Wednesday 16 May 2012

COMPUTER KNOWLEDGE PRACTICE QUESTIONS


1.         A Passive threat to computer security is-
       (1) Malicious Intent              
(2) Sabotage
(3) Accidental Errors             
(4) Espionage Agents
(5) None of these
2.          ____ allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.
(1) TCP/IP                                  
(2) Ethernet
(3) WAP                                     
(4) Token ring
(5) None of these

3.          ‘DOS’ floppy disk does not have____.
(1) A Boot Record                  
(2) A File Allocation Table
(3) A Root Directory              
(4) Virtual Memory
(5) BIOS
4.          ‘MICR’ technology used for clearance of cheques by banks refers to ____.
(1) Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition
(5) None of these
5.          All the information collected during database development is stored in a ____.
(1) repository                          
(2) data warehouse
(3) RAD                                      
 (4) CASE
(5) None of these
6.          The ____ component is used by the data analyst to create the queries that access the database.
(1) data extraction                 
(2) end-user query tool
(3) end-user presentation tool
(4) data store                           
(5) None of these
7.          The altering of data so that it is not usable unless the changes are undone is ____.
(1) Biometrics                         
 (2) Compression
(3) Encryption                          
(4) Ergonomics
(5) None of these
8.          The word FTP stands for-
(1) File Transfer Protocol   
 (2) File Transit Protocol
(3) File Typing Protocol        
(4) File Transfer Protocol
(5) None of these
9.          This ____ tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
(1) Client                   
(2) Applications/Web server
(3) Enterprise server            
(4) DBA
(5) None of these
10.      A DVD-RAM is similar to a ____, except it has storage capacities up to 5.2 GB.
(1) CD-R                                     
(2) Floppy disk
(3) CD-RW                                 
(4) Hard disk
(5) None of these
11.      All of the following are basic principles of networks, except-
(1) each computer must have a network card
(2) there must be communications media connecting the network hardware devices
(3) there must be at least one connecting device
(4) each computer must have software that supports the movement of information
(5) None of these
12.      ____ are used to identify a user who returns to a Website.
(1) Cookies                               
(2) Plug-ins
(3) Scripts                                  
(4) ASPs
(5) None of these
13.      If you wanted to locate the hardware address of a local device, which protocol would you use?
(1) ARP                                       
(2) RARP
(3) ICMP                                    
(4) PING
(5) PONG
14.      The term, ‘hypertext’ means-
(1) Non-sequential writing 
(2) Hypermedia
(3) Blinking text     
(4) Text with heavy formatting
(5) None of these
15.      Which kind of lock includes a keypad that can be used to control access into areas?
(1) Cipher                                  
(2) Warded
(3) Device                                  
(4) Tumbler
(5) Type lock
16.      What is the name of protocol used in eliminate loops?
(1) Switching                            
(2) ISL
(3) Frame tagging                  
 (4) Spanning Tree Protocol
(5) None of these
17.      In networking terminology UTP means –
(1) Unshielded Twisted Pair
(2) Ubiquitous Teflon Port
(3) Uniformly Terminating Port
(4) Unshielded T-Connector
(5) None of these
18.      In OSI network architecture, the dialogue control and token management are responsibility of-
(1) Session layer                     
(2) Network layer
(3) Transport layer                 
(4) Data link layer
(5) None of the above
19.      A ‘C’ data structure called a structure is a group of items in which each item is identified by its own identifier, each of which is known as a member of a structure. Member is also known as-
(1) Information                       
(2) Field
(3) Record                                 
(4) Data type
(5) None of these
20.      Multithread means-
(1) Program do more than one thing at a time
(2) More than one program do one thing at a time
(3) Both are correct               
(4) Both are incorrect
(5) None of these
21.      A page fault occurs?
(1) when the page is not in the memory
(2) when the page is in  the memory
(3) when the process enters the blocked state
(4) when the process is in the ready state
(5) None of these
22.      “Each packet contains the full source and destination address.” This statement indicates which of the following?
(1) Virtual Circuit                    
(2) Datagram
(3) Data link                              
(4) FDDI
(5) None of these 
23.      Data bus is-
(1) Unidirectional                   
(2) Bidirectional
(3) Both (1) & (2)                   
 (4) Multidirectional
(5) None of these
24.      Which of the following is a type of ISDN (Integrated Service Digital Network)?
(1) Narrow bank                     
(2) Broad band
(3) Both (1) & (2)                    
(4) Virtual Circuit
(5) None of these 
25.      Which of the following is a browser to view a web page?
(1) Mosaic                                 
(2) Netscape
(3) Internet Explorer           
(4) All of the above
(5) None of these
26.      A graph is a collection of-
(1) Row and columns            
(2) Vertices and edges
(3) Equations                           
(4) Identity
(5) None of these
27.      CDMA is used in-
(1) Wireless and local loop
(2) Allocating a wireless channel
(3) Both (1) & (2)                    
(4) Local loop
(5) None of these
28.      Number of arcs incident to a node is called its-
(1) Level                                     
(2) Predecessor
(3) Degree                                                
(4) Successor
(5) None of these
29.      OSPF means-
(1) Open shortest path finite protocol
(2) Open shortest path finite protocol
(3) Open slotted path finite protocol
(4) Open slotted path first protocol
(5) None of these
30.      Binding the same name to multiple operations whose signatures differ in number or types of arguments?
(1) Overloading                       
(2) Origin class
(3) Object model                    
(4) Package
(5) None of these
31.      What is the name of the chip which has more than one processor on it?
(1) Parallel chip                       
(2) Multi-processor chip
(3) Transputer                         
(4) Parallel processor
(5) None of these
32.      In windows-
(1) Docking views may be docked
(2) Docking views may be float
(3) Docking views may be docked or float
(4) All of the above                               
(5) None of these
33.      ____ performs relocations function?
(1) Absolute loader               
(2) Direct linking loader
(3) Relocating loader            
(4) Linkage editor
(5) None of these
34.      A central computer surrounded by one or more satellite computers is called a-
(1) Bus network                      
(2) Ring network
(3) Star network                     
(4) All of the above
(5) None of these
35.      Segmentation –
(1) is a memory management scheme that supports user view of memory
(2) logical address space is collection of segments
(3) logical address consists of two tuple < segment-number, offset>.
(4) All of the above                               
(5) None of these 
36.      Which of the following is a major component of the telephone system?
(1) Local loop                           
(2) Trunks
(3) Switching office                               
(4) All of these
(5) None of these 
37.      Function is invoked by-
(1) Function                             
(2) Declaration
(3) Definition                           
(4) Prototype
(5) None of these
38.      The ACCEPT command in SQL?
(1) Creates a customized prompt when accepting user input
(2) Explicitly defines a NUMBER or DATE data type variable
(3) Hides user input for security reasons
(4) All of the above
(5) None of these
39.      How many fields are required to represent a header node of a graph?
(1) 3                                             
(2) 2
(3) 4                                             
(4) 5
(5) None of these
40.      Which of the following is not used as a data structure?
(1) Array                                    
(2) Linked list
(3) Graph                                   
(4) Directory
(5) None of these 
41.      Which of the following is an operating system call?
(1) CREATE                                                
(2) LINK
(3) SYSTEM                               
(4) All of these
(5) None of these
42.      In C++, by default, the members of a class are-
(1) Public                                   
(2) Private
(3) Both public and private 
(4) Only Public
(5) None of these
43.      In core banking systems:
(1) Store and forward of transaction is done
(2) Branch server is not required
(3) Local database is not required
(4) Transaction cannot happen from a non-home branch
(5) None of these 
44.      MV command in Unix changes-
(1) Only the directory
(2) Only the directory entry and i-node
(3) Only the i-node number
(4) All of the above                               
(5) None of these
45.      E-Commerce refers to-
(1) Electrical commerce       
(2) Electronic commerce
(3) Evolutionary commerce              
(4) Effective commerce       
(5) None of these
46.      Graphs can be implemented using-
(i) Arrays    (ii) Linked list      (iii) Stack              (iv) Queue
(1) (i), (ii) and (iv)                   
(2) (i), (ii) and (iii)
(3) (ii) and (iii)                          
(4) (i) and (iv)
(5) None of these
47.      Thrashing-
(1) Always occur on large computers
(2) is a natural consequence of virtual memory systems
(3) Can always be avoided by swapping
(4) Can be caused by poor paging algorithm
(5) None of these
48.      The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred as-
(1) modulation                        
(2) demodulation
(3) synchronizing                    
(4) digitizing
(5) None of these
49.      The relational database environment has all of the following components except-
(1) Users                                    
(2) Separate files
(3) Database                            
(4) Database administrator
(5) None of these
50.      Primary key-
(1) Denote a candidate key that is chosen by the database designer as the principal means of identifying entities with in an entity set
(2) Attributes names of all primary key are unique
(3) Primary key specification is optional and good idea to specify primary key for each relation
(4) All of the above                              
 (5) None of these
Answers:


