Showing posts with label PRACTICE QUESTIONS. Show all posts
Showing posts with label PRACTICE QUESTIONS. Show all posts

Friday, 5 December 2014

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. The right click option of mouse is NOT used in which of the following?
1) To copy selected text into the clipboard
2) To rename file
3) To cut the selected text
4) To access properties of an object
5) None of these

2. .......... is the process of dividing the disk into tracks and sectors.
1) Tracking
2) Formatting
3) Crashing
4) Allotting
5) None of these

3. A place in the computer system where data and programs are temporarily stored is called....
1) paste
2) open
3) memory
4) pocket
5) None of these

4. Correcting errors in a program is referred to as...
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these

5. Graphical diagrams are used to represent multiple perspectives of a system which include
1) use-case, class and state diagrams
2) state, interaction and derivative diagrams
3) interaction, relationship and class diagrams
4) deployment, relationship and use-case diagrams
5) None of these

6. Which is the best view for representing your thoughts as a presentation of a computer?
1) Outline view
2) Notes page view
3) Slide sorter view
4) Slide view
5) None of these

7. What does SMPS stand for?
1) Switched Mode Power Supply
2) Single Mode Power Supply
3) Simple Mode Power Supply
4) Synchronous Mode Power Supply
5) None of these

8. RSA is........
1) Symmetric Cryptosystem
2) Digital Signature
3) Asymmetric Cryptosystem
4) Block Cypher
5) None of these

9. ......... hardware technology was used to fifth-generation computers.
1) Transistors
2) Valves
3) ICS
4) ULSI
5) VLSI

10. For each instruction in program memory the CPU goes through a ........
1) decode - fetch - execute sequence
2) fetch - decode - execute sequence
3) fetch - execute - decode sequence
4) execute - store - decode sequence
5) fetch - store - decode sequence

11. A proxy server is used for which of the following?
1) To provide security against unauthorised users
2) To process client requests for web pages
3) To process client requests for database access
4) To provide TCP / IP
5) None of these

12. A repair for a known software bug, usually available at no charge on the Internet, is called a(n).....
1) Version
2) Patch
3) Tutorial
4) FAQ
5) None of these

13. A modem performs.....
1) Modulation
2) Demodulation
3) Data compression
4) All of these
5) None of these

14. Which access method is used for obtaining a record from a cassette tape?
1) Direct
2) Sequential
3) Random
4) All of the above
5) None of these

15. A failure that occurs in an Oracle program when there is a logical failure in handling of a statement is called.........
1) Instance failure
2) Media failure
3) Process failure
4) Statement failure
5) User error

16. Which of the following represents the size of a floppy?
1) 3.5 inches
2) 5.25 inches
3) 8.0 inches
4) All the above
5) None of these

17. To format a number in date format, press..
1) Ctrl + Shift + @
2) Ctrl + Shift + #
3) Ctrl + Shift + %
4) Ctrl + Shift + $
5) Ctrl + Shift + ∗

18. ........ uses an embossed steel band to form the letters printed on the paper.
1) Laser printer
2) Dot-matrix printer
3) Daisy wheel printer
4) Band printer
5) Ink-jet printer

19. OR, XOR and AND functions can be performed by .............. of a computer in the CPU.
1) Memory
2) CU
3) Register
4) ALU
5) Processor

20. Internet provides....
1) Online communication
2) Software sharing
3) Customer support service
4) Online journals and magazines
5) All of the above

21. System software is the set of programs that enables your computer's hardware devices and ................ software to work together.
1) Management
2) Processing
3) Utility
4) Application
5) None of these

22. ............................ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these

23. SMPT, FTP and DNS are applications of the ............. layer.
1) data link
2) network
3) transport
4) application
5) None of these

24. According to which of the following, in a database, should information be organised and accessed?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these

25. WORM stands for ....
1) Wanted One Read Memory
2) Write Once Read Many
3) Write Original Read Many
4) All the above
5) None of these

26. Which of the following is separate software layer that acts as 'glue' between the client and the server parts of an application and provides a programming abstraction?
1) Freeware
2) Firmware
3) Shareware
4) User-supported software
5) Middleware

