Sunday, 19 February 2012

COMPUTER AWARENESS PRACTICE MCQs

1.    The instructions that tell a computer how to carry out the processing tasks are referred to as computer .........
1) programs
2) processors
 3) input devices
4) memory modules
5) None of these

2.    An area of a computer that temporarily holds data waiting to be processed is ..........
1) CPU
2) Memory
3) Storage
4) File
5) None of these

3.    To select or unselect one word to the right
1) CTRL + SHIFT
2) CTRL + SHIFT + UP Arrow
3) CTRL + SHIFT + Down Arrow
4) CTRL + SHIFT + Right Arrow
5) None of these

4.    To maximize or restore a selected window
1) CTRL + F7
2) CTRL + F10
3) CTRL + F8
4) CTRL + F9
5) None of these

5.    To Copy a picture of the selected window to the clipboard
1) ALT + TAB
 2) Ctrl + TAB
3) ALT + Print Screen
4) Both (1) and (2)
5) None of these

6.    .......... is the key to close a selected drop - down list; cancel a comm-and and close a dialog box.
1) TAB
2) SHIFT
3) ESC
4) F10
5) None of these

7.    ......... is the key we use to run the selected command.
1) SHIFT
2) TAB
3) ENTER
4) CTRL
5) None of these

8.    ............ is the functional key to display save-as box.
1) F5
2) F6
3) F9
4) F12
5) None of these

9.    ............ is the combination of keys to switch between the last four places that you have edited
1) ALT + CTRL + Z
2) ALT + CTRL + Y
3) ALT + TAB + Z
4) ALT + SHIFT + Z
5) None of these

10.    ............ is the Keyboard shortcut key to insert auto sum
1) ALT
2) ALT=
3) ALT+
4) ALT–
5) ALT+CTRL

11.    Data becomes ................ when it is presented in a format that people can understand and use
1) processed
2) graphs
3) information
4) presentation
5) None of these

12.    The term ............. designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these

13.    A ............ is a microprocessor - based computing device.
1) personal computer
2) mainframe
3) workstation   
4) server
5) None of these

14.    RAM can be thought of as the ......... for the computer's processor
1) factory
2) operating room
3) waiting room
4) planning room
5) None of these

15.    Which of the following are the functions of a operating system
1) Allocates resources
 2) Monitors Activities
3) Manages disks and files
4) All of the above
5) Only 1 and 2

16.    To move a copy of file from one computer to another over a communication channel is called ?
1) File transfer
2) File encryption
3) File modification
4) File copying
5) None of these

17.    The primary function of the ............ is to set up the hardware and load and start an operating system
1) System Programs
2) BIOS
3) CP
4) Memory
5) None of these

18.    What kind of memory is both static and non - volatile ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) 5) None of these

19.    .......... is computer software designed to operate the computer hardware and to provide platform for running application software
1) Application software
2) System software
3) Software
4) Operating system
5) None of these

20.    The ......... is the amount of data that a storage device can move from the storage medium to the Computer per second
1) data migration rate
2) data digitizing rate
3) data transfer rate
4) data access rate
5) None of these

21.    A device, which is not connected to CPU, is called as .......
1) land-line device
2) On-line device
3) Off-line device
4) Device
5) None of the above

22.    What is the other name for programmed chip?
1) RAM
2) ROM
3) LSIC
4) PROM
5) None of these

23.    On-line real time systems become popular in ........... generation
1) First Generation
2) Second Generation
3) Third Generation
4) FOurth Generation
5) None of thes

24.    You use a(n) ....., such as a keyboard or mouse, to input information
1) output device
2) input device
3) storage device
4) processing device
5) None of these

25.    ............ is the ability of a device to "jump" directly to the requested data
1) Sequential access
2) Random access
3) Quick access
4) All of the above
5) None of these

26.    ............ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously
1) Multitasking
2) Multithreading
3) Multiprocessing
4) Multicoputing
5) None of these

27.    The task of performing operations like arithmetic and logical operations is called ......
1) Processing
2) Storing
3) Editing
4) Sorting
5) None of these

28.    The ALU and Control Unit joinly known as
1) RAM
2) ROM
3) CPU
4) PC
5) None of these

29. RAM is an example of
1) Secondary memory
2) Primary memory
3) Main memory   
4) Both (1) and (2)
5) None of these

30.Magnetic disk is an example of
1) Secondary memory
2) Primary meory
3) Main memory   
4) Both (1) and (2)
5) None of these

31. Which one of the following is NOT a computer language /
1) MS-Excel
2) BASIC
3) COBOL
4) C++
5) None of these

32.    Each memory cell has a unique number, assigned to it is called as the ....... of the cell
1) Address
2) Register
3) Number
4) Path
5) None of these

33.    RAM is also called as
1) Read / Write Memory
2) Long Memory
3) Permanent Memory
4) Primary Memory
5) None of these
 
34.    ............ Store data or information temporarily and pass it on as directed by the control unit
1) Address
2) Register
3) Number
4) Memory
5) None of these

35.    Select the Odd one
1) Operating system
2) Interpreter
3) Compiler
4) Assembler
5) None of these

36.    A ............ is an additional set of commands that the computer displays after you make a selection from the main menu
1) dialog box
2) submenu
3) menu selection
4) All of the above
5) None of these

37.    COBOL is an acronym for .............
1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these

38.    All of the following are examples of real security and privacy risks EXCEPT
1) hackers
2) Spam
3) viruses
4) identity theft
5) None of these

39.    Which of the following is NOT one of the four major data processing functions of a computer?
1) gathering data
2) processing data into information
3) analyzing the data or information
4) storing the data or information
5) None of these

40.    All of the following are examples of storage devices EXCEPT :
1) hard disk drives
2) printers
3) floppy disk drives
4) CD drives
5) Pen drives

41.    The CPU and memory are located on the :
1) expansion board
2) motherboard
3) storage device
4) output device
5) display board

42.    .............. is the science that attempts to produce machines that display the same type of intelligence that humans do
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Aritificial intelligence (Al)
5) None of these

43.    Servers are computers that provide resources to other computers connected to a :
1) networkd
2) mainframe
3) supercomputer
4) client
5) internet