1
1
11
4
21
1
31
3
41
4
2
3
12
1
22
2
32
2
42
2
3
5
13
1
23
2
33
3
43
1
4
1
14
2
24
3
34
3
44
1
5
1
15
1
25
4
35
4
45
2
6
2
16
4
26
2
36
4
46
4
7
3
17
3
27
3
37
1
47
4
8
4
18
1
28
3
38
4
48
4
9
2
19
2
29
1
39
1
49
2
10
3
20
1
30
1
40
4
50
4

Thursday 10 May 2012

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. Selection of command- 
(A) Opens the copy of the document in preview 
(B) Prints the copy of displayed document
(C) Brings change in expansion of displayed document
(D) Saves the copy of displayed document
(E) None of these
Ans: (C)

2. You organize files by storing them in- 
(A) archives
(B) folders
(C) indexes    
(D) lists
(E) None of these
Ans: (B)



3. How many different documents can you have open at anyone time ? 
(A) No more than three
(B) Only one
(C) As many as your computer memory will hold
(D) No more than you taskbar can display
(E) None of these
Ans: (C)

4. What type of resource is most likely to be a shared common resource in a computer network ? 
(A) Printers
(B) Speakers
(C) Floppy disk drives
(D) Keyboards
(E) None of these
Ans: (A)

5. Directory in directory is called- 
(A) Mini directory
(B) Junior directory
(C) Part directory
(D) Sub-directory
(E) None of these
Ans: (D)

6. Such a pre-made document, which has coordinating font, layout and background, is- 
(A) Guide    
(B) Model
(C) Ruler    
(D) Template
(E) None of these
Ans: (D)

7. In order to create columnar data in Word you need to- 
(A) Tab consecutively until your cursor reaches the desired place
(B) Set tabs or use the Table menu
(C) You need to use Excel
(D) Press the space bar until your cursor reaches the desired place
(E) None of these
Ans: (E)

8. Saving is a process- 
(A) To copy the document from memory to stroage medium
(B) To bring change in present status of the document
(C) To change the face or entire form
(D) To develop the document by recording the text with the use of keyboard
(E) None of these
Ans: (A)

9. To insert a word into the middle of a sentence- 
(A) move the cursor to the desired location in the sentence and type the new word
(B) move the cursor to the desired location in the sentence, press Enter key, and type the new word
(C) move the cursor to the beginning of the sentence and start typing
(D) retype the whole sentence
(E) None of these
Ans: (A)

10. A(n) .............. is a combination of hardware and software that facilitates the sharing of information between computing devices. 
(A) network
 (B) peripheral
 (C) expansion board
 (D) digital device
 (E) None of these
 Ans: (A)

 11. In word you can force a page break-  (A) By positioning your cursor at the appropriate place and pressing the F1 key
 (B) By using the Insert/Section Break
 (C) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
 (D) By changing the font size of your document
(E) None of these
Ans: (C)

12. Junk e-mail is also called- (A) spam
(B) spoof
(C) sniffer script
(D) spool
(E) None of these
Ans: (A)

13. Hackers- (A) all have the same motive
(B) break into other people's computers
(C) may legally break into computers as long as they do not do any damage
(D) are people who are allergic to computers
(E) None of these
Ans: (B)

