) Server
5) Sketch

ANSWERS:
1-2, 2-3, 3-1, 4-4, 5-4, 6-4, 7-4, 8-2, 9-5, 10-2
11-4, 12-2, 13-4, 14-1, 15-2, 16-3, 17-5, 18-3, 19-3, 20-4, 21-2, 22-4, 23-1

Sunday 3 August 2014

COMPUTER KNOWLEDGE PRACTICE MCQs FOR ALL ABANK EXAMS

1. The physical parts of a computer are known as:
a) Software
b) Hardware
c) Shareware
d) Fixed - ware
e) Digital - ware

2. Which type of the following software is used by a person for preparation of text documents?
a) Data processor
b) Word processor
c) Complier
d) Multimedia
e) b and c

3. The complete picture of data stored in database is known as:
a) Record
b) Schema
c) System flow chart
d) DBMS
e) None of these

4. Most of the errors blamed on computers are actually due to ____
a) programming errors
b) hardware figure
c) defects of floppy disks
d) data entry errors
e) None of these

5. Information retrieval is fastest from ____
a) floppy disks
b) magnetic tapes
c) hard disk
d) All of the above
e) None of the above

6. In addition to keying data directly into a database, data entry can
also be done from a/ an ____
a) field
b) table
c) data dictionary
d) input form
e) None of these

7. Assembly instructions are in the form of ____
a) binary digits
b) digits and numbers
c) general English
d) a new format different from all of the above
e) None of the above

8. You must install a ____ on a network if you want to share an internet connection.
a) Router
b) Modem
c) Node
d) Cable
e) None of these

9. The ___ software contains lists of commands and options.
a) menu bar
b) tool bar
c) title bar
d) formula bar
e) None of these

10. A computer program which could infect the other programs or data is called:
a) System software
b) Application software
c) Cybercrime
d) Virus
e) Computer fraud

11. Which of the following parts of the computer makes use of primary memory?
a) Storage unit
b) Central Processing Unit
c) Output devices
d) All of the above
e) None of the above

12. The term ATM stands for:
a) Automatic Teller Mechanism
b) Automated Teller Mechanism
c) Automated Teller Machine
d) Atomic Teller Machine
e) Automated Telephone Machine

13. The device that is a kind of computer which does not have its own CPU or storage:
a) Standby computer
b) Terminal
c) Mainframe computer
d) Personal computer
e) None of the above

14. ___ is called as a supervisor of computer activities.
a) Memory
b) OS
c) I/O devices
d) CU
e) ALU

15. Master files contain data of ___ nature.
a) temporary
b) local
c) permanent
d) global
e) None of these

16. Which of the following temporarily stores the data?
a) RAM
b) ROM
c) Floppy disk
d) Hard disk
e) None of these

17. Data division is the third division of a ____ program.
a) LISP
b) FORTH
c) COBOL
d) BASIC
e) PASCAL

18. In Windows XP, which shortcut key is used to cycle through opened items in taskbar?
a) Ctrl + Tab
b) Alt + Tab
c) Ctrl + Esc
d) Alt + Esc
e) None of these

19. A/An___ is a program that makes the computer easier to use.
a) Operating system
b) Application
c) Utility
d) Network
e) None of these

20. Allocator and manager of memory in an operating system is:
a) Keyboard
b) Key punch
c) Kernel
d) Kludge
e) None of these

21. Which of the following is a type of memory chip whose contents cannot be altered by writing
data?
a) RAM
b) PROM
c) ROM
d) EPROM
e) None of these

22. Which computer has been designed to be as compact as possible?
a) Mini
b) Super computer
c) Micro computer
d) Mainframe
e) None of the above

23. Which part is interprets program that converts assembly language to machine language?
a) Input
b) Storage unit
c) Logic unit
d) Control unit
e) None these

24. A memory that does not change it's contents without external causes is known as:
a) Dynamic memory
b) Static memory
c) RAM
d) EEPROM
e) None of these

25. The computer program that ensure interface between the user and the computer hardware:
a) Application software
b) Operating software
c) Processing software
d) Complier
e) Interpreter

26. Which of the following better describes the term internet?
a) A network of standard alone computers
b) A network servers
c) A network of networks
d) A network of world - wide computers
e) All of the above

