Computer Knowledge is highly scoring section in IBPS POs and RRB (Regional Rural Banks) Examinations. All the questions will be from well known concepts such as Computer Terminology, Basic Computer Architecture, Internet, MS-Office, E-Commerce, Computer Network etc. The questions may be theoretical and also require knowledge of facts and application.
Monday, 26 September 2011
IBPS CLERKS COMPUTER KNOWLEDGE PRACTICE MCQs
1. ______Is the most widely used medium for telecommunications
a) Twisted Pair
b) Coaxial Cable
c) Optical Fiber
d) None
2. ______Is widely used medium of communication for cable television systems
a) Twisted Pair
b) Coaxial Cable
c) Optical fiber
d) None
3. ______Cable consists of one or more filaments of glass fiber wrapped in protective layers that carries data by means of pulses of light
a) Twisted Pair
b) Coaxial Cable
c) Optical fiber
d) None
4. ______Is a computer network used for communications among computers and different inform-ation technological devices close to one person
a) Personal Area Network
b) Local Area Network
c) Metropolitan Area Network
d) Wide Area Network
5. ______Is a collection of concep-tual tools for describing data, data relationships, data semantics and constraints
a) Data base
b) Data Model
c) E_R Model
d) None
6. Association among two or more entities called
a) Entity
b) Entity set
c) Relationship
d) Degree of relation
7. DDL stands for
a) Data Definition Language
b) Data Delete Language
c) Data Device Language
d) Database Definition Language
8. SDL stands for
a) Storage Definition Language
b) Save Definition Language
c) Storage Database Language
d) Shortcut Definition Language
9. DML stands for
a) Date Manipulation Language
b) Database Manipulation Language
c) Data Manuscript Language
d) Data Manipulation Language
10. ____Is the language that enable user to access or manipulate data as organized by appropriate data model
a) DML
b) SDL
c) DDL
d) All of the above
11. ____Is the language to specify the internal schema. (This language may specify the mapping between two schemas)
a) DML
b) SDL
c) DDL
d) None of the above
12. All candidate keys excluding the primary key are known as
a) Compound key
b) Partial key
c) Alternative key
d) None of the above
13. The user commands that are used to interact with a database is called as
a) Query
b) Interaction
c) Command
d) Instruction
14. The updates that are applied to database before it becomes effective in real world
a) Retroactive update
b) Proactive update
c) Simultaneous update
d) All of the above
15. The updates that are applied to database after it becomes effective in real world
a) Retroactive update
b) Proactive update
c) Simultaneous update
d) All of the above
16. The updates that are applied to database at the same time when it becomes effective in real world?
a) Retroactive update
b) Proactive update
c) Simultaneous update
d) All of the above
17. Match the following (select the test by using the key board)
a) A word from its beginning to its end
b) A paragraph from its begging to its end
c) The entire document
1. CTRL+ DOWN ARROW
2. CTRL+LEFT ARROW
3.CTRL+SHIFT+RIGHTARROW
a) a-3,b-1,c-2
b) a-3,b-2,c-3
c) a-3,b-2,c-1
d) a-2,b-3,c-1
18. Match the following (Move through your document)
a) One character to the left
b) One character to the right
c) One word to the left
d) One word to the right
1. CTRL+RIGHT ARROW
2. CTRL+LEFT ARROW
3. RIGHT ARROW
4. LEFT ARROW
a) a-4,b-3,c-2,d-1
b) a-4,b-2,c-3,d-1
c) a-1,b-3,c-4,d-2
d) a-2,b-1,c-3,d-4
19. Match the following (To move)
a) One paragraph down
b) To the beginning of a document
c) To the end of a document
d) Up one screen at a line
e) Down one screen at a time
1. CTRL+END
2. PAGE DOWN
3. CTRL+HOME
4. CTRL+DOWN ARROW
5. PAGE UP
a) a-5,b-3,c-1,d-4,e-2
b) a-4,b-3,c-2,d-5,e-1
c) a-3,b-4,c-1,d-5,e-2
d) a-4,b-3,c-1,d-5,e-2
20. In a word document Red underline indicates
a) Possible spelling error/word doesn't recognize a word
b) Word thinks that grammar should be revised
c) A word is spelled correctly, but does not seem to be the correct word sentence
d) All of the above
21. In a word document Green underline indicates
a) Possible spelling error/word doesn't recognize a word
b) Word thinks that grammar should be revised
c) A word is spelled correctly, but does not seem to be the correct word sentence
d) All of the above
22. In a word document Blue underline indicates?
a) Possible spelling error/word doesn't recognize a word
b) Word thinks that grammar should be revised
c) A word is spelled correctly, but does not seem to be the correct word sentence
d) All of the above
23. By default the Microsoft word document will be saved into a folder called
a) Desktop
b) My documents
c) D drive
d) Personal folder
24. What is the default file name for the word document?
a) Taken from the text at the start of the document
b) Word document
c) Both (a) and (b)
d) None of the above
25. In word-2010____is the key to see numbers and letters displayed over icons, tabs or commands towards the top of your screen?
a) Ctrl key
b) Tab key
c) Alt key
d) None of the above
26. ____ Is the keyboard shortcut key to close the word program
a) Alt+F4
b) Alt+F5
c) Alt+F6
d) Alt+F7
27. How will you remove all formatting added to your documents (such as bold, italics, and underline etc.)
a) Save
b) Save as plain text file
c) Save as
d) All of the above
28. _____Is the file format we can use to distribute the document to some one using totally different word processing program from a different software manufacturer, such as word perfect
a) Word document (.doc)
b) Rich Text Format (.RTF)
c) Both (a) and (b)
d) None of the above
29. _____Is the Icon to magnify or reduce the display
a) Print layout
b) Zoom
c) View
d) All of the above
30. Match the following
a) Cut 1. CTRL+C
b) Copy 2. CTRL+V
c) Paste 3. CTRL+X
a) a-1, b-3, c-2
b) a-2, b-1, c-3
c) a-3, b-1, c-2
d) a-3, b-2, c-1
31. What is text formatting?
a) Formatting characters and words with in a document
b) Saving the word document
c) Both (a) and (b)
d) None of the above
32. By default MS-Word 2010 uses a font called
a) Arial
b) Times New roman
c) Tahoma
d) Caliber
33. Superscript refers to____
a) Characters displayed below the line of the normal text
b) Characters displayed above the line of the normal text
c) Both (a) and (b)
d) None
34. Subscript refers to ___
a) Characters displayed below the line of the normal text
b) Characters displayed above the line of the normal text
c) Both (a) and (b)
d) None
35. (a+b)2 is an example for ----
a) Subscript
b) Superscript
c) Both (a) and (b)
d) None
36. CO2 is an example for ---
a) Subscript
b) Superscript
c) Both (a) and (b)
d) None
37. You need to find a particular word or phrase and replace this item with alternative text, what is the keyboard shortcut key
a) Ctrl+G
b) Ctrl+P
c) Ctrl+H
d) Ctrl+F
38. _____Is the path to create Header/Footer
a) Insert/Header & Footer
b) File/Header & Footer
c) Edit/Header & Footer
d) None of the above
39. __ Is the path to create footnotes
a) References/footnote
b) Insert/footnote
c) Edit/footnote
d) None
40. _____ Is the path to save a document in PDF format
a) Edit/Save as/PDF/Save
b) File/Save as/PDF/Save
c) Both (a) and (b)
d) None of the above
ANSWERS:
1) a 2) b 3) c 4) a 5) b 6) c 7) a 8) a 9) d 10) a 11) b 12) c 13) a 14) b 15) a 16) c 17) a 18) a 19) d 20) a 21) b 22) c 23) b 24) a 25) c 26) a 27) b 28) b 29) b 30) c 31) a 32) d 33) b 34) a 35) b 36) a 37) c 38) a 39) a 40) b
