1. To access properties of an object, the mouse technique to use is .........
1) right-clicking
2) shift-clicking
3) dragging
4) dropping
5) None of these
2. What is the term for unsolicited e-mail?
1) news group
2) use net
3) backbone
4) flaming
5) spam
3. A device operating at the physical layer is called a......
1) Bridge
2) Router
3) Repeater
4) All of the above
5) None of these
4. A ..... can make it easier to play games.
1) mouse
2) joystick
3) keyboard
4) pen
5) None of these
5. The blinking symbol on the computer screen is called the .....
1) mouse
2) logo
3) hand
4) palm
5) cursor
6. To make the number pad act as directional arrows, you press the ........ key.
1) shift
2) arrow lock
3) num lock
4) caps lock
5) None of these
7. Something which has easily-understood instructions is said to be ........
1) user friendly
2) information
3) word processing
4) icon
5) None of these
8. What is output?
1) what the processor takes from the user
2) what the user gives to the processor
3) what the processor gets from the user
4) what the processor gives to the user
5) None of these
9. The basic building block of a database that contains related record is .......
1) Query
2) Form
3) Table
4) Edited page
5) Report
10. Softcopy is the intangible output, so then what is hardcopy?
1) the physical parts of the computer
2) the printed parts of the computer
3) the printed output
4) the physical output devices
5) None of these
11. Difference between Direct and Indirect Bank Marketing is .......
1) Direct Marketing is to Bank's employees, Indirect is to outsiders
2) Direct Marketing is to outsiders, Indirect is to employees
3) Direct Marketing is to Bank's owners, Indirect is to outsiders
4) Direct Marketing is to other Bank's, Indirect is to outsiders
5) None of these
12. Transaction Marketing means ......
1) Marketing only to strangers
2) Mere selling of goods
3) Doing banking transactions
4) All of the above
5) None of these
13. In marketing it is necessary to identify ....
1) Potential sellers
2) Selling employees
3) Potential products and services
4) Key existing and potential customers
5) All of the above
14. NRI is an easy target for effective marketing because .........
1) he likes Indian goods
2) he does not like Indian goods
3) he is easily approachable
4) it is cheaper to contact NRIs
5) There are special products designed for NRIs
15. A DSA helps in .......
1) Boosting direct sales
2) Contacting customers on the net
3) Indirect marketing
4) Direct telemarketing
5) None of these
16. Marketing is required for .........
1) Boosting productions
2) Boosting sales
3) Boosting profits
4) Improving customer service
5) All of the above
17. A cold call is ......
1) Best way to do marketing
2) A last resort for marketers
3) Marketing at random
4) All of the above
5) None of these
18. A call can be effective by .......
1) Making a phone call
2) Sending an e-mail
3) Calling on friends
4) Service with several facilities
5) Personally calling on prospective customers
19. Good selling skills involves .......
1) Alertness
2) Knowledge
3) Perseverance
4) Empathy
5) None of these
20. Which of the following is not channel for bank marketing?
1) Telemarketing
2) Internet Banking
3) Mobile banking
4) Existing satisfied customers
5) None of these
21. A Prospect means .....
1) A person likely to work in a bank
2) College syllabus
3) A religious buyer
4) A likely buyer
5) None of these
22. Product development is ......
1) Useful for bank marketing
2) Not useful for bank marketing
3) They have no role to play in bank marketing
4) All of the above
5) None of these
23. Marketing is successful when .......
1) Demand exceeds supply
2) Supply exceeds demand
3) Exports are heavy and costly
4) Salesmen are effectively trained
5) All the above situations
24. In marketing, market penetration means ...
1) Entering likely purchasers houses
2) Entering stores and shops
3) Covering a wide area of the market
4) All of the above
5) None of these
25. Innovation helps in ........
1) Designing new products
2) Improving marketing functions
3) Increasing sales
4) New methods for increasing prospects
5) All of the above
26. Marketing strategy means ......
1) New ideas to true more customers
2) New methods to retain the customers
3) New ways to contact the new customers
4) New marketing techniques
5) All of the above
27. Successful marketing strategies need......
1) Knowledge of customers tastes
2) Good leadership
3) Proper direction and guidance
4) Knowledge of peers
5) All of the above
28. Promotion means .....
1) Additional responsibility
2) Doing research in marketing
3) Advertisement and publicity for marketing
4) Going up the ladder in Government establishments
5) All of the above
29. Diversification means ......
1) Marketing in diverse countries
2) Marketing in diverse companies
3) Making new diverse products
4) Used only for transactions with foreign countries
5) All of the above
30. Motivation is very much required effective marketing. What other qualities are required?
1) Confidence
2) Effective communication skills
3) Team work
4) Perseverance
5) All of the above
ANSWERS:
1-1, 2-2, 3-3, 4-2, 5-5, 6-3, 7-1, 8-4, 9-5, 10-3
11-5, 12-4, 13-5, 14-5, 15-4, 16-5, 17-2, 18-5, 19-5, 20-5
21-4, 22-1, 23-4, 24-3, 25-1, 26-5, 27-5, 28-3, 29-3, 30-5.
Computer Knowledge is highly scoring section in IBPS POs and RRB (Regional Rural Banks) Examinations. All the questions will be from well known concepts such as Computer Terminology, Basic Computer Architecture, Internet, MS-Office, E-Commerce, Computer Network etc. The questions may be theoretical and also require knowledge of facts and application.
