Sunday 26 October 2014

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. If you are working in English (US), Chinese or Japanese, Excel 2002 can speak data as you enter it, to help you verify accuracy. How do you activate the feature?
1) Point to Speech on the Tool menu, and then click Show Text To Speech Toolbar.
2) Click validation on the data menu.
3) Point to speech on the tools menu, and then click speech recognition.
4) All of the above
5) None of these

2. ...... are a type of inexpensive digital camera that remains tethered to a computer and are used for video conferencing, video chatting and live web broadcast.
1) Webcams
2) Webpicks
3) Browser cams
4) Browser pics
5) None

3. Which of the following statements is true?
1) To insert link in Ms Excel, Ctrl + K is used.
2) One can edit selected cell in Excel by pressing the F2 key.
3) Shift + space is used to select the entire row in Excel.
4) Ctrl + space is used to select the entire column in Excel.
5) All 1), 2), 3) and 4) are true

4. For multiple selection in any file system you have..
1) Radio button
2) Local area network
3) Notification area
4) Yes/ No box
5) None

5. A(n) ...... is a private corporate network used exclusively by company employees.
1) Internet
2) Local area network
3) Peer-to-peer
4) Intranet
5) None

6. Which of the following is the characteristic of a file server?
1) It manages file operations and is shared on a network.
2) It manages file operations and is limited to one PC.
3) It acts as fat client and is shared on a network.
4) It acts as fat client and is limited to one PC.
5) None of these

7. The && and operators.........
1) compare two numeric values
2) combine two numeric values
3) combine two Boolean values
4) All the above
5) None of these

8. Advantage of X.25 network is that...
1) frame delivery is more reliable
2) frames are delivered in order
3) flow control is provided
4) All the above
5) None of these

9. A ........ is a pre-designed document that already has co-ordinating fonts, a layout, and
a background.
1) guide
2) model
3) ruler
4) template
5) None of these

10. An output device that lets you see what the computer is doing is called....
1) a disk drive
2) monitor screen
3) shift key
4) printer
5) None of these

11. Computer's hard disk is....
1) an arithmetic and logical unit
2) computer software
3) operating system
4) computer hardware
5) None of these

12. To make a notebook act as a desktop model, the notebook can be connected to a ...... which
is connected to a monitor and other devices.
1) bay
2) docking station
3) port
4) network
5) None of these

13. Each cell in a Microsoft Office Excel document is referred to by its cell address, which
is the...
1) cell's column label
2) cell's column label and worksheet tab menu
3) cell's row
4) cell's row and column labels
5) None

14. The secret code that restricts entry to some programs is called.....
1) password
2) passport
3) entry-code
4) access-code
5) None of these

15. ...... is a field that uniquely identifies which person, thing or event the record describes
1) File
2) Data
3) Folder
4) Key
5) None

16. The .... directory is mandatory for every disk.
1) Root
2) Base
3) Sub
4) Case
5) None of these

17. You must install a ..... on a network if you want to share a Broadband Internet connection.
1) router
2) modem
3) node
4) cable
5) None of these

18. This can be another word of a program...
1) software
2) disk
3) floppy
4) hardware
5) None of these

19. First Technopark in India is in....
1) Bangalore
2) Kolkata
3) Thiruvananthapuram
4) Delhi
5) None

20. The simultaneous processing of two or more programs by a multiple processor is known as
1) Multiprogramming
2) Multitasking
3) Time sharing
4) Multiprocessing
5) None of these

ANSWERS:

1-1, 2-1, 3-5, 4-2, 5-4, 6-1, 7-3, 8-4, 9-4, 10-2
11-4, 12-2, 13-4, 14-1, 15-4, 16-1, 17-1, 18-1, 19-3, 20-4

Sunday 19 October 2014

COMPUTER AWARENESS PRACTICE MCQs FOR ALL BANK EXAMS

1. We cannot delete the ____ icon, but we can made it invisible.
a) Recycle
b) My Computer
c) Internet explorer
d) All the above
e) None of the above

2. What is the meaning of 'Hibernate' in Windows XP/ Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications
e) Restart the computers all the running applications

3. The RF communication can be broadly classified in how many types?
a) Three
b) Four
c) Two
d) Six
e) Ten

4. _____ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by invoking methods on their handles.
a) Windows NT
b) Windows XP
c) Windows VISTA
d) Windows 95/98
e) Windows 7

5. Which of the following is not available on the Ruler of MS Word screen?
a) Tab stop box
b) Left Indent
c) Right Indent
d) Center Indent
e) All of them are available on ruler

6. In OSI network architecture, the dialogue control and token management are responsibility of __
a) session layer
b) network layer
c) transport layer
d) data link layer
e) None of the above

7. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Average case
d) Null case
e) All of the above

8. A computer program that converts an entire program into machine language is called a/ an
a) Interpreter
b) Simulator
c) Compiler
d) Commander
e) Proposer

9. Which of the following formulas will Excel not be able to calculate?
a) =SUM(Sales)−A3
b) =SUM(A1:A5)*.5
c) =SUM(A1:A5)/(10−10)
d) =SUM(A1:A5)−10
e) = SUM(A1:A5)−A5

10. What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?
a) Customer relationship management systems cards
b) E-government identity cards
c) FEDI cards
d) Smart cards
e) Aadhar card

11. What is the shortcut key you can press to create a copyright symbol?
a) Alt+Ctrl+C
b) Alt + C
c) Ctrl + C
d) Ctrl + Shift + C
e) Ctrl + Shift + D

12. During software development which factor is most crucial?
a) People
b) Process
c) Product
d) Project
e) Purpose

13. How many OSI layers are covered in the X.25 standard?
a) Two
b) Three
c) Seven
d) Six
e) eight

14. The transmission signal coding method of TI carrier is called ___
a) Bipolar
b) NRZ
c) Manchester
d) Binary
e) Bit

15. The idea of MFC document architecture was created by:
a) Microsoft
b) Oracle
c) Xerox
d) IBM
e) Java

16. What is the name of the display feature that highlights are of the screen which requires operator
attention?
a) Pixel
b) Reverse video
c) Touch screen
d) Cursor
e) Image

17. What kind of architecture does mobile computing deploy?
a) Two layered
b) Three layered
c) Four layered
d) Five layered
e) Six layered

18. A word processor would most likely be used to do ___
a) Keep an account of money spent
b) Do a computer search in media center
c) Maintain an inventory
d) Type a biography
e) All the above

19. SDLC stands for?
a) Software Design Life Cycle
b) Software Development Life Cycle
c) System Design Life Cycle
d) System Development Life Cycle
e) None of these

20. When a subroutine is called, the address of the instruction following the CALL instructions
stored in/ on the ___
a) stack pointer
b) accumulator
c) program counter
d) stack
e) pointer

21. What component of .NET includes services used to support web services?
a) Platform
b) Framework
c) Visual Studio
d) System
e) Mather board

22. Which of the following is not one of the four primary focuses of e-government?
a) G2G
b) G2B
c) IG2B
d) IG2G
e) IG2I

23. ____is not a category of EPS.
a) E banking
b) Direct payments
c) Retailing payments
d) Cash on delivery
e) All of these

24. One of the distinguished features of super-computer over other category of computer is ____
a) parallel processing
b) highest accuracy level
c) more speed
d) more capacity
e) less speed

25. Which class is used to control the data being used by application?
a) Document class
b) View class
c) Frame class
d) Application class
e) Software class

26. What is the control unit's function in the CPU?
a) Transfers data to primary storage
b) Stores program instruction
c) Performs logic operations
d) Decodes program instruction
e) Performs logic storage

27. Which of the following is the most common method for online payment?
a) Card based system
b) Cheque based system
c) e cash system
d) All the above
e) None of the above