14. What type of computers are client computers (most of the time) in a client-server system ? (A) Mainframe
(B) Mini-computer
(C) Microcomputer
(D) PDA
(E) None of these
Ans: (C)

15. A computer cannot 'boot' if it does not have the- (A) Compiler
(B) Loader
(C) Operating System
(D) Assembler
(E) None of these
Ans: (C)

16. The amount of vertical space between lines of text in a document is called- (A) double-space
(B) line spacing
(C) single space
(D) vertical spacing
(E) None of these
Ans: (B)

17. Example of non-numeric data is- (A) Employee address
(B) Examination score
(C) Bank balance
(D) All of these
(E) None of these
Ans: (A)

18. What is embedded system ? (A) The programme which arrives by being wrapped in box.
(B) The programme which is the permanent part of the computer
(C) The computer which is the part of a big computer
(D) The computer and software system that control the machine
(E) None of these
Ans: (D)

19. First page of Website is termed as- (A) Homepage
(B) Index
(C) JAVA script
(D) Bookmark
(E) None of these
Ans: (A)

20. ..................... is the appearance of typed characters. (A) Size    
(B) Format
(C) Point    
(D) Colour
(E) None of these
Ans: (B)

21. When a file is saved for the first time- (A) a copy is automatically printed (B) it must be given a name to identify it
(C) it does not need a name
(D) it only needs a name if it is not going to be printed
(E) None of these
Ans: (B)

22. Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate- (A) CAN
(B) LAN
(C) DAN
(D) WAN
(E) TAN
Ans: (D)

23. Where are data and programme stored when the processor uses them ? (A) Main memory
(B) Secondary memory
(C) Disk memory
(D) Programme memory
(E) None of these
Ans: (A)

24. ............... represents raw facts, where- as ................. is data made meaningful. (A) Information, reporting
(B) Data, information
(C) Information, bits
(D) Records, bytes
(E) Bits, bytes
Ans: (B)

25. Which keystroke will take you at the beginning or the end of a long document ? (A) Ctrl + PageUp and Ctrl + PageOown
(B) Shift + Home and Shift + End
(C) Ctrl + Home and Ctrl + End
(D) The only way is by using the right scroll bar
(E) None of these
Ans: (C)

26. What characteristic of read-only memory (ROM) makes it useful ?  (A) ROM information can be easily updated.
 (B) Data in ROM is nonvolatile, that is, it remains there even without electrical power.
 (C) ROM provides very large amounts of inexpensive data storage.
 (D) ROM chips are easily swapped between different brands of computers.
 (E) None of these
 Ans: (B)

27. In page preview mode- 
 (A) You can see all pages of your document
 (B) You can only see the page you are currently working
 (C) You can only see pages that do not contain graphics
 (D) You can only see the title page of your document
 (E) None of these
 Ans: (A)

28. If the file saved earlier is edited, then- 
(A) It is essential to save the file again to store the change
(B) The change will automatically be saved in the file
(C) If the length is more than a page, the file will be needed to be saved 

(D) The name will be needed to be changed
(E) None of these
 Ans: (A)

29. When creating a word-processed document, this step involves the user changing how words on the page appear, both on the screen and in printed form- 
(A) Editing text
(B) Inserting tables and indexes
(C) Formatting text
(D) Proofing documents
(E) None of these
 Ans: (C)

30. Aligning of text in column is- 
(A) Justified
(B) Right
(C) Centre    
(D) Left
(E) None of these
 Ans: (A)

Thursday 3 May 2012

COMPUTER KNOWLEDGE PRACTICE PAPER

1. A keyboard is this kind of device—
(A) black
(B) input
(C) output
(D) word Processing
(E) None of these
Ans : (B)

2. IT stands for—
(A) information Technology
(B) integrated Technology
(C) intelligent Technology
(D) interesting Technology
(E) None of these
Ans : (A)

3. Which of the following refers to the fastest, biggest and most expensive computers ?
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
Ans : (B)

4. A collection of related information sorted and dealt with as a unit is a—
(A) disk
(B) data
(C) file
(D) floppy
(E) None of these
Ans : (C)

5. The process of a computer receiving information from a server on the Internet is known as—
(A) pulling
(B) pushing
(C) downloading
(D) transferring
(E) None of these
Ans : (C)

6. Which part of the computer helps to store information ?
(A) Disk drive
(B) Keyboard
(C) Monitor
(D) Printer
(E) None of these
Ans : (A)

7. ………………is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)

8. The role of a………generally is to determine a buyer’s needs and match it to the correct hardware and software.
(A) computer Scientist
(B) computer sales representative
(C) computer consultant
(D) corporate trainer
(E) None of these
Ans : (B)

9. Which of the following groups consist of only output devices ?
(A) Scanner, Printer, Monitor
(B) Keyboard, Printer, Monitor
(C) Mouse, Printer, Monitor
(D) Plotter, Printer, Monitor
(E) None of these
Ans : (D)

10. The rectangular area of the screen that displays a program, data, and/or information is a—
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)

11. A(n)………contains commands that can be selected.
(A) pointer
(B) menu
(C) icon
(D) button
(E) None of these
Ans : (B)

12. An error is also known as—
(A) bug
(B) debug
(C) cursor
(D) icon
(E) None of these
Ans : (A)

13. Arithmetic Operations—
(A) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item
(B) sort data items according to standard, predefined criteria in ascending order or descending order
(C) use conditions with operators such as AND, OR and NOT
(D) include addition, subtraction, multiplication and division
(E) None of these
Ans : (D)

14. Sending an e-mail is similar to—
(A) picturing an event
(B) narrating a story
(C) writing a letter
(D) creating a drawing
(E) None of these
Ans : (C)

15. Promotion in Marketing means—
(A) passing an examination
(B) elevation from one grade to another
(C) selling the products through various means
(D) selling the product in specific areas
(E) None of these
Ans : (C)

16. Microsoft Word is an example of—
(A) an operating system
(B) a processing device
(C) application software
(D) an input device
(E) None of these
Ans : (B)

17. Sources of Sales Leads are—
(A) Data Mining
(B) Market Research
(C) Media Outlets
(D) Promotional Programs
(E) All of these
Ans : (E)