Friday, 18 July 2014
Saturday, 14 June 2014
COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS
1. The number of pixels displayed on a screen is known as the _____ screen.
a) Viewing size
b) Color depth
c) Refresh rate
d) Resolutions
e) None of these
2. A proxy server is used for which of the following?
a) To process client requests for web pages
b) To process client requests for database access
c) To provide TCP/IP
d) To provide security against unauthorized users
e) None of these
3. A contains buttons and menus that provide quick access to commonly used commands?
a) Menu bar
b) Tool bar
c) Window
d) Action bar
e) None of these
4. Which among the following is not a security / privacy risk?
a) Hacking
b) Virus
c) Spam
d) Phishing
e) None of these
5. Which of the key is not on the number keypad?
a) Ctrl
b) Del
c) Enter
d) Num Lock
e) None of these
6. Which of the following refers to stand alone programs?
a) Executable programs
b) Source program
c) Object programs
d) All of the above
e) None of the above
7. What is the keyboard shortcut to move backward through the tabs?
a) SHIFT+TAB
b) CTRL+SHIFT+TAB
c) CTRL+TAB
d) ALT+TAB
e) None of these
8. What is the most common tool used to restrict access?
a) Access control software
b) Computer keys
c) User logins
d) Passwords
e) None of these
9. Which of the following is not an example of a document file?
a) Spreadsheet
b) Memo
c) Letter
d) Term paper
e) Thesis
10. What menu is selected to cut, copy, and paste?
a) File
b) Edit
c) Tools
d) Table
e) None of the above
11. A network geometric arrangement in which a single connection line is shared by a number of nodes is called?
a) Ring Topology
b) Bus Topology
c) Star topology
d) All of these
e) None of these
12. In Windows operating system the shortcut key CTRL+R is used to?
a) Open the print dialog box
b) Update the current web page
c) Close the current window
d) Close the current window
e) None of these
13. What is the other name for a LAN Card?
a) Network Connector
b) MODEM
c) Internet Card
d) Network Interface Card
e) None of these
14. MS Word allows creation of _____ type of documents by default?
a) .txt
b) .win
c) .dot
d) .doc
e) None of these
15. The process of a computer receiving information from a server on the Internet is known as?
a) Pulling
b) Pushing
c) Downloading
d) Transferring
e) None of these
16. Which of the following is the "Bubble Memory"?
a) Nonvolatile
b) Volatile
c) Permanent
d) Primary memory
e) None of these
17. Which of the following is not a standard MS Office Edition?
a) Standard
b) Professional
c) Normal
d) Advanced
e) None of these
18. Windows Explorer is a __________?
a) Drive
b) Browser
c) Network
d) Data Base
e) File Manager
19. Which type of protocol is used for accessing internet/ web on mobile phones?
a) HTTP
b) PPP
c) FTP
d) WAP
e) SMPT
20. When sending an e-mail, the _____ line describes the contents of the message?
a) Subject
b) to
c) Contents
d) cc
e) None of these
21. Uniform resource locator is another name of________?
a) Title bar
b) Web address
c) Title bar
d) Address bar
e) Formula bar
22. What is the default font size of cell content in EXCEL?
a) 8
b) 9
c) 10
d) 11
e) 12
23. Basic Input Output System (BIOS) is necessary for?
a) Boot-up
b) Mouse and keyboard only
c) Revolutions
d) Audio and video system
e) None of these
24. Which of the following cables can transmit data at high speeds?
a) Coaxial Cable
b) Optic Fiber Cable
c) UTP Cable
d) Twisted pair Cable
e) None of these
25. The software that allows users to surf the Internet is called an?
a) Search engine
b) Internet Service Provider (ISP)
c) Multimedia application
d) Browser
e) None of these
26. Shimmer Sparkle Text, Blinking Background, etc are known as?
a) Front style
b) Word Art
c) Font effects
d) Text Layout
e) Text effect
27. The Output Quality of a printer is measured by?
a) Dots per sq inch
b) Dots per inch
c) Dots printed per unit
d) Dots printed per line
e) None of these
28. Which of the following is not an Internet connection?
a) Broadband
b) WWAN
c) DSL
d) WLAN
e) Dial-up
29. Unsolicited commercial email is commonly known as?
a) Junk
b) Spam
c) Hoaxes
d) Hypertext
e) None of these
30. Which of the following is not an output device?
a) Plotter
b) Printer
c) Monitor
d) Touch Screen
e) None of these
31. Which process checks to ensure that the components of the computer are operating and connected properly?
a) Processing
b) Saving
c) Editing
d) Booting
e) None of these
32. ________ file format is used for data compression and archiving?
a) .exe
b) .in
c) .com
d) .zip
e) .win
33. ________ is a combination of software and hardware?
a) Firmware
b) Shareware
c) Freeware
d) Netware
e) Software
34. To move to the beginning of a line of text, press the _______ key?
a) Alt
b) Page up
c) Enter
d) Home
e) None of these
35. 'DOS' floppy disk does not have?
