Saturday, 14 June 2014

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. The number of pixels displayed on a screen is known as the _____ screen.
a) Viewing size
b) Color depth
c) Refresh rate
d) Resolutions
e) None of these

2. A proxy server is used for which of the following?
a) To process client requests for web pages
b) To process client requests for database access
c) To provide TCP/IP
d) To provide security against unauthorized users
e) None of these

3. A contains buttons and menus that provide quick access to commonly used commands?
a) Menu bar
b) Tool bar
c) Window
d) Action bar
e) None of these

4. Which among the following is not a security / privacy risk?
a) Hacking
b) Virus
c) Spam
d) Phishing
e) None of these

5. Which of the key is not on the number keypad?
a) Ctrl
b) Del
c) Enter
d) Num Lock
e) None of these

6. Which of the following refers to stand alone programs?
a) Executable programs
b) Source program
c) Object programs
d) All of the above
e) None of the above

7. What is the keyboard shortcut to move backward through the tabs?
a) SHIFT+TAB
b) CTRL+SHIFT+TAB
c) CTRL+TAB
d) ALT+TAB
e) None of these

8. What is the most common tool used to restrict access?
a) Access control software
b) Computer keys
c) User logins
d) Passwords
e) None of these

9. Which of the following is not an example of a document file?
a) Spreadsheet
b) Memo
c) Letter
d) Term paper
e) Thesis

10. What menu is selected to cut, copy, and paste?
a) File
b) Edit
c) Tools
d) Table
e) None of the above

11. A network geometric arrangement in which a single connection line is shared by a number of nodes is called?
a) Ring Topology
b) Bus Topology
c) Star topology
d) All of these
e) None of these

12. In Windows operating system the shortcut key CTRL+R is used to?
a) Open the print dialog box
b) Update the current web page
c) Close the current window
d) Close the current window
e) None of these

13. What is the other name for a LAN Card?
a) Network Connector
b) MODEM
c) Internet Card
d) Network Interface Card
e) None of these

14. MS Word allows creation of _____ type of documents by default?
a) .txt
b) .win
c) .dot
d) .doc
e) None of these

15. The process of a computer receiving information from a server on the Internet is known as?
a) Pulling
b) Pushing
c) Downloading
d) Transferring
e) None of these

16. Which of the following is the "Bubble Memory"?
a) Nonvolatile
b) Volatile
c) Permanent
d) Primary memory
e) None of these

17. Which of the following is not a standard MS Office Edition?
a) Standard
b) Professional
c) Normal
d) Advanced
e) None of these

18. Windows Explorer is a __________?
a) Drive
b) Browser
c) Network
d) Data Base
e) File Manager

19. Which type of protocol is used for accessing internet/ web on mobile phones?
a) HTTP
b) PPP
c) FTP
d) WAP
e) SMPT

20. When sending an e-mail, the _____ line describes the contents of the message?
a) Subject
b) to
c) Contents
d) cc
e) None of these

21. Uniform resource locator is another name of________?
a) Title bar
b) Web address
c) Title bar
d) Address bar
e) Formula bar

22. What is the default font size of cell content in EXCEL?
a) 8
b) 9
c) 10
d) 11
e) 12

23. Basic Input Output System (BIOS) is necessary for?
a) Boot-up
b) Mouse and keyboard only
c) Revolutions
d) Audio and video system
e) None of these

24. Which of the following cables can transmit data at high speeds?
a) Coaxial Cable
b) Optic Fiber Cable
c) UTP Cable
d) Twisted pair Cable
e) None of these

25. The software that allows users to surf the Internet is called an?
a) Search engine
b) Internet Service Provider (ISP)
c) Multimedia application
d) Browser
e) None of these

26. Shimmer Sparkle Text, Blinking Background, etc are known as?
a) Front style
b) Word Art
c) Font effects
d) Text Layout
e) Text effect

27. The Output Quality of a printer is measured by?
a) Dots per sq inch
b) Dots per inch
c) Dots printed per unit
d) Dots printed per line
e) None of these

