Monday 5 September 2011

COMPUTER AWARENESS PRACTICE MCQs


1. In a survey of more than 500 companies and government agencies, ____________ percent detected computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C

2. The survey showed that these businesses lost more than ____________ due to security breaches.
A. $100,000 each
B. $377 million
C. five employees each
D. $1 million
Answer: B

3. The typical computer criminal is a(n):
A. young hacker.
B. trusted employee with no criminal record.
C. trusted employee with a long, but unknown criminal record.
D. overseas young cracker.
Answer: B

4. The majority of computer crimes are committed by:
A. hackers.
B. insiders.
C. overseas criminals.
D. young teenage computer geniuses.
Answer: B

5. The common name for the crime of stealing passwords is:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: C 
Reference: Theft by Computer

6. Collecting personal information and effectively posing as another individual is known as the crime of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B

7. Malicious software is known as:
A. badware.
B. malware.
C. maliciousware.
D. illegalware.
Answer: B

8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate

9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
A. Trojan horse.
B. virus.
C. time bomb.
D. time-related bomb sequence.
Answer: B

10. In 1999, the Melissa virus was a widely publicized:
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A

11. What type of virus uses computer hosts to reproduce itself?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B

12. The thing that eventually terminates a worm virus is a lack of:
A. memory or disk space.
B. time.
C. CD drive space.
D. CD-RW.
Answer: A

13. When a logic bomb is activated by a time-related event, it is known as a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C

14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C

15. What is the name of an application program that gathers user information and sends it to someone through the Internet?
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B

16. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C

17. HTML viruses infect:
A. your computer.
B. a Web page in the HTML code.
C. both a Web page and the computer that is viewing it.
D. None
Answer: C

18. Software programs that close potential security breaches in an operating system are known as:
A. security breach fixes.
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D

19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
Answer: D

20. ___________ is the measurement of things such as fingerprints and retinal scans used for security access.
A. Biometrics
B. Biomeasurement
C. Computer security
D. Smart weapon machinery
Answer: A

21. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer: B

22. The most common passwords in the U.S. or Britain include all EXCEPT:
A. love.
B. Fred.
C. God.
D. 123.
Answer: D

23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
D. encryption safe wall.
Answer: B
24. The scrambling of code is known as:
A. encryption.
B. a firewall.
C. scrambling.
D. password-proofing.
Answer: A

25. If you want to secure a message, use a(n):
A. cryptology source.
B. encryption key.
C. encryption software package.
D. cryptosystem.
Answer: D 
Reference: How It Works: 10.2 Cryptography

26. To prevent the loss of data during power failures, use a(n):
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.
Answer: D

27. A(n) ____________ can shield electronic equipment from power spikes.
A. encryption program
B. surge protector
C. firewall
D. UPS
Answer: B

28. All of these are suggestions for safe computing EXCEPT:
A. don’t borrow disks from other people.
B. open all e-mail messages but open them slowly.
C. download shareware and freeware with caution.
D. disinfect your system.
Answer: B

29. Freeware ___________ encrypts data.
A. encryption
B. firewall software
C. PGP
D. private and public keys
Answer: C

30. ____________ is defined as any crime completed through the use of computer technology.
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer: B

31. Most computer systems rely solely on ___________ for authentication.
A. logins
B. passwords
C. encryption
D. lock and key
Answer: B

32. Creating strong computer security to prevent computer crime usually simultaneously helps protect :
A. privacy rights.
B. personal ethics.
C. the number of cookies downloaded to your personal computer.
D. personal space.
Answer: A

33. Over ___________ was spent by businesses and government to repair problems in regard to Y2K.
A. 20 million dollars
B. 100 million dollars
C. 1 billion dollars
D. 100 billion dollars
Answer: D

34. What is a complex system that takes on nearly complete responsibility for a task eliminating the
need for people, verification, or decision making?
A. Autonomous system
B. Missile defense auto-system
C. Smart weapon
D. Independent system
Answer: D

35. Security procedures can:
A. will eliminate all computer security risk.
B. reduce but not eliminate risks.
C. are prohibitively expensive.
D. are inaccessible for the average home user.
Answer: B

Sunday 4 September 2011

COMPUTER KNOWLEDGE PRACTICE MCQs

1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Ans : B

2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Ans : A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Ans : B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Ans : A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Ans : C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Ans : C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Ans : B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Ans : A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Ans : A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Ans : A

11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Ans : D

12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Ans : D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Ans : B

14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Ans : B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Ans : B

16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Ans : C

17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Ans : D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Ans : D

19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Ans : C

20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Ans : B

21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Ans : C

22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Ans : C

23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Ans : A

24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Ans : C

25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Ans : D

26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Ans : A

27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Ans : B

28. The ____________, also called the “brains” of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Ans : D

29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Ans : B

30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Ans : A

31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Ans : B

32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Ans : D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Ans : A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Ans : C

35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Ans : A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Ans : D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Ans : B

38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Ans : D

39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Ans : A

40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Ans : A

41. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Ans : D

42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Ans : A

43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Ans : B

44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Ans : C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Ans : B

46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Ans : C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Ans : B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Ans : A

49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Ans : D

50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Ans : A

Computer Awareness for Bank Exams


1. Who is called as "Father of Computers''?
(A) Charles Babage
(B) Blaise Pascal
(C) Hollirth
(D) All of these
(E) None of these

2. The first Digital Computer introduced, was named as :
(A) Univac
(B) Mark-I
(C) Eniac
(D) All of these
(E) None of these

3. How many generations, computer can be classified?
(A) 4
(B) 5
(C) 3
(D) 6
(E) None of these

4. First Generation Computers contain :
(A) Transistors
(B) Vacume Tubes
(C) LSI
(D) VLSI
(E) None of these

5. II Generation Computers are made of :
(A) Vaccume Tubes
(B) Transistors
(C) LSI
(D) VLSI
(E) None of these

6. IV Generation Computers contain :
(A) LSI
(B) Vaccume Tubes
(C) All Technology
(D) Transistors
(E) None of these

7. Vth Generation Computers are based on:
(A) Artificial Intelligence
(B) Programming Intelligence
(C) System Knowledge
(D) All of these
(E) None of these

