Saturday 3 August 2013

COMPUTER KNOWLEDGE PRACTICE MCQs FOR IBPS PO EXAM

1. Memory, also called Random Access Memory, or RAM .......
1) contains the electronic circuit that cause processing to occur.
2) makes the information resulting from processing available for use
3) allows data, program, commands, and user responses to be entered into a computer
4) consist of electronic components that store data
5) None of these

2. Correcting errors in a program is referred to as ........
1) debugging 
2) bugging 
3) rectifying
4) modifying 
5) None of these

3. An assembler is used to translate a program written in ........
1) a low level language
2) machine language
3) a high level language
4) assembly language 
5) None of these

4. The capability of operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is ........
1) Multiprocessing 
2) Multitasking
3) Multiprogramming 
4) Multiexecution
5) None of these

5. The basic goal of computer process is to convert data into ........
1) information 
2) table 
3) files
4) graphs 
5) None of these

6. A hard copy of documents is ........
1) stored in the hard disk
2) stored in the floppy 
3) Stored on a CD
4) Printed on the printer 
5) None of these

7. Find the odd man out?
1) plotter 
2) printer 
3) scanner
4) monitor 
5) None of these

8. Which key combination is used for special tasks?
1) Insert, Delete 
2) Ctrl, Shift
3) Left Arrow, Right Arrow
4) Page up, Page Down 
5) None of these

9. Which is the part of a computer that one can touch and feel?
1) Programs 
2) Software 
3) Hardware
4) Output 
5) None of these

10. A store that combines online and physical presence is called a(n) ........ store.
1) brick-and-mortar 
2) click-and-mortar
3) combination 
4) e-commerce
5) M commerce

11. The main processing unit of computer is known as ........
1) CD-run on memory
2) Central Processing Unit
3) Call powers Up
4) Create Program User 
5) None of these

12. ...... move the cursor one space to the right or puts spaces in between words.
1) Control key 
2) space bar 
3) printer
4) mouse 
5) None of these

13. Which key has to be used to type all letters capital without using the shift key for each character ........
1) shifter 
2) upper case 
3) caps lock key
4) icon 
5) None of these

14. A device that reads the information contained on a disk and transfer it to the computer's
memory ........
1) monitor 
2) screen 
3) keyboard
4) disk drive 
5) None of these

15. Which of the following is not the major function of a computer?
1) Processing data into information
2) Storing data or information
3) Gathering data
4) Analysing data or information
5) None of these

16. A disk on which you store information ........
1) plate 
2) data disk
3) paper disk
4) TV disk 
5) None of these

17. ........ is used to print document on printer.
1) ribbon 
2) monitor
3) go now 
4) control + p 
5) None of these

18. Easy to use means ........
1) user friendly 
2) select 
3) helpful
4) ever-ready 
5) None of these

19. When your computer stops working suddenly it is referred to as a ........
1) crash 
2) die 
3) death
4) penalty 
5) None of these

20. The smallest item of useful in information a computer can handle ........
1) bite 
2) byte 
3) bit
4) belt 
5) None of these

21. Device that let the computer communicate with you ........
1) input 
2) output 
3) type 
4) print 
5) None

22. Device that allows you to put information into the computer ........
1) input 
2) output 
3) type
4) print 
5) None of these

23. The different style of lettering in a word processing program ........
1) font 
2) calligraphy 
3) writing
4) manuscript 
5) None of these

24. Any letter, number or symbol found on the keyboard that you can type into the computer ........
1) output 
2) character 
3) type
4) print 
5) None of these

25. A symbol or question on the screen that prompts you to take an action and tell the computer what to do next ........
1) scanner 
2) questionnaire
3) prompt on dialog box
4) information seeker 
5) None of these

26. Choices are referred to as ........
1) options 
2) exit 
3) boot
4) folder 
5) None of these

27. The OSI model is divided into how many Processes called layers?
1) Five 
2) Six 
3) Seven
4) Eight 
5) None of these

28. ........ lets you leave a screen or program
1) boot 
2) programs
3) exit 
4) text
5) None of these

29. A place that a user can create files ........
1) cursor 
2) test 
3) folder
4) boot 
5) None of these

30. ........ start or restart the computer.
1) exit 
2) kick 
3) boot
4) kick-start 
5) None of these

