Wednesday 16 November 2011

COMPUTER KNOWLEDGE MCQs FOR BANK EXAMS

1. ______Is the most widely used medium for telecommunications
a) Twisted Pair
b) Coaxial Cable
c) Optical Fiber
d) None
 
2. ______Is widely used medium of communication for cable television systems
a) Twisted Pair
b) Coaxial Cable
c) Optical fiber
d) None
 
3. ______Cable consists of one or more filaments of glass fiber wrapped in protective layers that
carries data by means of pulses of light
a) Twisted Pair
b) Coaxial Cable
c) Optical fiber
d) None
 
4. ______Is a computer network used for communications among computers and different information technological devices close to one person
a) Personal Area Network
b) Local Area Network
c) Metropolitan Area Network
d) Wide Area Network
 
5. ______Is a collection of conceptual tools for describing data, data relationships, data semantics
and constraints
a) Data base
b) Data Model
c) E_R Model
d) None
 
6. Association among two or more entities called
a) Entity
b) Entity set
c) Relationship
d) Degree of relation
 
7. DDL stands for
a) Data Definition Language
b) Data Delete Language
c) Data Device Language
d) Database Definition Language
 
8. SDL stands for
a) Storage Definition Language
b) Save Definition Language
c) Storage Database Language
d) Shortcut Definition Language
 
9. DML stands for
a) Date Manipulation Language
b) Database Manipulation Language
c) Data Manuscript Language
d) Data Manipulation Language
 
10. ____Is the language that enable user to access or manipulate data as organized by appropriate
data model
a) DML
b) SDL
c) DDL
d) All of the above
 
11. ____Is the language to specify the internal schema. (This language may specify the mapping between two schemas)
a) DML
b) SDL
c) DDL
d) None of the above
 
12. All candidate keys excluding the primary key are known as
a) Compound key
b) Partial key
c) Alternative key
d) None of the above
 
13. The user commands that are used to interact with a database is called as
a) Query
b) Interaction
c) Command
d) Instruction
 
14. The updates that are applied to database before it becomes effective in real world
a) Retroactive update
b) Proactive update
c) Simultaneous update
d) All of the above
 
15. The updates that are applied to database after it becomes effective in real world
a) Retroactive update
b) Proactive update
c) Simultaneous update
d) All of the above
 
16. The updates that are applied to database at the same time when it becomes effective in real
world?
a) Retroactive update
b) Proactive update
c) Simultaneous update
d) All of the above
 
17. Match the following (select the test by using the key board)
a) A word from its beginning to its end
b) A paragraph from its begging to its end
c) The entire document
1. CTRL+ DOWN ARROW
2. CTRL+LEFT ARROW
3.CTRL+SHIFT+RIGHTARROW
a) a-3,b-1,c-2
b) a-3,b-2,c-3
c) a-3,b-2,c-1
d) a-2,b-3,c-1
 
18. Match the following (Move through your document)
a) One character to the left
b) One character to the right
c) One word to the left
d) One word to the right
1. CTRL+RIGHT ARROW
2. CTRL+LEFT ARROW
3. RIGHT ARROW
4. LEFT ARROW
a) a-4,b-3,c-2,d-1
b) a-4,b-2,c-3,d-1
c) a-1,b-3,c-4,d-2
d) a-2,b-1,c-3,d-4
 
19. Match the following (To move)
a) One paragraph down
b) To the beginning of a document
c) To the end of a document
d) Up one screen at a line
e) Down one screen at a time
1. CTRL+END
2. PAGE DOWN
3. CTRL+HOME
4. CTRL+DOWN ARROW
5. PAGE UP
a) a-5,b-3,c-1,d-4,e-2
b) a-4,b-3,c-2,d-5,e-1
c) a-3,b-4,c-1,d-5,e-2
d) a-4,b-3,c-1,d-5,e-2
 
20. In a word document Red underline indicates
a) Possible spelling error/word doesn't recognize a word
b) Word thinks that grammar should be revised
c) A word is spelled correctly, but does not seem to be the correct word sentence
d) All of the above
 
21. In a word document Green underline indicates
a) Possible spelling error/word doesn't recognize a word
b) Word thinks that grammar should be revised
c) A word is spelled correctly, but does not seem to be the correct word sentence
d) All of the above
 
22. In a word document Blue underline indicates?
a) Possible spelling error/word doesn't recognize a word
b) Word thinks that grammar should be revised
c) A word is spelled correctly, but does not seem to be the correct word sentence
d) All of the above
 
23. By default the Microsoft word document will be saved into a folder called
a) Desktop
b) My documents
c) D drive
d) Personal folder
 