18. Any data or instruction entered into the memory of a computer is considered as—
(A) storage
(B) output
(C) input
(D) information
(E) None of these
Ans : (A)

19. Which part of the computer displays the work done ?
(A) RAM
(B) printer
(C) monitor
(D) ROM
(E) None of these
Ans : (C)

20. One of the methods for Market Monitoring is—
(A) to watch TV serials
(B) to discuss with other sales persons
(C) to monitor media outlets
(D) All of these
(E) None of these
Ans : (C)

21. Market Expansion means—
(A) hiring more staff
(B) firing more staff
(C) buying more products
(D) buying more companies
(E) None of these
Ans : (E)

22. A series of instructions that tells a computer what to do and how to do it is called a—
(A) program
(B) command
(C) user response
(D) processor
(E) None of these
Ans : (A)

23. Effective marketing helps in—
(A) developing new products
(B) creating a competitive environment
(C) building demand for products
(D) All of these
(E) None of these
Ans : (D)

24. Which is the part of a computer that one can touch and feel ?
(A) Hardware
(B) Software
(C) Programs
(D) Output
(E) None of these
Ans : (A)

25. A Call in Marketing means—
(A) to phone the customers
(B) to visit the customers
(C) to visit the marketing site
(D) to call on prospective customers
(E) None of these
Ans : (D)

26. Delivery Channel means—
(A) maternity wards
(B) handing over the products to the buyers
(C) places where products are made available to the buyers
(D) All of these
(E) None of these
Ans : (C)

27. Processing involves—
(A) inputting data into a computer system
(B) transforming input into output
(C) displaying output in a useful manner
(D) providing relevant answers
(E) None of these
Ans : (B)

28. One of the following is a target group for the marketing of Internet Banking.
(A) All the customers
(B) All the educated customers
(C) All the computer educated customers
(D) Only creditors
(E) All of these
Ans : (C)

29. Innovation mean—
(A) Product Designing
(B) New ideas
(C) Impulse
(D) Both (A) and (B)
(E) None of these
Ans : (D)

30. One of the following is a target group for the marketing of educational loan.
(A) All the customers
(B) Students
(C) Only poor students
(D) Students having promising educational track record
(E) All of these
Ans : (B)

31. Service after sale is not the function of—
(A) Marketing staff
(B) Seller
(C) Director of the company
(D) Employees of the company
(E) All of the above are wrong
Ans : (A)

32. If done through………the rural marketing would be more effective.
(A) fairs
(B) village fairs
(C) door to door campaign
(D) All of these
(E) None of these
Ans : (B)

33. Market Survey means—
(A) Market Research
(B) Market Planning
(C) Marketing Strategies
(D) Market Monitering
(E) All of these
Ans : (A)

34. ………can be done through digital Banking ?
(A) Mobile phone
(B) Internet
(C) Telephone
(D) All of these
(E) None of these
Ans : (A)

35. A good seller should have the following quality/qualities ?
(A) Devotion to the work
(B) Submissive
(C) Sympathy
(D) All of these
(E) None of these
Ans : (D)

36. The rural marketing is not required because—
(A) rural people do not understand marketing
(B) its not practical from the cost point of view
(C) it is sheer wastage of time
(D) All are wrong
(E) All are correct
Ans : (D)

37. Planned-cost service means—
(A) Costly products
(B) Extra profit on the same cost
(C) Extra work by seller
(D) All of these
(E) None of these
Ans : (B)

38. Internet marketing means—
(A) Self-marketing
(B) Core Groups monitering
(C) Employees marketing
(D) All of these
(E) None of these
Ans : (E)

39. The aim of successful marketing is—
(A) to increase the sale
(B) to increase the profit
(C) to increase the output of sellers
(D) All of these
(E) None of these
Ans : (D)

40. The networking becomes……through networking.
(A) very difficult
(B) dull
(C) easy
(D) has no role in marketing
(E) None of these
Ans : (C)

Friday 27 April 2012

Allahabad Bank Clerk (Second Shift) Exam., 2011



 Computer Knowledge

(Exam Held on 8-5-2011)