27. What is the name of the windows software that is used for managing data base format?
a) MS Word
b) MS Power Point
c) MS Access
d) MS Excel
e) b and d

28. The computer related storage device used for the purpose of making permanent record:
a) CD -ROM
b) Floppy disk
c) Hard Disk
d) WORM Drive
e) All of the above

29. Which of the following takes care of processing of the information in a computer system?
a) ALU
b) CPU
c) Storage unit
d) Control unit
e) Processors

30. Devices that let the computer communicate with you are called ____ devices.
a) input
b) output
c) type
d) print
e) None of these

31. To move down a page in a document we use
a) Task bar
b) My computer
c) Recycle bin
d) Only (b) and (c)
e) None of these

32. To find a saved document in the computer's memory and bring it on the screen to view is called
___
a) reserve
b) rerun
c) retrieve
d) return
e) None of these

33. ____ servers store and manage files for network users.
a) Authentication
b) Main
c) Web
d) File
e) None of these

34. The ____ manual tells you how to use a software program.
a) documentation
b) programming
c) technical
d) user
e) None of these

35. Which of the following can be another word for program?
a) Software
b) Disk
c) Floppy
d) Hardware
e) None of these

36. ____ is the process of finding errors in software code.
a) Debugging
b) Compiling
c) Testing
d) Running
e) None of these

37. A name applied by Intel corp. to high speed MOS technology is ___
a) HDLC
b) LAP
c) HMOS
d) SDLC
e) None of the above

ANSWERS:
1) b 2) b 3) b 4) d 5) c 6) d 7) e 8) a 9) a 10) d
11) b 12) c 13) b 14) b 15) c 16) a 17) c 18) b 19) c 20) c
21) c 22) c 23) d 24) b 25) b 26) c 27) c 28) e 29) b 30) b
31) e 32) c 33) d 34) d 35) a 36) c 37) c

Sunday 27 July 2014

COMPUTER AWARENESS PRACTICE QUESTIONS FOR BANK EXAMS

1. Which one of the following is different from other three?
1) MAC Address
2) Hardware Address
3) Physical Address
4) IP Address
5) None of these

2. dentify the IP address from the following:
1) 300.215.317.3
2) 302.215@417.5
3) 202.50.20.148
4) 202-50-20-148
5) 101.50. 2 0.148

3. Which one of the following is not a/an image/ graphic file format?
1) PNG
2) GIF
3) BMP
4) GUI
5) None of these

4. Which of the following command is used to set the task priority in UNIX?
1) init
2) nice
3) PS
4) Kill
5) Loss

5. ____ is a protocol used by email clients to download e-mails to your computer.
1) SMTP
2) POP
3) FTP
4) MAIL
5) None of these

6. Which of the following is not a CPU trade name?
1) Intel
2) Dell
3) AMD
4) Cyrix
5) All of the above

7. The idea of stored-program concept was revealed by:
1) Pascal
2) Babbage
3) Neumann
4) Bill gates
5) James

8. Memories which can be read only are called ____ memories.
1) RAM
2) Secondary Memory
3) EERAM
4) Dynamic Memories
5) ROM

9. In a client/ server model, a client program ___
1) asks for information
2) provides information and files
3) serves software files to other computers
4)distributes data files to other computers
5) All of the above

10. Dot-matrix, DeskJet, Inkjet and Laser.. these all are which type of computer peripherals?
1) Keyboards
2) Software
3) Monitors
4) Hardware
5) Printers

11. Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?
1) MAC Layer
2) Data link layer
3) Transport layer
4) Application layer
5) Network layer

12.What is the meaning of 'Hibernate' in Windows XP/ Windows 7?
1) Restart the computers in safe mode
2) Restart the computers in normal mode
3) Shutdown the computer terminating all the running applications
4) Shutdown the computer without closing the running applications
5) None of these

13. Decisions or Conditions in flowchart is represented by ____.
1) Diamond
2) Parallelogram
3) Rectangle
4) Circle
5) All of the above

14. ____ is technology that allows someone to turn on a network computer remotely by sending a special data packet.
1) WAN
2) WHOL
3) WOL
4)Windows Mesh
5) None of these

15. Which of the following memory allocation scheme suffers from external fragmentation?
1) Segmentation
2) Pure demand paging
3) Swapping
4) Paging
5) None of these