8. Computers, combine both measuring and counting, are called :
(A) Analog
(B) Digital
(C) Hybrid
(D) All of these
(E) None of these

9. In world today, most of the computers are :
(A) Digital
(B) Hybrid
(C) Analog
(D) Complex
(E) None of these

10. In any computer installation, how many elements consists?
(A) 2
(B) 4
(C) 3
(D) 1
(E) None of these

11. Physical structure of computer is called :
(A) Software
(B) Hardware
(C) Humanware
(D) All of these
(E) None of these

12. A computer can perform, which of the following tasks?
(A) Computation
(B) Communication
(C) Processing
(D) All of these
(E) None of these

13. CPU stands for :
(A) Computer Processing Unit
(B) Central Processing Unit
(C) Both (A) & (B)
(D) Communication Processing Unit
(E) None of these

14. In which type of computer, data are represented as discrete signals?
(A) Analog computer
(B) Digital computer
(C) both
(D) Digilog Computer
(E) None of these

15. Which of the following is available in the form of a PC now?
(A) Mainframe
(B) Microcomputer
(C) Minicomputer
(D) Both (B) & (C)
(E) None of these

16. PARAM is an example of :
(A) Super computer
(B) PC
(C) Laptop
(D) PDA
(E) None of these

17. Who developed the `analytical engine'?
(A) Jacquard loom
(B) Charles Babbage
(C) Shannon
(D) IBM
(E) None of these

18. ENIAC stands for :
(A) Electrical Numerical Integrator and Calculator
(B) Electronic Numerical Integrator and Computer
(C) Electronic Numerical Integrator and Calculator
(D) Electronic Number Integrator and Calculator
(E) None of these

19. First Generation of computer was based on which technology?
(A) Transistor
(B) Vacuum Tube
(C) LSI
(D) VLSI
(E) None of these

20. Microprocessor was introduced in which generation of computer?
(A) Second Generation
(B) Fourth Generation
(C) Both (A) & (B)
(D) Third Generation
(E) All of the above

21. GUI stands for :
(A) Graphical User Interface
(B) Graph Use Interface
(C) Graphical Universal Interface
(D) None of these

22. The time taken by CPU to retrieve and interpret the instruction to be executed is called as :
(A) Instruction cycle
(B) Fetch cycle
(C) Both (A) & (B)
(D) All of these
(E) None of these

23. Which of the following is responsible for all types of calculations?
(A) ALU
(B) Control Unit
(C) Registers
(D) BUS
(E) None of these

24. Internal memory in a CPU is nothing but :
(A) A set of registers
(B) A set of ALU
(C) Microprocessor
(D) BUS
(E) None of these

25. Which of the following is permanent memory?
(A) SRAM
(B) DRAM
(C) ROM
(D) All of these
(E) None of these

Answers :
1. (A) 2. (B) 3. (B) 4. (B) 5. (B) 6. (A) 7. (A) 8. (C) 9. (A) 10. (C)
11. (B) 12. (D) 13. (B) 14. (B) 15. (B) 16. (A) 17. (B) 18. (B) 19. (B) 20. (B)
21. (A) 22. (A) 23. (A) 24. (A) 25. (C)

Allahabad Bank Probationary Officers Exam, 2010

                              Computer Knowledge 
(Held on 21-2-2010)

1. A………typically connects personal computers within a very limited geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)

2. Computers manipulate data in many ways, and this manipulation is called—
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)

3. An e-mail address typically consists of a user ID followed by the ……… sign and the name of the e-mail server that manages the user’s electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)


4. Software applies……, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)

5. A file extension is separated from the main file name with a(n) ……, but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)

6. An ad hoc query is a—
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)

7. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)

8. A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Ans : (B)

9. The desktop contains small graphics called—
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Ans : (C)

10. C, BASIC, COBOL, and Java are examples of ……… languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)

11. A(n)………camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Ans : (A)

12. ……makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) E-commerce
(C) E-spend
(D) E-business
(E) None of these
Ans : (D)

13. Networks are monitored by security personnel and supervised by ………who set(s) up accounts and passwords for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Ans : (C)

14. Application software is designed to accomplish—
(A) real-world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Ans : (D)

15. A telephone number, a birth date, and a customer name are all examples of—
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Ans : (D)

16. The human-readable version of a program is called—
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Ans : (D)

17. A ……… computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
Ans : (A)

18. ……… is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Ans : (C)

19. Programs such as Internet Explorer that serve as navigable windows into the Web are called—
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Ans : (D)

20. A ……… is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Ans : (C)

21. When you save to ………, your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
Ans : (C)

22. The motherboard is the—
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Ans : (D)

23. A computer-intensive problemruns on a—
(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these
Ans : (C)

24. A(n)……converts and executesone statement at a time.
(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these
Ans : (B)

25. The term ……… designates equipment that might be added to a computer system to enhance its functionality.
(A) digital device
(B) system add-on
(C) disk pack
(D) peripheral device
(E) None of these
Ans : (D)

26. Approximately how many bytes make one megabyte ?
(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these
Ans : (D)

27. What is MP3 ?
(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these
Ans : (C)

28. All the deleted files go to—
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)

29. ……… this is the act of copying or downloading a program from a network and making multiple copies of it.
(A) Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site-license piracy
(E) None of these
Ans : (C)

30. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)

31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
Ans : (B)

32. In MICR, C stands for ……….
(A) Code
(B) Colour
(C) Computer
(D) Character
(E) None of these
Ans : (D)

33. Fax machines and imaging systems are examples of—
(A) bar-code readers
(B) imaging systems
(C) scanning devices
(D) pen-based systems
(E) None of these
Ans : (B)

34. When writing a document, you can use the ……… feature to find an appropriate word or an alternative word if you find yourself stuck for the right word.
(A) dictionary
(B) word finder
(C) encyclopedia
(D) thesaurus
(E) None of these
Ans : (A)

35. Which key is used in combination with another key to perform a specific task ?
(A) Function
(B) Control
(C) Arrow
(D) Space bar
(E) None of these
Ans : (B)

36. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—
(A) read-only
(B) memory-only
(C) run-only
(D) write-only
(E) None of these
Ans : (A)

37. In an information system, alphanumeric data normally takes the form of—
(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these
Ans : (B)