31. A blinking indicator that shows you where your next action will happen is ........
1) CPU 
2) cursor 
3) tool bar
4) boot 
5) None of these

32. Commands at the top of a screen such; FILE-EDIT-FONT-TOOLS to operate and change things within programs is ........
1) menu bar 
2) tool bar 
3) user friendly
4) word processor 
5) None of these

33. CD-ROM stands for ........
1) Central processing unit
2) CD-remote open mouse
3) CD resizer or minimize
4) CD-read only memory
5) None of these

34. To change written work already done ........
1) find 
2) edit 
3) cut
4) close 
5) None of these

35. A key that will erase information from the computer's memory and characters on the
screen ........
1) edit 
2) delete key 
3) dummy out
4) trust key 
5) None of these

36. To insert copy of the clipboard contents, whatever was last cut or copied at the
insertion point ........
1) paste 
2) stick in 
3) fit in
4) push in 
5) None of these

37. The command used to remove text or graphics from a document. 
1) chop 
2) cut 
3) clip
4) chart away 
5) None of these

38. To encourage repeat customers, e-commerce sites recommend users create a(n)?
1) profile 
2) account
3) Survey 
4) wish list
5) None of the above

39. A removable magnetic disk that holds information is .........
1) floppy disk 
2) hard drive 
3) monitor
4) portable 
5) None of these

40. A command that saves what you are working on into the hard drive, or onto a disk?
1) view 
2) hold 
3) save
4) go 
5) None of these

41. To move down a page in a document
1) jump 
2) fly 
3) wriggle
4) scroll 
5) None of these

42. A command to get a file you worked already and it was stored in memory ........
1) close 
2) delete 
3) open
4) get it 
5) None of these

43. The primary device that a computer uses to store information .......
1) TV 
2) storehouse 
3) desk
4) hard drive 
5) None of these

44. Screen that comes on when you turn on your computer that shows all the icons
1) desktop 
2) fact to face 
3) viewer
4) view space 
5) None of these

45. A program that works like a calculator for keeping track of money and making budgets?
1) calculator 
2) spreadsheet 
3) budgeter
4) financier 
5) None of these

46. The operating system is the most common type of ........ software
1) communications 
2) applications
3) system 
4) word- processing
5) None of these

47. A ........ is approximately one billion bytes
1) kilo byte 
2) bit 
3) megabyte
4) gigabyte 
5) None of these

48. A scanner scans ........
1) pictures 
2) text 
3) both pictures and text
4) neither pictures nor text
5) None of these

49. Dumb terminals have terminals and ........
1) Mouse 
2) Keyboard 
3) Speakers
4) Mouse or speakers 
5) None of these

50. The portion of the CPU that coordinates the activities of all the other computer components is the ........
1) mother board 
2) coordination board
3) control unit 
4) arithmetic logic unit
5) None of these

ANSWERS:

1–4, 2-1, 3-4, 4-2, 5-1, 6-4, 7-3, 8-2, 9-3, 10-5
11-2, 12-2, 13-3, 14-4, 15-3, 16-2, 17-4, 18-1, 19-1, 20-3
21-2, 22-1, 23-1, 24-2, 25-3, 26-1, 27-3, 28-3, 29-3, 30-3
31–2, 32-1, 33-4, 34-2, 35-2, 36-1, 37-2, 38-2, 39-1, 40-3
41–4, 42-3, 43-4, 44-1, 45-2, 46-3, 47-4, 48-3, 49-3, 50-3.

Thursday 25 July 2013

COMPUTER KNOWLEDGE PRACTICE MCQs FOR IBPS EXAM

1. Data or information used to run the computer is called?
a) Software
b) Hardware 
c) Peripheral
d) CPU 
e) None of the above 

2. To memories the e- mail address one should use?
a) Browser 
b) Search engine 
c) Birthday list 
d) Phone book 
e) Add book 

3. A Hardware device that converts data into meaningful information
a) Protector 
b) Output device 
c) Input device 
d) Program 
e) Processor 

4. What from the following refers to the people, related to computing process?
a) Hardware 
b) Human ware 
c) Software
 d) Firmware 
e) Peripherals 