27. Which of the following is a must for a computer?
1) Chip
2) Data
3) Mouse
4) Processor
5) None of these

28. Disk can be used to store.......
1) Random files
2) Sequential files
3) Both (1) and (2)
4) Horizontal files
5) None of these

29. A derived class may also be called as.....
1) sub-class
2) super class
3) parent class
4) deprived class
5) None of these

30. The capacity of program counter is.......
1) 8 bits
2) 14 bits
3) 16 bits
4) 12 bits
5) 32 bits

31. In ........... generation computer the speed was measured in nanoseconds.
1) first
2) second
3) third
4) fourth
5) fifth

32. The process of transferring of files from your computer to the computer on the internet is called .......
1) downloading
2) uploading
3) FTP
4) JPEG
5) downsizing

33. Timing and control unit is a part of a(n)....
1) ALU
2) Processor
3) Memory
4) CMOS
5) BIOS

34. Chip is the common name for a(n)....
1) transistor
2) resistor
3) integrated circuit
4) semiconductor
5) None of these

35. ................. is developed specifically for a distinct industry.
1) Personal productivity software
2) Application software
3) Decision support system
4) Vertical market software
5) System software

36. Which of the following services is not provided by Internet service provider?
1) Internet transit
2) Domain name registration
3) Hosting
4) Dial-up access
5) None

37. A source program is written in a ............. language.
1) high-level
2) low-level
3) binary
4) All the above
5) None of these

38. The transfer rate of a standard USB 2.0 Device is .....
1) 100 M bit/s
2) 250 M bit/s
3) 480 M bit/s
4) 500 M bit/s
5) 1 G bit/s

39. The control part of a disk is known as
1) surface
2) hub
3) cylinder
4) cluster
5) None of these

40. Which of the following languages is used for process control?
1) ADA
2) COBOL
3) BASIC
4) PASCAL
5) LISP

ANSWERS:
1-5, 2-2, 3-3, 4-1, 5-1, 6-1, 7-1, 8-2, 9-4, 10-2
11-1, 12-2, 13-4, 14-2, 15-4, 16-4, 17-2, 18-4, 19-4, 20-5
21-4, 22-2, 23-4, 24-2, 25-2, 26-5, 27-4, 28-3, 29-1, 30-3
31-3, 32-2, 33-2, 34-3, 35-4, 36-5, 37-1, 38-3, 39-2, 40-1.

Tuesday, 25 June 2013

COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR RBI ASSISTANTS EXAM

1. To provide electronic circuits, first generation computers used
a) Vacuum tubes
b) Transistors
c) Integrated circuits
d) Large scale integrated circuits
e) None of these

2. In Ms word the key board short cut used for spelling and grammar check
a) F3 
b) F5 
c) F7
d) F9 
e) None of these

3. In Dos the primary name of a file can have a maximum of ..... characters
a) 10 
b) 8 
c) 12
d) 5 
e) None of these

4. The instruction of a program which is currently being executed are stored in
a) Secondary Storage Memory
b) Cache memory
c) Read Only Memory
d) RAM 
e) None of these

5. Prepare a presentation/ Slide show which application is commonly used
a) Photoshop 
b) Power point
c) Microsoft outlook 
d) MS Publisher
e) None of these

6. An Excel workbook is a collection of
a) Work books 
b) Worksheets
c) Charts 
d) tables
e) None of the above

7. When sending an email the ..... line describes the contents of message
a) TO 
b) Subject 
c) Content
d) CC 
e) None of these

8. The ....... also called the web contains billions of documents.
a) World wide Web 
b) HTTP
c) Web Portal 
d) Domain
e) None of these

9. Most of the commonly available personal computers/Laptops have a keyboard popularly
known as
a) QWERTY 
b) QOLTY
c) ALTER 
d) ULCLIF
e) None of these

10. When you quickly press and release the left mouse button twice you are
a) Primary checking 
b) Pointing
c) Double clicking 
d) Selecting
e) None of these

11. The time it takes a device to locate data and instructions and make them available to the
CPU is known as
a) Clock speed 
b) processing cycle
c) CPU speed 
d) access time
e) None of these

12. How many options does a binary choice offer?
a) One 
b) Three 
c) Two
d) It depends on computer memory
e) None of these

13. The ...... allows you to access object and start programme
a) Default menu 
b) XP menu
c) Start Menu 
d) Stop menu
e) None of these