a) A Boot Record
b) A File Allocation Table
c) A Root Directory
d) Virtual Memory
e) BIOS
36. ISDN is an Acronym?
a) Integrated Standard Digital Network
b) Intelligent Services Digital Network
c) Integrated Services Digital Network
d) Integrated Services Data Network
e) None of these
37. Which of the following is not a term pertaining to the internet?
a) Link
b) Touch Pad
c) Browser
d) Search engine
e) All of these
38. To insert a new slide in the current presentation, we can choose?
a) CTRL + N
b) CTRL + O
c) CTRL + F
d) CTRL + M
e) None of these
39. Multiple calculations can be made in a single formula using?
a) Standard Formula
b) Array Formula
c) Complex Formula
d) Smart Formula
e) None of these
40. Which of the following is used to identify a user who returns to a Website?
a) ASPs
b) Scripts
c) Plug-ins
d) Cookies
e) None of these
ANSWERS:
1) d 2) d 3) b 4) c 5) a 6) a 7) b 8) d 9) a 10) b
11) b 12) b 13) d 14) d 15) c 16) a 17) d 18) e 19) d 20) a
21) b 22) d 23) a 24) b 25) d 26) e 27) a 28) b 29) b 30) d
31) d 32) d 33) b 34) d 35) d 36) c 37) b 38) d 39) b 40) d
a) Viewing size
b) Color depth
c) Refresh rate
d) Resolutions
e) None of these
2. A proxy server is used for which of the following?
a) To process client requests for web pages
b) To process client requests for database access
c) To provide TCP/IP
d) To provide security against unauthorized users
e) None of these
3. A contains buttons and menus that provide quick access to commonly used commands?
a) Menu bar
b) Tool bar
c) Window
d) Action bar
e) None of these
4. Which among the following is not a security / privacy risk?
a) Hacking
b) Virus
c) Spam
d) Phishing
e) None of these
5. Which of the key is not on the number keypad?
a) Ctrl
b) Del
c) Enter
d) Num Lock
e) None of these
6. Which of the following refers to stand alone programs?
a) Executable programs
b) Source program
c) Object programs
d) All of the above
e) None of the above
7. What is the keyboard shortcut to move backward through the tabs?
a) SHIFT+TAB
b) CTRL+SHIFT+TAB
c) CTRL+TAB
d) ALT+TAB
e) None of these
8. What is the most common tool used to restrict access?
a) Access control software
b) Computer keys
c) User logins
d) Passwords
e) None of these
9. Which of the following is not an example of a document file?
a) Spreadsheet
b) Memo
c) Letter
d) Term paper
e) Thesis
10. What menu is selected to cut, copy, and paste?
a) File
b) Edit
c) Tools
d) Table
e) None of the above
11. A network geometric arrangement in which a single connection line is shared by a number of nodes is called?
a) Ring Topology
b) Bus Topology
c) Star topology
d) All of these
e) None of these
12. In Windows operating system the shortcut key CTRL+R is used to?
a) Open the print dialog box
b) Update the current web page
c) Close the current window
d) Close the current window
e) None of these
13. What is the other name for a LAN Card?
a) Network Connector
b) MODEM
c) Internet Card
d) Network Interface Card
e) None of these
14. MS Word allows creation of _____ type of documents by default?
a) .txt
b) .win
c) .dot
d) .doc
e) None of these
15. The process of a computer receiving information from a server on the Internet is known as?
a) Pulling
b) Pushing
c) Downloading
d) Transferring
e) None of these
16. Which of the following is the "Bubble Memory"?
a) Nonvolatile
b) Volatile
c) Permanent
d) Primary memory
e) None of these
17. Which of the following is not a standard MS Office Edition?
a) Standard
b) Professional
c) Normal
d) Advanced
e) None of these
18. Windows Explorer is a __________?
a) Drive
b) Browser
c) Network
d) Data Base
e) File Manager
19. Which type of protocol is used for accessing internet/ web on mobile phones?
a) HTTP
b) PPP
c) FTP
d) WAP
e) SMPT
20. When sending an e-mail, the _____ line describes the contents of the message?
a) Subject
b) to
c) Contents
d) cc
e) None of these
21. Uniform resource locator is another name of________?
a) Title bar
b) Web address
c) Title bar
d) Address bar
e) Formula bar
22. What is the default font size of cell content in EXCEL?
a) 8
b) 9
c) 10
d) 11
e) 12
23. Basic Input Output System (BIOS) is necessary for?
a) Boot-up
b) Mouse and keyboard only
c) Revolutions
d) Audio and video system
e) None of these
24. Which of the following cables can transmit data at high speeds?
a) Coaxial Cable
b) Optic Fiber Cable
c) UTP Cable
d) Twisted pair Cable
e) None of these
25. The software that allows users to surf the Internet is called an?
a) Search engine
b) Internet Service Provider (ISP)
c) Multimedia application
d) Browser
e) None of these
26. Shimmer Sparkle Text, Blinking Background, etc are known as?
a) Front style
b) Word Art
c) Font effects
d) Text Layout
e) Text effect
27. The Output Quality of a printer is measured by?
a) Dots per sq inch
b) Dots per inch
c) Dots printed per unit
d) Dots printed per line
e) None of these
28. Which of the following is not an Internet connection?
a) Broadband
b) WWAN
c) DSL
d) WLAN
e) Dial-up
29. Unsolicited commercial email is commonly known as?
a) Junk
b) Spam
c) Hoaxes
d) Hypertext
e) None of these
30. Which of the following is not an output device?
a) Plotter
b) Printer
c) Monitor
d) Touch Screen
e) None of these
31. Which process checks to ensure that the components of the computer are operating and connected properly?
a) Processing
b) Saving
c) Editing
d) Booting
e) None of these
32. ________ file format is used for data compression and archiving?
a) .exe
b) .in
c) .com
d) .zip
e) .win
33. ________ is a combination of software and hardware?
a) Firmware
b) Shareware
c) Freeware
d) Netware
e) Software
34. To move to the beginning of a line of text, press the _______ key?
a) Alt
b) Page up
c) Enter
d) Home
e) None of these
35. 'DOS' floppy disk does not have?
