Sunday, 27 July 2014

COMPUTER AWARENESS PRACTICE QUESTIONS FOR BANK EXAMS

1. Which one of the following is different from other three?
1) MAC Address
2) Hardware Address
3) Physical Address
4) IP Address
5) None of these

2. dentify the IP address from the following:
1) 300.215.317.3
2) 302.215@417.5
3) 202.50.20.148
4) 202-50-20-148
5) 101.50. 2 0.148

3. Which one of the following is not a/an image/ graphic file format?
1) PNG
2) GIF
3) BMP
4) GUI
5) None of these

4. Which of the following command is used to set the task priority in UNIX?
1) init
2) nice
3) PS
4) Kill
5) Loss

5. ____ is a protocol used by email clients to download e-mails to your computer.
1) SMTP
2) POP
3) FTP
4) MAIL
5) None of these

6. Which of the following is not a CPU trade name?
1) Intel
2) Dell
3) AMD
4) Cyrix
5) All of the above

7. The idea of stored-program concept was revealed by:
1) Pascal
2) Babbage
3) Neumann
4) Bill gates
5) James

8. Memories which can be read only are called ____ memories.
1) RAM
2) Secondary Memory
3) EERAM
4) Dynamic Memories
5) ROM

9. In a client/ server model, a client program ___
1) asks for information
2) provides information and files
3) serves software files to other computers
4)distributes data files to other computers
5) All of the above

10. Dot-matrix, DeskJet, Inkjet and Laser.. these all are which type of computer peripherals?
1) Keyboards
2) Software
3) Monitors
4) Hardware
5) Printers

11. Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?
1) MAC Layer
2) Data link layer
3) Transport layer
4) Application layer
5) Network layer

12.What is the meaning of 'Hibernate' in Windows XP/ Windows 7?
1) Restart the computers in safe mode
2) Restart the computers in normal mode
3) Shutdown the computer terminating all the running applications
4) Shutdown the computer without closing the running applications
5) None of these

13. Decisions or Conditions in flowchart is represented by ____.
1) Diamond
2) Parallelogram
3) Rectangle
4) Circle
5) All of the above

14. ____ is technology that allows someone to turn on a network computer remotely by sending a special data packet.
1) WAN
2) WHOL
3) WOL
4)Windows Mesh
5) None of these

15. Which of the following memory allocation scheme suffers from external fragmentation?
1) Segmentation
2) Pure demand paging
3) Swapping
4) Paging
5) None of these

16.A computer program that translates a program statement by statement into machine language is called a/an ____
1) Compiler
2) Simulator
3) Translator
4) Interpreter
5) Assembler

17. Mnemonic codes and variable name are used in a/ an ___
1) Machine language
2) Assembly language
3) High level language
4) All of the above
5) None of the above

18. CGI stands for:
1) Common Graphics Interface
2) Common Gateway Interchange
3) Common Gateway Interface
4) Computer Gateway Interface
5) None of these

19. If user is not able to see the image on the web page, the text that is displayed in place of the image, is specified by which of the following attributes in HTML?
1) ALTERNATE
2) ALTLINK
3) ALT_TEXYT
4) ALT
5) None of these

20. Which one of the following is different from other three?
1) Google
2) Windows
3) Linux
4) Mac
5) None of these

ANSWERS:
1) 4; 2) 3; 3) 4; 4) 2; 5) 2; 6) 2; 7) 3; 8) 5; 9) 1; 10) 5;
11) 5; 12) 4; 13) 1; 14) 3; 15) 1; 16) 4; 17) 1; 18) 3; 19) 4; 20) 1

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. A hard disk is divided into tracks which is further subdivided into?
a) Clusters
b) Sectors
c) Vectors
d) Heads
e) None of these

2. What is the radix of Binary Number System?
a) 3
b) 1
c) 2
d) 4
e) 0

3. Which of the following holds the ROM, RAM, CPU?
a) Hard Disk
b) ALU
c) Mother Board
d) All of the above
e) None of the above

4. Portable program means:
a) Program with wheels
b) Independent from its authors
c) Independent of platform
d) All of the above
e) None of the above