5. Which of the following is not an example of storage device? 
a) CD 
b) Floppy 
c) Hard disk
d) RAM 
e) DVD 

6. Today, the common form of RAM is built from?
a) Transistors 
b) Vacuum tubes 
c) Semiconductors IC's 
d) Super conductor IC's 
e) None 

7. Benefit of DRAM is ___ 
a) It is cheaper than SRAM 
b) It can store more than SRAM 
c) It is faster than SRAM
d) Data in it can easily be erased than in SRAM 
e) None 


8. Following all are related to spread sheet except?
a) Work sheet 
b) Sell 
c) Formula 
d) Virus detection 
e) None of these 

9. Which element is appropriate for the set of instructions, by which computer performs more than one task?
a) Hardware 
b) Software 
c) Human ware 
d) Firmware 
e) None of these 

10. Which of the following is both output and input? 
a) Printer 
b) Speaker 
c) Modem 
d) monitor 
e) Scanner 

11. A Special software that is used to create a job queue is called_____ 
a) Drive 
b) Spooler 
c) Interpreter
d) Linkage editor 
e) None 

12. Which one of the items listed below is not one of the software engineering layers?
a) Process 
b) Manufacturing 
c) Method 
d) Tools 
e) None 

13. What is the first stage in program development? 
a) Specification and design 
b) System Analysis 
c) Testing 
d) None of the above 
e) All of these 

14. By means of a data flow diagram the analyst can detect ____ 
a) Task duplication 
b) Unnecessary delays 
c) Task overlapping 
d) All of the above 
e) None of the above 

15. Virtual memory is ___ 
a) Related to virtual reality 
b) A form of ROM 
c) A form of RAM 
d) None of the above 
e) All of these 

16. What does RAM stands for? 
a) Read Access Memory 
b) Read Anywhere Memory 
c) Random Anything Memory
d) Random Access Module 
e) Random Access Memory 

17. For transferring file and exchanging messages, which utility is used?
a) Web browser
 b) WWW 
c) e - mail 
d) Hyper text 
e) Search engine 

18. The three main parts of a processor are..? 
a) ALU, control unit and register 
b) ALU, control unit and RAM 
c) Case, control unit and register
d) Control unit, Register and RAM 
e) RAM, ROM and CD- ROM 

19. Which of the following is the second largest unit of RAM? 
a) Terabyte 
b) Megabyte 
c) Byte 
d) Giga byte 
e) None of these 

20. What is present in motherboard that connects CPU with other parts on motherboard?
a) Input unit 
b) System bus 
c) ALU 
d) Primary memory 
e) None of these 

21. ___ servers stores and manage files for network users 
a) Authentication 
b) Main 
c) Web 
d) File 
e) None of these 

22. The OSI model is divided into ____ process called layers 
a) five 
b) six 
c) seven 
d) eight 
e) None of these 

23. System software is a set of programs that enables your computer's hardware devices and ____ software to work together.
a) management
b) Processing 
c) utility 
d) application
e) None of these 

24. In a ring topology, the computer in possession of the ____can transmit data 
a) packet 
b) data 
c) access method 
d) token 
e) None of these 

25. ____ viruses are often transmitted by a floppy disk left in the floppy drive 
a) Trojan horse 
b) Boot sector 
c) Script 
d) logic bomb 
e) None of the above 

26. ____ controls the way in which a computer system functions and provides name by which users can interact with the computer 
a) The platform 
b) Application software 
c) operating software 
d) The Mother board 
e) None 

27. Servers are components that provide resources to other computers connected to a.. 
a) mainframe 
b) network 
c) super computer 
d) client 
e) None of these 

Answers:
1) a; 2) e; 3) e; 4) b; 5) d; 6) c; 7) a; 8) d; 9) b; 10) d; 
11) b; 12) b; 13) d; 14) d; 15) c; 16) e; 17) c; 18) a; 19) d; 20) b; 
21) d; 22) c; 23) d; 24) d; 25) b; 26) c; 27) b. 