24. What is the default file name for the word document?
a) Taken from the text at the start of the document
b) Word document
c) Both (a) and (b)
d) None of the above
 
25. In word-2010____is the key to see numbers and letters displayed over icons, tabs or commands towards the top of your screen?
a) Ctrl key
b) Tab key
c) Alt key
d) None of the above
 
26. ____ Is the keyboard shortcut key to close the word program
a) Alt+F4
b) Alt+F5
c) Alt+F6
d) Alt+F7
 
27. How will you remove all formatting added to your documents (such as bold, italics, and underline etc.)
a) Save
b) Save as plain text file
c) Save as
d) All of the above
 
28. _____Is the file format we can use to distribute the document to some one using totally different word processing program from a different software manufacturer, such as word perfect
a) Word document (.doc)
b) Rich Text Format (.RTF)
c) Both (a) and (b)
d) None of the above
 
29. _____Is the Icon to magnify or reduce the display
a) Print layout
b) Zoom
c) View
d) All of the above
 
30. Match the following
a) Cut 1. CTRL+C
b) Copy 2. CTRL+V
c) Paste 3. CTRL+X
a) a-1, b-3, c-2
b) a-2, b-1, c-3
c) a-3, b-1, c-2
d) a-3, b-2, c-1
 
31. What is text formatting?
a) Formatting characters and words with in a document
b) Saving the word document
c) Both (a) and (b)
d) None of the above
 
32. By default MS-Word 2010 uses a font called
a) Arial
b) Times New roman
c) Tahoma
d) Caliber
 
33. Superscript refers to____
a) Characters displayed below the line of the normal text
b) Characters displayed above the line of the normal text
c) Both (a) and (b)
d) None
 
34. Subscript refers to ___
a) Characters displayed below the line of the normal text
b) Characters displayed above the line of the normal text
c) Both (a) and (b)
d) None
 
35. (a+b)2 is an example for ----
a) Subscript
b) Superscript
c) Both (a) and (b)
d) None
 
36. CO2 is an example for ---
a) Subscript
b) Superscript
c) Both (a) and (b)
d) None
 
37. You need to find a particular word or phrase and replace this item with alternative text, what is
the keyboard shortcut key
a) Ctrl+G
b) Ctrl+P
c) Ctrl+H
d) Ctrl+F
 
38. _____Is the path to create Header/Footer
a) Insert/Header & Footer
b) File/Header & Footer
c) Edit/Header & Footer
d) None of the above
 
39. __ Is the path to create footnotes
a) References/footnote
b) Insert/footnote
c) Edit/footnote
d) None
 
40. _____ Is the path to save a document in PDF format
a) Edit/Save as/PDF/Save
b) File/Save as/PDF/Save
c) Both (a) and (b)
d) None of the above


ANSWERS:
1) a 2) b 3) c 4) a 5) b 6) c 7) a 8) a 9) d 10) a 11) b 12) c 13) a 14) b 15) a 16) c 17) a 18) a 19) d 20) a 21) b 22) c 23) b 24) a 25) c 26) a 27) b 28) b 29) b 30) c 31) a 32) d 33) b 34) a 35) b 36) a 37)c 38) a 39) a 40) b

Monday 14 November 2011

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. A terabyte comprises
(a) 1024 gigabyte 
(b) 1024 kilobyte
(c) 1024 megabyte 
(d) 1024 byte

2. The access time refers to
(a) Time required to locate and retrieve stored data
(b) Time required to locate the lost data
(c) Time required to delete specific data on a certain memory location
(d) None of the above

3. Select the smallest memory size.
(a) Terabyte 
(b) Gigabyte
(c) Kilobyte 
(d) Megabyte

4. The type of RAM that works by staying on the row containing the requested bit and moves faster
through the columns reading each bit as it goes is
(a) DDR SDRAM 
(b) SDRAM
(c) FPM DRAM 
(d) RDRAM

5. The ROM chip which can be rewritten several times and requires the action of ultraviolet radiations to
erase its contents is
(a) Flash memory
(b) PROM
(c) EEPROM
(d) EPROM

6. The type of memory that uses in-circuit wiring to erase the content by applying electric field is
(a) PROM 
(b) Flash memory
(c) EAROM 
(d) EEPROM

7. Dynamic memory is also called as
(a) Internal processor memory 
(b) Primary memory
(c) External storage memory 
(d) Non-volatile memory

8. The memory which is utmost accessible to the processor is
(a) Cache memory 
(b) RAM
(c) Hard disk 
(d) Flash memory

9. The storage device that has high cost per bit of storage is
(a) SDRAM 
(b) Cache memory
(c) Read only Memory 
(d) Hard disk