28. Which of the following is not a product matrix?
a) Size
b) Reliability
c) Productivity
d) Functionality
e) Quality

29. Which of the following transmission systems provide the highest data rate in individual device?
a) Computer bus
b) Telephone lines
c) Voice and mode
d) Lease lines
e) Only voice

30. The most common addressing techniques employed by a CPU is ___
a) Immediate
b) Direct
c) Indirect
d) Register
e) All of the above

31. The key F12 opens a:
a) Save As dialog box
b) Open dialog box
c) Save dialog box
d) Close dialog box
e) Edit dialog box

32. Which of the following signal is not standard RS-232-C signal?
a) VDR
b) RTS
c) CTS
d) DSR
e) DLR

33. The indirect change of the values of a variable in one module by another module is called ___
a) internal change
b) inter-module change
c) side effect
d) side-module update
e) internal effect

34. Operating system is also known as:
a) Database
b) System software
c) Hardware
d) Printer
e) Operating system

35. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
a) Leech
b) Squid
c) Slug
d) Glitch
e) Bug

36. What happens if you press Ctrl + Shift + F8?
a) It activates extended selection
b) It activates the rectangular selection
c) It selects the paragraph on which the insertion line is
d) All of the above
e) None of the above

37. Which of the following is the latest version of Excel?
a) Excel 2000
b) Excel 2002
c) Excel ME
d) Excel 7
e) Excel XP

38. Which of the following statement is correct?
a) Terminal section of a synchronous modem contains the scrambler
b) Receiver section of a synchronous modem contains the scrambler
c) Transmission section of a synchronous modem contains the scrambler
d) Control section of a synchronous modem contains the scrambler
e) None of the above

39. Human beings are referred to as Homo sapiens, which device is called Silico Sapiens?
a) Monitor
b) Hardware
c) Robot
d) Computer
e) Mouse

40. ____ share characteristics with both hardware and software.
a) Operating system
b) Software
c) Data
d) File
e) None


ANSWERS: 
1) a 2) d 3) a 4) a 5) d 6) a 7) d 8) c 9) a 10) d
11) a 12) a 13) b 14) a 15) c 16) b 17) b 18) d 19) b 20) d
21) b 22) c 23) d 24) c 25) a 26) d 27) a 28) c 29) a 30) e
31) a 32) a 33) c 34) b 35) d 36) b 37) e 38) c 39) d 40) a 

Monday 13 October 2014

Computer Knowledge Practice Questions for Bank Exams

1. What is an 'internet'?
1) Internal internet used to transfer information internally.
2) Internal internet used to transfer information to the outside company.
3) Internal network designed to serve the internal informational needs of a single organisation.
4) Internal network designed to transfer the information between two organisations.
5) None of the above

2. To send another station a message, the main thing a user has to know is
1) how the network works
2) the other station's address
3) whether the network is packet-switched or circuit - switched
4) whether this is a voice or data network
5) None of the above

3. The data base administrator's function in an organization is
1) to be responsible for the more technical aspects of managing the information contained in organizational databases.
2) to be responsible for the executive level aspects of decisions regarding the information management
3) to show the relationship among entity classes in a data warehouse
4) to define which data mining tools must be used to extract data
5) None of the above

4. A ...... is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these

5. Each of the following is a true statement except
1) online systems continually update the master file
2) in online processing, the user enters transactions into a device that is directly connected to the computer system
3) batch processing is still used today in older systems or in some systems with massive volumes of transactions
4) information in batch systems will always be up-to-date
5) None of the above

6. When you save a presentation, ............
1) all slides in a presentation are saved in the same file
2) two files are created; one for graphics and one for content
3) a file is created for each slide
4) a file is created for each animation or graphic
5) None of the above

7. In a client/ server model, a client program
1) asks for information
2) provides information and files
3) serves software files to other computers
4) distributes data files to other computers
5) None of the above

8. Every device on the internet has a unique ....... address (also called an ‘Internet address’) that identifies it in the same way that a street address identifies the location of a house.
1) DH
2) DA
3) IP
4) IA
5) None

9. In a customer data base a customer’s surname would be keyed into a...
1) row
2) text field
3) record
4) computed field
5) None of these

10. A set of interrelated components that collect, process, store and distribute information to support decision making and control in an organization best defines
1) communications technology
2) a network
3) an information system
4) hardware
5) None of the above

11. Control in design of an information system is used to
1) inspect the system and check that it is built as per specifications
2) ensure that the system processes data as it was designed to and that the results are reliable
3) ensure privacy of data processed by it
4) protect data from accidental or intentional loss
5) None of the above

12. Storing same data in many places is called
1) iteration
2) concurrency
3) redundancy
4) enumeration
5) None of these

13. Which of the following is the first step in the 'transaction processing cycle', which captures business data through various modes such as optical scanning or at an electronic commerce website?
1) Document and report generation
2) Database maintenance
3) Transaction processing
4) Data Entry
5) None of the above

14. What is part of a database that holds only one type of information?
1) Report
2) Field
3) Record
4) File
5) None

15. 'MPG' extension refers usually to what kind of file?
1) Word Perfect Document file
2) MS Office document
3) Animation/ movie file
4) Image file
5) None of these

16. If you want to secure a message, use a(n):
1) cryptology source
2) encryption key
3) encryption software package
4) cryptosystem
5) None of these

17. Which key do you press to check spelling?
1) F3
2) F5
3) F7
4) F9
5) None

18. Which area in an Excel window allows entering values and formulas?
1) Title Bar
2) Menu Bar
3) Formula Bar
4) Standard Tool Bar
5) None of these

19. Which of the following helps to reduce spelling error in the document?
1) Auto Format
2) Auto Correct
3) Smart Tags
4) Auto Text
5) None

20. Which of the following is valid IP address?
1) 984.12.787.76
2) 192.168.321.10
3) 1.888.234.3456
4) 192.168.56.115
5) None of these

ANSWERS:
1-1, 2-2, 3-1, 4-2, 5-4, 6-1, 7-4, 8-3, 9-3, 10-3
11-2, 12-3, 13-4, 14-2, 15-3, 16-4, 17-3, 18-3, 19-2, 20-4.

Wednesday 1 October 2014

COMPUTER AWARENESS PRACTICE QUESTIONS FOR ALL BANK EXAMS

1. India's largest wide area network is:
a) INDONET
b) NICNET
c) INET
d) SWIFT
e) Beam

2. A computer system consists of several devices like CPU, monitor, mouse etc. together they are called:
a) computer peripherals
b) computer components
c) computer bits
d) computer equipments
e) none of the above

3. Number of devices supported by LAN can be maximum of:
a) 7
b) 12
c) 100
d) 1000
e) 25

4. An information system that immediately responds to the physical systems is called:
a) Live system
b) On-line System
c) Off-line system
d) Real time system
e) none

5. Route adopted by large companies for payment of dividends to shareholders is called
a) ECS Debit
b) RTGS
c) ECS Credit
d) either (b) or (c)
e) either (a) or (c)

6. Which combination of keys needs to be pressed to make a percent sign?
a) Shift+2
b) Shift+3
c) Shift+4
d) Shift+5
e) Shift+9

7. Which function calculates the largest value in a set of numbers?
a) Average
b) Count
c) Minimum
d) Maximum
e) None of these

8. Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?
a) Daughter board
b) Motherboard
c) Father board
d) Breadboard
e) CPU

9. MB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tan don, operating system from Microsoft, the printer from Epson and the application
software from everywhere. Can you name the country which contributed the video display?
a) India
b) China
c) Germany
d) Taiwan
e) Japan

10. What is meant by a dedicated computer?
a) Which is used by one person only
b) Which is assigned one and only one task
c) Which uses one kind of software
d) Which is meant for application software
e) All the above

11. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
a) 1978
b) 1984
c) 1990
d) 1989
e) 1991