a) A Boot Record
b) A File Allocation Table
c) A Root Directory
d) Virtual Memory
e) BIOS
36. ISDN is an Acronym?
a) Integrated Standard Digital Network
b) Intelligent Services Digital Network
c) Integrated Services Digital Network
d) Integrated Services Data Network
e) None of these
37. Which of the following is not a term pertaining to the internet?
a) Link
b) Touch Pad
c) Browser
d) Search engine
e) All of these
38. To insert a new slide in the current presentation, we can choose?
a) CTRL + N
b) CTRL + O
c) CTRL + F
d) CTRL + M
e) None of these
39. Multiple calculations can be made in a single formula using?
a) Standard Formula
b) Array Formula
c) Complex Formula
d) Smart Formula
e) None of these
40. Which of the following is used to identify a user who returns to a Website?
a) ASPs
b) Scripts
c) Plug-ins
d) Cookies
e) None of these
ANSWERS:
1) d 2) d 3) b 4) c 5) a 6) a 7) b 8) d 9) a 10) b
11) b 12) b 13) d 14) d 15) c 16) a 17) d 18) e 19) d 20) a
21) b 22) d 23) a 24) b 25) d 26) e 27) a 28) b 29) b 30) d
31) d 32) d 33) b 34) d 35) d 36) c 37) b 38) d 39) b 40) d
Sunday, 8 June 2014
COMPUTER AWARENESS PRACTICE QUESTIONS FOR SBI P.O. & ASSISTANTS EXAM
1. Fire Wall is used to…..
a) Select Network
b) Protect Network
c) Highlight Network
d) All of these
e) None of these
2. The button that displays the window over the entire screen is?
a) Scroll box down size
b) Restore down
c) Minimize
d) Maximize
e) None of these
3. Which of the following cannot be done by a computer virus……?
a) Loss of Data
b) Deletion of File
c) Corruption of a Program
d) All of these
e) None of these
4. What do we call a copy printed through a computer printer……?
a) Soft Copy
b) Hard Copy
c) Computer Printed
d) Laser Print
e) None of these
5. The .xls extension is used for ______ files?
a) Windows
b) Access
c) Power Point
d) Word
e) Excel
6. What is the term for calculations used within spreadsheets?
a) Analyses
b) Ranges
c) Formulas
d) Recalculations
e) Values
7. A collection of Raw Facts is…?
a) Input
b) Output
c) Information
d) Data
e) File
8. A _________ is a computer connected to two networks?
a) link
b) Server
c) Gateway
d) Bridge way
e) None of these
9. In a customer database, a customer's surname would be keyed into a?
a) Row
b) Text field
c) Record
d) Computed field
e) None of these
10. A flaw in a program may that causes it to produce incorrect or inappropriate results is called a.….?
a) Bug
b) Hacking
c) Phishing
d) Attribute
e) None of these
11. Which of the following can input graphical images and picture for computers?
a) Plotter
b) Scanner
c) Mouse
d) Printer
e) Keyboard
12. Attributes can defined as?
a) Entity
b) Switch board
c) Macro
d) Pages
e) None of the above
13. Where will we find the referential integrity command?
a) Tools
b) Switch Board
c) Format
d) Table
e) None of these
14. What refers to a set of characters of a particular design?
a) Key face
b) Formation
c) Calligraph
d) Stencil
e) Type face
15. Smart Card is….?
a) Special Purpose Card
b) Micro Processor Card
c) Processing unit contains memory for storing data
d) Processing unit for Software handling
e) None of these
16. Which of the following would you find on LinkedIn?
a) Games
b) Connections
c) Chat
d) Applications
e) None of these
17. What is a URL?
a) A computers software program
b) Atype of programming object
c) The address of a documents or 'page' on the World Wide Web
d) An Acronym for Unlimited Resources for learning
e) A piece of Hardware
18. ______ is a technique that is used to send more than one call over a single line?
a) Digital transmission
b) Infrared transmission
c) Digitizing
d) Multiplexing
e) Streaming
19. To access properties of an object, the mouse technique to use is?
a) Dragging
b) Dropping
c) Right-clicking
d) Shift-clicking
e) None of these
20. For internet banking a customer requires…….?
a) Personal Computer and a telephone line
b) Personal Computer, telephone line and modem
c) Personal Computer, telephone line & Internet Service Provider
d) Personal Computer, telephone line, modem & Internet Service Providers
e) None of these
21. A touchpad responds to?
a) Light
b) Pressure
c) clicking
d) the sense of heat from fingerprints
e) None of these
22. The computer that hosts your email account is known as ?
a) Host
b) e-mail client
c) e-mail server
d) Listserv
e) None of these
23. The most common pointing input devices?
a) Trackball
b) Touchpad
c) Touch screen
d) Mouse
e) Scanner
24. What does a website address uniquely specify?
a) Web Browser
b) Web site
c) PDA
d) Storage
e) Hard disk
25. Expansion cards are inserted into?
a) Slots
b) Peripheral devices
c) The CPU
d) The Back of the computers
e) Pegs
26. The Name of a Microsoft office word document is displayed in both the _________ and the taskbar?
a) Menu bar
b) Task bar
c) Formatting Tool bar
d) Standard Tool bar
e) Title bar
27. The display size of a monitor is measured ?
a) Zig- zag
b) Horizontally
c) Vertically
d) From center to the furthest corner
e) Diagonally
28. Operating system's and utility program are in a class of software known as?
a) Application Software
b) Sequential software
c) Software suites
d) BIOS Software
e) System software
29. The justification that aligns text on both margins of document in Word is?
a) Justify
b) Bold
c) Centre
d) Right
e) Balanced
30. What do we call the Inbuilt Storage Device in the Computer……?
a) Hard Disk
b) Mother Board
c) RAM
d) ROM
e) None of these
31. A byte can represent any number between 0 and _____?
a) 2
b) 255
c) 256
d) 1024
e) 1025
32. Which part of the computer helps to store information?
a) Monitor
b) Keyboard
c) Disk drive
d) Printer
e) None of these
33. Linux is a type of____ software?
a) Share ware
b) Commercial
c) Proprietary
d) Open source
e) Hidden type
34. Which key is used to delete one character to the left of the current position of the cursor?
a) Backspace
b) Delete
c) Insert
d) Esc
e) Ctrl
35. What of the following means the altering of computer system software to achieve a task for which it was not originally designed…?