38. A Website’s main page is called its—
(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these
Ans : (A)

39. When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these
Ans : (A)

40. A collection of interrelated files in a computer is a—
(A) file manager
(B) field
(C) record
(D) database
(E) None of these
Ans : (D)

41. A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these
Ans : (B)

42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as—
(A) a roller ball which moves the cursor
(B) a pen-shaped device which allows data to be entered through the CRT screen
(C) a figure which resembles a familiar office device
(D) an outdated input device
(E) None of these
Ans : (A)

43. Various applications and documents are represented on the Windows desktop by—
(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these
Ans : (D)

44. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these
Ans : (D)

45. The real business and competitive value of information technology lies in—
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
(D) The capabilities of the hardware and the speed at which it processes information
(E) None of these
Ans : (B)

46. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
(A) Open source vendors
(B) Alliances
(C) Application service providers
(D) All of the above
(E) None of these
Ans : (C)

47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(A) Opening an application previously installed on the computer
(B) Borrowed copies of software
(C) Viewing a website without causing any additional transactions
(D) Running antivirus programs
(E) None of these
Ans : (B)

48. Collecting personal information and effectively posing as another individual is known as the crime of—
(A) spooling
(B) dentity theft
(C) spoofing
(D) hacking
(E) None of these
Ans : (B)

49. The first step in the transaction processing cycle is—
(A) database operations
(B) audit
(C) data entry
(D) user inquiry
(E) None of these
Ans : (C)

50. In the information systems concept, the output function involves—
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation process to their ultimate destination
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
(E) None of these
Ans : (A)

Punjab and Sind Bank Clerk Exam., 2010 Solved Paper


                                                     Computer Knowledge 
                                                          (Exam  Held on 23-5-2010)

1. Memory, also called random access memory, or RAM……….
(A) contains the electronic circuits that cause processing to occur
(B) makes the information resulting from processing available for use
(C) allows data, programs, commands, and user responses to be entered into a computer
(D) consists of electronic components that store data
(E) None of these
Ans : (D)

2. Correcting errors in a program is referred to as………
(A) debugging
(B) bugging
(C) rectifying
(D) modifying
(E) None of these
Ans : (A)

3. An assembler is used to translate a program written in………
(A) a low level language
(B) machine language
(C) a high level language
(D) assembly language
(E) None of these
Ans : (D)


4. The capability of the operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is………
(A) Multiprocessing
(B) Multitasking
(C) Multiprogramming
(D) Multiexecution
(E) None of these
Ans : (B)

5. The basic goal of computer process is to convert data into……
(A) information
(B) tables
(C) files
(D) graphs
(E) None of these
Ans : (A)

6. A hard copy of a document is …
(A) stored in the hard disk
(B) stored on a floppy
(C) stored on a CD
(D) printed on the printer
(E) None of these
Ans : (D)

7. Which of the following is not an output device ?
(A) Plotter
(B) Printer
(C) Scanner
(D) Monitor
(E) None of these
Ans : (C)

8. Which keys can be used together with other keys for special tasks ?
(A) Insert, Delete
(B) Ctrl, Shift
(C) Left Arrow, Right Arrow
(D) Page up, Page Down
(E) None of these
Ans : (B)

9. Which is the part of a computer that one can touch and feel ?
(A) Programs
(B) Software
(C) Hardware
(D) Output
(E) None of these
Ans : (C)

10. Computers gather data, which means they allow users to…… data.
(A) present
(B) store
(C) output
(D) input
(E) None of these
Ans : (D)

11. CPU stands for……
(A) CD-run on memory
(B) central processing unit
(C) call powers up
(D) create programs user
(E) None of these
Ans : (B)

12. Moves the cursor one space to the right to puts spaces in between words……
(A) control key
(B) space bar
(C) printer
(D) mouse
(E) None of these
Ans : (B)

13. Use this when you want to make all letters capital without having to use the shift key for each character………
(A) shifter
(B) upper case
(C) caps lock key
(D) icon
(E) None of these
Ans : (C)

14. A device that reads the information contained on a disk and transfers it to the computer’s memory……
(A) monitor
(B) screen
(C) keyboard
(D) disk drive
(E) None of these
Ans : (D)

15. Which of the following is not the major function of a computer ?
(A) Processing data into information
(B) Storing data or information
(C) Gathering data
(D) Analysing data or information
(E) None of these
Ans : (D)

16. A disk on which you store information………
(A) plate
(B) data disk
(C) paper disk
(D) TV disk
(E) None of these
Ans : (B)

17. Allows you to print……
(A) ribbon
(B) monitor
(C) go now
(D) Control-P
(E) None of these
Ans : (D)

18. Easy to use……
(A) user friendly
(B) select
(C) helpful
(D) ever-ready
(E) None of these
Ans : (A)

19. When your computer stops working suddenly, it is referred to as a……
(A) crash
(B) die
(C) death
(D) penalty
(E) None of these
Ans : (E)

20. The smallest item of useful information a computer can handle…
(A) bite
(B) byte
(C) bit
(D) bait
(E) None of these
Ans : (C)

21. Devices that let the computer communicate with you……
(A) input
(B) output
(C) type
(D) print
(E) None of these
Ans : (B)

22. Devices that allow you to put information into the computer ……
(A) input
(B) output
(C) type
(D) print
(E) None of these
Ans : (A)

23. Eight bits of data……
(A) octabit
(B) word
(C) sentence
(D) byte
(E) None of these
Ans : (D)

24. The secret code that gives you access to some programs……
(A) clue
(B) cue
(C) password
(D) help
(E) None of these
Ans : (C)

25. The different styles of lettering in a word processing program……
(A) font
(B) calligraphy
(C) writing
(D) manuscript
(E) None of these
Ans : (A)

26. Any letter, number, or symbol found on the keyboard that you can type into the computer……
(A) output
(B) character
(C) type
(D) print
(E) None of these
Ans : (B)

27. A symbol or question on the screen that prompts you to take action and tell the computer what to do next……
(A) scanner
(B) questionnaire
(C) prompt and dialog box
(D) information seeker
(E) None of these
Ans : (C)