Sunday, 25 September 2011
IBPS CLERKS COMPUTER KNOWLEDGE MCQs
1. Assembly language is–
1. Low-level programming language
2. High level programming language
3. Machine language
4. All of the above
5. None of these
2. In Assembly language–
1. Mnemonics are used to code operations
2. Alphanumeric symbols are used for addresses
3. Language lies between high-level language and machine
4. All of the above
5. None of these
3. The following computer ’s memory is characterized by low cost per bit stored–
1. Primary
2. Secondary
3. Hard disk
4. All of the above
5. None of these
4. The following is true for Auxiliary Storage–
1. It has an operating speed far slower than that of the primary storage.
2. It has an operating speed faster than that of the primary storage.
3. It has an operating speed equivalent than that of the primary storage.
4. All of the above
5. None of these
5. Following is true for Bandwidth–
1. The narrow the bandwidth of a communications system the less data it can transmit in a given period of time.
2. The narrow then bandwidth of a communications system the more data it can transmit in a given period of time.
3. The wider the bandwidth of a communications system the less data it can transmit in a given period of time.
4. All of the above
5. None is true
6. Acknowledgement from a computer that a packet of data has been received and verified is known as–
1. ACK
2. BCK
3. ECK
4. All of the above
5. None of these
7. The following is a communications device (modem) which allows an ordinary telephone to be used with a computer device for data transmission–
1. Keyboard
2. Acoustic coupler
3. Mobile phone
4. All of the above
5. None of these
8. ALGOL is the
1. High-level language
2. Low level language
3. Machine language 4. All of the above
5. None of these
9. A high level programming language named after Ada Augusta, coworker with Charles Babbage–
1. Augustan
2. Babbage
3. Ada 4. Charlie
5. All of the above
10. Following is a logic circuit capable of forming the sum of two or more quantities–
1. Adder
2. Multiplier
3. Address
4. Access
5. None of these
11. To identification particular location in storage area one have a–
1. Address
2. Password
3. Logic
4. Mouse
5. None of these
12. A local storage register in the CPU which contains the address of the next instruction to be executed is referred as–
1. Key register
2. Address register
3. Password
4. All of the above
5. None of these
13. A sequence of precise and unambiguous instructions for solving a problem in a finite number of operations is referred as–
1. Address
2. Algorithm
3. Advice
4. All of the above
5. None of these
14. A character set that contains letters, digits, and other special characters such as $, @, +„ % etc. is referred as–
1. Numeric
2. Alphanumeric
3. Alphabetic
4. All of the above
5. None of these
15. One of the components of central Processing Unit (CPU) of the computer that performs mathematical and logical operations is–
1. ALU (Arithmetic Logic Unit)
2. Address register
3. Analog
4. All of the above
5. None of these
16. A standard intended to connect relatively lowspeed devices such as keyboards, mouse, modems and printers is–
1. Access bus
2. Access time
3. Connector
4. All of the above
5. None of these
17. The concept that one can disconnect peripherals and plug them in without letting computer shut down or reconfigure the system is referred as–
1. Hot plugging
2. Cold plugging
3. Access bus
4. All of the above
5. None of these
18. The time interval between the instant at which data is called from a storage device and the rust delivery begins in–
1. Access time
2. Delivery time
3. Service time
4. All of the above
5. None of these
19. The automatic execution of lower-priority (background) computer programs when higherpriority (foreground) programs are not using the system resources is referred as–
1. Background processing
2. Foreground processing
3. Null processing
4. All of the above
5. None of these
20. A form of access to a computer or network with specified user name and password is referred as–
1. Account
2. Address
3. Algorithm
4. All of the above
5. None of these
21. A local storage area also called a register, in which the result of an arithmetic or logic operation is formed, is–
1. Accumulator
2. Address
3. Algorithm
4. All of the above
5. None of these
22. Computer that operates on data which is in the form of continuously variable physical quantities–
1. Digital computer
2. Analog computer
3. Mechanical computer
4. All of the above
5. None of these
23. Anonymous FTP is the–
1. Internet file transfer protocol
2. Protocol that requires password
3. None access files
4. None of these
24. EFF sites allows anonymous FTP that–
1. Do not require a password or access
2. Requires password or access
3. Is a none access file
4. All of the above
5. None of these
25. ANSI is–
1. American National Standards Institute
2. A USA based national organization that establishes uniform standards in several fields of computers.
3. 1. and 2. both are true
4. All of the above
5. None is true
26. APL is–
1. A high level language for specifying complex algorithms.
2. A real-time language primarily for scientific applications.
3. Only 1. is true
4. Both 1. and 2. are true
5. None of these
27. The overall design, construction, organization and interconnecting of the various components
of a computer system is referred as–
1. Computer Architecture
2. Computer Flow chart
3. Computer Algorithm
4. All of the above
5. None of these
28. Asynchronous communication is–
1. Communication between indepen-dently operating units
2. Communication between dependent operating units
3. Communication between independent and dependent operating units
4. All of the above
5. None of these
29. Audio response is–
1. Output medium
2. Produces verbal responses from the computer system
3. Both 1. and 2. are true
4. Only A is true
5. None is true
30. Automated Office refers to the merger of ............... in an office environment.
1. Computers
2. Office
3. Telecommunications
4. All of the above
5. None is true
31. Auxiliary storage is
1. Secondary storage
2. Primary storage
3. Processing device
4. All of the above
5. None of these
32. Archive is–
1. Backup storage
2. Forward operation
3. Primary storage
4. All of the above
5. None of these
33. A branch of computer science that deals with computers that possess reasoning, learning and
thinking capabilities that resemble those of human beings is recognized as–
1. Software engineering
2. Artificial intelligence
3. Hardware engineering
4. All of the above
5. None of these
34. ASCII is–
1. A standard coding system for computers
2. Hardware device
3. Software
4. All of the above
5. None of these
35. Following is true for Bandwidth–
1. The wider the bandwidth of a communication system the more data it can transmit in a given period of time.
2. The narrow the bandwidth of a communication system the more data it can transmit in a given period of time.
3. The wider the bandwidth of a communication system the less data it can transmit in a given period of time.
4. All of the above
5. None is true
36. ASCII-8 is–
1. An extended version of ASCII-7
2. Is a 8-bit code
3. Both 1. and 2. are true
4. Both 1. and 2. are false
5. None of these
37. ASCII File is–
1. Document file in the universally recognized text format
2. Word processor
3. System file
4. All of the above
5. None of these
38. A program that translates mnemonic statements into executable instructions is referred as–
1. Software
2. Assembler
3. Translator
4. All of the above
5. None of these
39. An assembler is–
1. Translator
2. Hardware
3. Assembly language
4. All of the above
5. None of these
40. Following is not true for Backup files–
1. These are the files which are generated automatically in when one save a document.
2. These files help in protecting the document due to out of order of the computer or power failure
3. These files delete as soon computer is off
4. All of the above
5. None of these
41. An algebra that deals with logical propositions which are either true or false is referred as–
1. Boolean algebra
2. Modern Algebra
3. Abstract Algebra
4. All of the above
5. None of these
42. Bandwidth is–
1. The range of frequencies available for data transmission
2. Data transmission rate
3. Alternate for rubber band
4. All of the above
5. None is true
43. A coding structure in which characters are represented by means of a series of parallel bars is–
1. Bar code
2. Menu bar
3. Numeric bar
4. All of the above
5. None of these
44. In Broadband system or a network system
1. Several analog signals share the same physical network channel
2. Only digital signals share the same physical network channel
3. Single analog signals share the same physical network channel
4. All of the above
5. None of these
45. Bit stands for–
1. Binary digit
2. One binary piece of information
3. Both 1. and 2. are true
4. All of the above
5. None is true
46. Broadband channel is the–
1. The fastest carriers where data transfer rates is of 1 million baud (bits/second) or more.
2. The slower carriers where data transfer rates
is of 56k baud
3. Musical channel
4. All of the above
5. None of these
47. BLOB is–
1. Binary Large Object
2. A long bit string representing complex data
3. Object oriented language
4. Only 1. and 2. are true
5. None of these
48. A group of related items/section of program oding treated as a unit is referred as–
1. Block
2. Duplex
3. Street
4. All of the above
5. None of these
49. An operation in which data is moved to a different location is referred as–
1. Block move
2. Street move
3. Delete
4. All of the above
5. None of these
50. The following is responsible for number of logical records in a physical record–
1. Blocking factor
2. Block
3. Boolean algebra
4. All of the above
5. None of these
ANSWERS:
1. (1) 2. (4) 3. (2) 4. (1) 5. (1) 6. (1) 7. (2) 8. (1) 9. (3) 10. (1)11. (1) 12. (2) 13. (2) 14. (2) 15. (1) 16. (1) 17. (1) 18. (1) 19. (1) 20. (1)
21. (1) 22. (2) 23. (1) 24. (1) 25. (3) 26. (4) 27. (1) 28. (1) 29. (3) 30. (4)
31. (1) 32. (1) 33. (2) 34. (1) 35. (1) 36. (1) 37. (1) 38. (2) 39. (1) 40. (3)
41. (1) 42. (1) 43. (1) 44. (1) 45. (3) 46. (1) 47. (4) 48. (1) 49. (1) 50. (1)
Saturday, 24 September 2011
IBPS CLERKS EXAM PRACTICE MCQs
1. Buffer is device/storage area–
1. Where data are temporarily stored
2. Where data is permanently stored
3. Where data error occurs
4. All of the above 5. None of these
2. A network geometric arrangement in which a single connecting line is shared by a number of nodes is called–
1. Car Topology
2. Bus Topology
3. Truck Topology
4. All of the above
5. None of these
3. An error in a computer program is referred as–
1. Bug
2. Bit
3. Virus
4. All of the above
5. None of these
4. Circuits that provide a communication path between two or more devices of a digital computer system is–
1. Car
2. Bus
3. Truck
4. All of the above
5. None of these
5. A fixed number of adjacent bits that represent a particular character or symbol are referred as–
1. Byte
2. Octal
3. Bubble
4. All of the above
5. None of these
6. Cache memory is a–
1. Small buffer storage
2. Permanent storage
3. Main memory
4. All of the above
5. None of these
7. The total number of digits (symbols) available to represent numbers in a positional number system is referred as–
1. Number system
2. Base
3. Power
4. All of the above
5. None of these
8. Cache memory is–
1. Smaller and faster than main storage
2. Bigger and slower than main storage
3. Smaller but slower than main memory
4. Bigger and faster than main memory
5. None of these
9. Cache memory–
1. Is a Static RAM
2. Increases the speed of processing by making current programs and data available to the CPU at a rapid rate
3. Both 1. and 2. are true .
4. Both 1. and 2. are false
5. None of these
10. Following is false for BASIC–
1. Beginners All-Purpose Symbolic Instruction Code
2. High-level interactive programming language
3. Works in time sharing environment
4. Low level object oriented language
5. None of these
11. A unit for measuring data transmission speed that describes the capacity of a carrier is referred as–
1. Baud
2. Bit
3. Bond
4. All of the above
5. Batch
12. A process of trying out a new product by independent users before it is finally manufactured/developed–
1. Alpha test
2. Beta Test
3. Gamma test
4. All of the above
5. None of these
13. A selection, choice, or condition involving two possibilities is referred as–
1. Unary
2. Binary
3. Octal
4. All of the above
5. None of these
14. Base band System is–
1. A networking system
2. Where the channel support a single digital signal
3. Both 1. and 2. are true
4. All of the above
5. None is true
15. One of the early coding systems, based on the idea of converting each digit of a decimal number into its binary equivalent rather than converting the entire decimal value into a pure binary form is–