14. Spool is an acronym for
a) Simultaneous power on operation
b) Simultaneous print on operation
c) simultaneous peripheral operations on-line
d) All of these 
e) None of these

15. The purpose of the primary key in a database is to
a) Unlock the database
b) Provide a map of the data
c) uniquely identify a record
d) All of the above 
e) None of these

16. The most frequently used instruction of a computer program are likely to be fetched
from
a) The hard disk 
b) Cache memory
c) RAM 
d) Registers
e) None of these

17. Which of the following is NOT a type of broadband Internet connection?
a) Cable 
b) DSL 
c) Dial-up
d) Satellite 
e) None of these

18. It used a pictures(called icons) and menus displayed on the screen to send commands
to the Computer system
a) Command based user interface
b) GUI c) API
d) System utility 
e) None of these

19. These are specially designed computer chips reside inside other devices, such as
your car or electronic thermostat
a) Embedded Processors
b) Servers
c) Robotic computers
d) All of the above
e) None of these

20. TCP/ IP Network model consists ..... layers
a) TWO 
b) Seven 
c) Four
d) Eight 
e) None of these

21. ......... is a set of keywords, symbols, and system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer
a) A computer program
b) A programming language
c) An assemble
d) Syntax
e) None of these

22. A hard copy of a document is .........
a) Printed on the printer
b) Stored on a floppy
c) Stored on a CD
d) All of these
e) None of these

23. Which of the following groups consist of only input devices?
a) Mouse, keyboard, monitor
b) Mouse, keyboard, printer
c) Mouse, keyboard, plotter
d) Mouse, keyboard, Scanner
e) None of these

24. ............ is the process of finding errors in software code
a) Compiling 
b) Testing
c) Running 
d) Debugging
e) None of these

25. Which of the following computer languages is a mathematically oriented languages used for scientific problems?
a) FORTRAN 
b) COBAL
c) LISP 
d) PROLOG
e) None of these

26. Array is .........
a) Linear data structure
b) Non-linear structure
c) Complex data structure
d) Simple data structure
e) None of these

27 Which is the part of a computer that one can touch and feel?
a) Hardware
b) Software
c) Programs
d) Output
e) None of these

28. Storage that retains its data after the power is turned off is referred to as .........
a) Volatile memory
b) Non-volatile memory
c) Sequential memory
d) Direct storage
e) None of these

29. The name a user assigns to a document is called a (n)
a) File name 
b) Program
c) Record 
d) Data
e) None of these

30. In binary language, each letter, number or special character of alphabet is unique combination of ..........
a) Eight bytes
b) Eight kilobytes
c) Eight characters
d) Eight bits
e) None of these

31. How many margins are on a page?
a) Two 
b) Four 
c) Eight
d) One 
e) None of these

32. Nibble describes a bits combination of
a) 5 bits 
b) 6 bits 
c) 7 bits
d) 4 bits 
e) 16 bits

33. To centre a paragraph using short keys press ...........
a) CTRL + C 
b) CTRL + E 
c) CTRL + L
d) CTRL + R 
e) None of these

34. Which of the following types of tables constraints will prevent the entry of duplicate
rows
a) Primary key 
b) Unique
c) Null 
d) Foreign key
e) None of these

35. What is the base of hexadecimal number system?
a) 2 
b) 8 
c) 16
d) 10 
e) 32

36. The basic goal of computer process is to convert data into ......
a) files 
b) tables
c) information 
d) graphics
e) None of these

37. Spot the odd one out amongst the following
a) BASIC 
b) WINDOWS
c) DOS 
d) UNIX
e) None of these

38. Demodulation is the process of
a) Converting digital signals to analogue
b) converting analog signal to digital
c) combining analog and digital
d) All of the above
e) None of these

39. Which of the following is called the smallest
addressable element in a display device
a) Dotlex 
b) Pixel 
c) Cell
d) Shell 
e) None of these

40. The most common type of floppy size is
a) 3 1/2 inch 
b) 5 1/4-inch
c) 4 3/4 inch 
d) 4 1/4 inch
e) None of these

41. One megabyte equals approximately
a) 1,000 bits 
b) 1,000 bytes
c) 1 million bytes 
d) 1 million bits
e) None of these