Sunday 21 July 2013

COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR BANK EXAMS

1. Which of the following is NOT a characteristic of E-mail?
1) Low cost
2) Record maintenance in database
3) High speed
4) Waste Reduction (writing paper)
5) None

2. What are dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information
3) A computer reserved for special task
4) Both (1) & (2)
5) None of these

3. What are non dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information only
3) A computer reserved for special task
4) Both (2) & (3)
5) None of these

4. G3 is a
1) Computer
2) Cable
3) Chip
4) Mother board
5) None of these

5. One of the oldest calculating device was?
1) Arithmometer
2) Ready reckoner
3) Abacus
4) Both (1) & (2)
5) None of these

6. The first-generation computers had?
1) Vacuum tubes and magnetic drum
2) Magnetic tape and transistors
3) Ics
4) Either (1) or (3)
5) All of these

7. Which of the following is false about change in computer from one generation to the next?
1) Computer size is decreased
2) Speed of processing increases
3) Memory / storage capacities decreases
4) Both (1) & (3) 5) None of these

8. Which of the following is NOT false about GUIs?
1) They make computers easier to use for laymen
2) Icons and menus can be selected with a mouse
3) were first introduced by MACs
4) All of these are true
5) None of these

9. To make a program safe we should take care of:
1) Strong authentication and access controls
2) Error checking controls
3) Do risk analysis
4) Either (1) or (2)
5) All of these

10. Which of them is a must for understanding the organisation's business risks associated with using router
1) Network Architecture
2) Network traffic management
3) Network security
4) Either (2) or (3)
5) All of these

11. We are shifting towards computerization because
1) Current technologies are available
2) Technologies help in meeting the business objectives
3) Hire the employees that are expert in the latest technologies are available
4) Both (1) & (2)
5) None of these

12. Who is responsible for developing the intranet strategy and monitoring its policies?
1) Intranet administrator 2) Webmaster
3) Editor 4) Both (2) & (3)
5) None of these

13. Network layers function is to
1) Select paths for data transfer
2) Break the Network in to subnet
3) Determine the IP
4) Either (2) or (3)
5) All of these

14. Which of the following makes a network insecure?
1) Encryption
2) Network Interface Card (NIC)
3) Static keys
4) Both (2) & (3)
5) None of these

15. If the network of the company is to be protected from remote access that may damage company's reputation due to misuse of information then security policy would/ should include
1) All employees
2) Only the employer
3) Contractors
4) Either (1) or (2)
5) All of these

16. Project management will be made a separate division on the basis of:
1) Interdependencies among departments
2) Sharing of resources
3) Size of the project
4) Either (2) or (3)
5) All of these

17. Various kinds of e-mail threats-mails containing racist, sexual content are example of .....
1) Spam
2) International leakage
3) International tampering
4) Offensive contents
5) None of these

18. Artificial Intelligence can be used in everysphere of life because of its....
1) Ability to work in hazardous places
2) Ability to think like human beings
3) Ability to work in artificial environments
4) All of the above
5) None of these

19. The Steering Committee is made for
1) Reviewing user requirements and ensuring that all controls are considered.
2) Strategic planning for computer installation
3) Evaluating specific project plans for systems
4) Both (1) and (2)
5) None of these

20. In an IT division specific measures were introduced to improve on quality. However effectiveness of these measures can't be ascertained by simply
1) Increased user satisfaction
2) An increase in the quality assurance budget
3) A reduction in the maintenance cost ofthe application
4) Either (1) or (2)
5) All of these

21. Efficient system requirement analysis is required for:
1) Reverse engineering
2) Joint Application Design (JAD)
3) Traditional System development life cycle
4) Either (1) or (3)
5) All of these

22. Which of the following statements is NOT correct for structured programming concepts and modularity?
1) Interaction between modules should be minimal
2) Modules should have only one entry and one exit point
3) Modularity means program segmentation
4) Both (1) and (2)
5) None of these

23. Software quality assurance is for
1) Error prevention
2) Error detection
3) Error correction 4) Either (1) or (3)
5) All of these

24. Which of the following methods is NOT required for telecommunication continuity?
1) Alternative routing
2) Diverse routing
3) Satellite routing
4) All of these
5) None of these

25. The client is called .... in 2 tier architecture.
1) Fat client
2) Thin client
3) Very thin client
4) Either (1) or (2)
5) Cannot say