28. Choices are referred to as……
(A) options
(B) exit
(C) boot
(D) folder
(E) None of these
Ans : (A)

29. Anything written on the screen ……
(A) cursor
(B) text
(C) folder
(D) boot
(E) None of these
Ans : (B)

30. Lets you leave a screen or program……
(A) boot
(B) programs
(C) exit
(D) text
(E) None of these
Ans : (C)

31. Instructions that tell the computer what to do. Another name for software……
(A) programs
(B) CPU
(C) options
(D) folder
(E) None of these
Ans : (A)

32. A program which helps create written documents and lets you go back and make corrections as necessary……
(A) spreadsheet
(B) personal writer
(C) word printer
(D) word processor
(E) None of these
Ans : (D)

33. A place that a user can create to store files……
(A) cursor
(B) text
(C) folder
(D) boot
(E) None of these
Ans : (C)

34. Start or restart the computer……
(A) exit
(B) kick
(C) boot
(D) kick-start
(E) None of these
Ans : (C)

35. A blinking indicator that shows you where your next action will happen……
(A) CPU
(B) cursor
(C) tool bar
(D) boot
(E) None of these
Ans : (B)

36. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs……
(A) menu bar
(B) tool bar
(C) user friendly
(D) word processor
(E) None of these
Ans : (A)

37. CD-ROM stands for……
(A) central processing unit
(B) CD-remote open mouse
(C) CD-resize or minimize
(D) CD-read only memory
(E) None of these
Ans : (D)

38. To change written work already done……
(A) file
(B) edit
(C) cut
(D) close
(E) None of these
Ans : (B)

39. A place in the computer system where data and programs are temporarily stored……
(A) paste
(B) open
(C) memory
(D) pocket
(E) None of these
Ans : (C)

40. A key that will erase information from the computerÕs memory and characters on the screen……
(A) edit
(B) delete key
(C) dummy out
(D) trust key
(E) None of these
Ans : (B)

41. To insert a copy of the clipboard contents, whatever was last cut or copied at the insertion point……
(A) paste
(B) stick in
(C) fit in
(D) push in
(E) None of these
Ans : (A)

42. The command used to remove text or graphics from a document. The information is then stored on a clipboard so you can paste it.
(A) chop
(B) cut
(C) clip
(D) cart away
(E) None of these
Ans : (B)

43. To exit the program without leaving the application……
(A) file
(B) edit
(C) copy
(D) close
(E) None of these
Ans : (D)

44. A removable magnetic disc that holds information……
(A) floppy disk
(B) hard drive
(C) monitor
(D) portable
(E) None of these
Ans : (B)

45. A command that saves what you are working on into the hard drive, or onto a disk……
(A) view
(B) hold
(C) save
(D) go
(E) None of these
Ans : (E)

46. A command to get a file you worked on from the memory where it was stored……
(A) close
(B) delete
(C) open
(D) get it
(E) None of these
Ans : (C)

47. To move down a page in a document……
(A) jump
(B) fly
(C) wriggle
(D) scroll
(E) None of these
Ans : (D)

48. The primary device that a computer uses to store information……
(A) TV
(B) storehouse
(C) desk
(D) hard drive
(E) None of these
Ans : (D)

49. Screen that comes on when you turn on your computer that shows all the icons……
(A) desktop
(B) face to face
(C) viewer
(D) view space
(E) None of these
Ans : (A)

50. A program that works like a calculator for keeping track of money and making budgets……
(A) calculator
(B) spreadsheet
(C) budgeter
(D) financier
(E) None of these
Ans : (B)

Central Bank of India PO Exam Paper 2010

                                    Computer Knowledge
                                                            (Exam Held on 25-07-2010)
1. If a word is typed that is not in Word’s dictionary, a____________wavy underline
appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)
2. The____________button on the quick access Toolbar allows you to cancel your recent
commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)
3. In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans : (B)
4. ____________Software allows users to perform calculations on rows and columns of
data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these
Ans : (C)
5. A ____________represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (C)
6. ____________cells involves creating a single cell by combining two or more selected
cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)
7. The operating system is the most common type of____________software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (C)
8. When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans : (C)
9. The horizontal and vertical lines on a worksheet are called—
(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
Ans : (D)
10. To delete an incorrect character in a document, ____________ to erase to the right of
the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans : (D)
11. The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing.
Ans : (D)
12. During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
Ans : (B)
13. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
Ans : (C)
14. ____________ is the ability of an operating system to control the activities of multiple
programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
Ans : (A)
15. The unique signal, generated by a device, that tells the operating system that it is in
need of immediate attention is called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Ans : (C)
16. The operating system controls access to the processor by assigning a(n) ____________
to each task requiring the processor’s attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
Ans : (B)
17. The blocks of code, included in the operating system, that software applications
interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.
Ans : (A)
18. MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
Ans : (C)
19. An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device.
(C) utility program.
(D) special numeric code that indicates the priority of a request.
Ans : (D)
20. A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.
Ans : (C)
21. Virtual memory is typically located:
(A) on a floppy disk.
(B) in the CPU.
(C) in a flash card.
(D) on the hard drive.
Ans : (D)
22. The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously.
Ans : (B)
23. The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
Ans : (A)
24. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
Ans : (B)
25. Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C) authentication.
(D) logging in.
Ans : (C)
26. The combination of the operating system and the processor is referred to as the
computer’s:
(A) CPU.
(B) platform.
(C) BIOS.
(D) CMOS.
Ans : (B)
27. The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
Ans : (A)
28. Which of the following is the correct sequence of actions that takes place during the
boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
Ans : (B)
29. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
Ans : (D)
30. The ____________, stored on a ROM chip, is responsible for loading the operating
system from its permanent location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor program
Ans : (A)
31. The basic Input/output system (BIOS) is stored in:
(A) RAM.
(B) ROM.
(C) the CPU.
(D) the hard drive.
Ans : (B)
32. Ensuring that the essential peripheral devices are attached and operational is the
____________ process.
(A) configuration
(B) CMOS
(C) POST
(D) ROM
Ans : (C)
33. The memory resident portion of the operating system is called the—
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
Ans : (D)
34. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
Ans : (A)
35. All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be
manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
Ans : (A)
36. The operating system allows users to organize the computer’s contents in a
hierarchical structure of directories that include all of the following EXCEPT:
(A) files.
(B) folders.
(D) drives.
(D) systems.
Ans : (D)
37. All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
Ans : (A)
38. All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
Ans : (C)
39. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
Ans : (B)
40. In Windows XP, if you want to see the file size and modified dates of all files in a
folder, the best viewing option is the __________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon
Ans : (C)

