Thursday 18 July 2013

COMPUTER AWARENESS PRACTICE QUESTIONS

1. The part of a computer that coordinates all its functions is called ________ 
a) ROM program 
b) System Board 
c) Arithmetic logic unit 
d) Control unit 

e) None 

2. A computer cannot boot if it does not have the _____
a) Compiler

b) Loader 
c) Operating System 
d) Assembler

e) None 

3. Any data or instructions entered into the memory of a computer are considered ____ 
a) Storage 

b) Output 
c) Input

d) Information 
e) None of these 


4. A right click on the desktop itself will?
a) Open the display properties dialogue box 
b) Show a context - sensitive menu
c) Open the control panel 
d) Minimize all open applications 
e) None of these 


5. The process of starting or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called? 
a) Duping 

b) Booting 
c) Padding

d) CPS 
e) None of these


6. ___ is known as unauthorized access into others system?
a) Hacking

b) Encryption
c) Decryption

d) trafficking
e) None of these 


7. When creating a computer program, the ___ designs the structure of the program
a) End user 

b) System analyst 
c) Programmer 
d) All of the above 

e) None
 
8. Which commands divides the surface of the blank disk into sector and assign a unique address to each one 
a) Ver 

b) Format 
c) Fat 
d) Chkdsk

 e) None of these 

9. When you turn on the computer, the boot routine will perform this test: 

a) RAM test 
b) Disk drive test 
c) Memory test 
d) Power on self test 

e) None 

10. Which of the following perip-heral devices displays information to a user ?
a) Monitor 

b) Keyboard c) Secondary Storage Devices 
d) Secondary Storage Media 
e) None of these


11. Band width refers to: 
a) The cost of the cable required to implement a WAN
b) The cost of the cable required to implement a LAN
c) The amount of information a peer-to-peer network can store 
d) The amount of information a communication medium can transfer in a given amount of time 
e) None of these


12. If the computer keeps rebooting itself, it is likely that:
a) It is effected with virus 
b) It does not have enough memory 
c) There is no printer 
d) There has been a sudden power rise 
e) It needs a CD-ROM


13. Devices that enter information and let you communicate with the computer are called: 
a) Software 

b) Output Devices
c) Hardware 

d) Input Devices 
e) Input / Output Devices


14. An integrated circuit is ____ 
a) A complicated circuit 
b) An integrating device 
c) Much costlier than a single transistor 
d) Fabricated on a tiny silicon chip 
e) None of the above 


15. The computer connected to a LAN (Local Area Network) can
a) Run faster 

b) Go online 
c) Share information and/or share peripheral equipment 
d) E - Mail

e) None of these 

16. Which device can not be shared in network? 
a) Floppy

 b) Key board 
c) Computer

 d) Printer 
e) Hard Disk 


17. A printer is a type of device used for ____ 
a) Input b) Word processing
c) Processing 

d) Output 
e) None of these
 
18. The basic goal of computer process is to convert data into ____ 
a) Files b) Tables
c) Information 
d) Graphs 
e) None of these

 
19. The name that user gives to a document is referred to as ____ 
a) Document name 

b) File name
c) Name given 
d) Document identity 

e) None 

20. The person who writes and tests computer program is called a ___
a) Programmer 
b) Computer scientist 
c) Software engineer 
d) Project developer 

e) None 

21. DNS is the abbreviation of: 
a) Domain Name Service
b) Domain Name System
c) Direct Network Service
d) Direct Network System
e) None of these


22. Which of the following is not true as regards primary storage? 

a) It is a part of the CPU 
b) It allows very fast access to data 
c) It is relatively more expensive 
d) Information must be transf-erred to primary storage 
e ) None of these 


23. Which of the following is the most powerful type of computer? 

a) Super micro 
b) Super conductor 
c) Micro computer 
d) Super computer 
e) Mega frame 


24. Which of the following isn't a type of computer facility?
a) Decentralized 

b) Centralized 
c) De - distributed 
d) Distributed 

e) None 

Answers
1) d; 2) c; 3) c; 4) a; 5) b; 6) a; 7) b; 8) b; 9) b; 10) a; 

11) d; 12) a; 13) d; 14) d; 15) c; 16) b; 17) d; 18) c; 19) b; 20) a; 
21) b; 22) e; 23) d; 24) c. 