1. Information on a computer is stored as what ?
(A) Analog data
(B) Digital data
(C) Modem data
(D) Watts data
(E) None of these
Ans : (B)
2. C, BASIC, COBOL and Java are examples of ……… languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)
3. Most Web sites have a main page, the ………, which acts as a doorway to the rest of the Web site pages.
(A) search engine
(B) home page
(C) browser
(D) URL
(E) None of these
Ans : (B)
4. An email account includes a storage area, often called a(n)—
(A) attachment
(B) hyperlink
(C) mailbox
(D) IP address
(E) None of these
Ans : (C)
5. The ……… is the box that houses the most important parts of a computer system.
(A) software
(B) hardware
(C) input device
(D) system unit
(E) None of these
Ans : (D)
6. What type of computer could be found in a digital watch ?
(A) Mainframe computer
(B) Supercomputer
(C) Embedded computer
(D) Notebook computer
(E) None of these
Ans : (C)
7. What is a modem connected to ?
(A) Processor
(B) Mother board
(C) Printer
(D) Phone line
(E) None of these
Ans : (D)
8. A(n) ……… is a collection of information that determines which files you can access and which settings you use.
(A) network
(B) user account
(C) operating system
(D) file system
(E) None of these
Ans : (B)
9. The space in your computer that loads and works with data—
(A) cache memory
(B) CPU
(C) megabyte
(D) RAM memory
(E) ROM memory
Ans : (D)
10. ……… hard drives are permanently located inside the system unit and are not designed to be removed, unless they need to be repaired or replaced.
(A) Static
(B) Internal
(C) External
(D) Remove
(E) None of these
Ans : (B)
11. A computer ……… consists of two or more computers and other devices that are connected for the purpose of sharing data and programs.
(A) network
(B) system
(C) workstation
(D) device
(E) None of these
Ans : (A)
12. The taskbar is located—
(A) on the Start menu
(B) at the bottom of the screen
(C) on the Quick Launch toolbar
(D) at the top of the screen
(E) None of these
Ans : (B)
13. Once information is input into a computer, it becomes—
(A) objects
(B) data
(C) ideas
(D) facts
(E) None of these
Ans : (B)
14. Generally, you access the Recycle Bin through an icon located—
(A) on the desktop
(B) on the hard drive
(C) on the shortcut menu
(D) in the Properties dialog box
(E) None of these
Ans : (A)
15. Computer programs are written in a high-level programming language; however, the humanreadable version of a program is called—
(A) cache
(B) instruction set
(C) source code
(D) word size
(E) None of these
Ans : (C)
16. The Recycle Bin stores discarded items until—
(A) another user logs on
(B) the computer is shut down
(C) the end of the day
(D) you empty it
(E) None of these
Ans : (D)
17. A ……… is a collection of information saved as a unit.
(A) folder
(B) file
(C) path
(D) file extension
(E) None of these
Ans : (B)
18. Input, output, and processing devices grouped together represent a(n)—
(A) mobile device
(B) information processing cycle
(C) circuit board
(D) computer system
(E) None of these
Ans : (D)
19. One thousand bytes is a—
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (E)
20. What part of the computer provides only temporary storage of files ?
(A) ROM memory
(B) RAM memory
(C) Hard drive
(D) Mother board
(E) Processor
Ans : (B)
21. A(n) ……… backup contains a copy of every program, data, and system file on a computer.
(A) restoration
(B) bootstrap
(C) differential
(D) full
(E) None of these
Ans : (D)
22. Every component of your computer is either—
(A) application software or system software
(B) software or CPU/RAM
(C) hardware or software
(D) input devices or output devices
(E) None of these
Ans : (C)
23. A blinking symbol on the screen that shows where the next character will appear—
(A) delete key
(B) arrow key
(C) cursor
(D) return key
(E) Esc key
Ans : (C)
24. Being ……… means being familiar enough with computers that you understand their capabilities and limitations.
(A) computer literate
(B) computer competent
(C) computer savvy
(D) technology literate
(E) None of these
Ans : (A)
25. Which of the following could you do to remove a paragraph from a report you had written ?
(A) Delete and edit
(B) Copy and paste
(C) Cut and paste
(D) Undo typing
(E) Highlight and delete
Ans : (E)
26. The computer monitor is which type of device ?
(A) Scanning
(B) Input
(C) Processor
(D) Software
(E) Output
Ans : (E)
27. The arrow keys can be used to—
(A) delete text
(B) move the cursor in the text that has already been entered
(C) save the document
(D) move the cursor while deleting text
(E) None of these
Ans : (B)
28. Numbers in table columns are usually—
(A) right-aligned
(B) left-aligned
(C) justified
(D) centered
(E) None of these
Ans : (A)
29. To indent the first paragraph of your report, you should use this key—
(A) esc
(B) space bar
(C) return key
(D) shift key
(E) tab key
Ans : (E)
30. Each box in a spreadsheet is called a—
(A) cell
(B) empty space
(C) record
(D) field
(E) table
Ans : (A)
31. A small picture that represents something on your screen…such as a(n)—
(A) table
(B) application
(C) photo
(D) modem
(E) icon
Ans : (E)
32. When a file is saved for the first time—
(A) a copy is automatically printed
(B) file name and folder name must be the same
(C) it does not need a name
(D) it only needs a name if it is not going to be printed
(E) it must be given a name to identify it
Ans : (E)
33. Example of non-numeric data is—
(A) Employee Name
(B) Test score
(C) Bank Account No.
(D) All of these
(E) None of these
Ans : (A)
34. Which type of file is created by word processing programs ?
(A) Database file
(B) Storage file
(C) Worksheet file
(D) Document file
(E) Graphical file
Ans : (D)
35. The information you put into the computer is called—
(A) directory
(B) facts
(C) data
(D) files
(E) output
Ans : (C)
36. This can be another word for program—
(A) peripheral
(B) disk
(C) floppy
(D) hardware
(E) software
Ans : (E)
37. If a previously saved file is edited—
(A) it cannot be saved again
(B) the changes will automatically be saved in the file
(C) the file will only have to be saved again if it is more than one page in length
(D) its name must be changed
(E) the file must be saved again to store the changes
Ans : (E)
38. Mr. XYZ wants to send an electronic message to a friend. He should use this type of application—
(A) word processing
(B) email
(C) spreadsheet
(D) paper and pencil
(E) None of these
Ans : (B)
39. To print a document—
(A) select the Print command and then select OK
(B) select the Ready Printer command then select OK
(C) type PRINT and then press Enter
(D) close the document, select the Print command, then select OK
(E) None of these
Ans : (A)
40. Each ……… on a menu performs a specific action.
(A) client
(B) server
(C) node
(D) command
(E) folder
Ans : (D)