16.A computer program that translates a program statement by statement into machine language is called a/an ____
1) Compiler
2) Simulator
3) Translator
4) Interpreter
5) Assembler

17. Mnemonic codes and variable name are used in a/ an ___
1) Machine language
2) Assembly language
3) High level language
4) All of the above
5) None of the above

18. CGI stands for:
1) Common Graphics Interface
2) Common Gateway Interchange
3) Common Gateway Interface
4) Computer Gateway Interface
5) None of these

19. If user is not able to see the image on the web page, the text that is displayed in place of the image, is specified by which of the following attributes in HTML?
1) ALTERNATE
2) ALTLINK
3) ALT_TEXYT
4) ALT
5) None of these

20. Which one of the following is different from other three?
1) Google
2) Windows
3) Linux
4) Mac
5) None of these

ANSWERS:
1) 4; 2) 3; 3) 4; 4) 2; 5) 2; 6) 2; 7) 3; 8) 5; 9) 1; 10) 5;
11) 5; 12) 4; 13) 1; 14) 3; 15) 1; 16) 4; 17) 1; 18) 3; 19) 4; 20) 1

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. A hard disk is divided into tracks which is further subdivided into?
a) Clusters
b) Sectors
c) Vectors
d) Heads
e) None of these

2. What is the radix of Binary Number System?
a) 3
b) 1
c) 2
d) 4
e) 0

3. Which of the following holds the ROM, RAM, CPU?
a) Hard Disk
b) ALU
c) Mother Board
d) All of the above
e) None of the above

4. Portable program means:
a) Program with wheels
b) Independent from its authors
c) Independent of platform
d) All of the above
e) None of the above

5. 1 GB is equal to ____.
a) 230 bits
b) 230 bytes
c) 220 bits
d) 220 bytes
e) None of these

6. Which of the following are the 5 generic software engineering framework activities?
a) Communication, Planning, Modeling, Construction, Deployment
b) Communication, Risk management, Measurement, Production, Reviewing
c) Analysis, Designing, Programming, Debugging, Maintenance
d) Analysis, Planning, Designing, Programming, Testing
e) None of these

7. The principal electronic payment system for electronic commerce is ____.
a) Credit Card
b) Digital Wallet
c) Electronic Cheque
d) All of the above
e) None of these

8. The name of first super computer of India:
a) Saga 220
b) PARAM 8000
c) ENIAC
d) PARAM 6000
e) None of these

9. The machine readable form of a program is called as ___
a) Source code
b) Object code
c) Compiler
d) Executable File
e) All of the above

10. AVI format was developed by:
a) IBM
b) Apple
c) Microsoft
d) Macromedia
e) Sun Microsoft

11. Which of the following IP address class is a multicast address?
a) Class A
b) Class B
c) Class C
d) Class D
e) Class F

12. Each character on the keyboard of computer has an ASCII value which stands for:
a) African Standard Code for Information Interchange
b) American Standard Code for Information Interchange
c) American Stock Code for Information Interchange
d) American Standard Code for Information Interfere
e) None of these

13. Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?
a) Network layer
b) Data link layer
c) Transport layer
d) Application layer
e) Mac layer

14. What is the meaning of 'Hibernate' in Windows XP/ Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications
e) None of these

15. The basic unit of a worksheet into which you enter data in Excel is called a ___
a) Cell
b) Table
c) Box
d) Column
e) None of these

16. Which of the following is a correct format of e-mail address?
a) sales@website; info
b) sales@website.info
c) saleswebsite.info
d) sales.website.info
e) All of the above

17. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Ctrl + P
d) Ctrl+Shift+P
e) None of these

18. The operating system does all of the following EXCEPT:
a) Provide a way for the user to interact with the computer
b) Manage the Central Processing Unit (CPU)
c) Manage memory and storage
d) Enable users to perform a specific task such as document editing
e) All of the above

19. ____ is the ability of an operating system to control the activities of multiple programs at the
same time.
a) Streamlining
b) Multiuser
c) Multitasking
d) Simulating
e) None of these

20. Verification of a login name and password is known as:
a) Configuration
b) Accessibility
c) Authentication
d) Logging in
e) Logging off