a) Breaking
b) Hacking
c) Trekking
d) Pegging
e) None of these
36. POST stands for?
a) Power on Self Test
b) Program on self test
c) Power on system test
d) Program on system test
e) None of these
37. An educational institution would generally have the following in its domain name?
a) .org
b) .edu
c) .inst
d) .com
e) .sch
38. Which of the following is not a term pertaining to the Internet?
a) Keyboard
b) Link
c) Browser
d) Search engine
e) Hyper link
39. Which of the following is used by the browser to connect to the location of the Internet resources?
a) Linkers
b) Protocol
c) Cable
d) URL
e) None of these
40. Which of the following is Hardware and not software?
a) Excel
b) Printer driver
c) Operating System
d) Power Point
e) CPU
ANSWERS:
1) b 2) d 3) e 4) b 5) e 6) c 7) d 8) b 9) d 10) a
11) b 12) a 13) e 14) c 15) c 16) b 17) c 18) d 19) c 20) d
21) d 22) c 23) c 24) b 25) a 26) d 27) e 28) e 29) a 30) a
31) b 32) c 33) a 34) a 35) b 36) a 37) b 38) a 39) d 40) e
a) Select Network
b) Protect Network
c) Highlight Network
d) All of these
e) None of these
2. The button that displays the window over the entire screen is?
a) Scroll box down size
b) Restore down
c) Minimize
d) Maximize
e) None of these
3. Which of the following cannot be done by a computer virus……?
a) Loss of Data
b) Deletion of File
c) Corruption of a Program
d) All of these
e) None of these
4. What do we call a copy printed through a computer printer……?
a) Soft Copy
b) Hard Copy
c) Computer Printed
d) Laser Print
e) None of these
5. The .xls extension is used for ______ files?
a) Windows
b) Access
c) Power Point
d) Word
e) Excel
6. What is the term for calculations used within spreadsheets?
a) Analyses
b) Ranges
c) Formulas
d) Recalculations
e) Values
7. A collection of Raw Facts is…?
a) Input
b) Output
c) Information
d) Data
e) File
8. A _________ is a computer connected to two networks?
a) link
b) Server
c) Gateway
d) Bridge way
e) None of these
9. In a customer database, a customer's surname would be keyed into a?
a) Row
b) Text field
c) Record
d) Computed field
e) None of these
10. A flaw in a program may that causes it to produce incorrect or inappropriate results is called a.….?
a) Bug
b) Hacking
c) Phishing
d) Attribute
e) None of these
11. Which of the following can input graphical images and picture for computers?
a) Plotter
b) Scanner
c) Mouse
d) Printer
e) Keyboard
12. Attributes can defined as?
a) Entity
b) Switch board
c) Macro
d) Pages
e) None of the above
13. Where will we find the referential integrity command?
a) Tools
b) Switch Board
c) Format
d) Table
e) None of these
14. What refers to a set of characters of a particular design?
a) Key face
b) Formation
c) Calligraph
d) Stencil
e) Type face
15. Smart Card is….?
a) Special Purpose Card
b) Micro Processor Card
c) Processing unit contains memory for storing data
d) Processing unit for Software handling
e) None of these
16. Which of the following would you find on LinkedIn?
a) Games
b) Connections
c) Chat
d) Applications
e) None of these
17. What is a URL?
a) A computers software program
b) Atype of programming object
c) The address of a documents or 'page' on the World Wide Web
d) An Acronym for Unlimited Resources for learning
e) A piece of Hardware
18. ______ is a technique that is used to send more than one call over a single line?
a) Digital transmission
b) Infrared transmission
c) Digitizing
d) Multiplexing
e) Streaming
19. To access properties of an object, the mouse technique to use is?
a) Dragging
b) Dropping
c) Right-clicking
d) Shift-clicking
e) None of these
20. For internet banking a customer requires…….?
a) Personal Computer and a telephone line
b) Personal Computer, telephone line and modem
c) Personal Computer, telephone line & Internet Service Provider
d) Personal Computer, telephone line, modem & Internet Service Providers
e) None of these
21. A touchpad responds to?
a) Light
b) Pressure
c) clicking
d) the sense of heat from fingerprints
e) None of these
22. The computer that hosts your email account is known as ?
a) Host
b) e-mail client
c) e-mail server
d) Listserv
e) None of these
23. The most common pointing input devices?
a) Trackball
b) Touchpad
c) Touch screen
d) Mouse
e) Scanner
24. What does a website address uniquely specify?
a) Web Browser
b) Web site
c) PDA
d) Storage
e) Hard disk
25. Expansion cards are inserted into?
a) Slots
b) Peripheral devices
c) The CPU
d) The Back of the computers
e) Pegs
26. The Name of a Microsoft office word document is displayed in both the _________ and the taskbar?
a) Menu bar
b) Task bar
c) Formatting Tool bar
d) Standard Tool bar
e) Title bar
27. The display size of a monitor is measured ?
a) Zig- zag
b) Horizontally
c) Vertically
d) From center to the furthest corner
e) Diagonally
28. Operating system's and utility program are in a class of software known as?
a) Application Software
b) Sequential software
c) Software suites
d) BIOS Software
e) System software
29. The justification that aligns text on both margins of document in Word is?
a) Justify
b) Bold
c) Centre
d) Right
e) Balanced
30. What do we call the Inbuilt Storage Device in the Computer……?
a) Hard Disk
b) Mother Board
c) RAM
d) ROM
e) None of these
31. A byte can represent any number between 0 and _____?
a) 2
b) 255
c) 256
d) 1024
e) 1025
32. Which part of the computer helps to store information?
a) Monitor
b) Keyboard
c) Disk drive
d) Printer
e) None of these
33. Linux is a type of____ software?
a) Share ware
b) Commercial
c) Proprietary
d) Open source
e) Hidden type
34. Which key is used to delete one character to the left of the current position of the cursor?
a) Backspace
b) Delete
c) Insert
d) Esc
e) Ctrl
35. What of the following means the altering of computer system software to achieve a task for which it was not originally designed…?