Friday 5 July 2013

COMPUTER AWARENESS PRACTICE MCQs

1. The ______ of a system includes the program or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these

2. In order to save a word document as a web page you need to?
1) Put the appropriate graphic and links on the document
2) Save the document in the simple text format
3) Use your web browser as an editor and save as URL
4) Save as HTML
5) None of these

3. Something which is easily understood instructions is said to be?
1) User friendly
2) Information
3) Word processing 
4) Icon
5) None of these

4. The copy command saves the data to which of the following?
1) The desktop
2) The clipboard
3) Microsoft word 
4) Paste
5) None of these

5. Arranging the data in a sequence is known as?
1) Classifying 
2) Searching
3) Sorting
4) Reproducing
5) None of these

6. Find the Mis-Matched pair ?
1) Chrome - Google
2) Opera - Opera Software
3) Internet Explorer - Microsoft
4) Safari - Net Scape Commu-nications
5) None of these

7. In order to save an existing document with a different name you need to?
1) Retype the document and give it a different name
2) Use the Save as command
3) Copy it to a new folder and then save
4) Use Windows Explorer to save
5) None of these

8. Which of the following is a graphics package?
1) Adobe page maker
2) Acrobat Reader
3) Microsoft word
4) Corel Draw
5) None of these

9. Plotter is very useful in applica-tions such as?
1) Computer aided design
2) Word processing
3) Financial accounting
4) Spell checking 
5) None

10. Data processing cycle consists of?
1) Input and output
2) Output and processing
3) Input, processing and output
4) Only input
5) None

11. 'MICR' technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition
2) Magnetic Intelligence Chara-cter Recognition
3) Magnetic Information Cable Recognition
4) Magnetic Cable Recognition
5) None of these

12. All the information collected during database development is stored in a?
1) Repository
2) Data warehouse 
3) RAD
4) CASE 
5) None of these

13. ___ is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit making it an efficient way to store data in memory.
1) DRAM
2) PRAM
3) NRAM
4) NORAM
5) None of these

14. What is the symbol for attachments in yahoo mail :
1) Envelope
2) Letter A
3) Paper Clip
4) Pen
5) None of these

15. To cover files from a backup you perform________ option
1) Scan 
2) Move
3) Copy 
4) Restore
5) None of these

16. The internet began with the development of?
1) Ethernet 
2) Internet
3) USENET
4) Extranet
5) ARPANET

17. Select the odd man out
1) Interpreter 
2) Programmer
3) Operating system
4) Assembler 
5) Utility 

18. The number of pixels displayed on a screen is known as the screen?
1) Resolution
2) Color depth
3) Refresh rate
4) Viewing size
5) None of these

19. Name the certifying authority of digital signatures in banking and financial sector?
1) The IDRBT Certifying Auth-ority
2) Individual Banks
3) Reserve Bank of India
4) Indian Bank's Association
5) None of these

20. Firewall in parlance of computer science is a method of?
1) Stopping unauthorized access
2) Making network more secure against banking attempts
3) Filtering the data that is going out of the network and coming in the network.
4) All the above 
5) None

21. Encryption is used in computers to?
1) Protect data from unauthor-ized access
2) Protect data from damaging
3) Prevent the computer from unauthorized users
4) All the above
5) None

Answers
1) 4; 2) 4; 3) 1; 4) 2; 5) 3; 6) 4; 7) 2; 8) 4; 9) 1; 10) 3;
11) 1; 12) 2; 13) 1; 14) 3; 15) 4; 16) 5; 17) 2; 18) 1; 19) 1; 20) 4; 21) 1.