Punjab National Bank PNB Clerk Exam 2010 Paper

                                 Marketing and Computer Knowledge
                                                            (Exam Held on: 4-4-2010)

1. Four of the following five are alike in a certain way and so form a group.
Which is the one that does not belong to the group ?
1. Marketing function includes—
(A) Designing new products
(B) Advertisements
(C) Publicity
(D) After sales service
(E) All of these
Ans : (E)
2. Lead generation can be resorted to
by browsing—
(A) Telephone directories
(B) Yellow pages
(C) Internet sites
(D) List of existing customers
(E) All of these
Ans : (E)
3. Effective selling skills depend on—
(A) Effective lead generation
(B) Sales Call Planning
(C) Territory Allocation
(D) Effective communication skills
(E) All of these
Ans : (E)
4. Market Information means—
(A) Knowledge level of marketing staff
(B) Information about marketing staff
(C) Information regarding Share market
(D) Knowledge of related markets
(E) All of these
Ans : (D)
5. Marketing channels mean—
(A) Delivery period
(B) Delivery time
(C) Delivery outlets
(D) Delivery place
(E) All of these
Ans : (E)
6. ‘Buyer Resistance’ means—
(A) Buyer’s interest in the product being sold
(B) Buyer fighting with the seller
(C) Buyer’s hesitation in buying the product
(D) Buyer becoming a seller
(E) Buyer buying the product
Ans : (C)
7. Marketing is the function of—
(A) Sales persons
(B) Production Department
(C) Planning Department
(D) Team leaders
(E) A collective function of all staff
Ans : (E)
8. A DSA means—
(A) Direct Service Agency
(B) Direct Selling Agent
(C) Double Selling Agent
(D) Distribution Agency
(E) None of these
Ans : (B)
9. Service Marketing is resorted to in—
(A) All manufacturing companies
(B) All production houses
(C) Export units
(D) Insurance companies and banks
(E) All of these
Ans : (D)
10. Marketing is—
(A) A skilled person’s job
(B) A one day function
(C) A one time act
(D) Required only when a new product is launched
(E) None of these
Ans : (A)
11. Market share refers to—
(A) Share market prices
(B) Price fluctuation in the market
(C) Share issue floated by the company
(D) Share of wallet
(E) Share of business of the company
as compared to peers
Ans : (E)
12. Service Marketing is the same as—
(A) Internet marketing
(B) Telemarketing
(C) Internal Marketing
(D) Relationship Marketing
(E) All of these
Ans : (D)
13. Current Accounts can be freely opened by ………… Find the incorrect answer.
(A) All NRIs
(B) All businessmen
(C) Government departments
(D) Firms and Companies
(E) HUFs
Ans : (E)
14. Buyer Resistance can be overcome by—
(A) Cordial relation between buyer and
seller
(B) Good negotiation
(C) Persuasive communication
(D) Good after sales service
(E) All of these
Ans : (A)
15. Cross-selling is useful for canvassing—
(A) Current Accounts
(B) Fixed Deposit Accounts
(C) Student loans
(D) Car loans
(E) All of these
Ans : (E)
16. Market segmentation helps to
determine—
(A) Target groups
(B) Sale price
(C) Profit levels
(D) Product life cycle
(E) All of these
Ans : (A)
17. The target group for Car loans is—
(A) Auto manufacturing companies
(B) Car dealers
(C) Taxi drivers
(D) Car purchasers
(E) All of these
Ans : (E)
18. The best promotional tool in any marketing is—
(A) e-promotion
(B) Public Relations
(C) Viral marketing
(D) Word of mouth publicity
(E) Advertisements
Ans : (E)
19. Customisation results in—
(A) Customer exodus
(B) Customer retention
(C) Customer complaints
(D) All of these
(E) None of these
Ans : (B)
20. The target group for Education Loans is—
(A) All parents
(B) All Professors
(C) All Research Scholars
(D) All Tutorial Colleges
(E) All College Students
Ans : (E)
21. Find the correct sentence.
(A) Higher the price, higher are the sales
(B) More sales persons lead to more sales
(C) Mission statement is part of a Market Plan
(D) Better sales incentives means better performance
(E) All customers are profitable customers
Ans : (C)
22. Good marketing strategy envisages good and proper—
(A) Product development
(B) Promotion and Distribution
(C) Pricing
(D) Relationship management
(E) All of these
Ans : (E)
23. Savings Accounts can be opened by—
(A) All individuals fulfilling KYC norms
(B) All individuals earning more than Rs. 1,00,000 per annum
(C) All individuals above the age of 18
(D) All salaried persons only
(E) All students below the age of 18
Ans : (C)
24. Situation Analysis is useful for—
(A) SWOT Analysis
(B) Analysis of Sales person’s performances
(C) Analysis of capital markets
(D) All of these
(E) None of these
Ans : (A)
25. Information that comes from an external source and fed into computer software is called—
(A) Input
(B) Output
(C) Throughput
(D) Reports
(E) None of these
Ans : (A)
26. With a CD you can—
(A) Read
(B) Write
(C) Neither Read nor Write
(D) Both Read and Write
(E) None of these
Ans : (D)
27. Errors in a computer program are referred to as—
(A) bugs
(B) mistakes
(C) item overlooked
(D) blunders
(E) None of these
Ans : (A)
28. Which of the following are computers that can be carried around easily ?
(A) Laptops
(B) Supercomputers
(C) PCs
(D) Minicomputers
(E) None of these
Ans : (A)
29. What menu is selected to change font and style ?
(A) Tools
(B) File
(C) Format
(D) Edit
(E) None of these
Ans : (C)
30. Where is the disk put in a computer?
(A) In the hard drive
(B) In the disk drive
(C) Into the CPU
(D) In the modem
(E) None of these
Ans : (B)
31. A computer’s hard disk is—
(A) an arithmetic and logical unit
(B) computer software
(C) operating system
(D) computer hardware
(E) None of these
Ans : (D)
32. A compiler is used to translate a program written in—
(A) a low level language
(B) a high level language
(C) assembly language
(D) machine language
(E) None of these
Ans : (B)
33. In programming, you use the following keys—
(A) Arrow keys
(B) Function keys
(C) Alpha keys
(D) page up and Page Down keys
(E) None of these
Ans : (A)
34. Which keys enable the input of numbers quickly ?
(A) Function keys
(B) The numeric keypad
(C) Ctrl, shift and alt
(D) Arrow keys
(E) None of these
Ans : (B)
35. Files are organized by storing them in—
(A) tables
(B) databases
(C) folders
(D) graphs
(E) None of these
Ans : (C)
36. The secret code that restricts entry to some programs—
(A) entry-code
(B) passport
(C) password
(D) access-code
(E) None of these
Ans : (C)
37. Advertisements are not required in—
(A) Public Sector banks
(B) Private Sector banks
(C) Government concerns
(D) Profit making companies
(E) None of these
Ans : (C)
38. The most common method of entering text and numerical data into a computer system is through the use of a—
(A) plotter
(B) scanner
(C) printer
(D) keyboard
(E) None of these
Ans : (D)
39. Computer programs are also known as—
(A) operating systems
(B) documents
(C) peripherals
(D) applications
(E) None of these
Ans : (D)
40. A collection of unprocessed items is ………
(A) information
(B) data
(C) memory
(D) reports
(E) None of these
Ans : (B)
41. ……… is when the more powerhungry components, such as the monitor and the hard drive, are put in
idle.
(A) Hibernation
(B) Power down
(C) Standby mode
(D) The shutdown procedure
(E) None of these
Ans : (C)
42. ……… is the process of dividing the disk into tracks and sectors.
(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
(E) None of these
Ans : (B)
43. A saved document is referred to as a ………
(A) file
(B) word
(C) folder
(D) project
(E) None of these
Ans : (A)
44. Which of the following is the largest unit of storage ?
(A) GB
(B) KB
(C) MB
(D) TB
(E) None of these
Ans : (D)
45. The operating system is the most common type of ……… software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (B)
46. A ……… is approximately one billion bytes.
(A) kilobyte
(B) bit
(C) gigabyte
(D) megabyte
(E) None of these
Ans : (C)
47. A scanner scans—
(A) Pictures
(B) Text
(C) Both Pictures and Text
(D) Neither Pictures nor Text
(E) None of these
Ans : (C)
48. Dumb terminals have terminals and—
(A) Mouse
(B) Speakers
(C) Keyboard
(D) Mouse or Speakers
(E) None of these
Ans : (C)
49. The portion of the CPU that coordinates the activities of all the other computer components is the—
(A) motherboard
(B) coordination board
(C) control unit
(D) arithmetic logic unit
(E) None of these
Ans : (C)
50. A repair for a known software bug, usually available at no charge on the Internet, is called a(n)—
(A) version
(B) patch
(C) tutorial
(D) FAQ
(E) None of these
Ans : (B)