1. ASCII code
2. BCD
3. ASCII-8
4. All of the above
5. None of these
16. In Batch processing–
1. Several computer programs runs one after another without human interaction to run each program individually
2. Several computer programs runs one after another with human interaction to run each program individually
3. Selected computer programs runs one after another with human interaction to run each program individually
4. All of the above
5. None is true
17. BISYNC is–
1. Binary synchronous
2. A process of transmitting data
3. A half-duplex, character oriented, synchronous data communication transmission method
4. All of the above
5. None of these
18. A device that is used to transmit data from one location to another is referred as–
1. Storage
2. Memory
3. Carrier
4. All of the above
5. None of these
19. Programs developed by an outside supplier and provided to the user in a machine readable form is known as–
1. Canned programs
2. Beta program
3. Alpha program
4. All of the above
5. None of these
20. A binary numbers are represented by–
1. Digits 0 and 1
2. Digits 0, 1, ..., 8
3. Digits AB, C,...
4. All of the above
5. None of these
21. BIOS is responsible for
1. Handling the particulars of input/output operations
2. Output operations
3. Input operations
4. All of the above
5. None of these
22. BIOS is an abbreviation for–
1. Binary Input/Binary Output
2. Binary synchronous
3. Binary digit
4. All of the above
5. None of these
23. BISYNC is an abbreviation for–
1. Binary Input/Binary Output
2. Binary synchronous
3. Binary digit
4. All of the above
5. None of these
24. The overall design, construction, organiz-ation and interconnecting of the various components of a computer system is referred as–
1. Computer Architecture
2. Computer Flowchart
3. Computer Algorithm
4. All of the above
5. None of these
25. A number system with a base of two is referred as–
1. Unary number system
2. Binary number system
3. Octal number system
4. All of the above
5. None of these
1. Where data are temporarily stored
2. Where data is permanently stored
3. Where data error occurs
4. All of the above 5. None of these
2. A network geometric arrangement in which a single connecting line is shared by a number of nodes is called–
1. Car Topology
2. Bus Topology
3. Truck Topology
4. All of the above
5. None of these
3. An error in a computer program is referred as–
1. Bug
2. Bit
3. Virus
4. All of the above
5. None of these
4. Circuits that provide a communication path between two or more devices of a digital computer system is–
1. Car
2. Bus
3. Truck
4. All of the above
5. None of these
5. A fixed number of adjacent bits that represent a particular character or symbol are referred as–
1. Byte
2. Octal
3. Bubble
4. All of the above
5. None of these
6. Cache memory is a–
1. Small buffer storage
2. Permanent storage
3. Main memory
4. All of the above
5. None of these
7. The total number of digits (symbols) available to represent numbers in a positional number system is referred as–
1. Number system
2. Base
3. Power
4. All of the above
5. None of these
8. Cache memory is–
1. Smaller and faster than main storage
2. Bigger and slower than main storage
3. Smaller but slower than main memory
4. Bigger and faster than main memory
5. None of these
9. Cache memory–
1. Is a Static RAM
2. Increases the speed of processing by making current programs and data available to the CPU at a rapid rate
3. Both 1. and 2. are true .
4. Both 1. and 2. are false
5. None of these
10. Following is false for BASIC–
1. Beginners All-Purpose Symbolic Instruction Code
2. High-level interactive programming language
3. Works in time sharing environment
4. Low level object oriented language
5. None of these
11. A unit for measuring data transmission speed that describes the capacity of a carrier is referred as–
1. Baud
2. Bit
3. Bond
4. All of the above
5. Batch
12. A process of trying out a new product by independent users before it is finally manufactured/developed–
1. Alpha test
2. Beta Test
3. Gamma test
4. All of the above
5. None of these
13. A selection, choice, or condition involving two possibilities is referred as–
1. Unary
2. Binary
3. Octal
4. All of the above
5. None of these
14. Base band System is–
1. A networking system
2. Where the channel support a single digital signal
3. Both 1. and 2. are true
4. All of the above
5. None is true
15. One of the early coding systems, based on the idea of converting each digit of a decimal number into its binary equivalent rather than converting the entire decimal value into a pure binary form is–
1. ASCII code
2. BCD
3. ASCII-8
4. All of the above
5. None of these
16. In Batch processing–
1. Several computer programs runs one after another without human interaction to run each program individually
2. Several computer programs runs one after another with human interaction to run each program individually
3. Selected computer programs runs one after another with human interaction to run each program individually
4. All of the above
5. None is true
17. BISYNC is–
1. Binary synchronous
2. A process of transmitting data
3. A half-duplex, character oriented, synchronous data communication transmission method
4. All of the above
5. None of these
18. A device that is used to transmit data from one location to another is referred as–
1. Storage
2. Memory
3. Carrier
4. All of the above
5. None of these
19. Programs developed by an outside supplier and provided to the user in a machine readable form is known as–
1. Canned programs
2. Beta program
3. Alpha program
4. All of the above
5. None of these
20. A binary numbers are represented by–
1. Digits 0 and 1
2. Digits 0, 1, ..., 8
3. Digits AB, C,...
4. All of the above
5. None of these
21. BIOS is responsible for
1. Handling the particulars of input/output operations
2. Output operations
3. Input operations
4. All of the above
5. None of these
22. BIOS is an abbreviation for–
1. Binary Input/Binary Output
2. Binary synchronous
3. Binary digit
4. All of the above
5. None of these
23. BISYNC is an abbreviation for–
1. Binary Input/Binary Output
2. Binary synchronous
3. Binary digit
4. All of the above
5. None of these
24. The overall design, construction, organiz-ation and interconnecting of the various components of a computer system is referred as–
1. Computer Architecture
2. Computer Flowchart
3. Computer Algorithm
4. All of the above
5. None of these
25. A number system with a base of two is referred as–
1. Unary number system
2. Binary number system
3. Octal number system
4. All of the above
5. None of these
Answers:
1. (1) 2. (2) 3. (1) 4. (2) 5. (1) 6. (1) 7. (2) 8. (1) 9. (3) 10. (4) 11. (1) 12. (2) 13. (2) 14. (3) 15. (2) 16. (1) 17. (4) 18. (3) 19. (1) 20. (1) 21. (1) 22. (1) 23. (1) 24. (1) 25. (2)
Tuesday, 20 September 2011
IBPS CLERKS EXAM PRACTICE QUESTIONS
1. Which of the following statements is FALSE concerning file names?
(a) Files may share the same name or same extension but not both
(b) Every file in the same folder must have a unique name
(c) File extension is another name for file type
(d) The file extension comes before the dot (.) followed by the file name
(e) None of the above
ANSWER: (d)
2. Which of the following would most likely NOT be a symptom of a virus ?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) The Web browser opens to an unusual home page
(d) Odd messages or images are displayed on the screen
(e) None of the above
ANSWER: (b)
3. Main memory is
(a) Random Access Memory
(b) Read only Memory
(c) Serial Access Memory
(d) Storage Memory
(e) None of the above
ANSWER: (a)
4. A compact disc (CD) is a data storage of the type
(a) Magnetic
(b) Optical
(c) Electrical
(d) Electromechanical
(e) None of these
ANSWER: (a)
5. What are the two basic types of memory that your computer uses ?
(a) RAM
(b) RW/ RAM
(C) ROM
(d) ERAM
(e) POST
ANSWER: (a)
6. A computer with CPU speed around 100 million Instructions per second with the word length of
Around 64 bits is known as
(a) Super computer
(b) Mini computer
(c) Micro computer
(d) Macro computer
(e) None of these
ANSWER: (a)
7. To locate a data items for storage is
(a) Field
(b) Feed
(c) Database
(d) Fetch
(e) None of these
ANSWER: (d)
8. A type of line printer that uses embossed steel band to form the letters printed on the paper is
(a) Golf ball printer
(b) Dot-matrix printer
(c) Laser printer
(d) Band printer
(e) None of these
ANSWER: (d)
9. The chip, used in computers, is made of
(a) Chromium
(b) Iron oxide
(c) Silica
(d) Silicon
(e) None of these
ANSWER: (d)
10. The size of commonly used Floppy disk is
(a) 4.5"
(b) 3.5"
(c) 3.25"
(d) 5.5"
(e) None of these
ANSWER: (b)
11. Operating system of a computer
(a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references
(c) Provides a layer, user friendly interface
(d) Hardware of computer
(e) None of the above
ANSWER: (c)
12. Wild card operators specifies
(a) Can be used when writing into multiple files
(b) Allows several files to be read simultaneously
(c) Provide an easy way of groups of related files
(d) Are only used when printing the contents of a file
(e) None of the above
ANSWER: (c)
13. Most Websites have a main page, the ...... which acts as a doorway to the rest of the Web side
pages.
(a) Search engine
(b) Home page
(C) Browser
(d) URL
(e) None of these
ANSWER: (b)
14. Which of the following is not true about Computer files?
(a) They are collections of data saved to a storage medium
(b) Every file has a file name
(c) A file extension is established by the user to indicate the file's contents
(d) Files usually contain data
(e) None of the above
ANSWER: (c)
15. What type of computer could be found in a digital watch?
(a) Mainframe computer
(b) Super computer
(c) Embedded computer
(d) Note book computer
(e) Micro computer
ANSWER: (e)
16. This process is used by large retailers to study trends.
(a) Data mining
(b) Data selection
(C) POS
(d) Data conversion
(e) None of the above
ANSWER: (a)
17. This system is a small, wireless handheld computer that scans an items tag and pulls up the
current price (and any special offers) as you shop.