ANSWERS:
1-2, 2-3, 3-1, 4-3, 5-3, 6-1, 7-3, 8-4, 9-5, 10-4
11-4, 12-2, 13-4, 14-1, 15-1, 16-5, 17-1, 18-4, 19-4, 20-3
21-5, 22-4, 23-5, 24-2, 25-1

Saturday 20 July 2013

COMPUTER KNOWLEDGE PRACTICE MCQs

1. Computer network is a? 
a) A distributed data processing system 
b) Multiple computers are linked together for the purpose of data communication and reso-urce sharing 
c) Both (A) & (B) are false 
d) Both (A) & (B) are true 
e) None of these 

2. Which of the following will be used for checking spelling? 
a) Dictionary Disk 
b) Index disk 

c) Directory Disk 
d) None of these 
e) All the above 

3. Internet Banking is an example of? 
a) Electronic funds transfer (EFT) 
b) EDP (electronic data processing) 
c) EBCDIC 

d) ASCII 
e) None of these 

4. Anonymous FTP is? 
a) Internet file transfer protocol 
b) Protocol that requires password 
c) Not access to the files 
d) None

e) All of the above 

5. Archive is a? 
a) Backup storage 
b) Forward operation 
c) Primary storage 
d) None 

e) All the above

6. CPU performs read/write opera-tions at any point of time in? 
a) ROM b) PROM
c) EPROM d) RAM 
e) None of these

7. BIOS is an abbreviation for? 
a) Binary Input/Binary Output 
b) Binary synchronous 
c) Binary digit 
d) None of these 
e) All the above 

8. Most common channel used by networks today is?
a) Internet 

b) Telephone lines
c) Satellite 

d) Mail 
e) None of these 

9. What is the product of data processing? 
a) Data 

b) Information 
c) Software 

d) A computer 
e) None of these 

10. A source program is the program written in which language? 
a) English 

b) Symbolic 
c) High - level 

d) Machine 
e) None of these 

11. To be information, data must be? 
a) factual 

b) relevant 
c) news 

d) All the above 
e) None of these

12. Thick - film ICs use ____ technique?
a) Screen printing 
b) Cathode sputtering 
c) Monolithic 
d) Hybrid 

e) None 

13. A collection of Eight bits is called? 

a) byte 
b) word 
c) record
 d) file 
e) None of these 

14. What is a microprocessor? 
a) Same as a micro computer 
b) A small piece of equipment
c) A small device that controls other equipment 
d) A way of doing something fast 
e) None of these 

15. The microelectronics is the technology of?
a) microprocessor 
b) microcomputers 
c) Chips 
d) automatic processing 
e) None of these 

16. The processor of a computer system is called it's?
a) Nerve centre 
b) Eye 

c) Brain 
d) Ear 

e) None of these 

17. What are the two major types of computer chips? 
a) External memory 
b) Primary memory chip 
c) Microprocessor chip 
d) Both (B) and (C) 
e) None of these 

18. Who built the first computer mouse?
a) Doughlas Engelbart
b) William English 
c) Daniel Cougher 
d) Robert Zawacki 

e) None 

19. What is a Kimball tag? 
a) An address label 
b) A gift token 
c) A security key 
d) An input medium 
e) None 

20. Dot - matrix is a type of? 
a) tape 

b) printer 
c) Disk

d) Bus 
e) None of these 

21. What are the concentric circles on floppy disks know as? 
a) Tracks 

b) Cylinders 
c) Sectors 
d) Segments 
e) None of these 

22. What does the disk drive of a computers do? 
a) Rotate the disk 
b) Read the disk
c) Load a program from the disk into the memory 
d) Both (B) and (C) 
e) None of these 

23. A ___ is a computer connected to two networks? 
a) link

b) server 
c) gateway 

d) bridge way 
e) None of these 

Answers:

1) d; 2) a; 3) a; 4) a; 5) a; 6) c; 7) a; 8) b; 9) b; 10) c; 

11) b; 12) a; 13) a; 14) c; 15) c; 16) c; 17) d; 18) b; 19) d; 20) b; 21) a; 22) d; 23) b; 