Tuesday 24 April 2012

COMPUTER KNOWLEDGE PRACTICE MCQs

1. The ________ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule

(b) referential integrity constraint

(c) action assertion

(d) composite attribute

(e) None of these

2. An applet ________

(a) is an interpreted program that runs on the client

(b) tracks the number of visitors to a Website

(c) is a compiled program that usually runs on the client

(d) collects data from visitors to a Website

(e) None of these

3. A ________ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus

(b) Trojan horse virus

(c) file virus

(d) macro virus

(e) None of these

4. Which error detection method uses one's complement arithmetic?

(a) Simply parity check

(b) Checksum

(c) Two-dimensional parity check

(d) CRC

(e) None of these

5. A result of a computer virus can NOT lead to ________ .

(a) Disk Crash

(b) Mother Board Crash

(c) Corruption of program

(d) Deletion of files

(e) None of these

6. The network interface card of LAN is related to following layer of OSI Model

(a) Transport

(b) Network

(c) Data Link

(d) Physical

(e) All of these

7. Which of the following does NOT describe a data warehouse?

(a) Subject-oriented

(b) Integrated

(c) Time-variant

(d) Updateable

(e) None of these

8. Which of the following is TRUE ?

(a) Logical design is software-dependent

(b) In a distributed database, database is stored in one physical location

(c) Conceptual design translates the logical design into internal model

(d) Logical design is software independent

(e) None of these

9. A range check ________

(a) ensures that only the correct data type is entered into a field

(b) verifies that all required data is present

(c) determines whether a number is within a specified limit

(d) tests if the data in two or more associated fields is logical

(e) None of these

10. The total set of interlinked hypertext documents worldwide is-

(a) HTTP

(b) Browser

(c) WWW

(d) B2B

(e) None of these

11. With the object-oriented (OO) approach, an object encapsulates, or ________ .a programmer.

(a) carries out, the details of an object for

(b) hides, the details of an object from

(c) reveals, the details of an object to

(d) extends, the details of an object beyond

(e) None of these

12. Every computer connected to an intranet or extranet must have a distinct ________

(a) firewall

(b) proxy server

(c) IP address

(d) domain name

(e) None of these

13. A table of bits in which each row represents the distinct values of a key?

(a) Join index

(b) Bitmap index

(c) B + Tree

(d) Hierarchical index

(e) None of these

14. The degree of detail that should be incorporated into a database depends on what?

(a) Data integrity

(b) The type of database

(c) The user's perspective

(d) The business practices and policies

(e) None of these

15. The ________ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem

(b) Router

(c) Gateway

(d) Bridge

(e) All of these

16. Before a package can be used in a java program it must be ________ .

(a) executed

(b) referenced

(c) imported

(d) declared

(e) None of these

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction ________ .

(a) begin the line with a # sign

(b) begin the line with double slashes (/ /)

(c) begin and end the line with double hyphens (- _ -)

(d) indent the line

(e) None of these

18. Programming language built into user programs such as Word and Excel are known as ________

(a) 4GLs

(b) macro languages

(c) object-oriented languages

(d) visual programming languages

(e) None of these

19. Firewalls are used to protect against ________ .

(a) Unauthorized Attacks

(b) Virus Attacks

(c) Data Driven Attacks

(d) Fire Attacks

(e) All of these

20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-

(a) Interrupt request

(b) Forward DNS lookup

(c) Data-Link layer

(d) File Transfer Protocol

(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are ________ .

(a) Schema, Base and Table

(b) Base, Table and Schema

(c) Key, Base and Table

(d) Schema, Table and View

(e) None of these

22. Data are ________ in client/server computing.

(a) never sent to the client machine

(b) sent in very large sections to save processing time

(c) sent only upon the client's request

(d) sent in complete copies for the client to filter and sort

(e) sent from the client to the server for processing

23. Which of the following will NOT eliminates the ambiguities of a null value?

(a) Define the attribute as required

(b) Define subtypes

(c) Define each attribute as having an initial value that is recognized as blank

(d) Define supertypes

(e) None of these

24. The ________ directory is mandatory for every disk.

(a) Root

(b) Base

(c) Sub

(d) Case

(e) None of these

25. This is a group of servers that share work and may be able to back each other up if one server fails.

(a) Channel bank

(b) Cluster

(c) Tiger team

(d) Serverless backup

(e) Logical unit

ANSWERS

1. (a), 2. (c), 3. (e), 4. (b), 5. (b)
6. (e), 7. (d), 8. (a), 9. (c), 10. (a)
11. (b), 12. (c), 13. (b), 14. (b), 15. (a)
16. (c), 17. (b), 18. (d), 19. (a), 20. (e)
21. (d), 22. (c), 23. (d), 24. (c), 25. (b)

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. The ________ states that a foreign key must either match a primary key value in another relation or it must be null.

(a) entity integrity rule

(b) referential integrity constraint

(c) action assertion

(d) composite attribute

(e) None of these

2. An applet ________

(a) is an interpreted program that runs on the client

(b) tracks the number of visitors to a Website

(c) is a compiled program that usually runs on the client

(d) collects data from visitors to a Website

(e) None of these

3. A ________ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a) system virus

(b) Trojan horse virus

(c) file virus

(d) macro virus

(e) None of these

4. Which error detection method uses one's complement arithmetic?

(a) Simply parity check

(b) Checksum

(c) Two-dimensional parity check

(d) CRC

(e) None of these

5. A result of a computer virus can NOT lead to ________ .

(a) Disk Crash

(b) Mother Board Crash

(c) Corruption of program

(d) Deletion of files

(e) None of these

6. The network interface card of LAN is related to following layer of OSI Model

(a) Transport

(b) Network

(c) Data Link

(d) Physical

(e) All of these

7. Which of the following does NOT describe a data warehouse?

(a) Subject-oriented

(b) Integrated

(c) Time-variant

(d) Updateable

(e) None of these

8. Which of the following is TRUE ?

(a) Logical design is software-dependent

(b) In a distributed database, database is stored in one physical location

(c) Conceptual design translates the logical design into internal model

(d) Logical design is software independent

(e) None of these

9. A range check ________

(a) ensures that only the correct data type is entered into a field

(b) verifies that all required data is present

(c) determines whether a number is within a specified limit

(d) tests if the data in two or more associated fields is logical

(e) None of these

10. The total set of interlinked hypertext documents worldwide is-

(a) HTTP

(b) Browser

(c) WWW

(d) B2B

(e) None of these

11. With the object-oriented (OO) approach, an object encapsulates, or ________ .a programmer.

(a) carries out, the details of an object for

(b) hides, the details of an object from

(c) reveals, the details of an object to

(d) extends, the details of an object beyond

(e) None of these

12. Every computer connected to an intranet or extranet must have a distinct ________

(a) firewall

(b) proxy server

(c) IP address

(d) domain name

(e) None of these

13. A table of bits in which each row represents the distinct values of a key?

(a) Join index

(b) Bitmap index

(c) B + Tree

(d) Hierarchical index

(e) None of these

14. The degree of detail that should be incorporated into a database depends on what?

(a) Data integrity

(b) The type of database

(c) The user's perspective

(d) The business practices and policies

(e) None of these

15. The ________ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

(a) Modem

(b) Router

(c) Gateway

(d) Bridge

(e) All of these

16. Before a package can be used in a java program it must be ________ .

(a) executed

(b) referenced

(c) imported

(d) declared

(e) None of these

17. Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction ________ .