(a) PSS
(b) POS
(C) Inventory
(d) Data mining
(e) None of these
ANSWER: (a)
18. Which of the following is NOT one of the four major data processing functions of a computer ?
(a) Gathering data
(b) Processing data into information
(c) Analyzing the data or information
(d) Storing the data or information
(e) None of the above
ANSWER: (c)
19. Surgeons can perform delicate operations by manipulating devices through computers instead
of manually. This technology is known as
(a) Robotics
(b) Computer forensics
(C) Simulation
(d) Forecasting
(e) None of these
ANSWER: (a)
20. It is the study of molecules and structures whose size ranges from 1 to 100 Nano metres
(a) Nano science
(b) Microelectrodes
(C) Computer forensics
(d) Artificial intelligence
(e) None of the above
ANSWER: (a)
(a) Files may share the same name or same extension but not both
(b) Every file in the same folder must have a unique name
(c) File extension is another name for file type
(d) The file extension comes before the dot (.) followed by the file name
(e) None of the above
ANSWER: (d)
2. Which of the following would most likely NOT be a symptom of a virus ?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) The Web browser opens to an unusual home page
(d) Odd messages or images are displayed on the screen
(e) None of the above
ANSWER: (b)
3. Main memory is
(a) Random Access Memory
(b) Read only Memory
(c) Serial Access Memory
(d) Storage Memory
(e) None of the above
ANSWER: (a)
4. A compact disc (CD) is a data storage of the type
(a) Magnetic
(b) Optical
(c) Electrical
(d) Electromechanical
(e) None of these
ANSWER: (a)
5. What are the two basic types of memory that your computer uses ?
(a) RAM
(b) RW/ RAM
(C) ROM
(d) ERAM
(e) POST
ANSWER: (a)
6. A computer with CPU speed around 100 million Instructions per second with the word length of
Around 64 bits is known as
(a) Super computer
(b) Mini computer
(c) Micro computer
(d) Macro computer
(e) None of these
ANSWER: (a)
7. To locate a data items for storage is
(a) Field
(b) Feed
(c) Database
(d) Fetch
(e) None of these
ANSWER: (d)
8. A type of line printer that uses embossed steel band to form the letters printed on the paper is
(a) Golf ball printer
(b) Dot-matrix printer
(c) Laser printer
(d) Band printer
(e) None of these
ANSWER: (d)
9. The chip, used in computers, is made of
(a) Chromium
(b) Iron oxide
(c) Silica
(d) Silicon
(e) None of these
ANSWER: (d)
10. The size of commonly used Floppy disk is
(a) 4.5"
(b) 3.5"
(c) 3.25"
(d) 5.5"
(e) None of these
ANSWER: (b)
11. Operating system of a computer
(a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references
(c) Provides a layer, user friendly interface
(d) Hardware of computer
(e) None of the above
ANSWER: (c)
12. Wild card operators specifies
(a) Can be used when writing into multiple files
(b) Allows several files to be read simultaneously
(c) Provide an easy way of groups of related files
(d) Are only used when printing the contents of a file
(e) None of the above
ANSWER: (c)
13. Most Websites have a main page, the ...... which acts as a doorway to the rest of the Web side
pages.
(a) Search engine
(b) Home page
(C) Browser
(d) URL
(e) None of these
ANSWER: (b)
14. Which of the following is not true about Computer files?
(a) They are collections of data saved to a storage medium
(b) Every file has a file name
(c) A file extension is established by the user to indicate the file's contents
(d) Files usually contain data
(e) None of the above
ANSWER: (c)
15. What type of computer could be found in a digital watch?
(a) Mainframe computer
(b) Super computer
(c) Embedded computer
(d) Note book computer
(e) Micro computer
ANSWER: (e)
16. This process is used by large retailers to study trends.
(a) Data mining
(b) Data selection
(C) POS
(d) Data conversion
(e) None of the above
ANSWER: (a)
17. This system is a small, wireless handheld computer that scans an items tag and pulls up the
current price (and any special offers) as you shop.
(a) PSS
(b) POS
(C) Inventory
(d) Data mining
(e) None of these
ANSWER: (a)
18. Which of the following is NOT one of the four major data processing functions of a computer ?
(a) Gathering data
(b) Processing data into information
(c) Analyzing the data or information
(d) Storing the data or information
(e) None of the above
ANSWER: (c)
19. Surgeons can perform delicate operations by manipulating devices through computers instead
of manually. This technology is known as
(a) Robotics
(b) Computer forensics
(C) Simulation
(d) Forecasting
(e) None of these
ANSWER: (a)
20. It is the study of molecules and structures whose size ranges from 1 to 100 Nano metres
(a) Nano science
(b) Microelectrodes
(C) Computer forensics
(d) Artificial intelligence
(e) None of the above
ANSWER: (a)
Monday, 19 September 2011
IBPS CLERKS EXAM PRACTICE QUESTIONS
1. _____Is a program which reproduces itself?
a) Virus
b) Software
c) a and b
d) None
2. ____Viruses that aim at the boot sector of a hard drive are infect-ing a very crucial component of the boot process?
a) File infection virus
b) Boot virus
c) Network virus
d) E-mail virus
3. _____Is the virus that they will attach themselves to EXE files, compressed files like ZIP files and driver files?
a) File infector virus
b) Boot virus
c) Network virus
d) E-mail virus
4. _____Is the virus, which is uniquely created to quickly spread throughout the local area network?
a) File infector virus
b)Boot virus
c) Network virus
d) E-mail virus
5. Which of the following are the main purposes of an operating system?
a) To provide an environment for a computer user to execute programs on a computer hardware in a convenient and efficient manner
b) To allocate separate resources of the computer as needed to solve the problem given
c) Supervision of the executions of user programs to prevent errors and improper use of computer d) All of the above
6. Define acronym 'spooling'?
a) Simultaneous Peripheral Operation On-line
b) Simultaneous Peripheral Operation Off-line
c) Simultaneous Peripheral Organization On-line
d) System Peripheral Operation On-line
7. Several programs are in a memory concurrently; the syste-m switches among the programs for efficient processing and minimal idle time is called____?
a) Multi tasking
b) Multi programming
c) Multi functioning
d) None of the above
8. ____ Is the using scheduling and multiprogramming to provide an economical interactive system of two or more users?
a) Time sharing
b)Time changing
c) Processing
d) None
9. ____Is a system with two or more central processing units?
a) No definition
b) Multi processor
c) Double processor
d) None
10. ____ Is the system where fast response is desirable, but not required?
a) Real time systems
b) Time sharing systems
c) a and b
d) None
11. ____Is the system where processing must be completed with in certain time constraints appropriate for the system?
a) Real time systems
b) Time sharing systems
c) a and b
d) None
12. ____Is the smallest block that can be read or written on a disk?
a) Sector
b) Track
c) Disk
d) None of the above
13. ____Is the collection of sectors all as same circumference on a single surface?
a) Track
b) Sector
c) Disk
d) None of the above
14. ____Is the time interval when a process uses Central Processing Unit only?
a) CPU burst
b) I/O burst
c) (a)And(b)
d) Either (a)or(b)
15. ____Is the time interval when a process uses I/O devices only?
a) CPU burst
b) I/O burst
c) (a)And(b)
d) Either (a)or(b)
16. ____Is simply consists of one or more attributes that determine other attributes?
a) Lock
b) Database
c) Key
d) None of the above
17. Be unique is the characteristic of the ____key?
a) Primary
b) Secondary
c) Foreign
d) Candidate
18. A unique key can uniquely identify each ____ in a table?
a) Field
b) Row
c) File
d) Database
19. ____Is a database that treats all of its data as a collection of relations?
a) Relational database
b) Rational database
c) a and b
d) None
20. ____Is the precise set of instructions that describes how to perform a specific tasks?
a) Algorithm
b) Graph
c) Pie chart
d) None of the above
21. Which of the following is a programming language?
a) MS-Word
b) C++
c) Access
d) Power point
22. ____Is the process of writing the programs is commonly called?
a) Software
b) Coding
c) Debugging
d) None
23. ____Is the special program that converts programming language instructions into machine level instructions?
a) Modem
b) Central Processing Unit
c) Compiler
d)None of the above
24. After the program has been complied, the resulting set of instructions is called?
a) Final result
b) Information
c) Executable code
d) Source code
25. Which of the following is presen-tation application software?
a) MS-Power point
b) MS-Word
c) MS-Excel
d) MS-Access
26. ____Is a specific combination of a microprocessor family and an operating system?
a) Platform
b) Operating system
c) Central Processing Unit
d) None of the above
27. ____Platform comprises a windows operating system and an intel or intel compatible microprocessor?
a) Wintel
b) Macintosh
c) Normal platform
d) Java platform
28. Application software is?
a) System specific
b) User specific
c) Platform specific
d) None
29. An operating system runs multiple applications simultan-eously known as?
a) Multi tasking
b) Multi programming
c) Programming
d) None of the above
30. Which of the following language use interpreter?
a) C++
b) COBOL
c) BASIC
d) All of the above
31. ____Is a database program that stores information that can be manipulated, stored and filtered to meet your specific needs?
a) Access
b) Power point
c) Excel
d) None of the above
32. ____Creates multimedia presen-tations to display information in a graphical format?
a) Access
b) Power point
c) Excel
d) None of the above
33. ____Allows you develop spreadsheets that display data in various tabular and visual formats?
a) Access b) Power point
c) Excel
d) None of the above
34. FORTRAN is?
a) Formula translation
b) Formula generation
c) Format generation
d) Format translation
35. EEPROM stands for?
a) Electrically Erasable Program-mable Read Only Memory
b) Electrically Erasable Program-mable Run Only Memory
c) Electrically Efficiently Progr-ammed Read Only Memory
d) Efficiently Erasable Program-mable Read Only Memory
36. ____Generation computers are very big in size with less memory
a) Third Generation?
b) Fourth Generation
c) First Generation
d) Fifth Generation
37. EBCDIC stands for?
a) Extended Binary Cut Decimal Interchange Code
b) Extended Binary Coded Dedicated Interchange Code
c) Extended Binary Coded Decimal Inner Code
d) Extended Binary Coded Decimal Interchange Code
38. Computer can do every thing except?
a) Processing
b) Storing
c) Analyzing
d) Own decisions
39. ____Is a data model in which the data is organized into a tree like structure?