a) Breaking
b) Hacking
c) Trekking
d) Pegging
e) None of these
36. POST stands for?
a) Power on Self Test
b) Program on self test
c) Power on system test
d) Program on system test
e) None of these
37. An educational institution would generally have the following in its domain name?
a) .org
b) .edu
c) .inst
d) .com
e) .sch
38. Which of the following is not a term pertaining to the Internet?
a) Keyboard
b) Link
c) Browser
d) Search engine
e) Hyper link
39. Which of the following is used by the browser to connect to the location of the Internet resources?
a) Linkers
b) Protocol
c) Cable
d) URL
e) None of these
40. Which of the following is Hardware and not software?
a) Excel
b) Printer driver
c) Operating System
d) Power Point
e) CPU
ANSWERS:
1) b 2) d 3) e 4) b 5) e 6) c 7) d 8) b 9) d 10) a
11) b 12) a 13) e 14) c 15) c 16) b 17) c 18) d 19) c 20) d
21) d 22) c 23) c 24) b 25) a 26) d 27) e 28) e 29) a 30) a
31) b 32) c 33) a 34) a 35) b 36) a 37) b 38) a 39) d 40) e
Tuesday, 22 April 2014
COMPUTER KNOWLEDGE PRACTICE MCQs FOR SBI P.O. EXAM
1. Registers are located in _____
a) Memory
b) ALU
c) OS
d) CPU
e) None of these
2. ODBC stands for
a) object database connectivity
b) oral database connectivity
c) oracle database connectivity
d) open database connectivity
e) none of these
3. Which kind of malware typically has a tendency to reside in/to get attach to a computer program?
a) Worm
b) Trojan Horse
c) Computer Virus
d) All the Above
e) None of the above
4. What does router do in a network?
a) forwards a packet to all outgoing links
b) forwards a packet to the next free outgoing links
c) determines on which outgoing link a packet is to be forwarded
d) forwards a packet to all outgoing links except the originated link
e) none of these
5. Each cell in a Microsoft office excel document is referred to by its cell address, which is the…
a) cell's column label
b) cell's column label and work sheet tab name
c) cell's row and column labels
d) cell's row label
e) none of these
6. Windows 7 is an example of a(n)
a) Application software
b) browser
c) operating system
d) shareware
e) none of these
7. Many individuals create their own personal sites called web logs or
a) Social network
b) blogs
c) wikis
d) search engines
e) none of these
8. Programs that automatically submit your search request to several search engines simultaneously are called
a) Meta search engines
b) inclusive search engines
c) spiders
d) hits
e) none of these
9. LINKEDIN is a _____
a) Search Engine
b) Web Browser
c) Social Networking Site
d) Name of Operating System
e) None of these
10. A computer that is on the network is a
a) Node
b) terminal
c) client
d) online
e) none of these
11. The name a user assigns to a document is called a(n)
a) File name
b) Program
c) Record
d) Data
e) None of these
12. The system /tool which has made it possible to reduce paper work in offices is_______:
a) LAN
b) WAN
c) E-mail
d) Paper shredder
e) None of these
13. Decision support system in banking technology means a system which_____:
a) Allows creation of simulations
b) Allows analyzing created situations
c) Dont Allows creation of simulations
d) a, b
e) None of these
14. Computer audit involves review of ____
a) Established policies
b) Efficiency of operations
c) Checking of data integrity
d) All
e) None of these
15. The electronic payment system seeks to automate financial transactions as far as possible. What is the most popular electronic payment system?
a) The ATM
b) The HWAK
c) Electronic Purse
d) Electronic Cheque
e) None of these
16. The ____ is a device that connects in inputs to out puts
a) cross point
b) crossbar
c) modem
d) RAM
e) none of these
17. Which multiplexing technique transmits analogue signals?
a) FDM
b) synchronous TDM
c) asynchronous TDM
d) 2 and 3
e) none
18. ______was a search engine
system for the Gopher protocol
a) gobbler
b) archie
c) mikky
d) veronica
e) none of these
19. array is _____
a) linear data structure
b) object
c) class
d) interface
e) none of these
20. Flash memory is a type of ___ ?
a) ROM
b) PROM
c) EPROM
d) EEPROM
e) RAM
21. Data going into the computer is called
a) output
b) algorithm
c) input
d) flowchart
e) all of these
22. How many values can be represented by a single byte?
a) 4
b) 16
c) 64
d) 256
e) 512
23. Transformation of input into output is performed by
a) Peripherals
b) memory
c) storage
d) the input output unit
e) the CPU
24. Which of the following refers to a small , single site network?
a) LAN
b) DSL
c) RAM
d) USB
e) CPU
25. A set of instructions telling the computer what to do is called
a) Mentor
b) instructor
c) compiler
d) program
e) debugger
26. Computer connected to a LAN can
a) run faster
b) go on line
c) share information
d) E-mail
e) none
27. Which of the following refers to the memory in your computer?
a) RAM
b) DSL
c) USB
d) LAN
e) CPU
28. Information travels between components on the motherboard through
a) flash memory
b) CMOS
c) bays
d) buses
e) peripherals
29. One megabyte equals approximately
a) 1000 bytes
b) 1000 bits
c) 1 million bytes
d) 1 million bits
e) 2000 bytes
30. When you are working on a document on pc, where is the document temporarily stored ?
a) RAM
b) ROM
c) the CPU
d) flash memory
e) the cd-ROM
31. If the system has no ability to store data then it is a _____
a) Dump terminal
b) Computer
c) Microprocessor
d) Microcontroller
e) Mini processor
32. _____ is an electronic device for reading printed barcodes.