(a) begin the line with a # sign

(b) begin the line with double slashes (/ /)

(c) begin and end the line with double hyphens (- _ -)

(d) indent the line

(e) None of these

18. Programming language built into user programs such as Word and Excel are known as ________

(a) 4GLs

(b) macro languages

(c) object-oriented languages

(d) visual programming languages

(e) None of these

19. Firewalls are used to protect against ________ .

(a) Unauthorized Attacks

(b) Virus Attacks

(c) Data Driven Attacks

(d) Fire Attacks

(e) All of these

20. This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user-

(a) Interrupt request

(b) Forward DNS lookup

(c) Data-Link layer

(d) File Transfer Protocol

(e) Common gateway interface

21. Three SQL, DDL, CREATE commands are ________ .

(a) Schema, Base and Table

(b) Base, Table and Schema

(c) Key, Base and Table

(d) Schema, Table and View

(e) None of these

22. Data are ________ in client/server computing.

(a) never sent to the client machine

(b) sent in very large sections to save processing time

(c) sent only upon the client's request

(d) sent in complete copies for the client to filter and sort

(e) sent from the client to the server for processing

23. Which of the following will NOT eliminates the ambiguities of a null value?

(a) Define the attribute as required

(b) Define subtypes

(c) Define each attribute as having an initial value that is recognized as blank

(d) Define supertypes

(e) None of these

24. The ________ directory is mandatory for every disk.

(a) Root

(b) Base

(c) Sub

(d) Case

(e) None of these

25. This is a group of servers that share work and may be able to back each other up if one server fails.

(a) Channel bank

(b) Cluster

(c) Tiger team

(d) Serverless backup

(e) Logical unit

ANSWERS

1. (a), 2. (c), 3. (e), 4. (b), 5. (b)
6. (e), 7. (d), 8. (a), 9. (c), 10. (a)
11. (b), 12. (c), 13. (b), 14. (b), 15. (a)
16. (c), 17. (b), 18. (d), 19. (a), 20. (e)
21. (d), 22. (c), 23. (d), 24. (c), 25. (b)

Wednesday 18 April 2012

BANK EXAMS COMPUTER KNOWLEDGE PRACTICE QUESTIONS


1. Compiler is the
(a) name given to the computer operator
(b) part of the digital machine to store the information
(c) translator of source program to object
(d) part of arithmetic logic unit
(e) operator of Boolean Algebra
Ans (c)
2. Main memory is
(a) Random Access Memory
(b) Read only Memory
(c) Serial Access Memory
(d) None of these
Ans (a)
3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer
(b) Quantum Computer
(c) Param-10,000
(d) IBM chips
Ans (b)
4. A compact disc (CD) is a data storage of the type
(a) Magnetic
(b) Optical
(c) Electrical
(d) Electromechanical
Ans (a)
5. Which of the following is not as language for computer programming?
(a) WINDOWS
(b) PASCAL
(c) BASIC
(d) COBOL
Ans (a)
6. What are the two basic types of memory that your computer uses?
(a) RAM
(b) RW/RAM
(c) ROM
(d) ERAM
Ans (a)
7. The term gigabyte refers to
(a) 1024 bytes
(b) 1024 kilobytes
(c) 1024 megabytes
(d) 1024 gigabytes
Ans (c)