42. A program embedded in a semiconductor chip during their manufacture is called
a) human ware 
b) firmware
c) liveware 
d) software
e) None of these

43. The term gopher is related with
a) hardware 
b) firmware
c) internet searching 
d) none
e) None of these

44. A process known as ........ is used by large retailers to study trends.
a) data mining 
b) data selection
c) POS 
d) data conversion
e) None of these

45. Which of the following is the correct order of the four major functions of a computer?
a) Process , Output , Input , Storage
b) Input , Output, Process , Storage
c) Process ,Storage , Input,, Output
d) Input ,Process , Output , Storage
e) None of these

46. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
a) instructions.
b) the operating system.
c) application software.
d) the system unit.
e) None of these

47. Grouping and processing all of a firm's transactions at one time is called
a) a database management system
b) batch processing
c) a real-time system
d) an on-line system
e) None of these

48. Mobile Commerce is best described as
a) The use of Kiosks in marketing
b) Transporting products
c) Buying and selling goods/ services through wireless hand- held devices
d) Using notebook PC's in marketing
e) None of these

49. Collecting personal information and effectively posing as another individual is known as
a) spooling 
b) spoofing
c) Hacking 
d) identity theft
e) None of these

50. A web site address is a unique name that identifies a specific ............................ on the web
a) website 
b) web browser
c) Link 
d) PDA
e) None of these

Answers:

1-a,  2-c,  3-b,  4-d,  5-d,  6-b,  7-b,  8-a,  9-a,  10-c
11-b,  12-c,  13-c,  14-c,  15-c,  16-b,  17-c,  18-b,  19-a,  20-c
21-b,  22-a,  23-d,  24-d,  25-a,  26-a,  27-a,  28-b,  29-a,  30-d
31-b,  32-d,  33-b,  34-d,  35-b,  36-c,  37-a,  38-b,  39-b,  40-a
41-c,  42-b,  43-c,  44-a,  45-d,  46-a,  47-b,  48-c,  49-d,  50-a.

Saturday, 2 March 2013

COMPUTER KNOWLEDGE PRACTICE MCQs

1. Process of finding/ correcting program errors is—
(A) Bugs (B) Debugging
(C) Hacking (D) Cracking
Ans : (B)

2. Diagnostic routines is a—

(A) Programs used to print error messages
(B) Indicates system problems and improper program instructions.
(C) Both A & B are true
(D) None of these
Ans : (C)

3. The term DBMS is referred to—

(A) Data Base Management system
(B) The software used for the management, maintenance and retrieval of the data stored in a data base
(C) A & B both true
(D) None of these
Ans : (C)

4. The speed at which data is transferred from the main memory to another medium on which data are recorded is referred as—

(A) Data transfer rate (B) Byte
(C) Buds (D) None of these
Ans : (A)

5. The time period during which a computer is malfunctioning or not operating correctly due to machine failures is referred as—

(A) Downtime (B) Uptime
(C) Runtime (D) None of these
Ans : (A)

6. EBCDIC is—
(A) 6-bit coding system (B) 7-bit coding system
(C) 8-bit coding system (D) 9-bit coding system
Ans : (C)

7. A data communication facility on which data can be transmitted in two directions is referred as—
(A) Duplex (B) Simplex
(C) Triplex (D) None of these
Ans : (A)

8. Electronic Mail /Message System (EMMS) best suits to—
(A) Postal service (B) Telephone service
(C) Telegraph service (D) None of these
Ans : (A)

9. Digital Computer is a computer—
(A) that works with discrete quantities (B) that works with analog quantities
(C) Both A & B (D) None of these
Ans : (A)

10. The subdivision of fields—
(A) always done to give the programmer greater flexibility
(B) dependent on programming language used
(C) never accomplished on fields containing numeric data
(D) all the above
Ans : (B)

11. The primary memory of a personal computer consists—
(A) ROM only (B) RAM only
(C) Both ROM and RAM (D) memory module
Ans : (C)

12. Microsoft Excel is?
(A) financial planning package (B) electronic spreadsheet
(C) graphics package (D) data-base management package
Ans : (B)

13. All the keys on the IBM PC keyboard repeat as long as one holds them down. These keys are known as?
(A) typematic keys (B) functional keys
(C) automatic keys (D) alphabetic keys
Ans : (A)