a) Barcode reader
b) Barcode scanner
c) Bar code converter
d) Both a & b
e) None of these
33. The simultaneous processing of two or more Programs by multiple processors is
a) Multiprogramming
b) Multitasking
c) Time-sharing
d) Multiprocessing
e) None
34. The advantage of touch screen is ____.
a) that it is not as tiring as the keyboard input
b) that it uses little screen space for each choice
c) that it is natural to touch things
d) All of the above
e) None
35. A hacker contacts you my phone or email and attempts to acquire your password
a) Spoofing
b) phishing
c) spamming
d) bugging
e) None of these
36. Getting an instruction from the main memory to the CPU is known as _______.
a) getting
b) gathering
c) fetching
d) framing
e) downloading
37. A silicon chip containing CPU, ALU and some memory is known as _________.
a) Microcontroller
b) Microprocessor
c) Computer
d) Minicomputer
e) Laptop
38. Which of the following problem causes an exception?
a) Missing semicolon in statement in main
b) A problem in calling function
c) A syntax error
d) A run-time error
e) None of these
39. A computer derives its basic strength from
a) Speed
b) Accuracy
c) Memory
d) All the above
e) None of the above
40. To access a mainframe or supercomputer, users often use a ___.
a) terminal
b) node
c) desktop
d) handheld
e) None of these
41. Which of the following is not a mode in starting windows
a) Command Prompt
b) Safe Mode
c) Normal Mode
d) Turbo Mode
e) None of these
42. Which of the following process rearranges file fragments into contiguous files:
a) Folder folding
b) Defragmentation
c) Unfragging
d) Disk scanning
e) None of these
43. Which of the following server stores and manages files for network users?
a) Authorization Server
b) Main Server
c) Web Server
d) File Server
e) None of these
44. Custom software developed to address specific needs of a company is usually referred to as:
a) Developmental
b) Privately owned
c) Copyrighted
d) Proprietary
e) None of these
45. CD-ROM stands for:
a) Central Disk - Remote Open Mouse
b) CD - Resize
c) CD- Read Only Memory
d) CD-Remote Open Mouse
e) None of these
46. What is the name of an application program that gathers user information and sends it to someone through internet?
a) Virus
b) Spybot
c) Logic Bomb
d) Security Patch
e) None of these
47. Server or computer that provide resources to other computers connected to a?
a) Network
b) Mainframe
c) Supercomputer
d) Client
e) None of these
48. Which of the following is the fastest memory?
a) DDR RAM
b) DDR2 RAM
c) DDR3 RAM
d) Swap Memory
e) None of these
49. "Process" in computer terminology is synonymous to which of the following?
a) Job
b) Program
c) Task
d) Method
e) Call
ANSWERS:
1) d; 2) d; 3) c; 4) c; 5) c; 6) c; 7) b; 8) a; 9) c; 10) a;
11) a; 12) c; 13) d; 14) d; 15) a; 16) c; 17) a; 18) d; 19) a; 20) d;
21) c; 22) d; 23) d; 24) a; 25) d; 26) c; 27) a; 28) d; 29) c; 30) d;
31) a; 32) d; 33) d; 34) c; 35) b; 36) c; 37) b; 38) d; 39) d; 40) a;
41) d; 42) b; 43) d; 44) d; 45) c; 46) b; 47) a; 48) c; 49) c.
a) Memory
b) ALU
c) OS
d) CPU
e) None of these
2. ODBC stands for
a) object database connectivity
b) oral database connectivity
c) oracle database connectivity
d) open database connectivity
e) none of these
3. Which kind of malware typically has a tendency to reside in/to get attach to a computer program?
a) Worm
b) Trojan Horse
c) Computer Virus
d) All the Above
e) None of the above
4. What does router do in a network?
a) forwards a packet to all outgoing links
b) forwards a packet to the next free outgoing links
c) determines on which outgoing link a packet is to be forwarded
d) forwards a packet to all outgoing links except the originated link
e) none of these
5. Each cell in a Microsoft office excel document is referred to by its cell address, which is the…
a) cell's column label
b) cell's column label and work sheet tab name
c) cell's row and column labels
d) cell's row label
e) none of these
6. Windows 7 is an example of a(n)
a) Application software
b) browser
c) operating system
d) shareware
e) none of these
7. Many individuals create their own personal sites called web logs or
a) Social network
b) blogs
c) wikis
d) search engines
e) none of these
8. Programs that automatically submit your search request to several search engines simultaneously are called
a) Meta search engines
b) inclusive search engines
c) spiders
d) hits
e) none of these
9. LINKEDIN is a _____
a) Search Engine
b) Web Browser
c) Social Networking Site
d) Name of Operating System
e) None of these
10. A computer that is on the network is a
a) Node
b) terminal
c) client
d) online
e) none of these
11. The name a user assigns to a document is called a(n)
a) File name
b) Program
c) Record
d) Data
e) None of these
12. The system /tool which has made it possible to reduce paper work in offices is_______:
a) LAN
b) WAN
c) E-mail
d) Paper shredder
e) None of these
13. Decision support system in banking technology means a system which_____:
a) Allows creation of simulations
b) Allows analyzing created situations
c) Dont Allows creation of simulations
d) a, b
e) None of these
14. Computer audit involves review of ____
a) Established policies
b) Efficiency of operations
c) Checking of data integrity
d) All
e) None of these
15. The electronic payment system seeks to automate financial transactions as far as possible. What is the most popular electronic payment system?