a) Hierarchical database model
b) Sequential model
c) Dimensional model
d) None
40. SQL stands for?
a) Structured Quest Language
b) System Query Language
c) Structured Query Language
d) Standard Query Language
Answers:
1) a 2) b 3) a 4) c 5) d 6) a 7) b 8) a 9) b 10) b 11) a 12) a 13) a 14) a 15) b
16) c 17) a 18) b 19) a 20) a 21) b 22) b 23) c 24) c 25) a 26) a 27) a 28) c 29) a 30) c
31) a 32) b 33) c 34) a 35) a 36) c 37) d 38) d 39) a 40) c
Sunday, 18 September 2011
Allahabad Bank Probationary Officers Exam 2011 Solved Paper
COMPUTER AWARENESS
(Exam Held On: 17-04-2011)1. Microsoft word is a ____________.
a) Closed Source Software
b) Open Source Software
c) Horizontal Market Software
d) Vertical Market Software
e) None of these
2. Which of the following keyboard shortcut is used for selecting/highlighting the url address in the
text-box of a web browser’s address bar?
a) Ctrl + A
b) Ctrl + S
c) Alt + D
d) Ctrl + Alt + S
e) None of these
3. Which of the following computer softwares is best example of freeware programs?
a) Firewall / Antivirus
b) Instant messaging / Google Toolbar
c) Ms-Office / Internet explorer
d) Adobe Photoshop / Coreldraw
e) None of these
4. A ____________is a set of rules.
a) Network
b) Link
c) URL
d) Blog
e) Protocol
5. A __________is the result/match returned by a search engine when a user search a topic with in a
search criteria.
a) Link
b) URL
c) View
d) Hit
e) Success
6. Each computer have a/an ___________, and some ______.
a) Operating System, Application Programs
b) Internet Browser, Document files
c) Hard Disk, Application programs,
d) Operating system, Antivrus Programs
e) None of these
7. UNIX is used as an operating system in:
a) Desktop PC
b) Supercomputers
c) Web Sever
d) All the above
e) None of these
8. The term CPU stands for :
a) Central Protecting Unit
b) Central Processing Unit
c) Chief Processing Unit
d) Client Processing Unit
e) None of these
9. Primary function of a processor is :
a) to carried out instructions in a programs
b) to process data and information
c) to store the result into storage device
d) to manage a network printer
e) None of these
10. On which of the following storage devices data is stored permanently for long time and stored data
read by a beam of laser?
a) Digital Verstaile Disc
b) Hard Disk
c) Floppy Disk
d) Pen drive
e) None of these
11. Which of the following is a secondary storage device to hold large amount of data?
a) DVD
b) CD
c) Hard disk
d) Floppy disk
e) None of these
12. Which among the following devices is a/an image processing input device?
a) Printer
b) Scannar
c) Monitor
d) Keyboard
e) None of these
13.The ____________, also called the brain of the computer, is responsible for processing data.
a) CPU
b) RAM
c) Motherboard
d) Hard disk
e) None of these
14. A computerized system consists of :
a) Hardware, Data, Procedure, Processing, Peoples
b) Hardware, Programs, Data, Processing, Networks
c) Hardware, Programs, Data, Networks, Peoples
d) Hardware, Software, Procedure, Data, Peoples
e) None of these
15. A __________involves a type of e-mail messages designed to steal your sensitive information,
such as passwords and credit card details, with the intentions of stealing your identity.
a) Phishing trip
b) Hacking
c) Spamming
d) Spyware
e) Phishing scam
16. A ________ is a person who breaks into computers and computer networks for profit, as protest,
or sometimes by the motivation of the challenge.
a) Software engineer
b) Progammer
c) Hacker
d) Spammar
e) None of these
17. A(n)_______ is a collection of computers and devices interconnected by communications channels
to share information and resources.
a) Internet
b) Network
c) Server
d) Blog
e) None of these
18. The use of technology to enable people to learn anytime and anywhere is called ________.
a) e-commerce
b) information technolgoy
c) e-learning
d) online business
e) None of these
19. A way of accessing information over the medium of the Internet is
a) WWW
b) Web server
c) Website
d) All the above
e) None of these
20. The external devices that are connected to a computer system are known as:
a) Slots
b) Peripheral
c) Buses
d) Expansion cards
e) None of these
Thursday, 15 September 2011
SBI CLERKS EXAM COMPUTER KNOWLEDGE QUESTIONS
1. A keyboard is this kind of device—
(A) black
(B) input
(C) output
(D) word Processing
(E) None of these
Ans : (B)
2. IT stands for—
(A) information Technology
(B) integrated Technology
(C) intelligent Technology
(D) interesting Technology
(E) None of these
Ans : (A)
3. Which of the following refers to the fastest, biggest and most expensive computers ?
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
Ans : (B)
4. A collection of related information sorted and dealt with as a unit is a—
(A) disk
(B) data
(C) file
(D) floppy
(E) None of these
Ans : (C)
5. The process of a computer receiving information from a server on the Internet is known as—
(A) pulling
(B) pushing
(C) downloading
(D) transferring
(E) None of these
Ans : (C)
6. Which part of the computer helps to store information ?
(A) Disk drive
(B) Keyboard
(C) Monitor
(D) Printer
(E) None of these
Ans : (A)
7. ………………is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)
8. The role of a………generally is to determine a buyer’s needs and match it to the correct hardware and software.
(A) computer Scientist
(B) computer sales representative
(C) computer consultant
(D) corporate trainer
(E) None of these
Ans : (B)
9. Which of the following groups consist of only output devices ?
(A) Scanner, Printer, Monitor
(B) Keyboard, Printer, Monitor
(C) Mouse, Printer, Monitor
(D) Plotter, Printer, Monitor
(E) None of these
Ans : (D)
10. The rectangular area of the screen that displays a program, data, and/or information is a—
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)
11. A(n)………contains commands that can be selected.
(A) pointer
(B) menu
(C) icon
(D) button
(E) None of these
Ans : (B)
12. An error is also known as—
(A) bug
(B) debug
(C) cursor
(D) icon
(E) None of these
Ans : (A)
13. Arithmetic Operations—
(A) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item
(B) sort data items according to standard, predefined criteria in ascending order or descending order
(C) use conditions with operators such as AND, OR and NOT
(D) include addition, subtraction, multiplication and division
(E) None of these
Ans : (D)
14. Sending an e-mail is similar to—
(A) picturing an event
(B) narrating a story
(C) writing a letter
(D) creating a drawing
(E) None of these
Ans : (C)
15. Microsoft Word is an example of—
(A) an operating system
(B) a processing device
(C) application software
(D) an input device
(E) None of these
Ans : (B)
(A) black
(B) input
(C) output
(D) word Processing
(E) None of these
Ans : (B)
2. IT stands for—
(A) information Technology
(B) integrated Technology
(C) intelligent Technology
(D) interesting Technology
(E) None of these
Ans : (A)
3. Which of the following refers to the fastest, biggest and most expensive computers ?
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
Ans : (B)
4. A collection of related information sorted and dealt with as a unit is a—
(A) disk
(B) data
(C) file
(D) floppy
(E) None of these
Ans : (C)
5. The process of a computer receiving information from a server on the Internet is known as—
(A) pulling
(B) pushing
(C) downloading
(D) transferring
(E) None of these
Ans : (C)
6. Which part of the computer helps to store information ?
(A) Disk drive
(B) Keyboard
(C) Monitor
(D) Printer
(E) None of these
Ans : (A)
7. ………………is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)
8. The role of a………generally is to determine a buyer’s needs and match it to the correct hardware and software.
(A) computer Scientist
(B) computer sales representative
(C) computer consultant
(D) corporate trainer
(E) None of these
Ans : (B)
9. Which of the following groups consist of only output devices ?
(A) Scanner, Printer, Monitor
(B) Keyboard, Printer, Monitor
(C) Mouse, Printer, Monitor
(D) Plotter, Printer, Monitor
(E) None of these
Ans : (D)
10. The rectangular area of the screen that displays a program, data, and/or information is a—
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)
11. A(n)………contains commands that can be selected.
(A) pointer
(B) menu
(C) icon
(D) button
(E) None of these
Ans : (B)
12. An error is also known as—
(A) bug
(B) debug
(C) cursor
(D) icon
(E) None of these
Ans : (A)
13. Arithmetic Operations—
(A) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item
(B) sort data items according to standard, predefined criteria in ascending order or descending order
(C) use conditions with operators such as AND, OR and NOT
(D) include addition, subtraction, multiplication and division
(E) None of these
Ans : (D)
14. Sending an e-mail is similar to—
(A) picturing an event
(B) narrating a story
(C) writing a letter
(D) creating a drawing
(E) None of these
Ans : (C)
15. Microsoft Word is an example of—
(A) an operating system
(B) a processing device
(C) application software
(D) an input device
(E) None of these
Ans : (B)
Monday, 12 September 2011
Central Bank of India PO Exam Solved Paper
(Exam Held on 25-07-2010)
1. If a word is typed that is not in Word’s dictionary, a____________wavy underline
appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)
2. The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)
3. In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans : (B)
4. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these
Ans : (C)
5. A ____________represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (C)
6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)
7. The operating system is the most common type of____________software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (C)
8. When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans : (C)
9. The horizontal and vertical lines on a worksheet are called—
(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
Ans : (D)
10. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans : (D)
11. The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing.
Ans : (D)
12. During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
Ans : (B)
13. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
Ans : (C)
14. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
Ans : (A)
15. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Ans : (C)
16. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
Ans : (B)
17. The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.
Ans : (A)
18. MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
Ans : (C)
19. An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device.
(C) utility program.
(D) special numeric code that indicates the priority of a request.
Ans : (D)
20. A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.
Ans : (C)
21. Virtual memory is typically located:
(A) on a floppy disk.
(B) in the CPU.
(C) in a flash card.
(D) on the hard drive.
Ans : (D)
22. The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously.
Ans : (B)
23. The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
Ans : (A)
24. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
Ans : (B)
25. Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C) authentication.
(D) logging in.
Ans : (C)
26. The combination of the operating system and the processor is referred to as the computer’s:
(A) CPU.
(B) platform.
(C) BIOS.
(D) CMOS.