Wednesday 3 July 2013

COMPUTER KNOWLEDGE PRACTICE MCQs FOR RBI EXAM

1. Which computer has been designed to be as compact as possible?
1) Mini
2) Super computer
3) Micro computer
4) Mainframe
5) None of the above

2. The symbols used in an assembly language are
1) Codes
2) Mnemonics
3) Assembler
4) Literals
5) All of the above

3. Portrait and Landscape are
1) Page Orientation
2) Paper Size
3) Page Layout
4) Margin type
5) All of the above

4.Any storage device added to a computer beyond the immediately usable main storage is known as
1) Floppy disk
2) Hard disk
3) Backing store
4) Punched card
5) Magnetic Tape

5. Which output device is used for translating information from a computer into pictorial form on paper
1) Mouse
2) Plotter
3) Touch panel
4) Card punch
5) Keyboard

6.A computer assisted method for the recording and analyzing of existing or hypothetical systems is
1) Data transmission
2) Data flow
3) Data capture
4) Data processing
5) Data validation

7. Which access method is used for obtaining a record from a cassette tape?
1) Direct
2) Sequential
3) Random
4) ISAM
5) VSAM

8. Find the ODD one.
1) JAVA
2) Cobol
3) Fortran
4) Linux
5) ADA

9. The 2's compliment of a binary no. is obtained by adding.....to its 1's compliment.
1) 0
2) 1
3)10
4) 12
5) 13

10. With respect to a network interface card, the term 10/100 refers to
1) protocol speed
2) a fiber speed
3) megabits per seconds
4) minimum and maximum server speed
5) data capacity

11. The terms "red book", "yellow book", and "orange book" refer to:
1) SCSI
2) IDE
3) floppy drive technology
4) CD-ROM standards
5) SATA

12. In ROM BIOS, the acronym BIOS stands for:
1) Basic Intuitive Output Set
2) Basic Input Organizational System
3) Basic Input Output System
4) Basic Industry Operating System
5) Basic Input Output Set

13. Which DOS command will format a floppy disk and transfer the system files
1) SYS C: A:
2) SYS A:
3) FORMAT A: /S
4) FORMAT A: /T
5) SYS C:

14. Which command will be used to display file and directory names only, without size, date, and time information?
1) DIR/W
2) DIR A:
3) DIR/B
4) DIR/S
5) DIR

15. Which of the following is not a logical data-base structure?
1) tree
2) relational
3) network
4) chain
5) None of the above

16. Updating a database means
1) revising the file structure
2) reorganizing the database
3) modifying or adding record occurrences
4) Sorting
5) Indexing

17.Any and every command can be found on the
1) Drawing toolbar
2) Formatting toolbar
3) Standard toolbar
4) Menu bar
5) View toolbar

18. Which of the following should be used when you want to add a slide to an existing presentation?
1) File, add a new slide
2) Insert, new slide
3) File, open
4) File, new
5) None of the above

19. Which of the following items are examples of storage devices?
1) Floppy disks
2) CD-ROMs
3) Tape devices
4) Hard Disk
5) All of the above

20. The original ASCII code used .... bits of each byte, reserving that last bit for error checking
1) 5
2) 6
3) 7
4) 8
5) 16

21. Word length of a computer is measured in
1) Bytes
2) Millimeters
3) Meters
4) Bits
5) All the above

22. Which type of computers uses the 8-bit code called EBCDIC?
1) Minicomputers
2) Microcomputers
3) Mainframe computers
4) Super computer
5) Lap Tops

23. ATM terminals are example for
1) Smart Terminals
2) Intelligent terminals
3) Dumb terminals
4) Offline terminals
5) None of the above

24.A name or number used to identify a storage location is called
1) A byte
2) A record
3) An address
4) An instruction
5) All of above

25. The difference between memory and storage is that memory is .... and storage is .....
1) temporary, permanent
2) permanent, temporary
3) slow, fast
4) big, Small
5) None of the above