12. The information stored in storage devices can be accessed in ______
a) RAM access & ROM access
b) Memory access & Disk access
c) Random access & shift access
d) Sequential access & Direct access
e) All the above

13. Which of the following is the most commonly used encoding standard of Unicode?
a) UTF-6
b) UTF-7
c) UTF-5
d) UTF-9
e) UTF-8

14. UML is stands for
a) Universal Modelling Language
b) Unified Modelling Language
c) United Modelling Language
d) Unit Modelling Language
e) Uni Modelling Language

15. Which of the following translator program converts assembly language program to object program?
a) assembler
b) compiler
c) microprocessor
d) linker
e) sender

16. Which protocol is used to transfer web pages?
a) TCP/IP
b) SMTP
c) POP3
d) HTTP
e) HPTP

17. A self-sufficient computer that acts as both a server and a client is known as
a) Host
b) Client
c) Server
d) Terminal
e) Peer

18. The interactive transmission of data within a time sharing system may be best suited to
a) simplex lines
b) half-duplex lines
c) full duplex lines
d) bi flex-lines
e) tri flex lines

19. A system program that sets up an executable program in main memory ready for execution is
a) assembler
b) linker
c) compiler
d) Coding
e) loader

20. A table can be logically connected to another table by defining a
a) Super key
b) Candidate key
c) Primary key
d) Unique key
e) Common attribute.

21. Missing slot covers on a computer can cause?
a) Over heat
b) Power surges
c) EMI
d)Incomplete path for ESD
e) None of the above

22. From what location are the 1st computer instructions available on boot up?
a) ROM BIOS
b) CPU
c) boot.ini
d) CONFIG.SYS
e) .bat

23. Acollaborative network that uses Internet Technology to link business with their suppliers is ---
a) Internet
b) Intranet
c) Extranet
d) WAN
e) LAN

24. Open Systems Interconnection (OSI) Model consists of -
a) 5-layers
b) 6-layers
c) 7-layers
d) 8-layers
e) 9-layers

25. A communication processor that connects dissimilar networks by providing the translation from
one set of protocol to another is -
a) Bridge
b) Gateway
c) Router
d) Modem
e) CPU

26. A collection of raw facts is called -
a) Output
b) Information
c) Bits
d) Data
e) Files

27. A __ is an additional set of commands that the computer displays after you make a selection from the main menu.
a) dialog box
b) submenu
c) menu selection
d) all the above
e) None

28. What is the permanent memory built into your computer called?
a) RAM
b) Floppy
c) CPU
d) ROM
e) Hard disk

29. Storage that retains its data after the power is turned off is referred to as
a) volatile storage
b) non-volatile storage
c) sequential storage
d) direct storage
e) indirect storage

30. Which of the following is an example of connectivity?
a) internet
b) floppy disk
c) power card
d) data
e) file

31. ___ is the process of finding errors in software code.
a) Compiling
b) Testing
c) Running
d) Debugging
e) Marking

32. Which of the following is not as language for computer programming
a) Windows
b) PASCAL
c) BASIC
d) COBOL
e) .net

33. ____is the process of dividing the disk into tracks and sectors.
a) Tracking
b) Formatting
c) Crashing
d) Allotting
e) Storing

34. What is the shortcut key to "Undo" the last action in a document?
a) Ctrl + X
b) Ctrl + y
c) Ctrl + Z
d) Ctrl + U
e) Ctrl + V

35. The language that the computer can understand and execute is called
a) machine language
b) application software
c) system program
d) all of these
e) none of these

36. Which of the following is not hardware
a) magnetic tape
b) printer
c) VDU terminal
d) assembler
e) pointer

37. What are the basic types of memory that your computer uses
a) RAM
b) RW/RAM
c) ROM
d) both A and C
e) both A,B and C

38. The total set of interlinked hypertext documents worldwide is
a) HTTP
b) Browser
c) WWW
d) B2B
e) B2A

39. The ___ enables you to simultaneously keep multiple Web pages open in one browser window.
a) tab box
b) pop-up helper
c) tab row
d) address bar
e) none

40. Which ports connect special types of music instruments to sound cards?
a) BUS
b) CPU
c) USB
d) MIDI
e) RAM

41. You can ____ a search by providing more information the search engine can use to select a smaller, more useful set of results.
a) refine
b) expand
c) load
d) query
e) unload

42. The primary purpose of software is to turn data into
a) web sites
b) information
c) programs
d) objects
e) web engines

43. The metal or plastic case that holds all the physical parts of the computer is the:
a) Hard disk
b) CPU
c) Mainframe
d) Platform
e) System unit

44. The difference between people with access to computers and the Internet and those without this access is known as the:
a) Digital divide
b) Internet divides
c) Web divides
d) Broadband divide
e) None

45. DSL is an example of a(n) _____ connection.
a) Network
b) Wireless
c) Slow
d) Cable
e) Broadband

46. The Analytical Engine developed during First Generation of computers used ___ as a memory unit?
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) Rooms

47. Which type of DOS program can you run to see which serial ports are detected?
a) combing
b) MSD
c) command.com
d) SDET
e) serial.chk

ANSWERS:
1) b 2) a 3) b 4) d 5) c 6) d 7) d 8) b 9) d 10) b
11) e 12) d 13) e 14) b 15) b 16) d 17) e 18) c 19) e 20) c
21) a 22) a 23) c 24) c 25) b 26) d 27) a 28) d 29) b 30) a
31) b 32) a 33) b 34) c 35) a 36) d 37) d 38) a 39) c 40) b
41) a 42) b 43) e 44) a 45) e 46) d 47) b

Sunday 28 September 2014

COMPUTER AWARENESS PRACTICE QUESTIONS FOR SBI P.O. EXAM

1. The memory address of the first element of an array is called ___
a) floor address
b) foundation address
c) first address
d) base address
e) second address

2. The term "push" and "pop" is related to the ___
a) Array
b) Lists
c) Stacks
d) All the above
e) None of these

3. A data structure where elements can be added or removed at either end but not in the middle:
a) Linked lists
b) Deque
c) Stacks
d) Queues
e) Bugs

4. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Null case
d) Average case
e) Middle case

5. The operation of processing each element in the list is known as ___
a) Traversal
b) Sorting
c) Merging
d) Inserting
e) Layout

6. Human beings are referred to as Homo Sapiens, which device is called Sillico Sapien?
a) Hardware
b) Robot
c) Computer
d) Monitor
e) RAM

7. Asmall or intelligent device is so called because it contains within it a ___
a) Computer
b) Microcomputer
c) Programmable
d) Sensor
e) Cursor

8. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) Floppies
b) RAM
c) Counter Wheels
d) Cards
e) Wires

9. Which of the following devices is specially designed to forward packets to specific ports based on the packet's address?
a) Switching hub
b) Specialty hub
c) Filtering hub
d) Port hub
e) Pin hub

10. What is the Operating System used in ATM machine?
a) Windows XP
b) Windows 7
c) Linux
d) Windows 8.1
e) Windows XP or Linux based

11. BOSS is developed in which country?
a) Japan
b) USA
c) UK
d) India
e) China

12. A system call is a method by which a program makes a request to the ____
a) Input Management
b) Interrupt processing
c) Output Management
d) Operating system
e) Operating Management

13. Which of the following is the older high-level (non-assembler) programming language?
a) C
b) LISP
c) FORTRAN
d) BASIC
e) C++

14. Which device is used as the standard pointing device in a Graphical User Environment?
a) Keyboard
b) Mouse
c) Joystick
d) Trackball
e) Printer

15. The section of the CPU that is responsible for performing mathematical operations:
a) Memory
b) Register Unit
c) Control Unit
d) ALU
e) None of the above