Thursday 18 July 2013

COMPUTER AWARENESS PRACTICE QUESTIONS

1. The part of a computer that coordinates all its functions is called ________ 
a) ROM program 
b) System Board 
c) Arithmetic logic unit 
d) Control unit 

e) None 

2. A computer cannot boot if it does not have the _____
a) Compiler

b) Loader 
c) Operating System 
d) Assembler

e) None 

3. Any data or instructions entered into the memory of a computer are considered ____ 
a) Storage 

b) Output 
c) Input

d) Information 
e) None of these 


4. A right click on the desktop itself will?
a) Open the display properties dialogue box 
b) Show a context - sensitive menu
c) Open the control panel 
d) Minimize all open applications 
e) None of these 


5. The process of starting or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called? 
a) Duping 

b) Booting 
c) Padding

d) CPS 
e) None of these


6. ___ is known as unauthorized access into others system?
a) Hacking

b) Encryption
c) Decryption

d) trafficking
e) None of these 


7. When creating a computer program, the ___ designs the structure of the program
a) End user 

b) System analyst 
c) Programmer 
d) All of the above 

e) None
 
8. Which commands divides the surface of the blank disk into sector and assign a unique address to each one 
a) Ver 

b) Format 
c) Fat 
d) Chkdsk

 e) None of these 

9. When you turn on the computer, the boot routine will perform this test: 

a) RAM test 
b) Disk drive test 
c) Memory test 
d) Power on self test 

e) None 

10. Which of the following perip-heral devices displays information to a user ?
a) Monitor 

b) Keyboard c) Secondary Storage Devices 
d) Secondary Storage Media 
e) None of these


11. Band width refers to: 
a) The cost of the cable required to implement a WAN
b) The cost of the cable required to implement a LAN
c) The amount of information a peer-to-peer network can store 
d) The amount of information a communication medium can transfer in a given amount of time 
e) None of these


12. If the computer keeps rebooting itself, it is likely that:
a) It is effected with virus 
b) It does not have enough memory 
c) There is no printer 
d) There has been a sudden power rise 
e) It needs a CD-ROM


13. Devices that enter information and let you communicate with the computer are called: 
a) Software 

b) Output Devices
c) Hardware 

d) Input Devices 
e) Input / Output Devices


14. An integrated circuit is ____ 
a) A complicated circuit 
b) An integrating device 
c) Much costlier than a single transistor 
d) Fabricated on a tiny silicon chip 
e) None of the above 


15. The computer connected to a LAN (Local Area Network) can
a) Run faster 

b) Go online 
c) Share information and/or share peripheral equipment 
d) E - Mail

e) None of these 

16. Which device can not be shared in network? 
a) Floppy

 b) Key board 
c) Computer

 d) Printer 
e) Hard Disk 


17. A printer is a type of device used for ____ 
a) Input b) Word processing
c) Processing 

d) Output 
e) None of these
 
18. The basic goal of computer process is to convert data into ____ 
a) Files b) Tables
c) Information 
d) Graphs 
e) None of these

 
19. The name that user gives to a document is referred to as ____ 
a) Document name 

b) File name
c) Name given 
d) Document identity 

e) None 

20. The person who writes and tests computer program is called a ___
a) Programmer 
b) Computer scientist 
c) Software engineer 
d) Project developer 

e) None 

21. DNS is the abbreviation of: 
a) Domain Name Service
b) Domain Name System
c) Direct Network Service
d) Direct Network System
e) None of these


22. Which of the following is not true as regards primary storage? 

a) It is a part of the CPU 
b) It allows very fast access to data 
c) It is relatively more expensive 
d) Information must be transf-erred to primary storage 
e ) None of these 


23. Which of the following is the most powerful type of computer? 

a) Super micro 
b) Super conductor 
c) Micro computer 
d) Super computer 
e) Mega frame 


24. Which of the following isn't a type of computer facility?
a) Decentralized 

b) Centralized 
c) De - distributed 
d) Distributed 

e) None 

Answers
1) d; 2) c; 3) c; 4) a; 5) b; 6) a; 7) b; 8) b; 9) b; 10) a; 

11) d; 12) a; 13) d; 14) d; 15) c; 16) b; 17) d; 18) c; 19) b; 20) a; 
21) b; 22) e; 23) d; 24) c.