44.    When creating a computer program, the ......... designs the structure of the program
1) End user
2) System Analyst
3) Programmer
4) All of the above
5) None of these

45.    A computer program that converts an entire program into machine language at one time is called a/ an
1) interpreter
2) simulator
3) characters
4) numbers
5) None of these

46.    Computers process data into information by working exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these

47.    The difference between people with access to computers and the Internet and those without this access is known as the :
1) digital divide
2) Internet divide
3) Web divide
4) broadband divide
5) None of these

48.    Computers manipulate data in many ways, and this manipulation is calld ......
1) upgrading  
2) processing
3) batching  
4) utilizing
5) None of these

49.    The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:
1) robotics   
2) simulation
3) computer forensics
4) animation
5) None of these

50.    Where does most data go first with in a computer memory hierarchy ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) None of these
ANSWERS:
    1) 1    2) 2    3) 4    4) 2    5) 3    6) 3        7) 3    8) 4    9) 1    10) 2
11) 3    12) 4    13) 1    14) 3    15) 4    16) 1    17) 2    18) 2        19) 2
20) 3    21) 3    22) 2    23) 3    24) 2        25) 2    26) 1    27) 1    28) 3    29) 2    30) 1   
31) 1    32) 1    33) 1    34) 2    35) 1    36) 1   37) 1    38) 2    39) 3    40) 2
41) 2    42) 4    43) 2    44) 2    45) 3    46) 4    47) 1    48) 2        49) 3    50) 1

Wednesday, 15 February 2012

COMPUTER KNOWLEDGE MCQs

1.    The instructions that tell a computer how to carry out the processing tasks are referred to as computer .........
1) programs
2) processors
 3) input devices
4) memory modules
5) None of these

2.    An area of a computer that temporarily holds data waiting to be processed is ..........
1) CPU
2) Memory
3) Storage
4) File
5) None of these

3.    To select or unselect one word to the right
1) CTRL + SHIFT
2) CTRL + SHIFT + UP Arrow
3) CTRL + SHIFT + Down Arrow
4) CTRL + SHIFT + Right Arrow
5) None of these

4.    To maximize or restore a selected window
1) CTRL + F7
2) CTRL + F10
3) CTRL + F8
4) CTRL + F9
5) None of these

5.    To Copy a picture of the selected window to the clipboard
1) ALT + TAB
 2) Ctrl + TAB
3) ALT + Print Screen
4) Both (1) and (2)
5) None of these

6.    .......... is the key to close a selected drop - down list; cancel a comm-and and close a dialog box.
1) TAB
2) SHIFT
3) ESC
4) F10
5) None of these

7.    ......... is the key we use to run the selected command.
1) SHIFT
2) TAB
3) ENTER
4) CTRL
5) None of these

8.    ............ is the functional key to display save-as box.
1) F5
2) F6
3) F9
4) F12
5) None of these

9.    ............ is the combination of keys to switch between the last four places that you have edited
1) ALT + CTRL + Z
2) ALT + CTRL + Y
3) ALT + TAB + Z
4) ALT + SHIFT + Z
5) None of these

10.    ............ is the Keyboard shortcut key to insert auto sum
1) ALT
2) ALT=
3) ALT+
4) ALT–
5) ALT+CTRL

11.    Data becomes ................ when it is presented in a format that people can understand and use
1) processed
2) graphs
3) information
4) presentation
5) None of these

12.    The term ............. designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these

13.    A ............ is a microprocessor - based computing device.
1) personal computer
2) mainframe
3) workstation   
4) server
5) None of these

14.    RAM can be thought of as the ......... for the computer's processor
1) factory
2) operating room
3) waiting room
4) planning room
5) None of these

15.    Which of the following are the functions of a operating system
1) Allocates resources
 2) Monitors Activities
3) Manages disks and files
4) All of the above
5) Only 1 and 2

16.    To move a copy of file from one computer to another over a communication channel is called ?
1) File transfer
2) File encryption
3) File modification
4) File copying
5) None of these

17.    The primary function of the ............ is to set up the hardware and load and start an operating system
1) System Programs
2) BIOS
3) CP
4) Memory
5) None of these

18.    What kind of memory is both static and non - volatile ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) 5) None of these

19.    .......... is computer software designed to operate the computer hardware and to provide platform for running application software
1) Application software
2) System software
3) Software
4) Operating system
5) None of these

20.    The ......... is the amount of data that a storage device can move from the storage medium to the Computer per second
1) data migration rate
2) data digitizing rate
3) data transfer rate
4) data access rate
5) None of these

21.    A device, which is not connected to CPU, is called as .......
1) land-line device
2) On-line device
3) Off-line device
4) Device
5) None of the above

22.    What is the other name for programmed chip?
1) RAM
2) ROM
3) LSIC
4) PROM
5) None of these

23.    On-line real time systems become popular in ........... generation
1) First Generation
2) Second Generation
3) Third Generation
4) FOurth Generation
5) None of thes

24.    You use a(n) ....., such as a keyboard or mouse, to input information
1) output device
2) input device
3) storage device
4) processing device
5) None of these

25.    ............ is the ability of a device to "jump" directly to the requested data
1) Sequential access
2) Random access
3) Quick access
4) All of the above
5) None of these

26.    ............ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously
1) Multitasking
2) Multithreading
3) Multiprocessing
4) Multicoputing
5) None of these

27.    The task of performing operations like arithmetic and logical operations is called ......
1) Processing
2) Storing
3) Editing
4) Sorting
5) None of these

28.    The ALU and Control Unit joinly known as
1) RAM
2) ROM
3) CPU
4) PC
5) None of these

29.    RAM is an example of
1) Secondary memory
2) Primary memory
3) Main memory   
4) Both (1) and (2)
5) None of these

30.    Magnetic disk is an example of
1) Secondary memory
2) Primary meory
3) Main memory   
4) Both (1) and (2)
5) None of these

31.    Which one of the following is NOT a computer language /
1) MS-Excel
2) BASIC
3) COBOL
4) C++
5) None of these

32.    Each memory cell has a unique number, assigned to it is called as the ....... of the cell
1) Address
2) Register
3) Number
4) Path
5) None of these