16. Which of the following might be used by a company to satisfy its growing communication needs?
a) Front end processor
b) Multiplexer
c) Controller
d) Concentrator
e) All of the above

17. Microsoft .NET is ___
a) Open Source
b) Closed Source
c) Browser
d) Middle Source
e) All the above

18. Technical documentation is prepared by?
a) Users
b) Coders
c) Mangers
d) Marketing & sales people
e) Students

19. Comments can be added using __
a) \comments
b) /* */
c) //
d) %
e) $

20. What are the three main types of computer programming languages?
a) Machine language, assembly language, high level language
b) Imperative language, functional language, declarative language
c) COBOL, FORTRAN-77, C++
d) a and c
e) None of these

21. Which of the following network access standard is used for connecting stations to a circuitswitched network?
a) X.3
b) X.21
c) X.25
d) X.75
e) X.8

22. Which of the following is usually a special one-time operation that must be completed over a limited time period?
a) Batch
b) Patch
c) Project
d) Word
e) File

23. The latest PC keyboards use a circuit that senses the movement by the change in its capacitance. What are these keyboards called?
a) Capacitance keyboards
b) Mechanical keyboards
c) Qwerty keyboards
d) Dvorak keyboards
e) Normal keyboard

24. An IC contains 50 gates each of which consists of 6 components. Its belong to:
a) VLSI
b) LSI
c) MSI
d) SSI
e) SSC

25. Controls of data communication deal with ___
a) the communication channel
b) the computer
c) terminals
d) All of the above
e) None of the above

26. Inventory is also referred to as:
a) Stock
b) Warehouse capacity
c) Materials
d) Materials in hand
e) Storage

27. A server that can perform no other task besides network services is called ___
a) Uno server
b) Dedicated server
c) Committed server
d) Service server
e) Client server

28. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Del + P
d) Ctrl + Shift + P
e) Ctrl + P

29. The processing of an application takes place between a client and a ___ processor.
a) Front end
b) Back end
c) Middle end
d) Only a and b
e) a, b and c

30. ___ transforms one interface into another interface.
a) Program
b) Software
c) Data
d) File
e) Data Base

31. What is the full form of CRT?
a) Current Ray Tube
b) Current Ray Technology
c) Cathode Ray Tube
d) Cathode Ray Technology
e) Cat Ray Tube

32. The Analytical Engine developed during First Generation of computers used ___ as a memory
unit.
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) ROM

33. Which of the following companies is a leader in manufacture of Hard Disk Drives?
a) Samsung
b) IBM
c) Fujitsu
d) Seagate
e) Acer

34. ____ store data or information temporarily and pass it on as directed by the control unit?
a) Address
b) Register
c) Number
d) Memory
e) None of these

35. In ___ mode, the communication channel is used in both directions at the same time?
a) Full-duplex
b) Simplex
c) Half-duplex
d) Duplex
e) None of these

36. "New Comment" option can be found under ___ tab?
a) Insert
b) Data
c) Review
d) View
e) File

37. Which key moves the cursor to the beginning of the next line of text?
a) Shift
b) Enter/ return
c) Tab
d) Backspace/ delete
e) None of these

38. Identify the IP address from the following:
a) 300.215.317.3
b) 302.215@417.5
c) 202.50.20.148
d) 202-50-20-148
e) 101.50. 2 0.148

39. Which one of the following is not a/an image/ graphic file format?
a) PNG
b) GIF
c) BMP
d) GUI
e) None of these

40. In a client/ server model, a client program ___
a) asks for information
b) provides information and files
c) serves software files to other computers
d) distributes data files to other computers
e) All the above

41. Dot-matrix, DeskJet, Inkjet and Laser are all types of which computer peripherals?
a) Keyboard
b) Software
c) Monitor
d) Hardware
e) Printer

42. What is the meaning of 'Hibernate' in Windows XP / Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications.
e) None of these

ANSWERS:
1) d; 2) c; 3) b; 4) c; 5) a; 6) c; 7) d; 8) c; 9) a; 10) e;
11) c; 12) d; 13) c; 14) b; 15) d; 16) e; 17) b; 18) b; 19) d; 20) a;
21) b; 22) c; 23) a; 24) c; 25) d; 26) a; 27) b; 28) e; 29) d; 30) b;
31) c; 32) d; 33) d; 34) b; 35) a; 36) c; 37) b; 38) c; 39) d; 40) a; 41) e; 42) d.

Wednesday 24 September 2014

COMPUTER KNOWLEDGE PRACTICE MCQs FOR SBI P.O. EXAM

1. The memory address of the first element of an array is called ___
a) floor address
b) foundation address
c) first address
d) base address
e) second address

2. The term "push" and "pop" is related to the ___
a) Array
b) Lists
c) Stacks
d) All the above
e) None of these

3. A data structure where elements can be added or removed at either end but not in the middle:
a) Linked lists
b) Deque
c) Stacks
d) Queues
e) Bugs

4. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Null case
d) Average case
e) Middle case

5. The operation of processing each element in the list is known as ___
a) Traversal
b) Sorting
c) Merging
d) Inserting
e) Layout

6. Human beings are referred to as Homo Sapiens, which device is called Sillico Sapien?
a) Hardware
b) Robot
c) Computer
d) Monitor
e) RAM

7. Asmall or intelligent device is so called because it contains within it a ___
a) Computer
b) Microcomputer
c) Programmable
d) Sensor
e) Cursor

8. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) Floppies
b) RAM
c) Counter Wheels
d) Cards
e) Wires

9. Which of the following devices is specially designed to forward packets to specific ports based on the packet's address?
a) Switching hub
b) Specialty hub
c) Filtering hub
d) Port hub
e) Pin hub

10. What is the Operating System used in ATM machine?
a) Windows XP
b) Windows 7
c) Linux
d) Windows 8.1
e) Windows XP or Linux based

11. BOSS is developed in which country?
a) Japan
b) USA
c) UK
d) India
e) China

12. A system call is a method by which a program makes a request to the ____
a) Input Management
b) Interrupt processing
c) Output Management
d) Operating system
e) Operating Management

13. Which of the following is the older high-level (non-assembler) programming language?
a) C
b) LISP
c) FORTRAN
d) BASIC
e) C++

14. Which device is used as the standard pointing device in a Graphical User Environment?
a) Keyboard
b) Mouse
c) Joystick
d) Trackball
e) Printer

15. The section of the CPU that is responsible for performing mathematical operations:
a) Memory
b) Register Unit
c) Control Unit
d) ALU
e) None of the above

16. Which of the following might be used by a company to satisfy its growing communication needs?
a) Front end processor
b) Multiplexer
c) Controller
d) Concentrator
e) All of the above

17. Microsoft .NET is ___
a) Open Source
b) Closed Source
c) Browser
d) Middle Source
e) All the above

18. Technical documentation is prepared by?
a) Users
b) Coders
c) Mangers
d) Marketing & sales people
e) Students

19. Comments can be added using __
a) \comments
b) /* */
c) //
d) %
e) $

20. What are the three main types of computer programming languages?
a) Machine language, assembly language, high level language
b) Imperative language, functional language, declarative language
c) COBOL, FORTRAN-77, C++
d) a and c
e) None of these

21. Which of the following network access standard is used for connecting stations to a circuitswitched network?
a) X.3
b) X.21
c) X.25
d) X.75
e) X.8

22. Which of the following is usually a special one-time operation that must be completed over a limited time period?
a) Batch
b) Patch
c) Project
d) Word
e) File

23. The latest PC keyboards use a circuit that senses the movement by the change in its capacitance. What are these keyboards called?
a) Capacitance keyboards
b) Mechanical keyboards
c) Qwerty keyboards
d) Dvorak keyboards
e) Normal keyboard