a) The ATM
b) The HWAK
c) Electronic Purse
d) Electronic Cheque
e) None of these
16. The ____ is a device that connects in inputs to out puts
a) cross point
b) crossbar
c) modem
d) RAM
e) none of these
17. Which multiplexing technique transmits analogue signals?
a) FDM
b) synchronous TDM
c) asynchronous TDM
d) 2 and 3
e) none
18. ______was a search engine
system for the Gopher protocol
a) gobbler
b) archie
c) mikky
d) veronica
e) none of these
19. array is _____
a) linear data structure
b) object
c) class
d) interface
e) none of these
20. Flash memory is a type of ___ ?
a) ROM
b) PROM
c) EPROM
d) EEPROM
e) RAM
21. Data going into the computer is called
a) output
b) algorithm
c) input
d) flowchart
e) all of these
22. How many values can be represented by a single byte?
a) 4
b) 16
c) 64
d) 256
e) 512
23. Transformation of input into output is performed by
a) Peripherals
b) memory
c) storage
d) the input output unit
e) the CPU
24. Which of the following refers to a small , single site network?
a) LAN
b) DSL
c) RAM
d) USB
e) CPU
25. A set of instructions telling the computer what to do is called
a) Mentor
b) instructor
c) compiler
d) program
e) debugger
26. Computer connected to a LAN can
a) run faster
b) go on line
c) share information
d) E-mail
e) none
27. Which of the following refers to the memory in your computer?
a) RAM
b) DSL
c) USB
d) LAN
e) CPU
28. Information travels between components on the motherboard through
a) flash memory
b) CMOS
c) bays
d) buses
e) peripherals
29. One megabyte equals approximately
a) 1000 bytes
b) 1000 bits
c) 1 million bytes
d) 1 million bits
e) 2000 bytes
30. When you are working on a document on pc, where is the document temporarily stored ?
a) RAM
b) ROM
c) the CPU
d) flash memory
e) the cd-ROM
31. If the system has no ability to store data then it is a _____
a) Dump terminal
b) Computer
c) Microprocessor
d) Microcontroller
e) Mini processor
32. _____ is an electronic device for reading printed barcodes.
a) Barcode reader
b) Barcode scanner
c) Bar code converter
d) Both a & b
e) None of these
33. The simultaneous processing of two or more Programs by multiple processors is
a) Multiprogramming
b) Multitasking
c) Time-sharing
d) Multiprocessing
e) None
34. The advantage of touch screen is ____.
a) that it is not as tiring as the keyboard input
b) that it uses little screen space for each choice
c) that it is natural to touch things
d) All of the above
e) None
35. A hacker contacts you my phone or email and attempts to acquire your password
a) Spoofing
b) phishing
c) spamming
d) bugging
e) None of these
36. Getting an instruction from the main memory to the CPU is known as _______.
a) getting
b) gathering
c) fetching
d) framing
e) downloading
37. A silicon chip containing CPU, ALU and some memory is known as _________.
a) Microcontroller
b) Microprocessor
c) Computer
d) Minicomputer
e) Laptop
38. Which of the following problem causes an exception?
a) Missing semicolon in statement in main
b) A problem in calling function
c) A syntax error
d) A run-time error
e) None of these
39. A computer derives its basic strength from
a) Speed
b) Accuracy
c) Memory
d) All the above
e) None of the above
40. To access a mainframe or supercomputer, users often use a ___.
a) terminal
b) node
c) desktop
d) handheld
e) None of these
41. Which of the following is not a mode in starting windows
a) Command Prompt
b) Safe Mode
c) Normal Mode
d) Turbo Mode
e) None of these
42. Which of the following process rearranges file fragments into contiguous files:
a) Folder folding
b) Defragmentation
c) Unfragging
d) Disk scanning
e) None of these
43. Which of the following server stores and manages files for network users?
a) Authorization Server
b) Main Server
c) Web Server
d) File Server
e) None of these
44. Custom software developed to address specific needs of a company is usually referred to as:
a) Developmental
b) Privately owned
c) Copyrighted
d) Proprietary
e) None of these
45. CD-ROM stands for:
a) Central Disk - Remote Open Mouse
b) CD - Resize
c) CD- Read Only Memory
d) CD-Remote Open Mouse
e) None of these
46. What is the name of an application program that gathers user information and sends it to someone through internet?
a) Virus
b) Spybot
c) Logic Bomb
d) Security Patch
e) None of these
47. Server or computer that provide resources to other computers connected to a?
a) Network
b) Mainframe
c) Supercomputer
d) Client
e) None of these
48. Which of the following is the fastest memory?
a) DDR RAM
b) DDR2 RAM
c) DDR3 RAM
d) Swap Memory
e) None of these
49. "Process" in computer terminology is synonymous to which of the following?
a) Job
b) Program
c) Task
d) Method
e) Call
ANSWERS:
1) d; 2) d; 3) c; 4) c; 5) c; 6) c; 7) b; 8) a; 9) c; 10) a;
11) a; 12) c; 13) d; 14) d; 15) a; 16) c; 17) a; 18) d; 19) a; 20) d;
21) c; 22) d; 23) d; 24) a; 25) d; 26) c; 27) a; 28) d; 29) c; 30) d;
31) a; 32) d; 33) d; 34) c; 35) b; 36) c; 37) b; 38) d; 39) d; 40) a;
41) d; 42) b; 43) d; 44) d; 45) c; 46) b; 47) a; 48) c; 49) c.
Subscribe to:
Comments (Atom)