26. Offline device is
1) A device which is not  connected to CPU
2) A device which is connected to CPU
3) A direct access storage device
4) An I/O device
5) None of the above

27. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?
1) Memory address register
2) Memory data register
3) Instruction register
4) Program counter
5) Flag Register

28. Which American Computer Company is called Big Blue?
1) Microsoft
2) Compaq Corp
3) IBM
4) Tandy Stevenson
5) DELL

29.A term associated with the comparison of processing speeds of different computer system is:
1) EFTS
2) MPG
3) MIPS
4) CFPS
5) Bps

30. Daisy wheel printer is a type of
1) Matrix printer
2) Impact printer
3) Laser printer
4) Manual printer
5) Non impact printer

31. Serial access memories are useful in applications where
1) Data consists of numbers
2) Short access time is required
3) Each stored word is processed differently
4) Data naturally needs to flow in and out in a serial form
5) Data naturally needs to flow in
and out in a Random form

32. One of the main feature that distinguish microprocessors from micro-computers is
1) Words are usually larger in microprocessors
2) Words are shorter in microprocessors
3) Microprocessor does not contain I/O devices
4) Exactly the same as the machine cycle time
5) None of the above

33. Example of non-numeric data is..
1) Employee Name
2) Test score
3) Bank Account No.
4) Phone No
5) All the above

34. Numbers in table columns are usually...
1) right-aligned
2) left-aligned
3) justified
4) centered
5) None of the above

35. Most Web sites have a main page known as ........, which acts as a doorway to the rest of the Website pages.
1) search engine
2) home page
3) browser
4) URL
5) Domain

36.A software program that extends the capabilities of your browser in a specific way is known as
1) Plugin
2) Browser software
3) Cookies
4) Applets
5) None of the above

37. Internet is example of
1) LAN
2) MAN
3) WAN
4) SAN
5) CAN

38. ......... refers to maintaining and assuring the accuracy and consistency of data
1) Data redundancy
2) Data inconsistency
3) Data integrity
4) Data independence
5) All the above

39. ........... is a data model for describing a database in an abstract way
1) Data Flow Diagram
2) Flow chart
3) ER-Diagram
4) System chart
5) Network chart

40. Mechanism to protect private network from outside attack is
1) Firewall
2) Antivirus
3) Digital Signature
4) Formatting
5) Tunneling

41. The concept of electronic cash is execute payment by
1) Credit card
2) ATM card
3) Using computers over Network
4) Cheque
5) Debit card

42.Amazon.com comes under the following model
1) B2B
2) B2C
3) C2C
4) C2B
5) None of the above

43. A device that forwards data packets from one network to another is called a
1) Bridge
2) Router
3) Gateway
4) Switch
5) Repeaters

44. Tool that is used to transfer data/ files among computers on the internet
1) FTP
2) TCP
3) Archie
4) Gopher
5) POP

45. ........... is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication
1) Spoofing
2) Hacking
3) Phishing
4) Whaling
5) None of the above

46.A huge collection of information arranged for quick retrieval by computer is known as a
1) Deep web
2) Search Engine
3) Data base
4) URL
5) All the above

47. When using Internet sources, asking whether the site is inwardfocused or outward - focused helps to determine
1) Expertise
2) Objectivity
3) Accuracy
4) Purpose
5) Functionality

48. Network Interface card address is known as
1) IP address
2) MAC address
3) FTP address
4) LAN address
5) System address

49. In keyboard modifier keys are
1) Alt, Shift, Ctrl
2) PgUP, Alt, Ctrl
3) Home, Alt, Ctrl
4) Del, End, Alt
5) Tab, End, Alt

50. ASCII value of ‘D’ is
1) 66
2) 68
3) 74
4) 65
5) 64

51. In SD memory cards SD stands for
1) Standard Digital
2) Secure Digital
3) Secondary
4) Standard Data
5) Secure Data

52. What is the short cut key to open the Open dialog box?
1) F12
2) Shift F12
3) Alt + F12
4) Ctrl + F12
5) F11


ANSWERS:

1-3, 2-2, 3-1, 4-3, 5-2, 6-2, 7-2, 8-4, 9-2, 10-3
11-4, 12-3, 13-3, 14-3, 15-4, 16-3, 17-4, 18-2, 19-5, 20-3
21-4, 22-3, 23-1, 24-3, 25-1, 26-1, 27-4, 28-3, 29-3, 30-2
31-4, 32-3, 33-1, 34-1, 35-2, 36-1, 37-3, 38-3, 39-3, 40-1
41-3, 42-2, 43-2, 44-1, 45-3, 46-3, 47-3,  48-2, 49-1 50-2, 51-2, 52-4.

Tuesday 25 June 2013

COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR RBI ASSISTANTS EXAM

1. To provide electronic circuits, first generation computers used
a) Vacuum tubes
b) Transistors
c) Integrated circuits
d) Large scale integrated circuits
e) None of these

2. In Ms word the key board short cut used for spelling and grammar check
a) F3 
b) F5 
c) F7
d) F9 
e) None of these

3. In Dos the primary name of a file can have a maximum of ..... characters
a) 10 
b) 8 
c) 12
d) 5 
e) None of these

4. The instruction of a program which is currently being executed are stored in
a) Secondary Storage Memory
b) Cache memory
c) Read Only Memory
d) RAM 
e) None of these

5. Prepare a presentation/ Slide show which application is commonly used
a) Photoshop 
b) Power point
c) Microsoft outlook 
d) MS Publisher
e) None of these

6. An Excel workbook is a collection of
a) Work books 
b) Worksheets
c) Charts 
d) tables
e) None of the above

7. When sending an email the ..... line describes the contents of message
a) TO 
b) Subject 
c) Content
d) CC 
e) None of these

8. The ....... also called the web contains billions of documents.
a) World wide Web 
b) HTTP
c) Web Portal 
d) Domain
e) None of these

9. Most of the commonly available personal computers/Laptops have a keyboard popularly
known as
a) QWERTY 
b) QOLTY
c) ALTER 
d) ULCLIF
e) None of these

10. When you quickly press and release the left mouse button twice you are
a) Primary checking 
b) Pointing
c) Double clicking 
d) Selecting
e) None of these

11. The time it takes a device to locate data and instructions and make them available to the
CPU is known as
a) Clock speed 
b) processing cycle
c) CPU speed 
d) access time
e) None of these

12. How many options does a binary choice offer?
a) One 
b) Three 
c) Two
d) It depends on computer memory
e) None of these

13. The ...... allows you to access object and start programme
a) Default menu 
b) XP menu
c) Start Menu 
d) Stop menu
e) None of these

14. Spool is an acronym for
a) Simultaneous power on operation
b) Simultaneous print on operation
c) simultaneous peripheral operations on-line
d) All of these 
e) None of these

15. The purpose of the primary key in a database is to
a) Unlock the database
b) Provide a map of the data
c) uniquely identify a record
d) All of the above 
e) None of these

16. The most frequently used instruction of a computer program are likely to be fetched
from
a) The hard disk 
b) Cache memory
c) RAM 
d) Registers
e) None of these

17. Which of the following is NOT a type of broadband Internet connection?
a) Cable 
b) DSL 
c) Dial-up
d) Satellite 
e) None of these

18. It used a pictures(called icons) and menus displayed on the screen to send commands
to the Computer system
a) Command based user interface
b) GUI c) API
d) System utility 
e) None of these

19. These are specially designed computer chips reside inside other devices, such as
your car or electronic thermostat
a) Embedded Processors
b) Servers
c) Robotic computers
d) All of the above
e) None of these

20. TCP/ IP Network model consists ..... layers
a) TWO 
b) Seven 
c) Four
d) Eight 
e) None of these

21. ......... is a set of keywords, symbols, and system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer
a) A computer program
b) A programming language
c) An assemble
d) Syntax
e) None of these