24. An IC contains 50 gates each of which consists of 6 components. Its belong to:
a) VLSI
b) LSI
c) MSI
d) SSI
e) SSC

25. Controls of data communication deal with ___
a) the communication channel
b) the computer
c) terminals
d) All of the above
e) None of the above

26. Inventory is also referred to as:
a) Stock
b) Warehouse capacity
c) Materials
d) Materials in hand
e) Storage

27. A server that can perform no other task besides network services is called ___
a) Uno server
b) Dedicated server
c) Committed server
d) Service server
e) Client server

28. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Del + P
d) Ctrl + Shift + P
e) Ctrl + P

29. The processing of an application takes place between a client and a ___ processor.
a) Front end
b) Back end
c) Middle end
d) Only a and b
e) a, b and c

30. ___ transforms one interface into another interface.
a) Program
b) Software
c) Data
d) File
e) Data Base

31. What is the full form of CRT?
a) Current Ray Tube
b) Current Ray Technology
c) Cathode Ray Tube
d) Cathode Ray Technology
e) Cat Ray Tube

32. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) ROM

33. Which of the following companies is a leader in manufacture of Hard Disk Drives?
a) Samsung
b) IBM
c) Fujitsu
d) Seagate
e) Acer

34. ____ store data or information temporarily and pass it on as directed by the control unit?
a) Address
b) Register
c) Number
d) Memory
e) None of these

35. In ___ mode, the communication channel is used in both directions at the same time?
a) Full-duplex
b) Simplex
c) Half-duplex
d) Duplex
e) None of these

36. "New Comment" option can be found under ___ tab?
a) Insert
b) Data
c) Review
d) View
e) File

37. Which key moves the cursor to the beginning of the next line of text?
a) Shift
b) Enter/ return
c) Tab
d) Backspace/ delete
e) None of these

38. Identify the IP address from the following:
a) 300.215.317.3
b) 302.215@417.5
c) 202.50.20.148
d) 202-50-20-148
e) 101.50. 2 0.148

39. Which one of the following is not a/an image/ graphic file format?
a) PNG
b) GIF
c) BMP
d) GUI
e) None of these

40. In a client/ server model, a client program ___
a) asks for information
b) provides information and files
c) serves software files to other computers
d) distributes data files to other computers
e) All the above

41. Dot-matrix, DeskJet, Inkjet and Laser are all types of which computer peripherals?
a) Keyboard
b) Software
c) Monitor
d) Hardware
e) Printer

42. What is the meaning of 'Hibernate' in Windows XP / Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications.
e) None of these

ANSWERS:
1) d; 2) c; 3) b; 4) c; 5) a; 6) c; 7) d; 8) c; 9) a; 10) e;
11) c; 12) d; 13) c; 14) b; 15) d; 16) e; 17) b; 18) b; 19) d; 20) a;
21) b; 22) c; 23) a; 24) c; 25) d; 26) a; 27) b; 28) e; 29) d; 30) b;
31) c; 32) d; 33) d; 34) b; 35) a; 36) c; 37) b; 38) c; 39) d; 40) a;
41) e; 42) d.

Tuesday 16 September 2014

COMPUTER AWARENESS PRACTICE MCQs FOR ALL BANK EXAMS

1. ROM stands for
A. Random Only Memory 

B. Readable Only Memory
C. Real Online Memory 

D. Random Other Memory
E. Read Only Memory

2. Another name for a logic chip is
A. PROM 

B. Memory 
C. Microprocessor
D. ROM 

E. None of these

3. The Number System based on 0 and 1 only is known as..........................
A. Binary System 

B. Barter System
C. Number System

D. Hexadecimal System
E. Special System
4. The capacity of 0.5 inch floppy disk is.....
A. 1.40MB 

B. 1.44GB
C. 1.40GB 

D. 1.45MB 
E. 1.44MB

5. Which of the following is not an integral part of computer ?
A. CPU

B. Mouse
C. Monitor
D. UPS

E. None of these

6. Which of the following is/are not part of the CPU ?
A. Primary storage

B. Registers
C. Control unit

D. ALU
E. None of these

7. The device that reconciles the differences between computers and phones is the ......
A. LAN 

B. Wand reader
C. TCP/IP 

D. scanner 
E. modem

8. A combination of hardware and software that allows communication and electronic transfer of information between computers
A. Network 

B. Backup System 
C. Server

D. Peripheral 
E. Modem

9. Which of the following represents the fastest data transmission speed ?
A. bandwidth

B. bps
C. gbps 
D. kbps

E. mbps

10. What is a major feature of the World Wide Web that makes it simple to learn and use ?
A. Database interface
B. Graphical text interface
C. Graphical user interface
D. Point-to-Point Protocol 

E. None of these

11. Which of the following is an input device that, when moved by the user on a flat surface, causes a pointer on the screen to move accordingly ?
A. Wand reader 

B. Mouse
C. Keyboard 

D. Bar code reader
E. Scanner

12. A bar code reader is an example of a(n}.......
A. processing device
B. storage device 

C. input device
D. output device 

E. printer

13. If your regularly send letters to people, what type of program would you use to create the letters ?
A. Hardware 

B. System software
C. Utility software 
D. Application software
E. None of these

14. Computer gets && with the help of mouse or keyboard.
A. insert 

B. instructions
C. guides 

D. input 
E. None 

15. Dot-matrix is a type of ................
A. Tape

B. Printer
C. Disk 
D. Bus 
E. None 

16. Which of the following represents one billion characters ?
A. Byte

B. Gigabyte 
C. Kilobyte 

D. Megabyte
E. Terabyte

17. Which of the following menu types is also called a drop-down menu ?
A. Fly-down 

B.Pop-down 
C. Pop-up
D. Pull-up

E. Pull-down

18. What is an onscreen picture that represents an object, such as a program or file ?
A. Spool

B. NOS
C. Page

D. Pointer
E. Icon

19. Which of the following is not necessary to be considered computer literate ?
A. The ability to write the instructions that direct a computer
B. An awareness of the computers importance, versatility, and pervasiveness in society
C. Knowledge of what computers are and how they work
D. The ability to interact with computers using simple applications 
E. None of these

20. An area of the microprocessor chip used to temporarily store instructions and data that the processor is likely to use frequently is termed a(n)....
(A) ALL

(B) Bus
(C) Cache
(D) CPU 

(E) Flash

21. Kilobyte equals to how many bytes?
(A) 1000 

(B) 1035 
(C) 100 

(D) 1008 
(E) 1024

22. The central processing unit is an ex-ample of
A. peripheral 
(B) an output unit

(C) software 
(D) a program
(E) hardware

23. CD-ROM stands for ........
(A) Compactable Read Only Memory 

(B) Compact Data Read Only Memory 
(C) Compactable Disk Read Only Memo ry 
(D) Compact Disk Read Only Memory 

(E) Connected Disk Read Only Memory


24. Which of the following terms refers to the ability of a computer to automatically configure a new hardware component that is added to it ?
(A) Formatting 
(B) Multiprocessing

(C) Multiprogramming
(D) Multitasking
(E) Plug and Play

25. Free hard-disk space used to extend the capacity of RAM is ten:
(A) Cache 
(B) Flash memory 
(C) ROM
(D) Virtual memory 
(E) Volatile

26. Making illegal copies of copy-righted software is called ......
(A) Collaboration 
(B) software piracy
(C) electronic distribution
(D) Browsing
(E) software legacy

27. What is loading the operating system into a personal computer called ?
(A) Booting
(B) Prompting

(C) Paging
(D) Interrupting

(E) Readying

28. Which of the following is not an example of application software ?
(A) Database software
(B) Graphics software
(C) Operating system software
(D) Spreadsheet software
(E) Word processing software

29. Pie charts are typically created by using which of the follow ing ?
(A) browser software
(B) database software
(C) desk-top publishing software
(D) word-processing software
(E) spreadsheet software