Ans : (B)
27. The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
Ans : (A)
28. Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
Ans : (B)
29. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
Ans : (D)
30. The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor program
Ans : (A)
31. The basic Input/output system (BIOS) is stored in:
(A) RAM.
(B) ROM.
(C) the CPU.
(D) the hard drive.
Ans : (B)
32. Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
(A) configuration
(B) CMOS
(C) POST
(D) ROM
Ans : (C)
33. The memory resident portion of the operating system is called the—
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
Ans : (D)
34. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
Ans : (A)
35. All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
Ans : (A)
36. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:
(A) files.
(B) folders.
(D) drives.
(D) systems.
Ans : (D)
37. All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
Ans : (A)
38. All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
Ans : (C)
39. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
Ans : (B)
40. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon
Ans : (C)
Punjab and Sind Bank Clerk Exam Solved Paper
(Exam Held on 23-5-2010)
1. Memory, also called random access memory, or RAM……….
(A) contains the electronic circuits that cause processing to occur
(B) makes the information resulting from processing available for use
(C) allows data, programs, commands, and user responses to be entered into a computer
(D) consists of electronic components that store data
(E) None of these
Ans : (D)
2. Correcting errors in a program is referred to as………
(A) debugging
(B) bugging
(C) rectifying
(D) modifying
(E) None of these
Ans : (A)
3. An assembler is used to translate a program written in………
(A) a low level language
(B) machine language
(C) a high level language
(D) assembly language
(E) None of these
Ans : (D)
4. The capability of the operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is………
(A) Multiprocessing
(B) Multitasking
(C) Multiprogramming
(D) Multiexecution
(E) None of these
Ans : (B)
5. The basic goal of computer process is to convert data into……
(A) information
(B) tables
(C) files
(D) graphs
(E) None of these
Ans : (A)
6. A hard copy of a document is …
(A) stored in the hard disk
(B) stored on a floppy
(C) stored on a CD
(D) printed on the printer
(E) None of these
Ans : (D)
7. Which of the following is not an output device ?
(A) Plotter
(B) Printer
(C) Scanner
(D) Monitor
(E) None of these
Ans : (C)
8. Which keys can be used together with other keys for special tasks ?
(A) Insert, Delete
(B) Ctrl, Shift
(C) Left Arrow, Right Arrow
(D) Page up, Page Down
(E) None of these
Ans : (B)
9. Which is the part of a computer that one can touch and feel ?
(A) Programs
(B) Software
(C) Hardware
(D) Output
(E) None of these
Ans : (C)
10. Computers gather data, which means they allow users to…… data.
(A) present
(B) store
(C) output
(D) input
(E) None of these
Ans : (D)
11. CPU stands for……
(A) CD-run on memory
(B) central processing unit
(C) call powers up
(D) create programs user
(E) None of these
Ans : (B)
12. Moves the cursor one space to the right to puts spaces in between words……
(A) control key
(B) space bar
(C) printer
(D) mouse
(E) None of these
Ans : (B)
13. Use this when you want to make all letters capital without having to use the shift key for each character………
(A) shifter
(B) upper case
(C) caps lock key
(D) icon
(E) None of these
Ans : (C)
14. A device that reads the information contained on a disk and transfers it to the computer’s memory……
(A) monitor
(B) screen
(C) keyboard
(D) disk drive
(E) None of these
Ans : (D)
15. Which of the following is not the major function of a computer ?
(A) Processing data into information
(B) Storing data or information
(C) Gathering data
(D) Analysing data or information
(E) None of these
Ans : (D)
16. A disk on which you store information………
(A) plate
(B) data disk
(C) paper disk
(D) TV disk
(E) None of these
Ans : (B)
17. Allows you to print……
(A) ribbon
(B) monitor
(C) go now
(D) Control-P
(E) None of these
Ans : (D)
18. Easy to use……
(A) user friendly
(B) select
(C) helpful
(D) ever-ready
(E) None of these
Ans : (A)
19. When your computer stops working suddenly, it is referred to as a……
(A) crash
(B) die
(C) death
(D) penalty
(E) None of these
Ans : (E)
20. The smallest item of useful information a computer can handle…
(A) bite
(B) byte
(C) bit
(D) bait
(E) None of these
Ans : (C)
21. Devices that let the computer communicate with you……
(A) input
(B) output
(C) type
(D) print
(E) None of these
Ans : (B)
22. Devices that allow you to put information into the computer ……
(A) input
(B) output
(C) type
(D) print
(E) None of these
Ans : (A)
23. Eight bits of data……
(A) octabit
(B) word
(C) sentence
(D) byte
(E) None of these
Ans : (D)
24. The secret code that gives you access to some programs……
(A) clue
(B) cue
(C) password
(D) help
(E) None of these
Ans : (C)
25. The different styles of lettering in a word processing program……
(A) font
(B) calligraphy
(C) writing
(D) manuscript
(E) None of these
Ans : (A)
26. Any letter, number, or symbol found on the keyboard that you can type into the computer……
(A) output
(B) character
(C) type
(D) print
(E) None of these
Ans : (B)
27. A symbol or question on the screen that prompts you to take action and tell the computer what to do next……
(A) scanner
(B) questionnaire
(C) prompt and dialog box
(D) information seeker
(E) None of these
Ans : (C)
28. Choices are referred to as……
(A) options
(B) exit
(C) boot
(D) folder
(E) None of these
Ans : (A)
29. Anything written on the screen ……
(A) cursor
(B) text
(C) folder
(D) boot
(E) None of these
Ans : (B)
30. Lets you leave a screen or program……
(A) boot
(B) programs
(C) exit
(D) text
(E) None of these
Ans : (C)
31. Instructions that tell the computer what to do. Another name for software……
(A) programs
(B) CPU
(C) options
(D) folder
(E) None of these
Ans : (A)
32. A program which helps create written documents and lets you go back and make corrections as necessary……
(A) spreadsheet
(B) personal writer
(C) word printer
(D) word processor
(E) None of these
Ans : (D)
33. A place that a user can create to store files……
(A) cursor
(B) text
(C) folder
(D) boot
(E) None of these
Ans : (C)
34. Start or restart the computer……
(A) exit
(B) kick
(C) boot
(D) kick-start
(E) None of these
Ans : (C)
35. A blinking indicator that shows you where your next action will happen……
(A) CPU
(B) cursor
(C) tool bar
(D) boot
(E) None of these
Ans : (B)
36. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs……
(A) menu bar
(B) tool bar
(C) user friendly
(D) word processor
(E) None of these
Ans : (A)
37. CD-ROM stands for……
(A) central processing unit
(B) CD-remote open mouse
(C) CD-resize or minimize
(D) CD-read only memory
(E) None of these
Ans : (D)
38. To change written work already done……
(A) file
(B) edit
(C) cut
(D) close
(E) None of these
Ans : (B)
39. A place in the computer system where data and programs are temporarily stored……
(A) paste
(B) open
(C) memory
(D) pocket
(E) None of these
Ans : (C)
40. A key that will erase information from the computerÕs memory and characters on the screen……
(A) edit
(B) delete key
(C) dummy out
(D) trust key
(E) None of these
Ans : (B)
41. To insert a copy of the clipboard contents, whatever was last cut or copied at the insertion point……
(A) paste
(B) stick in
(C) fit in
(D) push in
(E) None of these
Ans : (A)
42. The command used to remove text or graphics from a document. The information is then stored on a clipboard so you can paste it.
(A) chop
(B) cut
(C) clip
(D) cart away
(E) None of these
Ans : (B)
43. To exit the program without leaving the application……
(A) file
(B) edit
(C) copy
(D) close
(E) None of these
Ans : (D)
44. A removable magnetic disc that holds information……
(A) floppy disk
(B) hard drive
(C) monitor
(D) portable
(E) None of these
Ans : (B)
45. A command that saves what you are working on into the hard drive, or onto a disk……
(A) view
(B) hold
(C) save
(D) go
(E) None of these
Ans : (E)
46. A command to get a file you worked on from the memory where it was stored……
(A) close
(B) delete
(C) open
(D) get it
(E) None of these
Ans : (C)
47. To move down a page in a document……
(A) jump
(B) fly
(C) wriggle
(D) scroll
(E) None of these
Ans : (D)
48. The primary device that a computer uses to store information……
(A) TV
(B) storehouse
(C) desk
(D) hard drive
(E) None of these
Ans : (D)
49. Screen that comes on when you turn on your computer that shows all the icons……
(A) desktop
(B) face to face
(C) viewer
(D) view space
(E) None of these
Ans : (A)
50. A program that works like a calculator for keeping track of money and making budgets……
(A) calculator
(B) spreadsheet
(C) budgeter
(D) financier
(E) None of these
Ans : (B)
1. Memory, also called random access memory, or RAM……….
(A) contains the electronic circuits that cause processing to occur
(B) makes the information resulting from processing available for use
(C) allows data, programs, commands, and user responses to be entered into a computer
(D) consists of electronic components that store data
(E) None of these
Ans : (D)
2. Correcting errors in a program is referred to as………
(A) debugging
(B) bugging
(C) rectifying
(D) modifying
(E) None of these
Ans : (A)
3. An assembler is used to translate a program written in………
(A) a low level language
(B) machine language
(C) a high level language
(D) assembly language
(E) None of these
Ans : (D)
4. The capability of the operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is………
(A) Multiprocessing
(B) Multitasking
(C) Multiprogramming
(D) Multiexecution
(E) None of these
Ans : (B)
5. The basic goal of computer process is to convert data into……
(A) information
(B) tables
(C) files
(D) graphs
(E) None of these
Ans : (A)
6. A hard copy of a document is …
(A) stored in the hard disk
(B) stored on a floppy
(C) stored on a CD
(D) printed on the printer
(E) None of these
Ans : (D)
7. Which of the following is not an output device ?
(A) Plotter
(B) Printer
(C) Scanner
(D) Monitor
(E) None of these
Ans : (C)