21. All of the following statements concerning windows are true EXCEPT:
a) Windows are an example of a command-driven environment
b) Windows can be resized and repositioned on the desktop
c) More than one window can be open at a time
d) Toolbars and scrollbars are features of windows
e) None of these

22. All of the following statements concerning files are true EXCEPT:
a) A file is a collection of related pieces of information stored together for easy reference
b) Files can be generated from an application
c) Files are stored in RAM
d) Files should be organized in folders
e) None of these

23. What are the four things needed to connect to the Internet?
a) Monitor, Keyboard, Mouse and Modem
b) Telephone line, PDA, Modem and Computer
c) Telephone line, Modem, Computer and an ISP
d) Modem, Computer, PDA and ISP
e) None of the above

24. Which of the following is true about firewalls?
a) Follows a set of rules
b) Can be either a hardware or software device
c) Filters network traffic
d) All of the above
e) None of these

25. Data that are accumulated and processed in group called:
a) Group processing
b) Batch Processing
c) Time sharing
d) All of the above
e) None of the above

26. Allocation of resources in a time dependent manner to several program simultaneously called as:
a) Multi user
b) Multi tasking
c) Time sharing
d) All of the above
e) None of the above

27. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called:
a) Simulation
b) Animation
c) Robotics
d) Computer forensics
e) None of these

28. In the binary language each letter of the alphabet, each number and each special character is made up
of a unique combination of:
a) Eight bytes
b) Eight characters
c) Eight bits
d) Eight kilobytes
e) None of the above

29. Servers are computers that provide resources to other computers connected to a:
a) Mainframe
b) Supercomputer
c) Network
d) Client
e) User

30. The difference between people with access to computers and the Internet and those without this
access is known as the:
a) Digital divide
b) Internet divide
c) Web divide
d) Cyber way divide
e) All of the above


ANSWERS:
1) b; 2) c; 3) c; 4) c; 5) b; 6) a; 7) d; 8) b; 9) b; 10) c;
11) d; 12) b; 13) a; 14) d; 15) a; 16) b; 17) c; 18) d; 19) c; 20) c;
21) a; 22) c; 23) c; 24) d; 25) b; 26) c; 27) d; 28) c; 29) c; 30) a;

Tuesday 22 July 2014

COMPUTER KNOWLEDGE PRACTICE MCQs FOR IBPS EXAMS

1. The number of pixels displayed on a screen is known as the _____ screen.
a) Viewing size
b) Color depth
c) Refresh rate
d) Resolutions
e) None of these

2. A proxy server is used for which of the following?
a) To process client requests for web pages
b) To process client requests for database access
c) To provide TCP/IP
d) To provide security against unauthorized users
e) None of these

3. A contains buttons and menus that provide quick access to commonly used commands?
a) Menu bar
b) Tool bar
c) Window
d) Action bar
e) None of these

4. Which among the following is not a security / privacy risk?
a) Hacking
b) Virus
c) Spam
d) Phishing
e) None of these

5. Which of the key is not on the number keypad?
a) Ctrl
b) Del
c) Enter
d) Num Lock
e) None of these

6. Which of the following refers to stand alone programs?
a) Executable programs
b) Source program
c) Object programs
d) All of the above
e) None of the above

7. What is the keyboard shortcut to move backward through the tabs?
a) SHIFT+TAB
b) CTRL+SHIFT+TAB
c) CTRL+TAB
d) ALT+TAB
e) None of these

8. What is the most common tool used to restrict access?
a) Access control software
b) Computer keys
c) User logins
d) Passwords
e) None of these

9. Which of the following is not an example of a document file?
a) Spreadsheet
b) Memo
c) Letter
d) Term paper
e) Thesis

10. What menu is selected to cut, copy, and paste?
a) File
b) Edit
c) Tools
d) Table
e) None of the above

11. A network geometric arrangement in which a single connection line is shared by a number of nodes is called?
a) Ring Topology
b) Bus Topology
c) Star topology
d) All of these
e) None of these

12. In Windows operating system the shortcut key CTRL+R is used to?
a) Open the print dialog box
b) Update the current web page
c) Close the current window
d) Close the current window
e) None of these

13. What is the other name for a LAN Card?
a) Network Connector
b) MODEM
c) Internet Card
d) Network Interface Card
e) None of these