8. A computer with CPU speed around 100 million instructions per second & with the word length of around 64 bits is known as
(a) Super computer
(b) Mini computer
(c) Micro computer
(d) Micro computer
Ans (a)
9. What digits are representative of all binary numbers?
(a) 0
(b) 1
(c) Both (a ) and (b)
(d) 3
Ans (c)
10. To locate a data items for storage is
(a) Field
(b) Feed
(c) Database
(d) Fetch
Ans (d)
11. Off-line operation is the operation of devices without the control of
(a) Memory
(b) CPU
(c) ALU
(d) Control unit
Ans (b)
12. A type of line printer that uses an embossed steel band to form the letters printed on the paper is
(a) Golf ball printer
(b) Dot-matrix printer
(c) Laser printer
(d) Band printer
Ans (d)
13. A software used to convert source program instructions to object instruction is known as
(a) Compiler
(b) Assembler
(c) Interpreter
(d) Language processor
14. The ‘IC’ chip, used in computers, is made of
(a) Chromium
(b) Iron oxide
(c) Silica
(d) Silicon
Ans (d)
15. Name the first general purpose electronic computer
Ans : UNIVAC
16. The size of commonly used Floppy disk is
(a) 4.5
(b) 3.5
(c) 3.25
(d) 5.5
Ans (b)
17. Which of the following statement is wrong
(a) Windows XP is an operating system
(b) Linux is owned and sold by Microsoft
(c) Photoshop is a graphical design tool by Adobe
(d) Linux is free and open source software
Ans (b)
18. Operating system of a computer
(a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references
(c) Provides a layer, user friendly interface
(d) None of the above
Ans (c)
19. The term Operating System means
(a) A set of programs which control computer working
(b) The way a user operates the computer system
(c) Conversion of high level language to machine language
(d) The way computer operator works
Ans (a)
20. Wild card operators specifies
(a) can be used when writing into multiple files
(b) allows several files to be read simultaneously
(c) Provide an easy way of groups of related files
(d) Are only used when printing the contents of a file
Ans (c)
21.Which one of the following is not a broadband communication medium
(a) Microwave
(b) Fibre optic cable
(c) Twisted pair
(d) Coaxial cable
Ans (c)
22.Which of the following performs modulation and demodulation
(a) Coaxial cable
(b) Satellite
(c) Modem
(d) Optical fibre
Ans (c)
23. Which one of the following is not an application software package
(a) Redhat Linux
(b) Microsoft Office
(c) Adobe PageMaker
(d) Open Office
Ans (a)
24. Who is the father of computer
Ans : Charles Babbage
25.The function of key F4 is
Ans : To repeat the last action
26.The function of key F4 is
Ans : To repeat the last action
27. The 0 and 1 in the binary numbering system are called binary digits or …….
(a) bytes
(b) kilobytes
(c) decimal bytes
(d) bits
Ans (D)
28. A monitor’s …… is the distance between the holes in the mask
behind the screen. This helps determine how sharp the dots appear.
(a) refresh rate
(b) dot pitch
(c) resolution
(d) colour depth
Ans (B)
29. A directly accessible appointment calendar is a feature of a ……. resident package.
(a) CPU
(b) memory
(c) Buffer
(d) ALU
Ans (B)
30. Perforated paper used as input or output media is known as
(a) Paper tape
(b) Magnetic tape
(c) Punched paper tape
(d) Card punch
Ans (A)
31. The invention of the slide rule is attributed to
(a) Babbage
(b) Oughtred
(c) Pascal
(d) Napier
Ans (B)
32. Which of the following is not an advantage of magnetic disk storage.
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) All of the above
Ans (e)
33. The memory sizes in mainframe computers and advanced technology micro computer are expressed as
(a) Bytes
(b) Kilo-bytes
(c) Bits
(d) Megabytes
Ans (d)
34. A prefix for billion which is equal to …. is called as billi.
(a) 100
(b) 10000
(c) 1000
(d) 10
Ans (d)
35. Each model of a computer has a unique
(a) Assembly language
(b) Machine language
(c) High level language
(d) All of the above
Ans (b)
36. One kilobyte = ____ byte.
(a) 1250
(b) 2088
(c) 1024
(d) 1000
Ans (c)
37. Which of the following circuit is used as a ‘Memory device’ in computers?
(a) Rectifier
(b) Flip-Flop
(c) Comparator
(d) Attenuator
Ans (b)
38. To move the cursor to the end of the document press
Ans : Ctrl + End
39. In Word Processing the red underline indicates
Ans : Spelling mistakes
40. The shortcut key to print documents is
Ans : Ctrl + P
41. First layer in the OSI reference model is
(a) Data link
(b) Network
(c) Physical
(d) Application
Ans (c)
42. Viruses, Trojan horses and Worms are
(a) able to harm computer system
(b) unable to detect if affected on computer
(c) user-friendly applications
(d) harmless applications resident on computer
Ans (a)
43. Program threats are
(a) Trap doors
(b) Trojan horse
(c) Both (a) & (b)
(d) All of the above
Ans (b)
44. Failure of passwords security due to exposure can result from
(a) Electronic monitoring
(b) Visual
(c) Both (a) & (b)
(d) All of the above
Ans (c)
45. Data security threats include
(a) Hardware failure
(b) Privacy invasion
(c) Fraudulent manipulation of data
(d) All of the above
Ans (b)
46. The bar which displays information about the current page number is
Ans : Status bar
47. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar
(b) Windows
(c) Desktop
(d) Icons
Ans (d)
48. Who invented the super-computer?
(a) P.T Farnsworth
(b) J.R Whinfield
(c) J.H. Van Tassell
(d) Charles Ginsberg
Ans (c)
49. Accessing records from a file directly without searching from the beginning of the file is
(a) Time sharing
(b) Random
(c) Direct access
(d) Access time
(e) None of the above
Ans (c)
50. Time during which a job is processed by the computer is
(a) Delay time
(b) Real time
(c) Execution time
(d) Down time
Ans (c)

SBI CLERKS EXAM COMPUTER KNOWLEDGE QUESTIONS

1. A keyboard is this kind of device—
(A) black
(B) input
(C) output
(D) word Processing
(E) None of these
Ans : (B)
2. IT stands for—
(A) information Technology
(B) integrated Technology
(C) intelligent Technology
(D) interesting Technology
(E) None of these
Ans : (A)
3. Which of the following refers to the fastest, biggest and most expensive computers ?
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
Ans : (B)
4. A collection of related information sorted and dealt with as a unit is a—
(A) disk
(B) data
(C) file
(D) floppy
(E) None of these
Ans : (C)
5. The process of a computer receiving information from a server on the Internet is known as—
(A) pulling
(B) pushing
(C) downloading
(D) transferring
(E) None of these
Ans : (C)
6. Which part of the computer helps to store information ?
(A) Disk drive
(B) Keyboard
(C) Monitor
(D) Printer
(E) None of these
Ans : (A)

7. ………………is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)
8. The role of a………generally is to determine a buyer’s needs and match it to the correct hardware and software.
(A) computer Scientist
(B) computer sales representative
(C) computer consultant
(D) corporate trainer
(E) None of these
Ans : (B)
9. Which of the following groups consist of only output devices ?
(A) Scanner, Printer, Monitor
(B) Keyboard, Printer, Monitor
(C) Mouse, Printer, Monitor
(D) Plotter, Printer, Monitor
(E) None of these
Ans : (D)
10. The rectangular area of the screen that displays a program, data, and/or information is a—
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)
11. A(n)………contains commands that can be selected.
(A) pointer
(B) menu
(C) icon
(D) button
(E) None of these
Ans : (B)
12. An error is also known as—
(A) bug
(B) debug
(C) cursor
(D) icon
(E) None of these
Ans : (A)
13. Arithmetic Operations—
(A) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item
(B) sort data items according to standard, predefined criteria in ascending order or descending order
(C) use conditions with operators such as AND, OR and NOT
(D) include addition, subtraction, multiplication and division
(E) None of these
Ans : (D)
14. Sending an e-mail is similar to—
(A) picturing an event
(B) narrating a story
(C) writing a letter
(D) creating a drawing
(E) None of these
Ans : (C)
15. Promotion in Marketing means—
(A) passing an examination
(B) elevation from one grade to another
(C) selling the products through various means
(D) selling the product in specific areas
(E) None of these
Ans : (C)
16. Microsoft Word is an example of—
(A) an operating system
(B) a processing device
(C) application software
(D) an input device
(E) None of these
Ans : (B)
17. Sources of Sales Leads are—
(A) Data Mining
(B) Market Research
(C) Media Outlets
(D) Promotional Programs
(E) All of these
Ans : (E)
18. Any data or instruction entered into the memory of a computer is considered as—
(A) storage
(B) output
(C) input
(D) information
(E) None of these
Ans : (A)
19. Which is the part of a computer that one can touch and feel ?
(A) Hardware
(B) Software
(C) Programs
(D) Output
(E) None of these
Ans : (A)