8. Which keys can be used together with other keys for special tasks ?
(A) Insert, Delete
(B) Ctrl, Shift
(C) Left Arrow, Right Arrow
(D) Page up, Page Down
(E) None of these
Ans : (B)
9. Which is the part of a computer that one can touch and feel ?
(A) Programs
(B) Software
(C) Hardware
(D) Output
(E) None of these
Ans : (C)
10. Computers gather data, which means they allow users to…… data.
(A) present
(B) store
(C) output
(D) input
(E) None of these
Ans : (D)
11. CPU stands for……
(A) CD-run on memory
(B) central processing unit
(C) call powers up
(D) create programs user
(E) None of these
Ans : (B)
12. Moves the cursor one space to the right to puts spaces in between words……
(A) control key
(B) space bar
(C) printer
(D) mouse
(E) None of these
Ans : (B)
13. Use this when you want to make all letters capital without having to use the shift key for each character………
(A) shifter
(B) upper case
(C) caps lock key
(D) icon
(E) None of these
Ans : (C)
14. A device that reads the information contained on a disk and transfers it to the computer’s memory……
(A) monitor
(B) screen
(C) keyboard
(D) disk drive
(E) None of these
Ans : (D)
15. Which of the following is not the major function of a computer ?
(A) Processing data into information
(B) Storing data or information
(C) Gathering data
(D) Analysing data or information
(E) None of these
Ans : (D)
16. A disk on which you store information………
(A) plate
(B) data disk
(C) paper disk
(D) TV disk
(E) None of these
Ans : (B)
17. Allows you to print……
(A) ribbon
(B) monitor
(C) go now
(D) Control-P
(E) None of these
Ans : (D)
18. Easy to use……
(A) user friendly
(B) select
(C) helpful
(D) ever-ready
(E) None of these
Ans : (A)
19. When your computer stops working suddenly, it is referred to as a……
(A) crash
(B) die
(C) death
(D) penalty
(E) None of these
Ans : (E)
20. The smallest item of useful information a computer can handle…
(A) bite
(B) byte
(C) bit
(D) bait
(E) None of these
Ans : (C)
21. Devices that let the computer communicate with you……
(A) input
(B) output
(C) type
(D) print
(E) None of these
Ans : (B)
22. Devices that allow you to put information into the computer ……
(A) input
(B) output
(C) type
(D) print
(E) None of these
Ans : (A)
23. Eight bits of data……
(A) octabit
(B) word
(C) sentence
(D) byte
(E) None of these
Ans : (D)
24. The secret code that gives you access to some programs……
(A) clue
(B) cue
(C) password
(D) help
(E) None of these
Ans : (C)
25. The different styles of lettering in a word processing program……
(A) font
(B) calligraphy
(C) writing
(D) manuscript
(E) None of these
Ans : (A)
26. Any letter, number, or symbol found on the keyboard that you can type into the computer……
(A) output
(B) character
(C) type
(D) print
(E) None of these
Ans : (B)
27. A symbol or question on the screen that prompts you to take action and tell the computer what to do next……
(A) scanner
(B) questionnaire
(C) prompt and dialog box
(D) information seeker
(E) None of these
Ans : (C)
28. Choices are referred to as……
(A) options
(B) exit
(C) boot
(D) folder
(E) None of these
Ans : (A)
29. Anything written on the screen ……
(A) cursor
(B) text
(C) folder
(D) boot
(E) None of these
Ans : (B)
30. Lets you leave a screen or program……
(A) boot
(B) programs
(C) exit
(D) text
(E) None of these
Ans : (C)
31. Instructions that tell the computer what to do. Another name for software……
(A) programs
(B) CPU
(C) options
(D) folder
(E) None of these
Ans : (A)
32. A program which helps create written documents and lets you go back and make corrections as necessary……
(A) spreadsheet
(B) personal writer
(C) word printer
(D) word processor
(E) None of these
Ans : (D)
33. A place that a user can create to store files……
(A) cursor
(B) text
(C) folder
(D) boot
(E) None of these
Ans : (C)
34. Start or restart the computer……
(A) exit
(B) kick
(C) boot
(D) kick-start
(E) None of these
Ans : (C)
35. A blinking indicator that shows you where your next action will happen……
(A) CPU
(B) cursor
(C) tool bar
(D) boot
(E) None of these
Ans : (B)
36. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs……
(A) menu bar
(B) tool bar
(C) user friendly
(D) word processor
(E) None of these
Ans : (A)
37. CD-ROM stands for……
(A) central processing unit
(B) CD-remote open mouse
(C) CD-resize or minimize
(D) CD-read only memory
(E) None of these
Ans : (D)
38. To change written work already done……
(A) file
(B) edit
(C) cut
(D) close
(E) None of these
Ans : (B)
39. A place in the computer system where data and programs are temporarily stored……
(A) paste
(B) open
(C) memory
(D) pocket
(E) None of these
Ans : (C)
40. A key that will erase information from the computerÕs memory and characters on the screen……
(A) edit
(B) delete key
(C) dummy out
(D) trust key
(E) None of these
Ans : (B)
41. To insert a copy of the clipboard contents, whatever was last cut or copied at the insertion point……
(A) paste
(B) stick in
(C) fit in
(D) push in
(E) None of these
Ans : (A)
42. The command used to remove text or graphics from a document. The information is then stored on a clipboard so you can paste it.
(A) chop
(B) cut
(C) clip
(D) cart away
(E) None of these
Ans : (B)
43. To exit the program without leaving the application……
(A) file
(B) edit
(C) copy
(D) close
(E) None of these
Ans : (D)
44. A removable magnetic disc that holds information……
(A) floppy disk
(B) hard drive
(C) monitor
(D) portable
(E) None of these
Ans : (B)
45. A command that saves what you are working on into the hard drive, or onto a disk……
(A) view
(B) hold
(C) save
(D) go
(E) None of these
Ans : (E)
46. A command to get a file you worked on from the memory where it was stored……
(A) close
(B) delete
(C) open
(D) get it
(E) None of these
Ans : (C)
47. To move down a page in a document……
(A) jump
(B) fly
(C) wriggle
(D) scroll
(E) None of these
Ans : (D)
48. The primary device that a computer uses to store information……
(A) TV
(B) storehouse
(C) desk
(D) hard drive
(E) None of these
Ans : (D)
49. Screen that comes on when you turn on your computer that shows all the icons……
(A) desktop
(B) face to face
(C) viewer
(D) view space
(E) None of these
Ans : (A)
50. A program that works like a calculator for keeping track of money and making budgets……
(A) calculator
(B) spreadsheet
(C) budgeter
(D) financier
(E) None of these
Ans : (B)
Allahabad Bank Probationary Officers Exam Solved Paper
Computer Knowledge
1. A………typically connects personal computers within a very limited geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)
2. Computers manipulate data in many ways, and this manipulation is called—
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)
3. An e-mail address typically consists of a user ID followed by the ……… sign and the name of the e-mail server that manages the user’s electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)
4. Software applies……, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)
5. A file extension is separated from the main file name with a(n) ……, but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)
6. An ad hoc query is a—
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)
7. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)
8. A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Ans : (B)
9. The desktop contains small graphics called—
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Ans : (C)
10. C, BASIC, COBOL, and Java are examples of ……… languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)
11. A(n)………camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Ans : (A)
12. ……makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) E-commerce
(C) E-spend
(D) E-business
(E) None of these
Ans : (D)
13. Networks are monitored by security personnel and supervised by ………who set(s) up accounts and passwords for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Ans : (C)
14. Application software is designed to accomplish—
(A) real-world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Ans : (D)
15. A telephone number, a birth date, and a customer name are all examples of—
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Ans : (D)
16. The human-readable version of a program is called—
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Ans : (D)
17. A ……… computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
Ans : (A)
18. ……… is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Ans : (C)
19. Programs such as Internet Explorer that serve as navigable windows into the Web are called—
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Ans : (D)
20. A ……… is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Ans : (C)
21. When you save to ………, your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
Ans : (C)
22. The motherboard is the—
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Ans : (D)
23. A computer-intensive problemruns on a—
(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these
Ans : (C)
24. A(n)……converts and executesone statement at a time.
(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these
Ans : (B)
25. The term ……… designates equipment that might be added to a computer system to enhance its functionality.
(A) digital device
(B) system add-on
(C) disk pack
(D) peripheral device
(E) None of these
Ans : (D)
26. Approximately how many bytes make one megabyte ?
(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these
Ans : (D)
27. What is MP3 ?
(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these
Ans : (C)
28. All the deleted files go to—
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)
29. ……… this is the act of copying or downloading a program from a network and making multiple copies of it.
(A) Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site-license piracy
(E) None of these
Ans : (C)
30. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)
31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
Ans : (B)
32. In MICR, C stands for ……….
(A) Code
(B) Colour
(C) Computer
(D) Character
(E) None of these
Ans : (D)
33. Fax machines and imaging systems are examples of—
(A) bar-code readers
(B) imaging systems
(C) scanning devices
(D) pen-based systems
(E) None of these
Ans : (B)
34. When writing a document, you can use the ……… feature to find an appropriate word or an alternative word if you find yourself stuck for the right word.