33.    RAM is also called as
1) Read / Write Memory
2) Long Memory
3) Permanent Memory
4) Primary Memory
5) None of these
 
34.    ............ Store data or information temporarily and pass it on as directed by the control unit
1) Address
2) Register
3) Number
4) Memory
5) None of these

35.    Select the Odd one
1) Operating system
2) Interpreter
3) Compiler
4) Assembler
5) None of these

36.    A ............ is an additional set of commands that the computer displays after you make a selection from the main menu
1) dialog box
2) submenu
3) menu selection
4) All of the above
5) None of these

37.    COBOL is an acronym for .............
1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these

38.    All of the following are examples of real security and privacy risks EXCEPT
1) hackers
2) Spam
3) viruses
4) identity theft
5) None of these

39.    Which of the following is NOT one of the four major data processing functions of a computer?
1) gathering data
2) processing data into information
3) analyzing the data or information
4) storing the data or information
5) None of these

40.    All of the following are examples of storage devices EXCEPT :
1) hard disk drives
2) printers
3) floppy disk drives
4) CD drives
5) Pen drives

41.    The CPU and memory are located on the :
1) expansion board
2) motherboard
3) storage device
4) output device
5) display board

42.    .............. is the science that attempts to produce machines that display the same type of intelligence that humans do
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Aritificial intelligence (Al)
5) None of these

43.    Servers are computers that provide resources to other computers connected to a :
1) networkd
2) mainframe
3) supercomputer
4) client
5) internet

44.    When creating a computer program, the ......... designs the structure of the program
1) End user
2) System Analyst
3) Programmer
4) All of the above
5) None of these

45.    A computer program that converts an entire program into machine language at one time is called a/ an
1) interpreter
2) simulator
3) characters
4) numbers
5) None of these

46.    Computers process data into information by working exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these

47.    The difference between people with access to computers and the Internet and those without this access is known as the :
1) digital divide
2) Internet divide
3) Web divide
4) broadband divide
5) None of these

48.    Computers manipulate data in many ways, and this manipulation is calld ......
1) upgrading  
2) processing
3) batching  
4) utilizing
5) None of these

49.    The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:
1) robotics   
2) simulation
3) computer forensics
4) animation
5) None of these

50.    Where does most data go first with in a computer memory hierarchy ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) None of these

ANSWERS:
    1) 1    2) 2    3) 4    4) 2    5) 3    6) 3        7) 3    8) 4    9) 1    10) 2
11) 3    12) 4    13) 1    14) 3    15) 4    16) 1    17) 2    18) 2        19) 2
20) 3    21) 3    22) 2    23) 3    24) 2        25) 2    26) 1    27) 1    28) 3    29) 2    30) 1   
31) 1    32) 1    33) 1    34) 2    35) 1    36) 1   37) 1    38) 2    39) 3    40) 2
41) 2    42) 4    43) 2    44) 2    45) 3    46) 4    47) 1    48) 2        49) 3    50) 1