5. 1 GB is equal to ____.
a) 230 bits
b) 230 bytes
c) 220 bits
d) 220 bytes
e) None of these

6. Which of the following are the 5 generic software engineering framework activities?
a) Communication, Planning, Modeling, Construction, Deployment
b) Communication, Risk management, Measurement, Production, Reviewing
c) Analysis, Designing, Programming, Debugging, Maintenance
d) Analysis, Planning, Designing, Programming, Testing
e) None of these

7. The principal electronic payment system for electronic commerce is ____.
a) Credit Card
b) Digital Wallet
c) Electronic Cheque
d) All of the above
e) None of these

8. The name of first super computer of India:
a) Saga 220
b) PARAM 8000
c) ENIAC
d) PARAM 6000
e) None of these

9. The machine readable form of a program is called as ___
a) Source code
b) Object code
c) Compiler
d) Executable File
e) All of the above

10. AVI format was developed by:
a) IBM
b) Apple
c) Microsoft
d) Macromedia
e) Sun Microsoft

11. Which of the following IP address class is a multicast address?
a) Class A
b) Class B
c) Class C
d) Class D
e) Class F

12. Each character on the keyboard of computer has an ASCII value which stands for:
a) African Standard Code for Information Interchange
b) American Standard Code for Information Interchange
c) American Stock Code for Information Interchange
d) American Standard Code for Information Interfere
e) None of these

13. Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?
a) Network layer
b) Data link layer
c) Transport layer
d) Application layer
e) Mac layer

14. What is the meaning of 'Hibernate' in Windows XP/ Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications
e) None of these

15. The basic unit of a worksheet into which you enter data in Excel is called a ___
a) Cell
b) Table
c) Box
d) Column
e) None of these

16. Which of the following is a correct format of e-mail address?
a) sales@website; info
b) sales@website.info
c) saleswebsite.info
d) sales.website.info
e) All of the above

17. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Ctrl + P
d) Ctrl+Shift+P
e) None of these

18. The operating system does all of the following EXCEPT:
a) Provide a way for the user to interact with the computer
b) Manage the Central Processing Unit (CPU)
c) Manage memory and storage
d) Enable users to perform a specific task such as document editing
e) All of the above

19. ____ is the ability of an operating system to control the activities of multiple programs at the
same time.
a) Streamlining
b) Multiuser
c) Multitasking
d) Simulating
e) None of these

20. Verification of a login name and password is known as:
a) Configuration
b) Accessibility
c) Authentication
d) Logging in
e) Logging off

21. All of the following statements concerning windows are true EXCEPT:
a) Windows are an example of a command-driven environment
b) Windows can be resized and repositioned on the desktop
c) More than one window can be open at a time
d) Toolbars and scrollbars are features of windows
e) None of these

22. All of the following statements concerning files are true EXCEPT:
a) A file is a collection of related pieces of information stored together for easy reference
b) Files can be generated from an application
c) Files are stored in RAM
d) Files should be organized in folders
e) None of these

23. What are the four things needed to connect to the Internet?
a) Monitor, Keyboard, Mouse and Modem
b) Telephone line, PDA, Modem and Computer
c) Telephone line, Modem, Computer and an ISP
d) Modem, Computer, PDA and ISP
e) None of the above

24. Which of the following is true about firewalls?
a) Follows a set of rules
b) Can be either a hardware or software device
c) Filters network traffic
d) All of the above
e) None of these

25. Data that are accumulated and processed in group called:
a) Group processing
b) Batch Processing
c) Time sharing
d) All of the above
e) None of the above

26. Allocation of resources in a time dependent manner to several program simultaneously called as:
a) Multi user
b) Multi tasking
c) Time sharing
d) All of the above
e) None of the above

27. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called:
a) Simulation
b) Animation
c) Robotics
d) Computer forensics
e) None of these

28. In the binary language each letter of the alphabet, each number and each special character is made up
of a unique combination of:
a) Eight bytes
b) Eight characters
c) Eight bits
d) Eight kilobytes
e) None of the above

29. Servers are computers that provide resources to other computers connected to a:
a) Mainframe
b) Supercomputer
c) Network
d) Client
e) User