14. MS Word allows creation of _____ type of documents by default?
a) .txt
b) .win
c) .dot
d) .doc
e) None of these

15. The process of a computer receiving information from a server on the Internet is known as?
a) Pulling
b) Pushing
c) Downloading
d) Transferring
e) None of these

16. Which of the following is the "Bubble Memory"?
a) Nonvolatile
b) Volatile
c) Permanent
d) Primary memory
e) None of these

17. Which of the following is not a standard MS Office Edition?
a) Standard
b) Professional
c) Normal
d) Advanced
e) None of these

18. Windows Explorer is a __________?
a) Drive
b) Browser
c) Network
d) Data Base
e) File Manager

19. Which type of protocol is used for accessing internet/ web on mobile phones?
a) HTTP
b) PPP
c) FTP
d) WAP
e) SMPT

20. When sending an e-mail, the _____ line describes the contents
of the message?
a) Subject
b) to
c) Contents
d) cc
e) None of these

21. Uniform resource locator is another name of________?
a) Title bar
b) Web address
c) Title bar
d) Address bar
e) Formula bar

22. What is the default font size of cell content in EXCEL?
a) 8
b) 9
c) 10
d) 11
e) 12

23. Basic Input Output System (BIOS) is necessary for?
a) Boot-up
b) Mouse and keyboard only
c) Revolutions
d) Audio and video system
e) None of these

24. Which of the following cables can transmit data at high speeds?
a) Coaxial Cable
b) Optic Fiber Cable
c) UTP Cable
d) Twisted pair Cable
e) None of these

25. The software that allows users to surf the Internet is called an?
a) Search engine
b) Internet Service Provider (ISP)
c) Multimedia application
d) Browser
e) None of these

26. Shimmer Sparkle Text, Blinking Background, etc are known as?
a) Front style
b) Word Art
c) Font effects
d) Text Layout
e) Text effect

27. The Output Quality of a printer is measured by?
a) Dots per sq inch
b) Dots per inch
c) Dots printed per unit
d) Dots printed per line
e) None of these

28. Which of the following is not an Internet connection?
a) Broadband
b) WWAN
c) DSL
d) WLAN
e) Dial-up

29. Unsolicited commercial email is commonly known as?
a) Junk
b) Spam
c) Hoaxes
d) Hypertext
e) None of these

30. Which of the following is not an output device?
a) Plotter
b) Printer
c) Monitor
d) Touch Screen
e) None of these

31. Which process checks to ensure that the components of the computer are operating and connected properly?
a) Processing
b) Saving
c) Editing
d) Booting
e) None of these

32. ________ file format is used for data compression and archiving?
a) .exe
b) .in
c) .com
d) .zip
e) .win

33. ________ is a combination of software and hardware?
a) Firmware
b) Shareware
c) Freeware
d) Netware
e) Software

34. To move to the beginning of a line of text, press the _______ key?
a) Alt
b) Page up
c) Enter
d) Home
e) None of these

35. 'DOS' floppy disk does not have?
a) A Boot Record
b) A File Allocation Table
c) A Root Directory
d) Virtual Memory
e) BIOS

36. ISDN is an Acronym?
a) Integrated Standard Digital Network
b) Intelligent Services Digital Network
c) Integrated Services Digital Network
d) Integrated Services Data Network
e) None of these

37. Which of the following is not a term pertaining to the internet?
a) Link
b) Touch Pad
c) Browser
d) Search engine
e) All of these

38. To insert a new slide in the current presentation, we can choose?
a) CTRL + N
b) CTRL + O
c) CTRL + F
d) CTRL + M
e) None of these

39. Multiple calculations can be made in a single formula using?
a) Standard Formula
b) Array Formula
c) Complex Formula
d) Smart Formula
e) None of these

40. Which of the following is used to identify a user who returns to a Website?
a) ASPs
b) Scripts
c) Plug-ins
d) Cookies
e) None of these

ANSWERS:
1) d 2) d 3) b 4) c 5) a 6) a 7) b 8) d 9) a 10) b
11) b 12) b 13) d 14) d 15) c 16) a 17) d 18) e 19) d 20) a
21) b 22) d 23) a 24) b 25) d 26) e 27) a 28) b 29) b 30) d
31) d 32) d 33) b 34) d 35) d 36) c 37) b 38) d 39) b 40) d