14. Distributed data processing configuration where all activities passes through a centrally located computer is—
(A) ring network (B) spider network
(C) hierarchical network (D) data control network
Ans : (B)

15. Communications device, combines transmissions from several devices into on line is ?
(A) concentrator (B) modifier
(C) multiplexer (D) full-duplex line
Ans : (C)

16. Data communications involving telegraph lines uses—
(A) simplex lines (B) wideband channels
(C) narrowband channels (D) Dialed service
Ans : (C)

17. A semiconductor memory which allows the eraser of the information stared in it so that new information can be stared in it is referred as—
(A) EPROM (B) ROM
(C) RAM (D) None of these
Ans : (A)

18. Extended ASCII uses—
(A) 8 bits for coding (B) 9 bits for coding
(C) 10 bits for coding (D) 11 bits for coding
Ans : (A)

19. A device used for transmission of images scanned at a transmitting point and duplicated at a receiving point is—
(A) Facsimile (FAX) (B) Telephone
(C) Photocopier (D) None of these
Ans : (A)

20. A data transmission medium made of tiny threads of glass or plastic that can transmit huge amount of information at the speed of light is—
(A) Fiber optic cable (B) Copper cable
(C) Twisted wire cable (D) None of these
Ans : (A)


COMPUTER KNOWLEDGE MCQs

1. Computer output which is displayed on the screen of a terminal without a permanent copy is called—
(A) Soft copy (B) Hard copy
(C) Hardware (D) None of these
Ans : (A)

2. A storage device or medium where the access time is dependent upon the location of the data is called—

(A) Serial access (B) Parallel access
(C) Null access (D) None of these
Ans : (A)

3. The set of computer programs, procedures, and associated documentation related to the effective operation of a computer system is referred as—

(A) Software (B) Hardware
(C) Hardcopy (D) Softcopy
Ans : (A)

4. An adder in which the bits of the operands are added one after another is called—

(A) Serial adder (B) Parallel adder
(C) Full adder (D) Half adder
Ans : (A)

5. A method of providing virtual memory—

(A) Segmentation (B) De-fragmentation
(C) Paging (D) None of these
Ans : (A)

6. A unit of a computer system that interprets instructions and executes them is known as—
(A) Processor (B) Storage
(C) Peripherals (D) None of these
Ans : (A)

7. A register in CPU used to store the address of the next instruction to be executed is known as—
(A) Program counter (B) Program library
(C) Programmer (D) None of these
Ans : (A)

8. One who designs, writes, tests and maintenance computer programs is called—
(A) Programmer (B) Operator
(C) User (D) None of these
Ans : (A)

9. Which of the following terms applies to communication between two computer systems?
(A) computer literacy (B) power supply
(C) applications software (D) connectivity
Ans : (D)

10. A memory in CPU that holds program instructions, input data, intermediate results and the output information produced during processing is—
(A) Secondary memory (B) Primary memory
(C) Auxiliary memory (D) None of these
Ans : (B)

11. In Broadband system a network system—
(A) Several analog signals share the same physical network channel.
(B) Only digital signals share the same physical network channel.
(C) Single analog signals share the same physical network channel.
(D) None of these.
Ans : (A)

12. Bit stands for—
(A) binary digit (B) one binary piece of information
(C) Both A and B are true (D) None is true
Ans : (C)

13. Broadband channel is the—
(A) The fastest carriers where data transfer rates is of 1 million baud (bits/secon(D) or more.
(B) The slower carriers where data transfer rates is of 56k baud
(C) Musical channel
(D) None of these
Ans : (A)

14. BLOB is—
(A) Binary Large Object (B) A long bit string representing complex data
(C) Object oriented language (D) Only A & B are true
Ans : (D)

15. A group of related items / section of program coding treated as a unit is referred as—
(A) Block (B) Duplex
(C) Street (D) None of these
Ans : (A)

16. Following is false for BASIC—
(A) Beginners All-Purpose Symbolic Instruction Code
(B) High-level interactive programming language
(C) Works in timesharing environment
(D) Low level object oriented language
Ans : (D)

17. A unit for measuring data transmission speed that describes the capacity of a carrier is referred as—
(A) Baud (B) Bit
(C) Bond (D) Batch
Ans : (A)