COMPUTER KNOWLEDGE PRACTICE MCQs

1.Which command devides the surface of the blank disk into sectors and assign a unique address to each one
1) Ver
2) Format
3) Fat
4) Chkdsk
5) None of these
2.If you need to duplicate the entire disk, which command will you use ?
1) Copy
2) Diskcopy
3) Chkdsk
4) Format
5) None of these
3.A
.............. sometimes called a boot sector virus, executes when a
computer boots up because it resides in the boot sector of a floppy disk
or the master boot record of a hard disk
1) system virus
2) Trojan horse virus
3) file virus
4) macro virus
5) None of these
4.A result of a computer virus can not lead to ......
1) Disk Crash
2) Mother Board Crash
3) Corruption o f program
4) Deletion of files
5) None of these
5.Every computer connected to an intranet or extranet must have a distinct .......
1) firewall
2) proxy server
3) IP address
4) domain name
5) None of these
6.Programming language built into user programs such as Word and Excel are known as ......
1) 4GLs 
2) Macro languages
3) object-oriented languages
4) visual programming languages
5) None of these
7.Firewalls are used to protect against .......
1) unauthorized Attacks
2) virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) None of these
8.Which of the following extensions suggest that the file is a backup copy
1) Bak
2) Bas
3) Com
4) Txt
5) None of these
9.Computer
programs are written in a high - level programming language; however,
the human readable version of a program is called .......
1) cache
2) instruction set
3) source code
4) word size
5) None of these
10.The software tools that enable a user to interact with a computer for specific purposes are known as .......
1) Hardware
2) Networked Software
3) Shareware
4) Applications
5) None of these
11...............
proessing is used when a large mail-order company accumulates orders
and processes them together in one large set
1) Batch
2) Online
3) Real-time
4) Group
5) None of these
12.When a file contains instructions that can be carried out by the computer, it is often called a(n) ...... file
1) data
2) information
3) executable
4) application
5) None of these
13.A complier translates a program written in a high - level language into ........
1) Machine language   
2) An algorithm
3) A debugged program
4) Java
5) None of these
14.A set of step - by - step procedures for accomplishing a task is known as a(n) .....
1) algorithm
2) hardware program
3) software bug
4) firmware program
5) None of these
15.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) ......
1) Workstation
2) CPU
3) Magnetic disk
4) Integrated circuit
5) None of these
16.A saved document is referred to as a .....
1) file
2) word
3) folder
4) project
5) None of these
17.What is output ?
1) What the processor takes from the user
2) What the user gives to the processor
3) What the processor gets from the user
4) What the processor gives to the user
5) None of these
18.When you turn on the computer, the boot routine will perform this test ........
1) RAM test
2) Disk drive test
3) Memory test
4) Power - on self-test
5) None of these
19.Which of the following storage media provides sequential access only ?
1) Floppy disk
2) Magnetic disk
3) Magnetic tape
4) Optical disk
5) None of these
20.In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ........
1) copy and paste
2) copy, cut and paste
3) cut, copy and paste
4) cut and paste
5) None of these
21. Hardware includes ..........
1) all devices used to input data into a computer
2) sets of instructions that  a computer runs or executes
3) the computer and all the devices connected to it that are used to input and output data
4) all devices involved in processing information including the central processing unit, memory and storage
5) None of these
22.The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ....... command
1) Replace
2) Find
3) Lookup
4) Search
5) None of these
23.The term 'user interface' refers to ............
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to user commands
3) the means by which the user interacts with the peripheral devices on the computer
4) the monitor that is available for the computer
5) None of these
24.For creating a document, you use ........ command at File Menu.
1) Open
2) Close
3) New
4) Save
5) None of these
25.The .............. becomes different shapes depending on the task you are performing
1) Active tab
2) Insertion point
3) Mouse pointer
4) Ribbon
5) None of these
26.Specilizd programs that asist users in locating information on the Web are called ....
1) Information engines
2) Search engines
3) Web browsers
4) Resource locators
5) None of these
27.The background of any Word document ......
1) Is always white colour
2) Is the colour you presect under the Options menu
3) Is always the same for the entire document
4) Can have any colour you choose
5) None of these
28.Correcting errors in a program is referred to as .........
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these
29.Any letter, number, or symbol found on the keyboard that you can type into the computer ..........
1) output
2) character
3) type
4) print
5) font
30.A symbol or question on the screen that prompts you to take action and tell the computer what to do next ........
1) scanner
2) questionnaire
3) prompt and dialog box
4) information seeker
5) None of these
31.Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs .....
1) menu bar
2) tool bar
3) user friendly
4) word processor
5) None of these
32.The primary device that a computer uses to store information ......
1) monitor
2) memory
3) disk
4) hard drive
5) None of these
33.A file extension is separated from the main file name with a(n) ......, but no spaces
1) questiion nark
2) exclamation mark
3) underscore
4) period
5) None of these
34.Application software is designed to accomplish .......
1) real -w orld tasks
2) computer-centric tasks
3) gaming tasks
4) operating system tasks
5) None of these
35.A ...... is a device that not only provdes surge protection, but also  furnishes your computer with battery backup power during a power outage
1) surge strip
2) USB
3) UPS
4) battery strip
5) None of these
36.The term ............. designates equipment that might be added to a computer system to enhance, its functionality
1) digitial device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
37........... this is the act of copying or downloading a program from a network and making multiple copies of it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
38.When installing ............., the user must copy and usually decompress  program files from a CDROM or other medium to the hard disk
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these
39.Which one of the following would be considered as a way that a computer virus can enter a computer system ?
1) Opening an application previously installed on the computer
2) Borrowed an illegal copy of software
3) Viewing a website without causing any additional transctions
4) Running antivirus programs
5) None of these
40.Programs such as Mozila Firefox that serve as navigable windows into the Web are called ..........
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these
41.What is the main difference between a mainframe and a super computer ?
1) Super computer is much larger than mainframe computers
2) Super computers are much smaller than mainframe computers
3) Supercomputers are focused to execute few programs as fast as possible
while mainframe uses its power to execute as many programs concurrently
4) Supercomputers are focused to execute as many programs as possible
while mainframe uses its power to execute few programs as fast as
possible
5) None of these
42.What is the function of Recycle Bin ?
1) Store deleted file
2) Store temporary file
3) Store corrupted file
4) Store Document file
5) None of these
43.Which is the latest version of MS Office ?
1) Office XP
2) Windows XP
3) Office 2007
4) Office 2010
5) None of these
44.Which device can not be shared in network ?
1) Floppy
2) Keyword
3) Computer
4) Printer
5) None of these
45.What is the purpose of query ?
1) Input data
2) Output data
3) Sort & filter
4) All of above
5) None of these
46.Which port doesn't exist in computer ?
1) USB
2) Parallel
3) Com1 / Com2
4) RAW
5) None of these
47.What is the name of exel files ?
1) Workbook
2) Worksheet
3) Spreadsheet
4) Spread book
5) None of these
48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
4) All of he above
5) None of these
49.Synonym can be reviewed with
1) Spelling and grammar
2) Thesaurus
3) Both
4) Synonym viewer
5) None of these
50.Which command allows you to reduce fragments of file and optimize the performance of disk ?
1) Scandisk
2) Diskcomp
3) Chkdsak
4) Defrag
5) None of these

ANSWERS:
    1) 2    2) 2    3) 5    4) 2    5) 2    6) 4        7) 1    8) 1    9) 3    10) 4
11) 1    12) 3    13) 1    14) 1    15) 4    16) 1    17) 4    18) 2        19) 2   20) 4
21) 4    22) 2    23) 1    24) 3        25) 3    26) 2    27) 4    28) 1    29) 2    30) 3   
31) 1    32) 4    33) 5    34) 4    35) 3    36) 4  37) 3    38) 1    39) 2    40) 4
41) 3    42) 1   43) 4    44) 2    45) 4    46) 4    47) 1    48) 1        49) 2    50) 4

Wednesday, 8 February 2012

BANK EXAMS COMPUTER KNOWLEDGE MODEL QUESTIONS

1. URL stands for
(a) Universal Research List
(b) Universal Resource List
(c) Uniform Resource Locator
(d) Uniform Research Locator
(e) None of the above

ANSWER: (c)
2. Which of the following is NOT a goal of Transaction processing system?
(a) Capture, process and store transactions
(b) Produce a variety of documents related to Routine business activities
(c) Reduce manual effort associated with Processing business transactions
(d) Produce standard reports used for Management decision making
(e) None of the above

ANSWER: (b)
3.When data changes in multiple lists and all lists are not updated, this causes
(a) Data redundancy
(b) Information overload
(c) Duplicate data
(d) Data inconsistency
(e) None of the above

ANSWER: (d)
4. Data becomes _ when it is presented in a format that people can understand and use.
(1) Processed
(2) Graphs
(3) Information
(4) Presentation
(5) None of these

ANSWER (3)
5. The term _ designates equipment that might be added to a computer system to enhance its functionality.
(1) Digital device
(2) System add-on
(3) Disk pack
(4) Peripheral device
(5) None of these