10. The dual-port version of DRAM formerly used in graphics adaptors is
(a) FPM DRAM 
(b) EDO DRAM
(c) VRAM
(d) DDR SDRAM

11. The secondary storage device that follows the sequential mode of access is
(a) Optical Disk 
(b) Magnetic Disk
(c) Magnetic Tape 
(d) None of these

12. FPI stands for
(a) Faults per inch 
(b) Frames per inch
(c) Figure per inch 
(d) Film per inch

13. The most common type of floppy size is
(a) 3½-inch 
(b) 5¼-inch
(c) 4¾-inch 
(d) None of these

14. A spiral shape track formatting is present in
(a) Floppy Disk (b) Optical Disk
(c) Hard Disk (d) Half-inch Tape Cartridge

15. A floppy can be write protected by
(a) Breaking the slider
(b) Positioning the slider to cover the hole
(c) Positioning the slider away from the hole
(d) A floppy cannot be write protected

16. Rotational delay time is also known as
(a) Seek time 
(b) Shift time
(c) Latency 
(d) Access time

17. The average drives have an access time of
(a) 14-29 ms 
(b) 9-14 ms
(c) 60-70 ms 
(d) None of these

18. In which kind of disk does the read/write head physically touches the surface?
(a) Hard Disk (b) Compact Disk
(c) Floppy Disk (d) None of these

19. RAID stands for
(a) Reproduce Array of Intelligent Disks
(b) Reproduce Array of Inexpensive Disks
(c) Redundant Array of Inexpensive Drives
(d) Redundant Array of Inexpensive Disks

20. CD-ROM is a kind of
(a) Optical disk 
(b) Magneto-Optical disk
(c) Magnetic disk 
(d) None of these

ANSWERS
1. (a)
2. (a)
3. (c)
4. (b)
5. (d)
6. (d)
7. (d)
8. (a)
9. (b)
10. (c)
11. (c)
12. (b)
13. (a)
14. (b)
15. (c)
16. (c)
17. (b)
18. (c)
19. (d)
20. (a)

Thursday 10 November 2011

COMPUTER KNOWLWDGE FOR BANK EXAMS


1. ----- Controls access to the resources on a network
a) Server
b) Client
c) Both (a) and (b)
d) None of the above

2. The wider the bus, the ---- the transfer of data
a) Greater the number of transfer steps required and the slower
b) Greater the number of transfer steps required and the faster
c) Fewer the number of transfer steps required and the slower
d) Fewer the number of transfer steps required and the faster

3. A micro second is --- of a second
a) One-trillionth
b) One-millionth
c) One-billionth
d) None of the above

4. The ---- format works best for images that have only a few distinct colors
a) GIF
b) MPEG
c) JPEG
d) Both (b) and (c)

5. Some large businesses use ---- to open communications among employees, customers, and/or vendors
a) Blog
b) Mails
c) LAN Network
d) None of the above

6. When the computers power is turned off ---- memory does not lose its contents
a) Volatile
b) Non-volatile
c) Cache memory
d) Flash memory

7. --- Is needed to access accounts, to pay the bills, to transfer money from one account to another account
a) On-line Banking facility
b) Good relations with customers
c) Both (a) and (b)
d) None of the above

8. Which of the following is used as storage locations both the ALU and in the control sections of a computer?
a) Accumulator
b) Register
c) Adder
d) Decoder

9. Accumulator is a ?
a) Hardwired unit
b) Sequential circuit
c) Finite state machine
d) Register

10. Which memory is non-volatile and may be written only once?
a) RAM
b) EPROM
c) EEPROM
d) PROM

11. The communication mode that supports data in both directions?
a) Simplex b) Half-duplex
c) Full-duplex
d) None of the above

12. To connect a computer with a device in the same room, you might be likely to use?
a) Coaxial cable
b) Optical fiber
c) Wireless
d) None of the above

13. A table consists of?
a) Fields and columns
b) Rows and columns
c) Rows and cells
d) None of the above

14. Which of the following is an advantage of the database approach?
a) Elimination of data redundancy
b) Ability to associate related data
c) Increase security
d) All of the above

15. When the same data field is stored more than once in a file, then it leads to?
a) Data redundancy
b) Data inconsistency
c) Both (a) and (b)
d) None of the above

16. ----Means database updating
a) Changing the file structure
b) Re-organizing the database
c) Modifying or adding records
d) All of the above

17. Which of the following is the descending order of data hierarchy?
a) File-Database-Field-Record-Byte-Bit
b) Database-File-Record-Field-Byte-Bit
c) Database-Record-File-Field-Byte-Bit
d) Database-Field-File-Record-Bit-Byte