22. A hard copy of a document is .........
a) Printed on the printer
b) Stored on a floppy
c) Stored on a CD
d) All of these
e) None of these

23. Which of the following groups consist of only input devices?
a) Mouse, keyboard, monitor
b) Mouse, keyboard, printer
c) Mouse, keyboard, plotter
d) Mouse, keyboard, Scanner
e) None of these

24. ............ is the process of finding errors in software code
a) Compiling 
b) Testing
c) Running 
d) Debugging
e) None of these

25. Which of the following computer languages is a mathematically oriented languages used for scientific problems?
a) FORTRAN 
b) COBAL
c) LISP 
d) PROLOG
e) None of these

26. Array is .........
a) Linear data structure
b) Non-linear structure
c) Complex data structure
d) Simple data structure
e) None of these

27 Which is the part of a computer that one can touch and feel?
a) Hardware
b) Software
c) Programs
d) Output
e) None of these

28. Storage that retains its data after the power is turned off is referred to as .........
a) Volatile memory
b) Non-volatile memory
c) Sequential memory
d) Direct storage
e) None of these

29. The name a user assigns to a document is called a (n)
a) File name 
b) Program
c) Record 
d) Data
e) None of these

30. In binary language, each letter, number or special character of alphabet is unique combination of ..........
a) Eight bytes
b) Eight kilobytes
c) Eight characters
d) Eight bits
e) None of these

31. How many margins are on a page?
a) Two 
b) Four 
c) Eight
d) One 
e) None of these

32. Nibble describes a bits combination of
a) 5 bits 
b) 6 bits 
c) 7 bits
d) 4 bits 
e) 16 bits

33. To centre a paragraph using short keys press ...........
a) CTRL + C 
b) CTRL + E 
c) CTRL + L
d) CTRL + R 
e) None of these

34. Which of the following types of tables constraints will prevent the entry of duplicate
rows
a) Primary key 
b) Unique
c) Null 
d) Foreign key
e) None of these

35. What is the base of hexadecimal number system?
a) 2 
b) 8 
c) 16
d) 10 
e) 32

36. The basic goal of computer process is to convert data into ......
a) files 
b) tables
c) information 
d) graphics
e) None of these

37. Spot the odd one out amongst the following
a) BASIC 
b) WINDOWS
c) DOS 
d) UNIX
e) None of these

38. Demodulation is the process of
a) Converting digital signals to analogue
b) converting analog signal to digital
c) combining analog and digital
d) All of the above
e) None of these

39. Which of the following is called the smallest
addressable element in a display device
a) Dotlex 
b) Pixel 
c) Cell
d) Shell 
e) None of these

40. The most common type of floppy size is
a) 3 1/2 inch 
b) 5 1/4-inch
c) 4 3/4 inch 
d) 4 1/4 inch
e) None of these

41. One megabyte equals approximately
a) 1,000 bits 
b) 1,000 bytes
c) 1 million bytes 
d) 1 million bits
e) None of these

42. A program embedded in a semiconductor chip during their manufacture is called
a) human ware 
b) firmware
c) liveware 
d) software
e) None of these

43. The term gopher is related with
a) hardware 
b) firmware
c) internet searching 
d) none
e) None of these

44. A process known as ........ is used by large retailers to study trends.
a) data mining 
b) data selection
c) POS 
d) data conversion
e) None of these

45. Which of the following is the correct order of the four major functions of a computer?
a) Process , Output , Input , Storage
b) Input , Output, Process , Storage
c) Process ,Storage , Input,, Output
d) Input ,Process , Output , Storage
e) None of these

46. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
a) instructions.
b) the operating system.
c) application software.
d) the system unit.
e) None of these

47. Grouping and processing all of a firm's transactions at one time is called
a) a database management system
b) batch processing
c) a real-time system
d) an on-line system
e) None of these

48. Mobile Commerce is best described as
a) The use of Kiosks in marketing
b) Transporting products
c) Buying and selling goods/ services through wireless hand- held devices
d) Using notebook PC's in marketing
e) None of these