Union Bank of India Probationary Officers Exam. 2011 Solved Paper


                                   Computer Knowledge
                                                             (Exam Held on 9-1-2011)


1. You can keep your personal files/folders in—
(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Ans : (B)

2. The primary purpose of software is to turn data into—
(A) Web sites
(B) Information
(C) Programs
(D) Objects
(E) None of these
Ans : (B)

3. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)


4. A compiler translates a program written in a high-level language into—
(A) Machine language
(B) An algorithm
(C) A debugged program
(D) Java
(E) None of these
Ans : (A)

5. When you turn on the computer, the boot routine will perform this test—
(A) RAM test
(B) Disk drive test
(C) Memory test
(D) Power-on self-test
(E) None of these
Ans : (B)

6. A ……is a unique name that you give to a file of information.
(A) device letter
(B) folder
(C) filename
(D) filename extension
(E) None of these
Ans : (D)

7. Hardware includes—
(A) all devices used to input data into a computer
(B) sets of instructions that a computer runs or executes
(C) the computer and all the devices connected to it that are used to input and output data
(D) all devices involved in processing information including the central processing unit, memory and storage
(E) None of these
Ans : (D)

8. A ……… contains specific rules and words that express the logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
Ans : (A)

9. All the deleted files go to—
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)

10. The simultaneous processing of two or more programs by multiple processors is—
(A) Multiprogramming
(B) Multitasking
(C) Time-sharing
(D) Multiprocessing
(E) None of these
Ans : (D)

11. The secret code that restricts entry to some programs—
(A) Password
(B) Passport
(C) Entry-code
(D) Access-code
(E) None of these
Ans : (A)

12. Computers use the ……… number system to store data and perform calculations.
(A) binary
(B) octal
(C) decimal
(D) hexadecimal
(E) None of these
Ans : (A)

13. The main function of the ALU is to—
(A) Perform arithmetic and logical operations
(B) Store data and information for future use
(C) Control computer output, such as printing
(D) Monitor all computer activities
(E) None of these
Ans : (A)

14. ……is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)

15. Softcopy is the intangible output, so then what is hardcopy ?
(A) The physical parts of the computer
(B) The printed parts of the computer
(C) The printed output
(D) The physical output devices
(E) None of these
Ans : (C)

16. A(n) ……… is a program that makes the computer easier to use.
(A) utility
(B) application
(C) operating system
(D) network
(E) None of these
Ans : (A)

17. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)—
(A) Workstation
(B) CPU
(C) Magnetic disk
(D) Integrated circuit
(E) None of these
Ans : (D)

18. Computer systems are comprised of—
(A) Hardware, programs, processors, procedures and people
(B) Hardware, programs, information, people and procedures
(C) Hardware, programs, information, people and networks
(D) Hardware, software, procedures, networks and people
(E) None of these
Ans : (D)

19. An error in a computer program—
(A) Crash
(B) Power Failure
(C) Bug
(D) Virus
(E) None of these
Ans : (C)

20. What is output ?
(A) What the processor takes from the user
(B) What the user gives to the processor
(C) What the processor gets from the user
(D) What the processor gives to the user
(E) None of these
Ans : (D)

21. The person who writes and tests computer programs is called a—
(A) programmer
(B) computer scientist
(C) software engineer
(D) project developer
(E) None of these
Ans : (A)

22. A set of instructions telling the computer what to do is called—
(A) mentor
(B) instructor
(C) compiler
(D) program
(E) None of these
Ans : (D)