18. Which of the following groups contains graphical file extensions
a) JPG, CPX, GCM
b) GIF, TCF, WMF
c) TCP, JPG, BMP
d) JPG, GIF, BMP

19. A package, which can be used for a short period before purchasing, it is termed as?
a) Try and Buy
b) Freeware
c) Shareware
d) Borrow ware

20. Which one of the following is the main function of a driver file?
a) Useful to open windows
b) Enables a specific device to work
c) To re-start the system
d) To activate the system

21. A proxy server is used as the computer?
a) With external access
b) Acting as a backup
c) Performing file handling
d) Access user permissions

22. ---- Prevents external access to a system
a) Gateway
b) Firewall
c) Router
d) Switcher

23. A list of rules for transferring data over a network is called?
a) Protocol
b) Program code
c) Rules
d) Flowchart

24. Which of the following is a valid e-mail address?
a) Authors.sakshi@gmail.com
b) @Gmailsakshi.authors.com
c) Both (a) and (b)
d) None of the above

25. Which of the following is not a network topology?
a) Star
b) Bus
c) Linear
d) Ring

26. ---- Types of virus that stays permanently in the RAM memory
a) Resident
b) File infectors
c) Boot virus
d) Macro virus

27. ---- Is the Virus that overwrite the files or a few parts being replaced?
a) Resident
b) File infectors
c) Boot virus
d) Macro virus

28. In 1983, this person was the first to offer a definition of the term 'computer virus'?
a) MC Fee
b) Smiths
c) Cohen
d) Norton

29. If you see a small red triangle in the top right corner of a cell, it means there is something attached to the call. What is it?
a) A comment
b) An attachment
c) An error
d) None of the above

30. Which function would be the best to use to calculate the payout value of a term deposit?
a) FV
b) NPV
c) IRR
d) PV

31. Sigma button is used for?
a) Totaling a Column or row
b) It is a mathematical function
c) Subtracting
d) None of the above

32. What is the correct syntax for typing a function into a cell?
a) Equal sign, Function Name, Matching brackets
b) Function Name, Equal sign, Matching brackets
c) Equal sign, Matching brackets, Function Name
d) None of the above

33. What does 'ctrl +esc' do if I am at the desktop?
a) Shows the start menu
b) Shows the format menu
c) Shows the tools menu
d) Shows the insert menu

34. In most Microsoft programs, what does 'alt+f4' do?
a) Ends the program
b) Opens the program
c) Run the program
d) Modify the program

35. In MS-Word 'alt+shift+d' does what?
a) Automatically inserts the date
b) Inserts the time
c) Inserts the day
d) None of the above

36. ---- Deletes an item immediately without placing it in the recycle bin.
a) Shift +enter
b) Shift +delete
c) Shift +right arrow
d) Shift +left arrow

37. --- Function key refreshes the current window
a) F5
b) F6
c) F7
d) F8

38. To minimize all open windows and display the desktop?
a) Windows logo +D
b) Windows logo + E
c) Windows logo + F
d) Windows logo + G


Saturday 5 November 2011

COMPUTER KNOWLEDGE FOR BANK EXAMS


1. Buffer is device/storage area–
1. Where data are temporarily stored
2. Where data is permanently stored
3. Where data error occurs
4. All of the above
5. None of these

2. A network geometric arrangement in which a single connecting line is shared by a number of nodes is called–
1. Car Topology
2. Bus Topology
3. Truck Topology
4. All of the above
5. None of these

3. An error in a computer program is referred as–
1. Bug
2. Bit
3. Virus
4. All of the above
5. None of these

4. Circuits that provide a communication path between two or more devices of a digital computer system is–
1. Car
2. Bus
3. Truck
4. All of the above
5. None of these

5. A fixed number of adjacent bits that represent a particular character or symbol are referred as–
1. Byte
2. Octal
3. Bubble
4. All of the above
5. None of these

6. Cache memory is a–
1. Small buffer storage
2. Permanent storage
3. Main memory
4. All of the above
5. None of these

7. The total number of digits (symbols) available to represent numbers in a positional number system is referred as–
1. Number system
2. Base
3. Power
4. All of the above
5. None of these

8. Cache memory is–
1. Smaller and faster than main storage
2. Bigger and slower than main storage
3. Smaller but slower than main memory
4. Bigger and faster than main memory
5. None of these

9. Cache memory–
1. Is a Static RAM
2. Increases the speed of processing by making current programs and data available to the CPU at a rapid rate
3. Both 1. and 2. are true .
4. Both 1. and 2. are false
5. None of these