ANSWER (4)
6. What is the primary difference between viruses and a worm?
(a) A worm has the ability to self-propagate From an infected user’s computer to other Computers
(b) A worm is usually written by a cracker: Script bunnies do not have the skills to Develop a worm program
(c) A virus is very harmful to the computers it Infects: a worm is not a serious, a problem
(d) Anti-virus software is effective in fighting Viruses but not worms
(e) None of the above

ANSWER: (c)
7. You must install this on a network if you want to Share a broadband Internet connection.
(a) router
(b) Modem
(c) Node
(d) Cable
(e) None of these

ANSWER: (a)
8. ______________ is the ability of a device to ‘jump” directly to the requested data.
(1) Sequential access
(2) Random access
(3) Quick access
(4) All of these
(5) None of these

ANSWER (1)
9. Granting an outside organisation access to Internet web pages is often implemented using a (an)
(a) Extranet
(b) Intranet
(c) Internet
(d) Hacker
(e) None of these

ANSWER: (a)
10. The code that relational database management Systems use to perform their database task is Referred to as
(a) QBE
(b) SQL
(c) OLAP
(d) Sequel Server
(e) None of these

ANSWER: (b)
11. The purpose of the primary key in a database is to
(a) Unlock the database
(b) Provide a map of the data
(c) Uniquely identify a record
(d) Establish constraints on database operations
(e) None of the above

ANSWER: (c)
12. The instructions that tell a computer how to carry out the processing tasks are referred to as computer
(1) Programs
(2) Processors
(3) Input devices
(4) Memory modules
(5) None of these

ANSWER (1)
13. The ________________ is the amount of data that a storage device can move from the storage medium to the
computer per second.
(1) Data migration rate
(2) Data digitizing rate
(3) Data transfer rate
(4) Data access rate
(5) None of these

ANSWER (3)
14. C, BASIC, COBOL and Java examples of _languages.
(1) Low-level
(2) Computer
(3) System programming
(4) High-level
(5) None of the above

ANSWER (2)
15. A______________ is a microprocessor-based computing device.
(1) Personal computer
(2) Mainframe
(3) Workstation
(4) Server
(5) None of these

ANSWER (1)
16. The design of the network is called the network
(a) Architecture
(b) Server
(c) Transmission
(d) Type
(e) None of these

ANSWER: (a)
17. A _____________ converts all the statements in a program in a single batch and the resulting collection of Instructions is placed in a new file.
(1) Converter
(2) Compiler
(3) Interpreter
(4) Instruction
(5) None of these

ANSWER (2)
18. It uses pictures (called icons) and menus Displayed on the screen to send commands to the Computer system
(a) command-based user interface
(b) GUI
(c) System utility
(d) API
(e) None of the above

ANSWER: (b)
19. It contains data descriptions and defines the Name, data type, and length of each field in the Database
(a) Data dictionary
(b) Data table
(C) Data record
(d) Data field
(e) None of these

ANSWER: (a)
20. A is an additional set of commands that the computer displays after you make a selection from the main menu.
(1) Dialog box
(2) Submenu
(3) Menu selection
(4) All of these
(5) None of these

ANSWER (2)
21. Which of the following is NOT a type of Broadband internet connection?
(a) Cable
(b) DSL
(c) Dial-up
(d) Satellite
(e) None of these

ANSWER: (c)
22. in making a field this property show that it Cannot be left blank
(a) Numeric
(b) Required
(c) Calculated
(d) Validated
(e) None of these

ANSWER: (b)
23. There are viruses that are triggered by the Passage of time or on a certain date
(a) Boot-sector viruses
(b) Macro viruses
(c) Time bombs
(d) Worms
(e) None of these

ANSWER: (c)
24. What is a backup?
(a) Restoring the information backup
(b) An exact copy of a system’s information
(c) The ability to get a system up and running In the event of a system crash or failure
(d) All of the above
(e) None of the above

ANSWER: (d)
25. The internet is
(a) A large network of networks
(b) An internal communication system for a Business
(c) A communication system for the Indian Government
(d) All of the above
(e) None of the above

ANSWER: (d)

BANK EXAMS COMPUTER KNOWLEDGE MCQs

1.The first generation of computers were based upon
(a) transistors
(b) lC’s
(c) valves
(d) conductor
Ans : c
2.Turbo switch on computer is in
(a) back panel
(b) is not there
(c) front panel
(d) All of these
Ans : c
3.The second generation computers were based upon
(a) transistors
(b) ICs
(c) valves
(d) chips
Ans : a
4.RAM stands for
(a) Random Allowed Memory
(b) Ready Access Memory
(c) Random Access Memory
(d) Random Added Memory
Ans : c
5.In programming, you use the following keys
(a) Arrow keys
(b) Function keys
(c) Alpha keys
(d) Num keys
Ans : b
6.Printer is a device which
(a) input
(b) output
(c) Both a and b
(d) None of these
Ans : b
7.Laser printer is device which
(a) input
(b) output
(c) Both a and b
(d) None of these
Ans : b
8.Track ball has a
(a) ball
(b) track
(c) football
(d) None of these
Ans : a
9.Dot matrix printer uses what for printing
(a) hammers
(b) slugs
(c) mouse
(d) nibs
Ans : a
10.A CD can hold approximately how much of data
(a) 200 MB
(b) 700 MB
(c) 1000 MB
(d) 2000 MB
Ans : b
11. Computer program which controls the operations of computer is called
(a) assembles
(b) operating System
(c) interpreter
(d) compiler
Ans : b
12. System software are of two types operating systems and
(a) applications
(b) word processing
(c) language trans
(d) None of these
Ans : c
13.Debugging tools are there to debug errors in
(a) printers
(b) keyboards
(c) programs
(d) language
Ans : c
14. There are two basic types of disks-floppy disk and
(a) low disk
(b) hard disk
(c) soft disk
(d) None of these
Ans : b
15. It is a collection of facts and figures
(a) data
(b) information
(c) processing
(d) file
Ans : a
16.It converts accepted instructions into machine language
(a) input unit
(b) output unit
(c) processing unit
(d) memory unit
Ans : a
17. To open a new file in MS-Word, the shortcut key is
(a) Ctrl + X
(b) Ctrl + N
(c) Ctrl + Y
(d) Ctrl + V
Ans : b
18. What is the term used for the word processing programs that show you directly on the PC screen the appearance of your final document as you might expect on the paper?
(a) Search & Replace
(b) Pagination
(c) Soft Copy
(d) WYSIWYG
Ans : d
19. Alignment buttons are available on which toolbar?
(a) Status
(b) Standard
(c) Formatting
(d) None of these
Ans : c
20. Which of the following is not an option of edit menu?
(a) Cut
(b) Copy
(c) Paste
(d) Page setup
Ans : d
21. By default the bottom margin in the word document is
(a) 2 inch
(b) 1 inch
(c) 3 inch
(d) 1.5 inch
Ans : b
22.A file name cannot contain in MS-Word database file
(a) a letter
(b) number
(c) underscore
(d) space
Ans : d
23.Selection of text involves only
(a) single word
(b) line or multiple lines
(c) paragraph or paragraphs and complete document
(d) All of the above
Ans : d
24.‘Replace’ option is available in
(a) Edit menu
(b) File menu
(c) Tools menu
(d) Insert menu
Ans : a
25.When you start spelling checker, it starts checking the spellings
(a) from the end of the document to upward
(b) from the beginning of the document and downward
(c) from the insertion point
(d) None of the above
Ans : c