23. What menu is selected to print ?
(A) Edit
(B) Special
(C) File
(D) Tools
(E) None of these
Ans : (C)

24. What is backup ?
(A) Adding more components to your network
(B) Protecting data by copying it from the original source to a different destination
(C) Filtering old data from the new data
(D) Accessing data on tape
(E) None of these
Ans : (B)

25. The term bit is short for—
(A) Megabyte
(B) Binary language
(C) Binary digit
(D) Binary number
(E) None of these
Ans : (C)

26. A saved document is referred to as a—
(A) file
(B) word
(C) folder
(D) project
(E) None of these
Ans : (A)

27. Specialized programs that assist users in locating information on the Web are called—
(A) Information engines
(B) Search engines
(C) Web browsers
(D) Resource locators
(E) None of these
Ans : (B)

28. An application program has which one of the following functions ?
(A) It specifies the informationprocessing procedures required by a particular informationprocessing job
(B) It controls the input/output and storage functions of the computer system
(C) It provides various support services for the computer system
(D) It supervises the operations of the CPU
(E) None of these
Ans : (A)

29. In page preview mode—
(A) You can see all pages of your document
(B) You can only see the page you are currently working
(C) You can only see pages that do not contain graphics
(D) You can only see the title page of your document
(E) None of these
Ans : (A)

30. An operating system that can do multitasking means that—
(A) The operating system can divide up work between several CPUs
(B) Several programs can be operated concurrently
(C) Multiple people can use the computer concurrently
(D) All of the above
(E) None of these
Ans : (B)

31. The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ……… command.
(A) Replace
(B) Find
(C) Lookup
(D) Search
(E) None of these
Ans : (B)

32. What is the default file extension for all Word documents ?
(A) WRD
(B) TXT
(C) DOC
(D) FIL
(E) None of these
Ans : (C)

33. With a CD you can—
(A) Read
(B) Write
(C) Read and Write
(D) Either Read or Write
(E) None of these
Ans : (C)

34. A collection of interrelated records is called a—
(A) Utility file
(B) Management information system
(C) Database
(D) Spreadsheet
(E) None of these
Ans : (C)

35. To move to the beginning of a line of text, press the ……… key.
(A) PageUp
(B) A
(C) Home
(D) Enter
(E) None of these
Ans : (C)

36. The term ‘user interface’ refers to—
(A) What the user sees on the screen and how they can interact with it
(B) How the operating system responds to user commands
(C) the means by which the user interacts with the peripheral devices on the computer
(D) The monitor that is available for the computer
(E) None of these
Ans : (A)

37. The background of any Word document—
(A) Is always white colour
(B) Is the colour you preset under the Options menu
(C) Is always the same for the entire document
(D) Can have any colour you choose
(E) None of these
Ans : (D)

38. Reusable optical storage will typically have the acronym—
(A) CD
(B) DVD
(C) ROM
(D) RW
(E) None of these
Ans : (D)

39. For creating a document, you use ……… command at File Menu.
(A) Open
(B) Close
(C) New
(D) Save
(E) None of these
Ans : (C)

40. The contents of ……… are lost when the computer turns off.
(A) storage
(B) input
(C) output
(D) memory
(E) None of these
Ans : (D)

41. Grouping and processing all of a firm’s transactions at one time is called—
(A) A database management system
(B) Batch processing
(C) A real-time system
(D) An on-line system
(E) None of these
Ans : (C)

42. A printer is this kind of device—
(A) Input
(B) Word processing
(C) Processing
(D) Output
(E) None of these
Ans : (D)

43. Text in a column is generally aligned—
(A) Justified
(B) Right
(C) Center
(D) Left
(E) None of these
Ans : (D)

44. What type of device is a computer mouse ?
(A) Input
(B) Output
(C) Software
(D) Storage
(E) None of these
Ans : (A)

45. In Excel, Charts are created using which option ?
(A) Chart Wizard
(B) Pivot Table
(C) Pie Chart
(D) Bar Chart
(E) None of these
Ans : (A)

46. What is the permanent memory built into your computer called ?
(A) RAM
(B) ROM
(C) CPU
(D) CD-ROM
(E) None of these
Ans : (B)

47. If text was highlighted and ‘Edit’ ‘Copy’ was clicked, what would happen ?
(A) Text would be copied from the document and placed in the clipboard
(B) Text would be removed from the document and placed in the clipboard
(C) Text from the clipboard would be placed in the document at the place where the cursor is blinking
(D) (B) and (C) above
(E) None of these
Ans : (A)

48. You can start Microsoft Word by using ……… button.
(A) New
(B) Start
(C) Program
(D) Control Panel
(E) None of these
Ans : (C)

49. You click at B to make the text—
(A) Italics
(B) Underlined
(C) Italics and Underlined
(D) Bold
(E) None of these
Ans : (D)

50. The……becomes different shapes depending on the task you are performing.
(A) Active tab
(B) Insertion point
(C) Mouse pointer
(D) Ribbon
(E) None of these
Ans : (C)

SBI ASSOCIATE BANKS CLERKS EXAM 2011


                     Marketing Aptitude and Computer Knowledge

Q. 1. An email account includes a storage area, often called a(n) __
(1) attachment
(2) hyperlink
(3) mailbox
(4) IP address
(5) None of these

Q. 2. Data becomes __ when it is presented in a format that people can understand and use.
(1) processed
(2) graphs
(3) information
(4) presentation
(5) None of these

Q.3. A set of computer programs that helps a computer monitor itself and function more efficiently isajan __
(1) Windows
(2) System Software
(3) DBMS
(4) Application Software
(5) None of these

Q. 4. An area of a computer that temporarily holds data waiting to be processed is __
(1) CPU
(2) Memory
(3) Storage
(4) File
(5) None of these

Q.5. A __ is a microprocessor-based computing device.
(1) personal computer
(2) mainframe
(3) workstation
(4) server
(5) None of these

Q. 6. You use a(n) __ , such as a keyboard or mouse, to input information.
(1) output device
(2) input device
(3) storage device
(4) processing device
(5) None of these

Q.7. The term __ designates equipment that might be added to a computer system to enhance its functionality.