30. The computer to which a users computer connects in order to access the Internet is called a ........
(A) notebook 

(B) PDA
(C) supercomputer 

(D) server
(E) laptop

31. Which of the following domains is used by for-profit businesses ?
(A) .com

(B) .edu
(C) .mil

(D) .net 
(E) .org

32. WAN stands for ...................
(A) Wired Area Network
(B) Wide Area Network
(C) Wide Array Net
(D) Wireless Area Network
(E) Wanted Area Network

33. What are lists of programs waiting to be run called ?
(A) Shells 

(B) The background
(C) Queues 

(D) Page frames 
(E) Lists

34. An example of peripheral equipm-ent is the
(A) printer 

(B) CPU 
(C) spreadsheet 
(D) microcomputer 
(E) ALU

35. Which of the following commercial software products are examples of operating system software and application soft-ware, respectively ?
(A) Microsoft Windows XP and Microsoft Word
(B) Microsoft Office XP and Micro soft Windows XP
(C) MS DOS and Microsoft Windows XP
(D) UNIX and LINUX 
(E) UNIX and Java

36. MS Excel is used for ?
(A) Letter writing
(B) Spread Sheet Calculation
(C) Presentation
(D) Painting 
(E) None of these

37. Computer users who are not; computer professionals, are someti-mes called.....
(A) peripheral users
(B) programmers 
(C) librarians
(D) information officers 
(E) end-users

38. Desktop and personal computers are also known as.....
(A) supercomputers
(B) servers 

(C) mainframes
(D) peripheral equipment
(E) microcomputers

39. The ability to exchange information through the use of computer equipment and software is
(A) Data entry
(B) The Internet 
(C) Data retrieval
(D) Electronic communication

(E) None 

40. A computer professional who writes and tests software is called a /an .....
(A) hardware consultant 

(B) librarian 
(C) programmer
(D) computer operator
(E) data entry operator


ANSWERS:
1-E, 2-C, 3-A, 4-E, 5-D, 6-E, 7-E, 8-A, 9-C, 10-C
11-B, 12-D, 13-D, 14-D, 15-B, 16-B, 17-E, 18-E, 19-E, 20-C
21-E, 22-E, 23-D, 24-E, 25-B, 26-B, 27-A, 28-C, 29-E, 30-D
31-E, 32-B, 33-D, 34-A, 35-A, 36-B, 37-E, 38-E, 39-D, 40-C

Saturday 13 September 2014

COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR ALL BANK EXAMS

1. Which of the following is an example of non volatile memory?
1) VLSI
2) LSI
3) ROM
4) RAM
5) Hard disk

2. IEEE 802.16 popularly called ___
1) Ethernet
2) Wi-Fi
3) WIMAX
4) Wireless Network
5) None of these

3. To protect system, there are how many security levels?
1) One
2) Two
3) Three
4) Four
5) Five

4. Java was originally invented by
1) Oracle
2) Microsoft
3) Novell
4) Sun
5) IBM

5. Asmall network making up the internet and also having a small number of computers with in it is called ___
1) Host
2) Address
3) Sub domain
4) Domain
5) URL

6. The operating system of a computer serves as a software interface between the user and ___
1) Software
2) Hardware
3) Processor
4) Compiler
5) RAM

7. Both the ALU and control section of CPU employ special purpose storage locations called:
1) Decoders
2) Buffers
3) Multiplexer
4) Registers
5) Flip flops

8. The address of the next instruction to be executed by the current process is provided by the ___
1) CPU registers
2) program counter
3) process stack
4) pipe
5) coding counter

9. Which command combines the contents of one file with another?
1) Restore
2) Rename
3) Append
4) Add
5) Store

10. The ___ is the administrative section of the computer system.
1) Memory Unit
2) Input Unit
3) Central Processing Unit
4) Control Unit
5) Logic Unit

11. Coded entries which are used to gain access to a computer system are called
1) Codeword's
2) Entry codes
3) Entry words
4) Security commands
5) Data codes

12. What is the primary requisite of a good computer programmer?
1) Mathematical mind
2) Artistic mind
3) Logical mind
4) Scientific knowledge
5) Memory Knowledge

13. The errors that can be pointed out by the compiler:
1) Syntax errors
2) Internal errors
3) Semantic errors
4) Coding errors
5) Logical errors

14. Which of the following is an advantage to using fibre optics data transmission?
1) Resistance to data theft
2) Fast data transmission rate
3) Few transmission errors
4) Low noise level
5) All the above

15. Which one of the following when added can reduce the processing time of a computer?
1) A buffer
2) A co-processor
3) 1024 megabyte
4) A converter
5) 1064 megabyte

16. A program that neither replicates or copies itself, but does damage or compromises the security of the computer. Which 'Computer Virus' it is?
1) Hoax
2) Worm
3) Trojan
4) Joke program
5) Juke program

17. 'DB' computer abbreviation usually means?
1) Driver Boot
2) Double Byte
3) Data Block
4) Database
5) None of these

18. What do we call a network whose elements may be separated by some distance? It usually involves two or more small networks and dedicated high-speed telephone lines.
1) WAN (Wide Area Network)
2) World Wide Web
3) URL (Universal Resource Locator)
4) LAN (Local Area Network)
5) All the above

19. Hardware devices that are not part of the main computer system and are often added later to the system.
1) Execute
2) Highlight
3) Peripheral
4) Clip art
5) Insert

20. '.BAK' extension refers usually to what kind of file?
1) Audio file
2) MS Encarta document
3) Backup file
4) Animation/ movie file
5) Restore file

21. The main computer that stores the files that can be sent to computers that are networked together is ___
1) Clip art
2) File server
3) Peripheral
4) Mother board
5) IC

22. Which of the following word processors came first?
1) MS Word
2) Lotus Notes
3) WordPerfect
4) WordStar
5) WordPad

23. Which of the following operating systems is produced by IBM?
1) UNIX
2) Windows
3) DOS
4) OS-2
5) OS-3

24. Computers calculate numbers in what mode?
1) Decimal
2) Octal
3) Binary
4) Primary
5) Secondary

25. Which of the following software is used to view web pages?
1) Web Browser
2) Internet Browser
3) Page Browser
4) Crème Browser
5) All the above

26. ____ is the process in which a user sends computer information from his computer to another computer through modem.
1) Downloading
2) Uploading
3) Processing
4) Programming
5) Seeding

27. Which of the following is used to save the frequently visited web sites?
1) Frequent List
2) Favourites List
3) Explorer List
4) File list
5) Data list

28. Which of the following performs arithmetic and logical operations?
1) CU
2) PU
3) ALU
4) Memory
5) CPU

29. A ____ is a group of independent computers attached to one another through communication media.
1) Internet
2) E-mail
3) Network
4) Software
5) Hard ware

30. Which of the following is a presentation program?
1) MS-Word
2) MS-Excel
3) MS-Power Point
4) MS- Access
5) MS-Outlook

31. Collection of 1024 Bytes:
1) 1MB
2) 1KB
3) 1TB
4) 1GB
5) 100 MB

32. How would you be able to protect yourself from phishing?
1) Call your local fish store.
2) Get an Anti-Virus Program
3) Change Passwords Every 4-6 months
4) 2 & 3
5) All the above

33. Why is identity theft something hackers usually go for?
1) Personal Information
2) Being able to have another name
3) Send them emails
4) Take their victim's address for future use
5) All the above

34. This type of software is on computers and collects small pieces of information from users. It is also difficult to detect, what is it?
1) Spam
2) Malware
3) Phishing
4) Spyware
5) Under ware

35. Many malware programs gather information that leads to loss of privacy. How can you generally be protected from this?
1) Close window
2) Never use your computer
3) Anti-Virus Program
4) Turn Off Computer
5) Restart Computer