10. Following is false for BASIC–
1. Beginners All-Purpose Symbolic Instruction Code
2. High-level interactive programming language
3. Works in time sharing environment
4. Low level object oriented language
5. None of these

11. A unit for measuring data transmission speed that describes the capacity of a carrier is referred as–
1. Baud
2. Bit
3. Bond
4. All of the above
5. Batch

12. A process of trying out a new product by independent users before it is finally manufactured/developed–
1. Alpha test
2. Beta Test
3. Gamma test
4. All of the above
5. None of these

13. A selection, choice, or condition involving two possibilities is referred as–
1. Unary
2. Binary
3. Octal
4. All of the above
5. None of these

14. Base band System is–
1. A networking system
2. Where the channel support a single digital signal
3. Both 1. and 2. are true
4. All of the above
5. None is true

15. One of the early coding systems, based on the idea of converting each digit of a decimal number into its binary equivalent rather than converting the entire decimal value into a pure binary form is–
1. ASCII code
2. BCD
3. ASCII-8
4. All of the above
5. None of these

16. In Batch processing–
1. Several computer programs runs one after another without human interaction to run each program individually
2. Several computer programs runs one after another with human interaction to run each program individually
3. Selected computer programs runs one after another with human interaction to run each program individually
4. All of the above
5. None is true

17. BISYNC is–
1. Binary synchronous
2. A process of transmitting data
3. A half-duplex, character oriented, synchronous data communication transmission method
4. All of the above
5. None of these

18. A device that is used to transmit data from one location to another is referred as–
1. Storage
2. Memory
3. Carrier
4. All of the above
5. None of these

19. Programs developed by an outside supplier and provided to the user in a machine readable form is known as–
1. Canned programs
2. Beta program
3. Alpha program
4. All of the above
5. None of these

20. A binary numbers are represented by–
1. Digits 0 and 1
2. Digits 0, 1, ..., 8
3. Digits AB, C,...
4. All of the above
5. None of these

21. BIOS is responsible for
1. Handling the particulars of input/output operations
2. Output operations
3. Input operations
4. All of the above
5. None of these

22. BIOS is an abbreviation for–
1. Basic Input/Basic Output
2. Binary synchronous
3. Binary digit
4. All of the above
5. None of these

23. BISYNC is an abbreviation for–
1. Binary Input/Binary Output
2. Binary synchronous
3. Binary digit
4. All of the above
5. None of these

24. The overall design, construction, organiz-ation and interconnecting of the various components of a computer system is referred as–
1. Computer Architecture
2. Computer Flowchart
3. Computer Algorithm
4. All of the above
5. None of these

25. A number system with a base of two is referred as–
1. Unary number system
2. Binary number system
3. Octal number system
4. All of the above
5. None of these

Answers:

1. (1) 2. (2) 3. (1) 4. (2) 5. (1) 6. (1) 7. (2) 8. (1) 9. (3) 10. (4) 11. (1) 12. (2) 13. (2) 14. (3) 15. (2) 16. (1) 17. (4) 18. (3) 19. (1) 20. (1) 21. (1) 22. (1) 23. (2) 24. (1) 25. (2)

COMPUTER KNOWLEDGE FOR BANK EXAMS


1. A digital communication system capable of interconnecting, a large number of computers, terminals and other peripheral devices within a limited geographical area is called–
1. LAN
2. WAN
3. Internet
4. All of the above
5. None of these

2. A secondary storage device that uses a long plastic strip coated with a magnetic material as a recording medium is–
1. Magnetic tape
2. Compact disk
3. Hard disk
4. All of the above
5. None of these

3. An E-mail protocol for storage, manage-ment and change, especially in corporate offices–
1. Message handling service
2. Postal service’s
3. Data storage
4. All of the above
5. None of these


4. Which of the following is an advantage of stored programs?
1. Reliability
2. Reduction in operation costs
3. The computers becoming general-purpose
4. All of the above
5. None of these

5. Which of the following is not true for primary storage?
1. It is a part of the CPU
2. It allows very fast access of data
3. It is relatively more expensive then other storage devices.
4. Can be removed and transported.
5. All of the above

6. Function of control unit in the CPU is–
1. To decode program instructions
2. To transfer data to primary storage
3. To perform logical operations
4. To store program instructions
5. All of the above

7. Electronic spreadsheets are useful in situation where relatively .......... data must be input
1. Small
2. Large
3. No
4. All of the above
5. None is true

8. A list of options from which a program user can select anyone in order to perform a desired action is referred as–
1. Menu
2. Index
3. Directory
4. All of the above
5. None of these