28. Which of the following is not an Internet connection?
a) Broadband
b) WWAN
c) DSL
d) WLAN
e) Dial-up

29. Unsolicited commercial email is commonly known as?
a) Junk
b) Spam
c) Hoaxes
d) Hypertext
e) None of these

30. Which of the following is not an output device?
a) Plotter
b) Printer
c) Monitor
d) Touch Screen
e) None of these

31. Which process checks to ensure that the components of the computer are operating and connected properly?
a) Processing
b) Saving
c) Editing
d) Booting
e) None of these

32. ________ file format is used for data compression and archiving?
a) .exe
b) .in
c) .com
d) .zip
e) .win

33. ________ is a combination of software and hardware?
a) Firmware
b) Shareware
c) Freeware
d) Netware
e) Software

34. To move to the beginning of a line of text, press the _______ key?
a) Alt
b) Page up
c) Enter
d) Home
e) None of these

35. 'DOS' floppy disk does not have?
a) A Boot Record
b) A File Allocation Table
c) A Root Directory
d) Virtual Memory
e) BIOS

36. ISDN is an Acronym?
a) Integrated Standard Digital Network
b) Intelligent Services Digital Network
c) Integrated Services Digital Network
d) Integrated Services Data Network
e) None of these

37. Which of the following is not a term pertaining to the internet?
a) Link
b) Touch Pad
c) Browser
d) Search engine
e) All of these

38. To insert a new slide in the current presentation, we can choose?
a) CTRL + N
b) CTRL + O
c) CTRL + F
d) CTRL + M
e) None of these

39. Multiple calculations can be made in a single formula using?
a) Standard Formula
b) Array Formula
c) Complex Formula
d) Smart Formula
e) None of these

40. Which of the following is used to identify a user who returns to a Website?
a) ASPs
b) Scripts
c) Plug-ins
d) Cookies
e) None of these

ANSWERS:
1) d 2) d 3) b 4) c 5) a 6) a 7) b 8) d 9) a 10) b
11) b 12) b 13) d 14) d 15) c 16) a 17) d 18) e 19) d 20) a
21) b 22) d 23) a 24) b 25) d 26) e 27) a 28) b 29) b 30) d
31) d 32) d 33) b 34) d 35) d 36) c 37) b 38) d 39) b 40) d

Sunday, 8 June 2014

COMPUTER AWARENESS PRACTICE QUESTIONS FOR SBI P.O. & ASSISTANTS EXAM

1. Fire Wall is used to…..
a) Select Network
b) Protect Network
c) Highlight Network
d) All of these
e) None of these

2. The button that displays the window over the entire screen is?
a) Scroll box down size
b) Restore down
c) Minimize
d) Maximize
e) None of these

3. Which of the following cannot be done by a computer virus……?
a) Loss of Data
b) Deletion of File
c) Corruption of a Program
d) All of these
e) None of these

4. What do we call a copy printed through a computer printer……?
a) Soft Copy
b) Hard Copy
c) Computer Printed
d) Laser Print
e) None of these

5. The .xls extension is used for ______ files?
a) Windows
b) Access
c) Power Point
d) Word
e) Excel

6. What is the term for calculations used within spreadsheets?
a) Analyses
b) Ranges
c) Formulas
d) Recalculations
e) Values

7. A collection of Raw Facts is…?
a) Input
b) Output
c) Information
d) Data
e) File

8. A _________ is a computer connected to two networks?
a) link
 b) Server
c) Gateway
d) Bridge way
e) None of these

9. In a customer database, a customer's surname would be keyed into a?
a) Row
b) Text field
c) Record
d) Computed field
e) None of these

10. A flaw in a program may that causes it to produce incorrect or inappropriate results is called a.….?
a) Bug
b) Hacking
c) Phishing
d) Attribute
e) None of these

11. Which of the following can input graphical images and picture for computers?
a) Plotter
 b) Scanner
c) Mouse
d) Printer
e) Keyboard

12. Attributes can defined as?
a) Entity
b) Switch board
c) Macro
d) Pages
e) None of the above

13. Where will we find the referential integrity command?
a) Tools
b) Switch Board
c) Format
d) Table
e) None of these

14. What refers to a set of characters of a particular design?
a) Key face
b) Formation
c) Calligraph
d) Stencil
e) Type face