36. Older networks often use another type of cable, called ________
1) Unshielded twisted-pair cable
2) Coaxial cable
3) Optical Fibre
4) Twisted-pair cable
5) Data cable

37. Which device can understand difference between data & programs?
1) Input device
2) Output device
3) Memory
4) Microprocessor
5) RAM

38. Total keys keyboard is most popular
1) 123
2) 111
3) 101
4) 134
5) 143

39. What is the name of the software that allows us to browse through web pages?
1) Mail Client
2) FTP Client
3) Messenger
4) Browser
5) Server

40. Which of the following best suits the statement below? It's the main memory of the computer system and is volatile.
1) RAM
2) ROM
3) PROM
4) Primary storage
5) Secondary storage


ANSWERS:
1) 3; 2) 3; 3) 4; 4) 4 ; 5) 1; 6) 2 ; 7) 4; 8) 2; 9) 3; 10) 3;
11) 4; 12) 3; 13) 5 14) 2; 15) 2; 16) 3; 17) 4; 18) 1; 19) 3; 20) 3;
21) 2; 22) 4; 23) 4; 24) 3; 25) 1; 26) 2; 27) 2; 28) 3; 29) 3; 30) 3;
31) 2; 32) 4; 33) 1; 34) 4; 35) 3; 36) 2; 37) 4; 38) 3; 39) 4; 40) 1;

Sunday 7 September 2014

COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR SBI P.O. EXAM

1. Which of the following condition is used to transmit two packets over a medium at the same time?
1) Contention
2) Collision
3) Synchronous
3) Asynchronous
5) None of the above

2. Which of the following is not an option of the spelling dialog box?
1) Ignore
2) Ignore all
3) Edit
4) Change
5) Select

3. Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
1) 4
2) 8
3) 16
4) 15
5) 32

4. A message with replies on a newsgroup is often called a _____
1) post
2) list
3) thread
4) comment
5) format

5. Which of the following network is used to connect a number of computers to each other by cables in a single location?
1) WAN
2) LAN
3) GAN
4) PAN
5) MAN

6. News servers utilize _____ to distribute documents to readers.
1) NNTP
2) NEWS
3) HTTP
4) FTP
5) HTML

7. The Software which contains rows and columns is called ___
1) Database
2) Drawing
3) Word processing
4) Spreadsheet
5) All the above

8. Addresses separate the user name from the ISP using the ____ symbol.
1) &
2) @
3) %
4) *
5) $

9. The ___ layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames
a) Data Link
b) Physical
c) Network
d) Session
e) MAC

10. The spelling tool is placed on ___ toolbar
1) Standard
2) Formatting
3) Drawing
4) Reviewing
5) Viewing

11. The maximum size of the window in a Sliding Window Protocol is _____
1) 2m + 1
2) 2m
3) 2(m-1)
4) 2m*1
5) 2m - 1

12. A name in the ____ name space is a sequence of characters without structure
1) address
2) oman
3) flat
4) Both a and b
5) location

13. Which of the following is not a valid Zoom percentage in Excel?
1) 10
2) 100
3) 300
4) 500
5) 750

14. Distance Vector Routing is a ____ routing algorithm; it consists of a data structure called a ____
1) Static, routing table
2) Dynamic, look-up table
3) Dynamic, routing table
4) Static, look-up table
5) dynamic, less table

15. What is the short cut key to replace a data with another in sheet?
1) Ctrl + R
2) Ctrl + Shift + R
3) Ctrl + H
4) Ctrl + F
5) Ctrl + V

16. The ___ protocol is based on end-toend delivery.
1) SCTP
2) TCP
3) SMTP
4) SCTP
5) HTTP

17. If you need to change the typeface of a document, which menu will you choose?
1) Edit
2) View
3) Tools
4) File
5) Format

18. What is the size of Network bits & Host bits of Class A of IP address?
1) Network bits 7, Host bits 24
2) Network bits 8, Host bits 24
3) Network bits 7, Host bits 23
4) Network bits 8, Host bits 23
5) Network bits 4, Host bits 25

19. ____ is a uniform naming scheme for locating resources on the web.
1) URI
2) HTTP
3) WEBNAME
4) RESOURCENAME
5) URL

20. The options like Relationship, SQL Server etc. are found in ___
1) External data tab
2) Database tools tab
3) Create tab
4) Home tab
5) Format tab

21. A Database Language Concerned with the Definition of the Whole Database Structure and Schema is ____
1) DCL
2) DML
3) DDL
4) DCO
5) DDI

22. A ____ Enables You To View Data From A Table Based On A Specific Criterion
1) Form
2) Query
3) Macro
4) Report
5) Bug

23. A____ normal form normalization will be needed where all attributes in relation tuple are not functionally dependent only on the key attribute.
1) First
2) Second
3) Third
4) Fourth
5) Fifth

24. An outstanding functionality of SQL is its support for automatic ____ to the target data.
1) programming
2) functioning
3) navigation
4) notification
5) none of these

25. The hardware component used to control the operation of a computer system is:
1) Ram
2) Processor
3) Keyboard
4) Hard disk
5) Monitor

26. Which output device is suited to presenting information that is likely to change very frequently?
1) Sound card
2) Monitor
3) Plotter
4) Printer
5) COM

27. Which is the most difficult environmentally to dispose of?
1) Floppy drives
2) Hard drives
3) Power supplies
4) CRTs
5) System boards

28. Which type of system hoard is the MOST likely candidate for processor upgrading if you want maximum performance and future compatibility?
1) ML
2) PCI
3) ISA
4) EISA
5) ISO

29. Which of the following is a type of preventative maintenance used on a hard drive?
1) Disk check diagnostics
2) Head alignment diagnostics
3) Initializing
4) Uninstalling programs
5) None of the above

30. How many IRQs does a chain of USB devices require?
1) 1
2) 2
3) 3
4) 4
5) 5

31. Which of the following addressing modes, facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears?
1) ascending
2) sorting
3) index
4) indirect
5) direct

32. Which command will be used with vi editor to replace text from cursor to right?
1) r
2) R
3) s
4) S
5) Q

33. Which of the following is not a filter?
1) cat
2) grep
3) wc
4) sort
5) None of the above

34. Which of the following commands is used to view your file 24 lines at a time?
1) pg
2) cat
3) //p
4) /p
5) ///p

35. The rise time of a pulse waveform is the time required for the voltage to rise:
1) from zero to its rms value
2) from zero to its peak value
3) from 10% of the peak value to 70.7% of the peak value
4) from 10% of the peak value to 90% of the peak value
5) from 10% of the peak value to 80% of the peak value

36. Holes are the minority carriers in which type of semiconductor?
1) Extrinsic
2) Intrinsic
3) n-type
4) p-type
5) m-type

37. While working with MS-DOS, which command is used to restore files that were backed up using the BACKUP command?
1) COPY
2) DISKCOPY
3) RESTORE
4) STORE
5) DELETE

38. Which of the following commands will take you directly to the root directory no matter what subdirectory you are currently in?
1) CD \root
2) CD\
3) CD\..
4) CD..
5) CD\\..