9. A method whereby messages to be transmitted between computers are all sent to a central computer, which gathers them and routes them to the appropriate destination(s) is known as–
1. Message switching
2. Message delete
3. Message accept
4. All of the above
5. None of these

10. Which of the following describe one or more characteristics of a modem computer?
1. An electronic device
2. A mechanical device
3. A electro-mechanical device
4. All of the above
5. None of these

11. Combining records from two or more ordered files into a single ordered file is called–
1. Menu
2. Merging
3. Taking
4. All of the above
5. None of these

12. The ascending order of a data hierarchy is
1. Bit-byte-record-field-file-database
2. Byte-bit-field-record-file-database
3. Byte-bit-record-file-field-database
4. Bit-byte-field-record-file-database
5. All of the above

13. A LSI chip contains the entire CPU of computer except main memory is called–
1. Microprocessor
2. Hard disk
3. Input device
4. Output device
5. All of the above

14. A storage medium that loses its contents in the event of power failure is called–
1. Volatile storage
2. Non volatile storage
3. Permanent storage
4. All of the above
5. None of these

15. One-millionth of a second is referred as–
1. Microsecond
2. Millisecond
3. Hour
4. Minute
5. All of the above

16. Alternate facilities of programs, data files, hardware equipments, etc. used in case the original one is destroyed, lost, or fail to operate is–
1. Backup
2. Forehead
3. Delete
4. All of the above
5. None of these

17. One-thousandth of a second is called–
1. Microsecond
2. Millisecond
3. Hour 4. Minute
5. All of the above

18. The CPU (central processing unit) consists of
1. Input, output, and processing
2. Control unit, primary storage, and secondary storage
3. Control unit, arithmetic-logic unit, and primary storage
4. All of the above
5. None of these

19. The product of data processing is–
1. Data
2. Information
3. Software
4. Computer
5. All of the above

20. The input device used by computer is–
1. Motherboard
2. Central processing unit
3. Keyboard
4. System unit
5. All of the above

21. The structure of interconnecting of nodes of
a computer network is referred as–
1. Network topology 2. Internet
3. Local Area Network
4. Wide Area Network
5. All of the above

22. Nible is–
1. Double of byte
2. Half of byte
3. Ten times of byte
4. Five times of byte
5. All of the above

23. Multiprogramming is the–
1. The inter-leaved execution of two or more different and independent programs by the same computer
2. The execution of single by the different computers
3. The inter-leaved execution of two or more different and independent programs by the different computers
4. All of the above
5. None of these

24. A facility available in an operating system that allows multiple functions from the same application package is referred as–
1. Multi-threading
2. Multi-programming
3. Multi-processing
4. All of the above
5. None of these

25. Narrowband channel is a communication channels–
1. That handle low volumes of data
2. Used mainly for telegraph lines and low
speed terminals
3. Both 1. and 2.
4. All of the above
5. None of these

26. Following is the example of Network–
1. LAN
2. WAN
3. Internet
4. All the above
5. None of these

27. Peer-to-peer is a description–
1. Of communications between two dissimilar devices
2. Of communications between two equal devices
3. Of communications between two different devices
4. All of the above
5. None of these

 28. Non-document files are–
1. Pure ASCII files that can be listed for any word processing software
2. Non ASCII files that can be listed for any word processing software
3. Pure ASCII files that can be listed for specific word processing software
4. Non ASCII files that can be listed for pecific word processing software
5. All of the above

29. The method of dividing a physical channel into many logical channels so that a number of independent signals may be simultaneously transmitted on it is referred as–
1. Multithreading
2. Multiprocessing
3. Multiplexing
4. All of the above
5. None of these

30. An interconnected computer configura-tions or computers with two or more independent CPUs that have the ability to simultaneously execute several programs is called–
1. Multithreading
2. Multiprocessing
3. Multiplexing
4. All of the above
5. None of these

31. Following is not a non-impact printer–
1. Thermal printer
2. Ink-jet printer
3. Laser printer
4. Dot-matrix printer
5. All of the above

32. A number system with a base of 8 is referred as–
1. Binary
2. Decimal
3. Octal
4. All of the above
5. None of these

33. Devices converts digital signals to Sine waves at the sending end and back to digital signals at the receiving end is called–
1. Modem
2. Telephone
3. Mobile phone
4. All of the above
5. None of these

34. Dividing a project into segments and smaller units in order to simplify the analysis, design and programming effort is referred as–
1. Monitoring
2. Modular approach
3. Microprocessing
4. All of the above
5. None of these

35. The technique where digital signals are converted to its analog form for transmission over an analog facility is called–
1. Modulation
2. Digitization
3. Multiprocessing
4. All of the above
5. None of these