15. Smart Card is….?
a) Special Purpose Card
b) Micro Processor Card
c) Processing unit contains memory for storing data
d) Processing unit for Software handling
e) None of these

16. Which of the following would you find on LinkedIn?
a) Games
b) Connections
c) Chat
d) Applications
e) None of these

17. What is a URL?
a) A computers software program
b) Atype of programming object
c) The address of a documents or 'page' on the World Wide Web
d) An Acronym for Unlimited Resources for learning
e) A piece of Hardware

18. ______ is a technique that is used to send more than one call over a single line?
a) Digital transmission
b) Infrared transmission
c) Digitizing
d) Multiplexing
e) Streaming

19. To access properties of an object, the mouse technique to use is?
a) Dragging
b) Dropping
c) Right-clicking
d) Shift-clicking
e) None of these

20. For internet banking a customer requires…….?
a) Personal Computer and a telephone line
b) Personal Computer, telephone line and modem
c) Personal Computer, telephone line & Internet Service Provider
d) Personal Computer, telephone line, modem & Internet Service Providers
e) None of these

21. A touchpad responds to?
a) Light
b) Pressure
c) clicking
d) the sense of heat from fingerprints
e) None of these

22. The computer that hosts your email account is known as ?
a) Host
b) e-mail client
c) e-mail server
d) Listserv
e) None of these

23. The most common pointing input devices?
a) Trackball
b) Touchpad
c) Touch screen
d) Mouse
e) Scanner

24. What does a website address uniquely specify?
a) Web Browser
b) Web site
c) PDA
d) Storage
e) Hard disk

25. Expansion cards are inserted into?
a) Slots
b) Peripheral devices
c) The CPU
d) The Back of the computers
e) Pegs

26. The Name of a Microsoft office word document is displayed in both the _________ and the taskbar?
a) Menu bar
b) Task bar
c) Formatting Tool bar
d) Standard Tool bar
e) Title bar

27. The display size of a monitor is measured ?
a) Zig- zag
b) Horizontally
c) Vertically
d) From center to the furthest corner
e) Diagonally

28. Operating system's and utility program are in a class of software known as?
a) Application Software
b) Sequential software
c) Software suites
d) BIOS Software
e) System software

29. The justification that aligns text on both margins of document in Word is?
a) Justify
b) Bold
c) Centre
d) Right
e) Balanced

30. What do we call the Inbuilt Storage Device in the Computer……?
a) Hard Disk
b) Mother Board
c) RAM
d) ROM
e) None of these

31. A byte can represent any number between 0 and _____?
a) 2
b) 255
c) 256
d) 1024
e) 1025

32. Which part of the computer helps to store information?
a) Monitor
b) Keyboard
c) Disk drive
d) Printer
e) None of these

33. Linux is a type of____ software?
a) Share ware
b) Commercial
c) Proprietary
d) Open source
e) Hidden type

34. Which key is used to delete one character to the left of the current position of the cursor?
a) Backspace
b) Delete
c) Insert
d) Esc
e) Ctrl

35. What of the following means the altering of computer system software to achieve a task for which it was not originally designed…?
a) Breaking
b) Hacking
c) Trekking
d) Pegging
e) None of these

36. POST stands for?
a) Power on Self Test
b) Program on self test
c) Power on system test
d) Program on system test
e) None of these

37. An educational institution would generally have the following in its domain name?
a) .org
b) .edu
c) .inst
d) .com
e) .sch

38. Which of the following is not a term pertaining to the Internet?
a) Keyboard
b) Link
c) Browser
d) Search engine
e) Hyper link

39. Which of the following is used by the browser to connect to the location of the Internet resources?
a) Linkers
b) Protocol
c) Cable
d) URL
e) None of these

40. Which of the following is Hardware and not software?
a) Excel
b) Printer driver
c) Operating System
d) Power Point
e) CPU

ANSWERS:
1) b 2) d 3) e 4) b 5) e 6) c 7) d 8) b 9) d 10) a
11) b 12) a 13) e 14) c 15) c 16) b 17) c 18) d 19) c 20) d
21) d 22) c 23) c 24) b 25) a 26) d 27) e 28) e 29) a 30) a
31) b 32) c 33) a 34) a 35) b 36) a 37) b 38) a 39) d 40) e