30. The difference between people with access to computers and the Internet and those without this
access is known as the:
a) Digital divide
b) Internet divide
c) Web divide
d) Cyber way divide
e) All of the above


ANSWERS:
1) b; 2) c; 3) c; 4) c; 5) b; 6) a; 7) d; 8) b; 9) b; 10) c;
11) d; 12) b; 13) a; 14) d; 15) a; 16) b; 17) c; 18) d; 19) c; 20) c;
21) a; 22) c; 23) c; 24) d; 25) b; 26) c; 27) d; 28) c; 29) c; 30) a;

Tuesday, 22 July 2014

COMPUTER KNOWLEDGE PRACTICE MCQs FOR IBPS EXAMS

1. The number of pixels displayed on a screen is known as the _____ screen.
a) Viewing size
b) Color depth
c) Refresh rate
d) Resolutions
e) None of these

2. A proxy server is used for which of the following?
a) To process client requests for web pages
b) To process client requests for database access
c) To provide TCP/IP
d) To provide security against unauthorized users
e) None of these

3. A contains buttons and menus that provide quick access to commonly used commands?
a) Menu bar
b) Tool bar
c) Window
d) Action bar
e) None of these

4. Which among the following is not a security / privacy risk?
a) Hacking
b) Virus
c) Spam
d) Phishing
e) None of these

5. Which of the key is not on the number keypad?
a) Ctrl
b) Del
c) Enter
d) Num Lock
e) None of these

6. Which of the following refers to stand alone programs?
a) Executable programs
b) Source program
c) Object programs
d) All of the above
e) None of the above

7. What is the keyboard shortcut to move backward through the tabs?
a) SHIFT+TAB
b) CTRL+SHIFT+TAB
c) CTRL+TAB
d) ALT+TAB
e) None of these

8. What is the most common tool used to restrict access?
a) Access control software
b) Computer keys
c) User logins
d) Passwords
e) None of these

9. Which of the following is not an example of a document file?
a) Spreadsheet
b) Memo
c) Letter
d) Term paper
e) Thesis

10. What menu is selected to cut, copy, and paste?
a) File
b) Edit
c) Tools
d) Table
e) None of the above

11. A network geometric arrangement in which a single connection line is shared by a number of nodes is called?
a) Ring Topology
b) Bus Topology
c) Star topology
d) All of these
e) None of these

12. In Windows operating system the shortcut key CTRL+R is used to?
a) Open the print dialog box
b) Update the current web page
c) Close the current window
d) Close the current window
e) None of these

13. What is the other name for a LAN Card?
a) Network Connector
b) MODEM
c) Internet Card
d) Network Interface Card
e) None of these

14. MS Word allows creation of _____ type of documents by default?
a) .txt
b) .win
c) .dot
d) .doc
e) None of these

15. The process of a computer receiving information from a server on the Internet is known as?
a) Pulling
b) Pushing
c) Downloading
d) Transferring
e) None of these

16. Which of the following is the "Bubble Memory"?
a) Nonvolatile
b) Volatile
c) Permanent
d) Primary memory
e) None of these

17. Which of the following is not a standard MS Office Edition?
a) Standard
b) Professional
c) Normal
d) Advanced
e) None of these

18. Windows Explorer is a __________?
a) Drive
b) Browser
c) Network
d) Data Base
e) File Manager

19. Which type of protocol is used for accessing internet/ web on mobile phones?
a) HTTP
b) PPP
c) FTP
d) WAP
e) SMPT

20. When sending an e-mail, the _____ line describes the contents
of the message?
a) Subject
b) to
c) Contents
d) cc
e) None of these

21. Uniform resource locator is another name of________?
a) Title bar
b) Web address
c) Title bar
d) Address bar
e) Formula bar

22. What is the default font size of cell content in EXCEL?
a) 8
b) 9
c) 10
d) 11
e) 12

23. Basic Input Output System (BIOS) is necessary for?
a) Boot-up
b) Mouse and keyboard only
c) Revolutions
d) Audio and video system
e) None of these