(1) digital device
(2) system add-on
(3) disk pack
(4) peripheral device
(5) None of these

Q. 8. The instructions that tell a computer how to carry out the processing tasks are referred to as computer __
(1) programs
(2) processors
(3) input devices
(4) memory modules
(5) None of these

Q. 9. RAM can be thought of as the __ for the computer's processor.
(1) factory
(2) operating room
(3) waiting room
(4) planning room
(5) None of these

Q. 10. C, BASIC, COBOL, and Java are examples of __ languages.
(1) low-level
(2) computer
(3) system programming
(4) high-level
(5) None of these

Q.11. __ is the ability of a device to "jump" directly to the requested data.
(1) Sequential access
(2) Random access
(3) Quick access
(4) All of the above
(5) None of these

Q.12. The __ is the amount of data that a storage device can move from the storage medium to the Computer per second.
(1) data migration rate
(2) data digitizing rate
(3) data transfer rate
(4) data access rate
(5) None of these

Q.13. A __ converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file.
(1) converter
(2) compiler
(3) interpreter
(4) instruction
(5) None of these

Q.14. One thousand bytes is a __
(1) kilobyte
(2) megabyte
(3) gigabyte
(4) terabyte
(5) None of these

Q.15. 'Benchmark' means __
(1) Benches for customers to sit
(2) Benches for salesmen to sit
(3) Products displayed on a bench
(4) Set standards
(5) All of the above

Q. 16 A Call Centre is __
(1) a meeting place for DSAs
(2) a Training Centre for DSAs
(3) a meeting place for customers
(4) Data Centre
(5) a back office set up where customer queries are answered

Q .17. The sequence of a sales process is __
(1) Lead generation, Call, Presentation & Sale
(2) Sale, Presentation, Lead generation & Call
(3) Presentation, Lead generation, Sale & Call
(4) Lead Generation, Call, Sale & Presentation
(5) There is no sequence required

Q.18. Home loans are granted to -
(1) Individuals
(2) Institutions
(3) Builders
(4) All of these
(5) None of these


Q.19. To 'Close a Call' means __
(1) 'fo end the conversation
(2) To put the phone down
(3) To close the doors
(4) To clinch the sale
(5) To close the business

Q.20. A __ is an additional set of commands that the computer displays after you make a selection from the main menu.
(1) dialog box
(2) submenu
(3) menu selection
(4) All of the above
(5) None of these

Q.21. Information kept about a file includes ----
(1) print settings
(2) deletion date
(3) (1) & (2) only
(4) size
(5) None of these

Q.22. __ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.
(1) Multitasking
(2) Multithreading
(3) Multiprocessing
(4) Multicomputing
(5) None of these

Q.23. The ALU performs __ operations.
(1) arithmetic
(2) ASCII
(3) algorithm-based
(4) logarithm-based
(5) None of these

Q. 24. A (n) __ is software that helps a computer control itself to operate efficiently and keep track of data.
(1) application system
(2) hardware system
(3) software system
(4) oprating system
(5) None of these

Q.25. 'Customisation' means __
(1) Tailor-made products for each customer
(2) Customers selling goods
(3) Tailor-made products for each staff
4) A selling process
(5) None of these

Q.26. A 'Call' in Marketing language means __
(1) Calling On a salesperson
(2) Calling on a customer
(3) Making a phone-call
(4) Telemarketing
(5) None of these

Q.27. Computers manipulate data in many ways, and this manipulation is called __
(1) upgrading
(2) processing
(3) batching
(4) utilizing
(5) None of these

Q.28. A Marketing Survey is required for __
(1) deciding marketing strategies
(2) deciding Product strategies
(3) deciding pricing strategies
(4) All of these
(5) None of these

Q.29. The Target Group for Education Loans is ----
(1) all colleges
(2) all parents
(3) research scholars
(4) meritorious students seeking higher education
(5) all of these

Q.30. Cross-selling means __
(1) Selling with a cross face
(2) Cross country marketing
(3) Selling other products to existing customers
(4) Selling to friends
(5) Selling to employees

Q.31. Market Segmentation is useful for---
(1) Preferential marketing
(2) Targeting existing clients
(3) Identifying prospects
(4) Knowing customers' tastes
(5) All of the above

Q.32. The Target Group for Savings Deposit Accounts is __
(1) Newborn babies
(2) students
(3) parents
(4) businessman
(5) all of the above

Q. 33. Market Segmentation can be resorted to by means of __
(1) segmenting by age
(2) segmenting by income
(3) segmenting geographically
(4) all of these
(5) none of these

Q.34. The Target Group for a Car Loan is ---
(1) all auto drivers
(2) all auto dealers
(3) all car owners
(4) any individual needing a car
(5) all of these

Q.35. Market information means ---
(1) knowledge of industries
(2) knowledge of households
(3) knowledge of peers
(4) knowledge of customers' tastes
(5) All of these

Q.36. Credit cards are used for -
(1) Cash withdrawals
(2) Purchase of air tickets
(3) Purchase of consumable items from retail outlets
(4) All of these
(5) None of these

Q.37. TheTarget Group for Agricultural Loans is __
(1) any farmer
(2) farm labourers
(3) any individual dealing in agricultural or related activity
(4) farmers'societies
(5) all of these

Q.38. The Target Group for Credit Cards is ----
(1) existing cardholders
(2) all graduates
(3) all minors
(4) individuals with taxable income
(5) all of these

Q.39. Market Segmentation means __
(1) segmenting the salesmen
(2) segmenting the employees
(3) segmenting the customers as per their Heeds
(4) segmenting the products
(5) All of these

Q. 40. A 'Target Group' means---
(1) a group of sellers
(2) a group of buyers
(3) a group of products
(4) a group of persons to whom sales should be focused
(5) all of these

Answer :

(1) 3 (2) 3 (3) 2 (4) 2 (5) 1 (6) 2 (7) 4 (8) 1 (9) 3 (10) 4 (11) 2 (12) 3 (13) 2 (14) 1 (15) 4 (16) 5 (17) 1 (18) 1 (19) 4 (20) 1 (21) 3 (22) 1 (23) 1 (24) 4 (25) 1 (26) 2  (27) 2 (28) 4 (29) 4 (30) 3 (31) 5 (32) 5 (33) 4 (34) 4 (35) 5 (36) 4 (37) 3 (38) 4 (39) 3 (40) 5