36. Multiprocessor is a computer system–
1. Where many CPU under a common control
2. Consisting of more than one input devices under common control
3. Where many output devices under
4. All of the above
5. None of these

37. The point at which the flow of text in a document moves to the top of a new page–
1. Page break
2. Page insert
3. Page format
4. All of the above
5. None of these

38. Technique to implement virtual memory where memory is divided into units of fixed size memory is–
1. Paging
2. De-fragments
3. Segmentation
4. All of the above
5. None of these

39. An adder where all the bits of the two operands are added simultaneously–
1. Parallel adder
2. Half adder
3. Full adder
4. All of the above
5. None of these

40. An extra bit added to a string of bits that enables the computer to detect internal errors in the transmission of binary data–
1. Parity bit
2. Byte
3. Nibble
4. All of the above
5. None of these

41. Password is–
1. Code by which a user gains access to a computer system
2. Pass for viewing movie
3. Entrance without paying something
4. All of the above
5. None of these

42. PL 1 (Programming Language One) is–
1. High level programming language
2. Low level programming language
3. Machine language
4. Assembly language
5. All of the above

43. Pascal is–
1. A high-level programming language
2. Named after Blaise Pascal
3. Named after mathematician that facilitates structured programming techniques
4. All of the above
5. None of these

44. Storage device where time to retrieve stored information is independent of address where it is stored is called–
1. Random access memory (RAM)
2. Primary memory
3. Secondary memory
4. All of the above
5. None of these

45. Octal number system has a base–
1. Two
2. Four
3. Eight
4. Ten
5. All of the above

46. Since input and output devices are on the edge of the main processing therefore they are referred as–
1. Peripheral devices
2. Processing devices
3. Personal devices
4. All of the above
5. None of these

47. A system changeover method where complete changeover to the new system takes place incrementally over a period of time is referred as–
1. Phased replacement
2. Block replacement
3. Complete replacement
4. All of the above
5. None of these

48. One trillionth of a second is–
1. Pico second
2. Mille second
3. Micro second
4. Minute
5. All of these

49. Following is of Non-vo a storage device
1. Magnetic tape
2. Compact disk
3. Floppy disk
4. All of the above
5. None of these

50. A storage medium that retains its contents even in the absence of power is referred as–
1. Non-volatile storage
2. Volatile storage
3. Secondary storage
4. Primary storage
5. None of these

ANSWERS:

1. (1) 2. (1) 3. (1) 4. (1) 5. (1) 6. (4) 7. (1) 8. (2) 9. (1) 10. (1)
11. (1) 12. (2) 13. (4) 14. (1) 15. (1) 16. (1) 17. (1) 18. (2) 19. (3) 20. (2)
21. (3) 22. (1) 23. (2) 24. (1) 25. (1) 26. (4) 27. (4) 28. (2) 29. (1) 30. (3)
31. (2) 32. (3) 33. (3) 34. (1) 35. (2) 36. (1) 37. (1) 38. (1) 39. (1) 40. (1)
41. (1) 42. (1) 43. (1) 44. (4) 45. (3) 46. (3) 47. (1) 48. (1) 49. (1) 50. (4)

BANK EXAMS COMPUTER KNOWLEDGE STUDY MATERIAL

1. Which of the following are the major components in a computer
a) CPU, CD_Rom, Mouse, Keyboard
b) Memory, Video card, Monitor
c) Modem, Printer, Screen
d) CPU, Memory, System bus, Input H/w, Output H/w

2. How the information is transformed from one component to another component in a system?
a) System bus
b) Memory
c) Keyboard
d) Monitor

3. MS-Access, MS-Foxpro is the examples of what type of software?
a) Spread Sheet
b) Presentation Software
c) Database Management
d) None of the above

4. Windows operating system have
a) Graphical User Interface
b) Command based Interface
c) Both a and b
d) None of the above

5. ___ Allows more data to be stored on a disk?
a) Data Compression
b) Disk Defragmentation
c) Both a and b
d) None of the above

6. A text-based language with codes or tags used for developing web pages is called?
a) Java
b) HTML
c) Both a and b
d) None of the above

7. CASE stands for?
a) Computer Aided Software Engineering
b) Common Aided Software Engineering
c) Computer Access Software Engineering
d) Computer Aided Software Engine

8. The primary job of the information system is?
a) Data collection
b)Data transfer
c) Transform inputs to information
d) None of the above

9. ___ Is the software that allows the computer to interact with users and hardware?
a) System Software
b) Application software
c) Development software
d) None of the above

10. This type of boot occurs when the computer is already on, and you restart it without turning off the power?
a) Generic boot
b) Live boot
c) Warm boot
d) Cold boot