BANK EXAMS COMPUTER KNOWLEDGE PRACTICE MCQs

1. Which of the following is not an advantage of magnetic disk storage ?
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) None of the above
ANSWER: (d)
2. A prefix for billion which is equal to _____is called as billi.
(a) 100
(b) 10000
(c) 1000
(d) 10
 ANSWER: (a)
3. One kilobyte -byte
(a) 1250
(b) 2088
(c) 1024
(d) 1000

ANSWER: (c)
4. To move the cursor to the end of the document
press
(a) Ctrl + Esc
(b) Ctrl + End
(c) Ctrl + B
(d) Ctrl + c

ANSWER: (B)
5. The shortcut key to print documents is
(a) Ctrl + A
(b) Ctrl + B
(c) Ctrl + P
(d) Ctrl + C

ANSWER: (c)
6. In MICR, C stands for
(a) Code
(b) Colour
(c) Computer
(d) Character
(e) None of these

ANSWER: (d)
7. The simultaneous processing of two or more
Programs by multiple processors is
(a) Multiprogramming
(b) Multitasking
(c) Time-sharing
(d) Multiprocessing
(e) None of these

ANSWER: (d)
8. First layer in the OSI reference model is
(a) Data link
(b) Network
(c) Physical
(d) Application

ANSWER: (c)
9. Viruses, Trojan horses and worms are
(a) Able to harm computer system
(b) Unable to detect if affected on computer
(c) User-friendly applications
(d) Harmless applications resident on computer

ANSWER: (a)
10. Failure of passwords security due to exposure can result from
(a) Electronic monitoring
(b) Visual
(c) Both ‘a’ and ‘b’
(d) Light

ANSWER: (c)
11. Data security threats include
(a) Hardware failure
(b) Privacy invasion
(c) Fraudulent manipulation of data
(d) All of the above

ANSWER (b)
12. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar
(b) Windows
(c) Desktop
(d) Icons

ANSWER (d)
13. Accessing records from a file directly without
searching from the beginning of the file is
(a) Time sharing
(b) Random
(c) Direct access
(d) Access time

ANSWER (c)
14. Database redesign is not terribly difficult if the
(a) Database is structured
(b) Database is well-designed
(c) Database has no data
(d) Database is relatively small

ANSWER (c)
15. Which of the following SQL statements are helpful in database redesign ?
(a) Correlated sub queries only
(b) EXISTS/ NOT EXISTS expressions only
(c) Both of the above are helpful
(d) Creating the database are helpful

ANSWER (c)
16. The EXISTS keyword will be true if
(a) Any row in the sub query meets the condition only
(b) All rows in the sub query fail the condition only
(c) Both of these two conditions are met
(d) Neither of these two conditions is met

ANSWER (a)
17. How can you find rows that do not match some specified condition ?
(a) EXISTS
(b) Double use of NOT EXISTS
(C) NOT EXISTS
(d) ROWS EXIT

ANSWER (c)
18. The process of reading a database schema and producing a data model from that schema is known
as
(a) Data modeling
(b) Database design
(c) Reverse engineering
(d) Inverse engineering

ANSWER (c)
19. Which SQL-92 standard SQL command can be used to change a table name ?
(a) RENAME TABLE
(b) CHANGE TABLE
(c) ALTER TABLE
(d) None of the above is correct

ANSWER (a)
20. What SQL command can be used to delete
columns from a table ?
(a) MODIFY TABLE Table Name DROP COLUMN Column Name
(b) MODIFY TABLE Table Name DROP Column Name Column Name
(d) ALTER TABLE Table Name DROP Column Name

ANSWER (c)
21. Which of the following modifications may not succeed?
(a) Changing a column data type from char to date
(b) Changing a column data type from numeric to char
(c) Both of the above actions should succeed
(d) Neither of the above actions will succeed

ANSWER (a)
22. Changing cardinalities in a database is
(a) A common database design task
(b) A rare database design task, but does occur
(c) A database design task that never occurs
(d) Is impossible to do, so a new database must be constructed and the data moved into it

ANSWER (a)
23. A regular sub query can be processed
(a) From the top down
(b) From the bottom up
(c) By nesting
(d) From the right up

ANSWER (b)
24. How many copies of the database schema are typically used in the redesign process ?
(a) One
(b) Two
(c) Three
(d) Four

ANSWER (c)

BANK EXAMS COMPUTER KNOWLEDGE PRACTICE MCQs

1. Which of the following is not as language for computer programming ?
(a) WINDOWS
(b) PASCAL
(c) BASIC
(d) COBOL
(e) All of these
 
ANSWER: (a)
2. What digits are representative of all binary Numbers?
(H) 0
(b) 1
(c) Both ‘a’ and ‘b’
(d) 3
(e) None of these