39. Batch files contain a group of MSDOS commands that are run in successive order. What filename extension identifies batch files?
1) COM
2) BAT
3) EXE
4) SYS
5) DOC

40. The _____ command allows you to modify the default prompt to provide other information
1) prompt
2) windows
3) cursor
4) click
5) double click

ANSWERS:
1) 2; 2) 3; 3) 4; 4) 3; 5) 5; 6) 1; 7) 4; 8) 2; 9) 1; 10) 1 ;
11) 5; 12) 3; 13) 4; 14) 3; 15) 3; 16) 3; 17) 5; 18) 1; 19) 1: 20) 2;
21) 3; 22) 2; 23) 3; 24) 3; 25) 2; 26) 2; 27) 4; 28) 2; 29) 1; 30) 1;
31) 3; 32) 2; 33) 5; 34) 1; 35) 4; 36) 3; 37) 3; 38) 2; 39) 2; 40) 1;

Wednesday 3 September 2014

COMPUTER AWARENESS PRACTICE MCQs FOR SBI P.O. EXAM 2014

1. Person, who design, program, operates and maintains computer equipment refers to:
a) Console-operator
b) Programmer
c) People ware
d) System Analyst
e) User

2. Who invented the high level language C?
a) Dennis M. Ritchie
b) Niklaus Writh
c) Seymour Papert
d) Donald Kunth
e) A.R John

3. Which of the following is the product of data processing?
a) Information
b) Data
c) Software program
d) System
e) Hardware program

4. How many units in a single bus structure will communicate at a time?
a) 1
b) 2
c) 3
d) 16
e) 32

5. A microcomputer consists of at least an input unit, an output unit, microprocessor unit and a ___
a) stabilizer
b) memory unit
c) printer
d) network
e) monitor

6. For each instructions of program in memory the CPU goes through a ___
a) decode - fetch - execute sequence
b) execute - store - decode sequence
c) fetch - decode - execute sequence
d) fetch - execute - decode sequence
e) None of these

7. The database environment has all of the following components except:
a) Users
b) Database
c) Database administrator
d) Database programmer
e) Separate files

8. Which of the following technique provides dedicated communication channel between two stations?
a) Circuit switching
b) Packet switching
c) Network switching
d) Switch network
e) Modem switching

9. End-to-end connectivity is provided from host-to-host in ___
a) Network layer
b) Session layer
c) Data link layer
d) Transport layer
e) Mac layer

10. A source program is the program written in ____ language.
a) English
b) symbolic
c) high level
d) object
e) French

11. Which of the following is a computer device that primarily used to provide hardcopy?
a) CRT
b) Line printer
c) Computer console
d) Card reader
e) Pen drive

12. In magnetic disks data is organized on the platter in a concentric sets or rings called ___
a) sector
b) track
c) head
d) block
e) bug

13. The memory which is programmed at the time it is manufactured is ___
a) ROM
b) RAM
c) PROM
d) EPROM
e) PRAM

14. In comparison to the internal (main) memory, tape or disk memory is ___
a) slower and more expensive
b) slower and less expensive
c) faster and more expensive
d) faster and less expensive
e) None of these

15. A distributed network configuration in which all data/ information pass through a central computer is ___
a) bus network
b) duplex
c) multiplex
d) multiple
e) star network

16. The process of copying data from a memory location is called ___
a) reading
b) writing
c) controlling
d) booting
e) calling

17. Which of the following is true about primary storage?
a) It is a part of the CPU
b) It allows very fast access to data
c) It is relatively more expensive
d) All of the above
e) None of these

18. 100110 - This binary representation is numerically equivalent to:
a) The decimal representation 46
b) The hexadecimal representation 46
c) The binary representation 26
d) The octal representation 26
e) The octal representation 46

19. Administrative supervision of database activities is the responsibility of ___
a) Data base administrator
b) DP Manager
c) DB Manager
d) VP-DP administrator
e) DO Manager

20. Transmission of computerised data from one location to another is called ___
a) data transfer
b) data flow
c) data communication
d) data management
e) Any of the above

21. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Average case
d) a, b and c
e) Null case

22. The indirect change of the values of a variable in one module by another module is called ___
a) Internal change
b) Inter-module change
c) Side effect
d) Side-module update
e) Top-module update

23. By default, your documents print in ____ mode.
a) landscape
b) portrait
c) page setup
d) print view
e) page layout

24. Which of the following is not available on the Ruler of MS Word screen?
a) Tab stop box
b) Left Indent
c) Right Indent
d) Canter Indent
e) All of them are available on ruler

25. Which American Computer Company is called big blue?
a) Microsoft
b) Compaq Corp
c) IBM
d) Tandy Stevenson
e) Samsung

26. Which of the following is a computer package for preparing/ typing letters/ documents?
a) Word
b) Excel
c) Power Point
d) Windows
e) Adobe Reader

27. Which of the following is true regarding Referential Integrity?
a) Every primary-key value must match a primary-key value in an associated table
b) Every primary-key value must match a foreign-key value in an associated table
c) Every foreign-key value must match a primary-key value in an associated table
d) Every foreign-key value must match a foreign-key value in an associated table
e) None of these

28. If every non-key attribute is functionally dependent on the primary key, the relation will be in ___
a) First Normal Form
b) Second Normal Form
c) Second Formal Form
d) First Formal Form
e) Third Normal Form

29. A desktop computer is also known as a ___
a) PC
b) Laptop
c) Palmtop
d) Mainframe
e) System

30. What does the DOCTYPE declaration defines in HTML?
a) It defines the document Property
b) It defines the document Type
c) It defines the document Size
d) It defines the document Style
e) It defines the document colour

31. In which mode Windows starts with only the core drivers and services?
a) Safe Mode
b) Quick Mode
c) Normal Mode
d) Repair Mode
e) Continue Mode

32. To "Debug" the System means:
a) Find the Correct Software
b) Find the Correct Hardware
c) Find and Install correct System
d) Find and Correct Errors on System
e) Find and fix the Errors on System

33. In Computer Architecture a Bus is ____
a) A collection of various software
b) A collection of various computers
c) A collection of shared communication wires
d) A collection of chairs where the user sits
e) All the above

34. While starting Window XP/7 extra booting options can be shown by pressing
a) F1
b) F8
c) F9
d) F12
e) F11

35. Which of the following is used to add comments in PHP?
a) //
b) /* … */
c) & … &
d) Only a & b
e) All the above

36. How PHP files can be accessed?
a) Through Web Browser
b) Through HTML files
c) Through Web Server
d) Through Internet Server
e) Through .Net Server

37. The first network that planted the seeds of network was?
a) ARPANET
b) NSF net
c) I net
d) V net
e) N net

38. The small size animated pictures moving on WebPages are called?
a) Media
b) Flash
c) Podcast
d) Kris
e) Drag

39. Which of the following is a domain name?
a) .NET
b) .ORG
c) .GOV
d) .IN
e) All the above

40. Firewall is used to prevent unauthorized access from both the sides as software and ___
a) Hardware
b) Malware
c) Spyware
d) Freeware
e) Menswear

41. The unsolicited and bulk mails in e-Mail is called?
a) Spam
b) Scan
c) Storm
d) Virus
e) Trash

42. Graphical pictures that represent an object file, folder, ... are called ___
a) Desktop
b) Icons
c) Windows
d) Taskbar
e) Menus

43. Which of the following keys create symbol copyright as ©?
a) Alt + ctrl + d
b) Alt + Shift + c
c) Ctrl + alt + c
d) Alt +del+ c
e) Alt+ break +c

44. To move to the beginning of a line of text, press the ___ key.
a) Home
b) A
c) Page up
d) Enter
e) Page down

45. Who is responsible for "traffic directing" on Internet?
a) Hub
b) Repeater
c) Router
d) Switch
e) Gateway

ANSWERS:
1) c; 2) a; 3) a; 4) b; 5) b; 6) c; 7) e; 8) a; 9) d; 10) c;
11) b; 12) b; 13) a; 14) b; 15) e; 16) a; 17) d; 18) e; 19) a; 20) c;
21) e; 22) c; 23) b; 24) d; 25) c; 26) a; 27) c; 28) e; 29) a; 30) b;
31) a; 32) d; 33) c; 34) b; 35) d; 36) c; 37) a 38) b; 39) e; 40) a;
41) a; 42) b 43) c; 44) a; 45) c;