49. Collecting personal information and effectively posing as another individual is known as
a) spooling 
b) spoofing
c) Hacking 
d) identity theft
e) None of these

50. A web site address is a unique name that identifies a specific ............................ on the web
a) website 
b) web browser
c) Link 
d) PDA
e) None of these

Answers:

1-a,  2-c,  3-b,  4-d,  5-d,  6-b,  7-b,  8-a,  9-a,  10-c
11-b,  12-c,  13-c,  14-c,  15-c,  16-b,  17-c,  18-b,  19-a,  20-c
21-b,  22-a,  23-d,  24-d,  25-a,  26-a,  27-a,  28-b,  29-a,  30-d
31-b,  32-d,  33-b,  34-d,  35-b,  36-c,  37-a,  38-b,  39-b,  40-a
41-c,  42-b,  43-c,  44-a,  45-d,  46-a,  47-b,  48-c,  49-d,  50-a.

Sunday 26 May 2013

COMPUTER KNOWLEDGE PRACTICE MCQs

1. A (n) ____ program is one that is ready to run and does not need to be altered in any way.
1) Interpreter
2) High-level
3) Compiler 
4) COBOL 
5) Executable

2. Which of the following is true about URL?
1) It is a computer program
2) It is a type of Programming object
3) It is the address of a document or page on the World Wide Web
4) It is an acronym for Unlimited Resources for Listening
5) It is a piece of hardware

3. Universal Product Code (UPC) is a _
1) Scanner 
2) Hardware Equipment
3) Antivirus 
4) Graphics Adapter
5) Barcode system

4. Facsimile Transmission Machine is popularly known as: 
1) ATM 
2)Scanner 
3) Fax Machine 
4) Format Machine 
5) None

5. What is the significance of a faded/ dimmed command in a pull-down menu?
1) Screen becomes faded / dimmed if the command is selected 
2) The command is not accessible currently
3) A dialog box appears if the command is selected.
4) A help window appears if the command is selected. 
5) None 

6. The main folder on a storage device is called _____
1) Root Directory
2) Interface
3) Device driver
4) Platform
5) Main directory

7. To protect the computer from hacker intrusions, ____ must be installed.
1) Firewall
2) Mailer
3) Script
4) Yahoo Messenger
5) None of these

8. Which of the following is used to read handwritten or printed text to make a digital image that is stored in memory?
1) Printer 2) Laser beam
3) Scanner 4) Touchpad 5) None 

9. A program designed to destroy data on the computer which can travel to infect other computers is called a ____
1) Hurricane
2) Infector
3) Disease 
4) Virus 
5) None

10. Thesaurus option is available in ___ menu.
1) Page layout
2) References
3) Review 
4) View 
5) Layout

11. Which of the following is/ are the functions of operating system 
1) Memory Management
2) Access to I/O devices
3) Controlled Access to files
4) All the above 
5) None of these

12. The easiest way to select text is to left click the mouse and _____
1) Hold the Shift key
2) Hold the Ctrl key
3) Move the mouse
4) Drag Over the words you want to highlight 
5) None

13. Which part of the URL http://www.sbi.co.in will specify the rules to be followed when accessing a file? 
1) http:// 
2) www
3) sbi 
4) .in 
5) sbi.co.in

14) Moving the page around to view all the pages in the document on the screen is referred to as: 
1) Surfing
2) Navigating
3) Hyperlink
4) Scrolling
5) Browsing

15 Which of the following is the short-cut key to close an active tab of a browser? 
1) Alt + F4
2) Ctrl + C
3) Ctrl + F4
4) Shift + C
5) Ctrl + W

ANSWERS:
1) 5; 2) 3; 3) 5; 4) 3; 5) 2; 6) 1
7) 1; 8) 3; 9) 4; 10) 3; 11) 4; 12) 4; 13) 1; 14) 4; 15) 5.