24. Which of the following cables can transmit data at high speeds?
a) Coaxial Cable
b) Optic Fiber Cable
c) UTP Cable
d) Twisted pair Cable
e) None of these

25. The software that allows users to surf the Internet is called an?
a) Search engine
b) Internet Service Provider (ISP)
c) Multimedia application
d) Browser
e) None of these

26. Shimmer Sparkle Text, Blinking Background, etc are known as?
a) Front style
b) Word Art
c) Font effects
d) Text Layout
e) Text effect

27. The Output Quality of a printer is measured by?
a) Dots per sq inch
b) Dots per inch
c) Dots printed per unit
d) Dots printed per line
e) None of these

28. Which of the following is not an Internet connection?
a) Broadband
b) WWAN
c) DSL
d) WLAN
e) Dial-up

29. Unsolicited commercial email is commonly known as?
a) Junk
b) Spam
c) Hoaxes
d) Hypertext
e) None of these

30. Which of the following is not an output device?
a) Plotter
b) Printer
c) Monitor
d) Touch Screen
e) None of these

31. Which process checks to ensure that the components of the computer are operating and connected properly?
a) Processing
b) Saving
c) Editing
d) Booting
e) None of these

32. ________ file format is used for data compression and archiving?
a) .exe
b) .in
c) .com
d) .zip
e) .win

33. ________ is a combination of software and hardware?
a) Firmware
b) Shareware
c) Freeware
d) Netware
e) Software

34. To move to the beginning of a line of text, press the _______ key?
a) Alt
b) Page up
c) Enter
d) Home
e) None of these

35. 'DOS' floppy disk does not have?
a) A Boot Record
b) A File Allocation Table
c) A Root Directory
d) Virtual Memory
e) BIOS

36. ISDN is an Acronym?
a) Integrated Standard Digital Network
b) Intelligent Services Digital Network
c) Integrated Services Digital Network
d) Integrated Services Data Network
e) None of these

37. Which of the following is not a term pertaining to the internet?
a) Link
b) Touch Pad
c) Browser
d) Search engine
e) All of these

38. To insert a new slide in the current presentation, we can choose?
a) CTRL + N
b) CTRL + O
c) CTRL + F
d) CTRL + M
e) None of these

39. Multiple calculations can be made in a single formula using?
a) Standard Formula
b) Array Formula
c) Complex Formula
d) Smart Formula
e) None of these

40. Which of the following is used to identify a user who returns to a Website?
a) ASPs
b) Scripts
c) Plug-ins
d) Cookies
e) None of these

ANSWERS:
1) d 2) d 3) b 4) c 5) a 6) a 7) b 8) d 9) a 10) b
11) b 12) b 13) d 14) d 15) c 16) a 17) d 18) e 19) d 20) a
21) b 22) d 23) a 24) b 25) d 26) e 27) a 28) b 29) b 30) d
31) d 32) d 33) b 34) d 35) d 36) c 37) b 38) d 39) b 40) d

COMPUTER AWARENESS PRACTICE QUESTIONS FOR IBPS CWE

1. Computer audit involves review of ____
a) Established policies
b) Efficiency of operations
c) Checking of data integrity
d) a, b, c
e) None of these

2. Which of the following is not available in Font Spacing?
a) Normal
b) Loosely
c) Condensed
d) Expanded
e) None of these

3. Dynamic Adhoc Wireless Networks (DAWN) usually come under?
a) 2G
b) 3G
c) 4G
d) 5G
e) None of these

4. Which of the following is Not a characteristic of e-mail?
a) Low cost
b) Record maintenance in data base
c) High speed
d) Waste reduction
e) None of these

5. Which of the following is not an example of hard ware?
a) Scanner
b) Printer
c) Mouse
d) Monitor
e) Interpreter

6. A magnetic strip is fixed on the back of the cards, which holds information about the customer such as his account number etc also contains his:
a) Personal Identification Number
b) Address
c) Age
d) Occupation
e) None

7. What is used in most programs that is a part of program and guides the user through certain steps?
a) Wizard
b) Software
c) Wiki
d) Hardware
e) None of these

8. Which one of the following input device is user-programmable?
a) Dumb terminal
b) Smart terminal
c) VDT
d) Intelligent terminal
e) None of these