ANSWER: (c)
3. The term gigabyte refers to
(a) 1024 bytes
(b) 1024 kilobytes
(c) 1024 megabytes
(d) 1024 gigabytes
(e) None of these

ANSWER: (c)
4. Off-line operation is the operation of devices without the control of
(a) Memory
(b) CPU
(C) ALU
(d) Control unit
(e) None of these

ANSWER: (b)
5. Name the first general purpose electronic computer
(a) ADVAC
(b) ADSAC
(c) UNIVAC
(d) EDVAC
(e) None of these

ANSWER: (c)
6. Which of the following statement is wrong?
(a) Windows XP is an operating system
(b) Linux is owned and sold by Microsoft
(c) Photoshop is a graphical design tool by Adobe
(d) Linux is free and open source software
(e) None of the above

ANSWER: (b)
7. A software used to convert source program instructions to object instruction is known as
(a) Compiler
(b) Assembler
(c) Interpreter
(d) Language processor
(e) None of these

ANSWER: (d)
8. The term ‘Operating System’ means
(a) A set of programs which control computer working
(b) The way a user operates the computer system
(c) Conversion of high level language to machine language
(d) The way computer operator works
(e) None of the above

ANSWER: (a)
9. Input, output and processing devices grouped together represent a(n) ……
(a) Mobile device
(b) Information processing cycle
(c) Circuit boards
(d) Computer system
(e) None of the above

ANSWER: (d)
10. The …… is the box that houses the most Important parts of a computer system.
(a) Software
(b) Hardware
(c) Input device
(d) System unit
(e) None of these

ANSWER: (d)
11. The physical arrangement of elements on a page is referred to as a document’s ……
(a) Features
(b) Format
(c) Pagination
(d) Grid
(d) None of these

ANSWER: (b)
12. All of the following are examples of real security and privacy risks EXCEPT
(a) Hackers
(b) Spam
(c) Viruses
(d) Identity theft
(e) None of these

ANSWER: (b)
13. The ability to recover and read deleted or damaged files from a Criminals computer is an example of a law enforcement specialty called
(a) Robotics
(b) Simulation
(C) Computer forensics
(d) Animation
(e) None of these

ANSWER: (c)
14. This tags, when placed on an animal, can be used to record and track in a database all of the
Animal’s movements
(a) POS C
(b) RFID
(C) PPS
(d) GPS
(e) None of these

ANSWER: (b)
15. These terminals (formerly known as cash Registers) are often connected to complex inventory and sales computer systems
(a) Data
(b) Point-of-sale (POS)
(c) Sales
(d) Query
(e) None of the above

ANSWER: (b)
16. Technology no longer protected by copyright,available to everyone, is considered to be
(a) proprietary.
(b) Open
(c) Experimental
(d) In the public domain
(e) None of the above

ANSWER: (a)
17. It is the science that attempts to produce machines that display the same type of Intelligence that humans do
(a) Nano science
(b) Nanotechnology
(c) Simulation
(d) Artificial intelligence (AI)
(e) None of the above

ANSWER: (d)
18. The name for the way that computers manipulate data into information is Called
(a) Programming
(b) Processing
(C) Storing
(d) Organizing
(e) None of these

ANSWER: (b)
19.Computers gather data, which means that they allow users to
(a) Present data
(B) input data
(C) Output data
(d) Store data
(e) None of these

ANSWER: (b)
20. Which type of data has been organized or presented in a meaningful fashion ?
(a) A process
(b) Software
(C) Storage
(d) Information
(e) None of these

ANSWER: (d)
21. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered -
(a) Data
(b) Output
(c) Input
(d) The process
(e) None of these

ANSWER: (b)
22. Computers process data into information by working exclusively with
(a) Multimedia
(b) Words
(c) Characters
(d) Numbers
(e) None of these

ANSWER: (d)
23. The term bit is short for
(a) Megabyte
(b) Binary language
(C) Binary digit
(d) Binary number
(e) None of these

ANSWER: (c)
24. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of
(a) eight bytes
(b) eight kilobytes
(C) Eight characters
(d) eight bits
(e) None of these

ANSWER: (d)
25. Computers use which language to process data?
(a) Processing
(b) Kilobyte
(C) binary
(d) Representational
(e) None of these

ANSWER: (c)

BANK PO EXAM SOLVED PAPER

(Exam held on 18-09-2011)  


1. Computer uses the……….number system to store data and perform calculations.
(A) binary
(B) octal
(C) decimal
(D) hexadecimal
(E) None of these
Ans : (A)

2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is–
(A) Memory-only
(B) Write-only
(C) Once-only
(D) Run-only
(E) Read-only
Ans : (E)

3. Which of the following can be used to select the entire document ?
(A) CTRL+A
(B) ALT+F5
(C) SHIFT+A
(D) CTRL+K
(E) CTRL+H
Ans : (A)

4. ……….are 'attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above
Ans : (A)

5. Part number, part description, and number of parts ordered are examples of–
(A) control
(B) output
(C) processing
(D) feedback
(E) input
Ans : (E)

6. A Web site's main page is called its–
(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these
Ans : (A)

7. The simultaneous processing of two or more programs by multiple processors is–
(A) multiprogramming
(B) multitasking
(C) time-sharing
(D) multiprocessing
(E) None of these
Ans : (D)

8. Codes consisting of lines of varying widths or lengths that are computer-readable are known as–
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
(E) None of these
Ans : (D)

9. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to AutoFit Contents.
(A) Fit to Form
(B) Format
(C) Autosize
(D) Contents
(E) AutoFit
Ans : (E)

10. Why is it unethical to share copyrighted files with your friends ?
(A) It is not unethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.
(E) It is not unethical-anyone can access a computer
Ans : (C)

11. Reusable optical storage will typica1ly have the acronym–
(A) CO
(B) DVD
(C) ROM
(D) RW
(E) ROS
Ans : (D)

12. The most common type of storage devices are–
(A) persistent
(B) optical
(C) magnetic
(D) flash
(E) steel
Ans : (D)

13. A device that connects to a network without the use of cables is said to be–
(A) distributed
(B) free
(C) centralized
(D) open source
(E) None of these
Ans : (B)

14. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a–
(A) hacker
(B) analyst
(C) instant messenger
(D) programmer
(E) spammer
Ans : (A)

15. To access properties of an object, the mouse technique to use is–
(A) dragging
(B) dropping
(C) right-clicking
(D) shift-clicking
(E) None of these
Ans : (C)

16. To change selected text to all capital letters, click the change case button, then click–
(A) UPPERCASE
(B) UPPER ALL
(C) CAPS LOCK
(D) Lock Upper
(E) Large Size
Ans : (A)

17. The basic unit of a worksheet into which you enter data in Excel is called a–
(A) tab
(B) cell
(C) box
(D) range
(E) None of these
Ans : (B)

18. You can keep your personal files / folders in–
(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Ans : (B)

19. In Word you can force a page break–
(A) By positioning your cursor at the appropriate place and pressing the F1 key
(B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter
(C) By using the Insert/Section Break
(D) By changing the font size of your document
(E) None of these
Ans : (B)

20. A DVD is an example of a(n) –
(A) hard disk
(B) optical disc
(C) output device
(D) solid-state storage device
(E) None of these
Ans : (B)

21. The default view in Excel is……….view.
(A) Work
(B) Auto
(C) Normal
(D) Roman
(E) None of these
Ans : (C)

22. The process of transferring files from a computer on the Internet to your computer is called–
(A) downloading
(B) uploading
(C) FTP
(D) JPEC
(E) downsizing
Ans : (A)

23. ……….is the process of dividing the disk into tracks and sectors.
(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
(E) None of these
Ans : (B)

24. Help Menu is available at which button ?
(A) End
(B) Staft
(C) Turnoff
(D) Restart
(E) Reboot
Ans : (B)

25. The contents of……….are lost when the computer turns off.
(A) storage
(B) input
(C) output
(D) memory
(E) None of these
Ans : (D)

26. When you save to this, your data will remain intact even when the computer is turned off–
(A) RAM
(B) Motherboard
(C) Secondary storage device
(D) Primary storage device
(E) None of these
Ans : (C)

27. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n) –
(A) supercomputer
(B) minicomputer
(C) laptop
(D) server
(E) None of these
Ans : (D)

28. The……….folder retains copies of messages that you have started but are not yet ready to send.
(A) Drafts
(B) Outbox
(C) Address Book
(D) Sent Items
(E) Inbox
Ans : (B)

29. Grouping and processing all of a firm's transactions at one time is called–
(A) a database management system
(B) batch processing
(C) a real-time system
(D) an on-line system
(E) None of these
Ans : (B)

30. The……….enables you to simultaneously keep multiple Web pages open in one browser window.
(A) tab box
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key
Ans : (C)

31. Which ports connect special types of music instruments to sound cards ?
(A) BUS
(B) CPU
(C) USB
(D) MIDI
(E) MINI
Ans : (C)

32. You can……….a search by providing more information the search engine can use to select a smaller, more useful set of results.
(A) refine
(B) expand
(C) load
(D) query
(E) slowdown
Ans : (A)

33. What is the permanent memory built into your computer called ?
(A) RAM
(B) Floppy
(C) CPU
(D) CO-ROM
(E) ROM
Ans : (E)

34. What displays the contents of the active cell in Excel ?
(A) Name box
(B) Row Headings
(C) Formula bar
(D) Task pane
(E) None of these
Ans : (A)

35. The piece of hardware that converts your computer's digital signal to an analog signal that can travel over telephone lines is called 
(A) red wire
(B) blue cord
(C) tower
(D) modem
(E) None of these
Ans : (D)

36. Video processors consist of……….and………., which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) None of these
Ans : (C)

37. If you want to connect to your own computer through the Internet from another location, you can use–
(A) e-mail
(B) FTP
(C) instant message
(D) Telnet
(E) None of these
Ans : (D)

38. To reload a Web page, press the……….button.
(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh
Ans : (E)

39. This first step in the transaction processing cycle captures business data through various modes such as optical scanning or at an electronic commerce website–
(A) Document and report generation
(B) Database maintenance
(C) Transaction processing startup
(D) Data Entry
(E) None of these
Ans : (D)

40. A(n) ……….is a special visual and audio effect applied in Power-point to text or content.
(A) animation
(B) flash
(C) wipe
(D) dissolve
(E) None of these
Ans : (A)

41. When the pointer is positioned on a……….it is shaped like a hand.
(A) grammar error
(B) Formatting error
(C) Screen Tip
(D) Spelling error
(E) hyperlink
Ans : (E)

42. Personal computers can be connected together to form a–
(A) server
(B) supercomputer
(C) network
(D) enterprise
(E) None of these
Ans : (C)

43. A……….is the term used when a search engine returns a Web page that matches the search criteria.
(A) blog
(B) hit
(C) link
(D) view
(E) success
Ans : (E)

44. ……….are words that a programming language has set aside for its own use.
(A) Control words
(B) Control structures
(C) Reserved words
(D) Reserved keys
(E) None of these
Ans : (C)

45. Mobile Commerce is best described as–
(A) The use of Kiosks in marketing
(B) Transporting products
(C) Buying and selling goods/services through wireless handheld devices
(D) Using notebook PC's in marketing
(E) None of the above
Ans : (C)

46. Which of, the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information–
(A) floppy diskette
(B) hard disk
(C) permanent disk
(D) optical disk
(E) None of these
Ans : (B)

47. The computer abbreviation KB usually means–
(A) Key Block
(B) Kernel Boot
(C) Key Byte
(D) Kit Bit
(E) Kilo Byte
Ans : (E)

48. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) Configuration
(B) Download
(C) Storage
(D) Upload
(E) Installation
Ans : (D)

49. In Excel……….allows users to bring together copies of work-books that other users have worked on independently.
(A) Copying
(B) Merging
(C) Pasting
(D) Compiling
(E) None of these
Ans : (B)

50. Which of the following are advantages of CD-ROM as a storage media?
(A) CD-ROM is an inexpensive way to store large, amount of data and information
(B) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) An of the above
(E) None of these
Ans : (D)