(A) dictionary
(B) word finder
(C) encyclopedia
(D) thesaurus
(E) None of these
Ans : (A)
35. Which key is used in combination with another key to perform a specific task ?
(A) Function
(B) Control
(C) Arrow
(D) Space bar
(E) None of these
Ans : (B)
36. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—
(A) read-only
(B) memory-only
(C) run-only
(D) write-only
(E) None of these
Ans : (A)
37. In an information system, alphanumeric data normally takes the form of—
(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these
Ans : (B)
38. A Website’s main page is called its—
(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these
Ans : (A)
39. When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these
Ans : (A)
40. A collection of interrelated files in a computer is a—
(A) file manager
(B) field
(C) record
(D) database
(E) None of these
Ans : (D)
41. A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these
Ans : (B)
42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as—
(A) a roller ball which moves the cursor
(B) a pen-shaped device which allows data to be entered through the CRT screen
(C) a figure which resembles a familiar office device
(D) an outdated input device
(E) None of these
Ans : (A)
43. Various applications and documents are represented on the Windows desktop by—
(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these
Ans : (D)
44. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these
Ans : (D)
45. The real business and competitive value of information technology lies in—
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
(D) The capabilities of the hardware and the speed at which it processes information
(E) None of these
Ans : (B)
46. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
(A) Open source vendors
(B) Alliances
(C) Application service providers
(D) All of the above
(E) None of these
Ans : (C)
47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(A) Opening an application previously installed on the computer
(B) Borrowed copies of software
(C) Viewing a website without causing any additional transactions
(D) Running antivirus programs
(E) None of these
Ans : (B)
48. Collecting personal information and effectively posing as another individual is known as the crime of—
(A) spooling
(B) dentity theft
(C) spoofing
(D) hacking
(E) None of these
Ans : (B)
49. The first step in the transaction processing cycle is—
(A) database operations
(B) audit
(C) data entry
(D) user inquiry
(E) None of these
Ans : (C)
50. In the information systems concept, the output function involves—
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation process to their ultimate destination
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
(E) None of these
Ans : (A)
(Exam Held on 21-2-2010)
1. A………typically connects personal computers within a very limited geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)
2. Computers manipulate data in many ways, and this manipulation is called—
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)
3. An e-mail address typically consists of a user ID followed by the ……… sign and the name of the e-mail server that manages the user’s electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)
4. Software applies……, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)
5. A file extension is separated from the main file name with a(n) ……, but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)
6. An ad hoc query is a—
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)
7. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)
8. A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Ans : (B)
9. The desktop contains small graphics called—
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Ans : (C)
10. C, BASIC, COBOL, and Java are examples of ……… languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)
11. A(n)………camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Ans : (A)
12. ……makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) E-commerce
(C) E-spend
(D) E-business
(E) None of these
Ans : (D)
13. Networks are monitored by security personnel and supervised by ………who set(s) up accounts and passwords for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Ans : (C)
14. Application software is designed to accomplish—
(A) real-world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Ans : (D)
15. A telephone number, a birth date, and a customer name are all examples of—
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Ans : (D)
16. The human-readable version of a program is called—
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Ans : (D)
17. A ……… computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
Ans : (A)
18. ……… is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Ans : (C)
19. Programs such as Internet Explorer that serve as navigable windows into the Web are called—
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Ans : (D)
20. A ……… is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Ans : (C)
21. When you save to ………, your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
Ans : (C)
22. The motherboard is the—
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Ans : (D)
23. A computer-intensive problemruns on a—
(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these
Ans : (C)
24. A(n)……converts and executesone statement at a time.
(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these
Ans : (B)
25. The term ……… designates equipment that might be added to a computer system to enhance its functionality.
(A) digital device
(B) system add-on
(C) disk pack
(D) peripheral device
(E) None of these
Ans : (D)
26. Approximately how many bytes make one megabyte ?
(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these
Ans : (D)
27. What is MP3 ?
(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these
Ans : (C)
28. All the deleted files go to—
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)
29. ……… this is the act of copying or downloading a program from a network and making multiple copies of it.
(A) Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site-license piracy
(E) None of these
Ans : (C)
30. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)
31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
Ans : (B)
32. In MICR, C stands for ……….
(A) Code
(B) Colour
(C) Computer
(D) Character
(E) None of these
Ans : (D)
33. Fax machines and imaging systems are examples of—
(A) bar-code readers
(B) imaging systems
(C) scanning devices
(D) pen-based systems
(E) None of these
Ans : (B)
34. When writing a document, you can use the ……… feature to find an appropriate word or an alternative word if you find yourself stuck for the right word.
(A) dictionary
(B) word finder
(C) encyclopedia
(D) thesaurus
(E) None of these
Ans : (A)
35. Which key is used in combination with another key to perform a specific task ?
(A) Function
(B) Control
(C) Arrow
(D) Space bar
(E) None of these
Ans : (B)
36. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—
(A) read-only
(B) memory-only
(C) run-only
(D) write-only
(E) None of these
Ans : (A)
37. In an information system, alphanumeric data normally takes the form of—
(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these
Ans : (B)
38. A Website’s main page is called its—
(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these
Ans : (A)
39. When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these
Ans : (A)
40. A collection of interrelated files in a computer is a—
(A) file manager
(B) field
(C) record
(D) database
(E) None of these
Ans : (D)
41. A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these
Ans : (B)
42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as—
(A) a roller ball which moves the cursor
(B) a pen-shaped device which allows data to be entered through the CRT screen
(C) a figure which resembles a familiar office device
(D) an outdated input device
(E) None of these
Ans : (A)
43. Various applications and documents are represented on the Windows desktop by—
(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these
Ans : (D)
44. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these
Ans : (D)
45. The real business and competitive value of information technology lies in—
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
(D) The capabilities of the hardware and the speed at which it processes information
(E) None of these
Ans : (B)
46. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
(A) Open source vendors
(B) Alliances
(C) Application service providers
(D) All of the above
(E) None of these
Ans : (C)
47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(A) Opening an application previously installed on the computer
(B) Borrowed copies of software
(C) Viewing a website without causing any additional transactions
(D) Running antivirus programs
(E) None of these
Ans : (B)
48. Collecting personal information and effectively posing as another individual is known as the crime of—
(A) spooling
(B) dentity theft
(C) spoofing
(D) hacking
(E) None of these
Ans : (B)
49. The first step in the transaction processing cycle is—
(A) database operations
(B) audit
(C) data entry
(D) user inquiry
(E) None of these
Ans : (C)
50. In the information systems concept, the output function involves—
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation process to their ultimate destination
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
(E) None of these
Ans : (A)
Allahabad Bank Clerk Exam Solved Paper
Computer General Knowledge
1. If a word is typed that is not in Word’s dictionary, a____________wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)
2. The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)
3. In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans : (B)
4. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these
Ans : (C)
5. A ____________represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (C)
6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)
7. The operating system is the most common type of____________software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (C)
8. When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans : (C)
9. The horizontal and vertical lines on a worksheet are called—
(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
Ans : (D)
10. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans : (D)
11. The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing.
Ans : (D)
12. During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
Ans : (B)
13. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
Ans : (C)
14. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
Ans : (A)
15. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Ans : (C)
16. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
Ans : (B)
17. The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.
Ans : (A)
18. MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
Ans : (C)
19. An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device.
(C) utility program.
(D) special numeric code that indicates the priority of a request.
Ans : (D)
20. A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.
Ans : (C)
21. Virtual memory is typically located:
(A) on a floppy disk.
(B) in the CPU.
(C) in a flash card.
(D) on the hard drive.
Ans : (D)
22. The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously.
Ans : (B)
23. The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
Ans : (A)
24. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
Ans : (B)
25. Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C) authentication.
(D) logging in.
Ans : (C)
26. The combination of the operating system and the processor is referred to as the computer’s:
(A) CPU.
(B) platform.
(C) BIOS.
(D) CMOS.
Ans : (B)
27. The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
Ans : (A)
28. Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
Ans : (B)
29. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
Ans : (D)
30. The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor program
Ans : (A)
31. The basic input/output system (BIOS) is stored in:
(A) RAM.
(B) ROM.
(C) the CPU.
(D) the hard drive.
Ans : (B)
32. Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
(A) configuration
(B) CMOS
(C) POST
(D) ROM
Ans : (C)
33. The memory resident portion of the operating system is called the—
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
Ans : (D)
34. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
Ans : (A)
35. All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
Ans : (A)
36. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:
(A) files.
(B) folders.
(D) drives.
(D) systems.
Ans : (D)
37. All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
Ans : (A)
38. All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
Ans : (C)
39. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
Ans : (B)
40. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon
Ans : (C)
(Exam Held on 30-08-2008)
1. If a word is typed that is not in Word’s dictionary, a____________wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)
2. The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)
3. In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans : (B)
4. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these
Ans : (C)
5. A ____________represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (C)
6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)
7. The operating system is the most common type of____________software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (C)
8. When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans : (C)
9. The horizontal and vertical lines on a worksheet are called—
(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
Ans : (D)
10. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans : (D)
11. The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing.
Ans : (D)
12. During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
Ans : (B)
13. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
Ans : (C)
14. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
Ans : (A)
15. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Ans : (C)
16. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
Ans : (B)
17. The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.
Ans : (A)
18. MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
Ans : (C)
19. An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device.
(C) utility program.
(D) special numeric code that indicates the priority of a request.
Ans : (D)
20. A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.
Ans : (C)
21. Virtual memory is typically located:
(A) on a floppy disk.
(B) in the CPU.
(C) in a flash card.
(D) on the hard drive.
Ans : (D)
22. The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously.
Ans : (B)
23. The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
Ans : (A)
24. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
Ans : (B)
25. Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C) authentication.
(D) logging in.
Ans : (C)
26. The combination of the operating system and the processor is referred to as the computer’s:
(A) CPU.
(B) platform.
(C) BIOS.
(D) CMOS.
Ans : (B)
27. The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
Ans : (A)
28. Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
Ans : (B)
29. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
Ans : (D)
30. The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor program
Ans : (A)
31. The basic input/output system (BIOS) is stored in:
(A) RAM.
(B) ROM.
(C) the CPU.
(D) the hard drive.
Ans : (B)
32. Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
(A) configuration
(B) CMOS
(C) POST
(D) ROM
Ans : (C)
33. The memory resident portion of the operating system is called the—
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
Ans : (D)
34. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
Ans : (A)
35. All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
Ans : (A)
36. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:
(A) files.
(B) folders.
(D) drives.
(D) systems.
Ans : (D)
37. All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
Ans : (A)
38. All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
Ans : (C)
39. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
Ans : (B)
40. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon
Ans : (C)
Subscribe to:
Posts (Atom)