9. The most frequently used instructions of a computer program are likely to be fetched from?
a) The hard disk
b) Cache memory
c) RAM
d) Registers
e) None

10. In Excel, this is a prerecorded formula that provides a shortcut for complex calculations?
a) Value
b) Data Series
c) Function
d) Field
e) None of these

11. The secondary storage devices can only store data but they cannot perform?
a) Arithmetic Operation
b) Logic operation
c) Fetch operations
d) All of the above
e) None of the above

12. The One-time password (OTPs) can be obtained by a customer, via which among the following?
a) Approaching the nearest Bank Branch
b) e-mail by applying for OTP online
c) SMS on Mobile
d) All of the above
e) None of these

13. The ____ component is used by the data analyst to create the queries that access the database?
a) Data extraction
b) End User Presentation Tool
c) Data store
d) End User Query Tool
e) None Of These

14. Which of the following is used To access a mainframe or supercomputer?
a) PDA
b) Terminal
c) Modem
d) Node
e) None of these

15. "Bitmap" is a ?
a) Format which windows use for desktop wall paper
b) Graphic file format made up of small dots
c) Specific kind of bitmap files with the BMP extension
d) All of the above
e) None of these

16. ADSL stands for ?
a) Automatic Digital Subscriber Line
b) Asymmetric Direct Subscriber Line
c) Asymmetric Digital Subscriber Line
d) Automatic Direct Subscriber Line
e) None of these

17. The most common method of signing digitally is with the help of______cryptography, as contemplated
by the Information Technology Act 2000:
a) Public Key
b) Biometrics
c) Firewall
d) b and c
e) None of these

18. Objects on the slide which holds text are called ______
a) Object holders
b) Text holders
c) Auto layout
d) Data holders
e) Place holders

19. What is the shortcut key to "Undo" the last action in a document?
a) Ctrl + U
b) Ctrl + Y
c) Ctrl + X
d) Ctrl + Z
e) None of these

20. End-to-end connectivity is provided from Host-to-Host in?
a) Network layer
b) Session layer
c) Data link layer
d) Transport layer
e) None

21. "www" is based on which of the following modes?
a) Local Server
b) 2-tier
c) Client server
d) 3- tier
e) None of these

22. Which command will be used to duplicate the entire disk?
a) Copy
b) Undo
c) Format
d) Disk copy
e) None

23. To select the entire column in a worksheet, which of the following options can be used?
a) Shift + Space
b) Alt + Space
c) Shift + Alt
d) Ctrl + Space
e) None of these

24. The errors that can be pointed out by the compiler are?
a) Semantic errors
b) Logic errors
c) System errors
d) Syntax errors
e) None of these

ANSWERS:
1) d 2) b 3) d 4) b 5) e 6) a 7) a 8) d 9) b 10) c
11) d 12) c 13) d 14) b 15) d 16) c 17) a 18) e 19) d 20) d
21) c 22) d 23) d 24) d

Friday, 18 July 2014

COMPUTER AWARENESS PRACTICE MCQs FOR IBPS EXAMS

1. To access properties of an object, the mouse technique to use is .........
1) right-clicking
2) shift-clicking
3) dragging
4) dropping
5) None of these

2. What is the term for unsolicited e-mail?
1) news group
2) use net
3) backbone
4) flaming
5) spam

3. A device operating at the physical layer is called a......
1) Bridge
2) Router
3) Repeater
4) All of the above
5) None of these

4. A ..... can make it easier to play games.
1) mouse
2) joystick
3) keyboard
4) pen
5) None of these

5. The blinking symbol on the computer screen is called the .....
1) mouse
2) logo
3) hand
4) palm
5) cursor

6. To make the number pad act as directional arrows, you press the ........ key.
1) shift
2) arrow lock
3) num lock
4) caps lock
5) None of these

7. Something which has easily-understood instructions is said to be ........
1) user friendly
2) information
3) word processing
4) icon
5) None of these

8. What is output?
1) what the processor takes from the user
2) what the user gives to the processor
3) what the processor gets from the user
4) what the processor gives to the user
5) None of these