11. A concentric ring on a hard disk is referred to as a?
a) Track
b) Sector
c) Table
d) None of the above

12. Which of the following best describes the purpose of generating a flowchart as part of the design of a computer program?
a) To test and maintain the efficiency of the overall program
b) To present the steps needed to solve the programming problem
c) To ensure that all methods are appropriately linked
d) To determine the necessary number of global and local variables

13. Which of the following would best facilitate the expansion of a computer program?
a) Incorporation of diagrams into the design documents
b) Minimal use of global variables in the source code
c) Construction of methods that are highly dependent on one another
d) Extensive use of functions, that support the debugging process

14. ___ Is/are the steps that tell the computer how to perform a particular task?
a) Data
b) Instructions
c) Information
d) Documentation

15. A computer contain many electric, electronic, and mechanical components known as?
a) Software
b) Input devices
c) Output devices
d) Hardware

16. ___ Is the most widely used coding scheme used to represent data
a) ASCII
b) Unicode
c) EBCDIC
d) Multi code

17. ___ Is the most common type of volatile memory?
a) ROM
b) CMOS
c) Flash Memory
d) RAM

18. A ___ is equal to approximately 1 million bytes?
a) Kilobytes
b) Mega bytes
c) Giga bytes
d) Tera bytes

19. Two categories of software are?
a) Operating System & System Software
b) Utility Programs
c) System software and Utility Programs
d) System software and Application Software

20. Notebook computers?
a) Can run on batteries or standard power supply
b) Are less expensive than a desktop with similar capabilities
c) Facilities are less
d) None of the above

21. The world's largest computer network is?
a) Internet
b) Intranet
c) LAN
d) MAN

22. Transaction Processing Systems are the basic business systems that serve which level of the organization?
a) Middle level
b) Senior level
c) Operational level
d) None of the above

23. In batch processing?
a) Transactions are processed immediately in batches
b) Transactions are accumulated in batches until it is time to process them
c) Both a and b
d) None of the above

24. Which of the following is the most powerful computer?
a) Mainframe computer
b) Micro computer
c) Super computer
d) Mini computer

25. A program written in a machine language is called ___ program?
a) Object
b) Computer
c) Assembler
d) High level

26. A collection of wires that connects several devices is called?
a) Link
b) Bus
c) Cable
d) Port

27. The fastest type of memory is?
a) Tape
b) Semi conductor memory
c) Disk memory
d) Bubble memory

28. Which of the following translator program coverts assembly level language program to object program?
a) Assembler
b) Complier
c) Micro processor
d) Linker

29. Barcodes stores information by using?
a) Dots b) Thick and thin lines
c) Both a and b
d) None of the above

30. Which of the following are the main problems in File Management System?
a) Data redundancy
b) Difficulty in updating
c) Both a and b
d) None of the above

31. In a database related fields are grouped to form?
a) Record
b) File
c) Both a and b
d) None of the above

32. Which of the following parts of a computer is necessary to enable it to play music?
a) Sound cards
b) CD-Ram
c) MIDI interface
d) Serial interface

33. Which one of the following printers is suitable for printing sprocket fed carbon copies?
a) Laser
b) Dot matrix
c) Ink jet
d) None of the above

34. To be effective a virus checker should be?
a) Replaced regularly
b) Never updated
c) Updated regularly
d) None of the above

35. Passwords enable users to?
a) Get into the system quickly
b) Make efficient use of time
c) Retain confidentiality of files
d) Simplify file structure

36. Automated transaction for the purchase of goods over the Internet is called?
a) E-Shopping
b) Web-Purchase
c) E-Commerce
d) Web-Shopping

37. Which one of the following would be the best to use to produce hundreds of letters at a time with same matter to different addresses?
a) Personal information
b) Email group
c) DTP
d) Mail merge

38. A:\ refers to?
a) A file name
b) Root directory
c) Hard drive
d) None of the above

39. Which of the following input device would be best suited to capturing images for use with a personal computer?
a) Digital camera
b) Graphics tablet
c) Touch Screen
d) Optical Mark Reader

40. The concept of "Zero Administ-ration" is associated with?
a) Network computer
b) Mini computer
c) Micro computer
d) None of the above

ANSWERS:
1) d 2) a 3) c 4) a 5) a 6) b 7) a 8) c 9) a 10) c 11) a 12) b 13) b 14) b 15) d 16) a 17) d 18) b
19) d 20) a 21) a 22) c 23) c 24) c 25) a 26) b 27) b 28) a 29) b 30) c 31) b 32) a 33) b 34) c
35) c 36) c 37) d 38) b 39) d 40) a