9. The basic building block of a database that contains related record is .......
1) Query
2) Form
3) Table
4) Edited page
5) Report

10. Softcopy is the intangible output, so then what is hardcopy?
1) the physical parts of the computer
2) the printed parts of the computer
3) the printed output
4) the physical output devices
5) None of these

11. Difference between Direct and Indirect Bank Marketing is .......
1) Direct Marketing is to Bank's employees, Indirect is to outsiders
2) Direct Marketing is to outsiders, Indirect is to employees
3) Direct Marketing is to Bank's owners, Indirect is to outsiders
4) Direct Marketing is to other Bank's, Indirect is to outsiders
5) None of these

12. Transaction Marketing means ......
1) Marketing only to strangers
2) Mere selling of goods
3) Doing banking transactions
4) All of the above
5) None of these

13. In marketing it is necessary to identify ....
1) Potential sellers
2) Selling employees
3) Potential products and services
4) Key existing and potential customers
5) All of the above

14. NRI is an easy target for effective marketing because .........
1) he likes Indian goods
2) he does not like Indian goods
3) he is easily approachable
4) it is cheaper to contact NRIs
5) There are special products designed for NRIs

15. A DSA helps in .......
1) Boosting direct sales
2) Contacting customers on the net
3) Indirect marketing
4) Direct telemarketing
5) None of these

16. Marketing is required for .........
1) Boosting productions
2) Boosting sales
3) Boosting profits
4) Improving customer service
5) All of the above

17. A cold call is ......
1) Best way to do marketing
2) A last resort for marketers
3) Marketing at random
4) All of the above
5) None of these

18. A call can be effective by .......
1) Making a phone call
2) Sending an e-mail
3) Calling on friends
4) Service with several facilities
5) Personally calling on prospective customers

19. Good selling skills involves .......
1) Alertness
2) Knowledge
3) Perseverance
4) Empathy
5) None of these

20. Which of the following is not channel for bank marketing?
1) Telemarketing
2) Internet Banking
3) Mobile banking
4) Existing satisfied customers
5) None of these

21. A Prospect means .....
1) A person likely to work in a bank
2) College syllabus
3) A religious buyer
4) A likely buyer
5) None of these

22. Product development is ......
1) Useful for bank marketing
2) Not useful for bank marketing
3) They have no role to play in bank marketing
4) All of the above
5) None of these

23. Marketing is successful when .......
1) Demand exceeds supply
2) Supply exceeds demand
3) Exports are heavy and costly
4) Salesmen are effectively trained
5) All the above situations

24. In marketing, market penetration means ...
1) Entering likely purchasers houses
2) Entering stores and shops
3) Covering a wide area of the market
4) All of the above
5) None of these

25. Innovation helps in ........
1) Designing new products
2) Improving marketing functions
3) Increasing sales
4) New methods for increasing prospects
5) All of the above

26. Marketing strategy means ......
1) New ideas to true more customers
2) New methods to retain the customers
3) New ways to contact the new customers
4) New marketing techniques
5) All of the above

27. Successful marketing strategies need......
1) Knowledge of customers tastes
2) Good leadership
3) Proper direction and guidance
4) Knowledge of peers
5) All of the above

28. Promotion means .....
1) Additional responsibility
2) Doing research in marketing
3) Advertisement and publicity for marketing
4) Going up the ladder in Government establishments
5) All of the above

29. Diversification means ......
1) Marketing in diverse countries
2) Marketing in diverse companies
3) Making new diverse products
4) Used only for transactions with foreign countries
5) All of the above

30. Motivation is very much required effective marketing. What other qualities are required?
1) Confidence
2) Effective communication skills
3) Team work
4) Perseverance
5) All of the above

ANSWERS:

1-1, 2-2, 3-3, 4-2, 5-5, 6-3, 7-1, 8-4, 9-5, 10-3
11-5, 12-4, 13-5, 14-5, 15-4, 16-5, 17-2, 18-5, 19-5, 20-5
21-4, 22-1, 23-4, 24-3, 25-1, 26-5, 27-5, 28-3, 29-3, 30-5.