18. A process of trying out a new product by independent users before it is finally manufactured/ developed—
(A) Alpha test (B) Beta Test
(C) Gamma test (D) None of these
Ans : (B)

19. A selection, choice, or condition involving two possibilities is referred as—
(A) Unary (B) Binary
(C) Octal (D) None of these
Ans : (B)

20. Base band System is—
(A) A networking system (B) Where the channel support. a single digital signal.
(C) Both A & B true (D) None is true
Ans : (C)

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. Constant is a value written into a program instruction—
(A) that does not change during the execution of the program
(B) that can change during the execution of the program
C) that can vary during the execution of the program
(D) none of these
Ans : (A)

2. A removable direct-access storage medium containing multiple magnetic disks mounted vertically on a single-shaft is referred as—

(A) Tape pack (B) Disk pack
(C) Cylinder (D) None of these
Ans : (B)

3. Diskette is a—

(A) A low-cost, thin flexible magnetic disk storage device
(B) High volume storage device
(C) Primary storage device
(D) None of these
Ans : (A)

4. An optical input device that is used to read documents printed in a special type font is known as—

(A) Document reader (B) Documentation
(C) Printer (D) None of these
Ans : (A)

5. For checking spelling one uses—

(A) Dictionary Disk (B) Index disk
(C) Directory (D) None of these
Ans : (A)

6. APL is—
(A) A high level language for specifying complex algorithms.
(B) A real-time language primarily for scientific applications.
(C) Only A is true
(D) Both A & B true
Ans : (D)

7. The overall design, construction, organization and interconnecting of the various components of a computer system is referred as—
(A) Computer Architecture (B) Computer Flow chart
(C) Computer Algorithm (D) None of these
Ans : (A)

8. Asynchronous communication is—
(A) Communication between independently operating units
(B) Communication between dependent operating units
(C) Communication between independent and dependent operating units
(D) None of these
Ans : (A)

9. Audio response is—
(A) output medium
(B) produces verbal responses from the computer system
(C) Both A & B true
(D) None is true
Ans : (C)

10. Automated Office refers to the merger of …………… in an office environment.
(A) Computers (B) office
(C) telecommunications (D) All the above
Ans : (D)

11. Technique of placing software/programs in a ROM semiconductor chip is called—
(A) PROM (B) EPROM
(C) firm ware (D) microprocessor
Ans : (C)

12. Following is not true for magnetic tape ?
(A) low cost (B) direct-access storage medium
(C) compact and portable (D) highly reliable
Ans : (B)

13. The following is an nonvolatile memory?
(A) ROM (B) RAM
(C) LSI (D) VLSI
Ans : (A)

14. The……………can be programmed one time by either the manufacturer or the computer user. Once programmed, it cannot be modified.
(A) RAM (B) ROM
(C) PROM (D) EPROM
Ans : (C)

15. Which of the following is not true of a magnetic disk?
(A) Users can update records by writing over the old data
(B) It provides sequential access to stored data
(C) It is slow relative to magnetic tape
(D) All of the above are true
Ans : (B)

16. A term used for diskette is—
(A) disk cartridge (B) disk pack
(C) floppy disk (D) none of these
Ans : (C)

17. Following is true for the digital computer?
(A) Information is in form of a string of binary digits
(B) It can be used as analog processor
(C) It is less accurate than the analog computer
(D) None of these.
Ans : (A)

18. Comparing with secondary storage, primary storage is—
(A) slow and inexpensive (B) fast and inexpensive
(C) fast and expensive (D) slow and expensive
Ans : (C)

19. CPU performs read/write operations at any point in time in—
(A) ROM (B) PROM
(C) EPROM (D) RAM
Ans : (C)

20. Following is not the from of secondary storage—
(A) magnetic tape (B) CD’s
(C) Disk (D) Hard disk
Ans : (D)

Wednesday, 7 November 2012

IBPS CLERKS CWE COMPUTER KNOWLEDGE QUESTIONS


1. The Title and Page number of a document can be displayed using which of the following options?
1) Insert table
2) Spelling and Grammar
3) Header and Footer
4) Thesaurus
5) File

2. Which of the following is the advantage of Assembly language over Machine language?
1) Easy to use
2) Easy to understand
3) Easy to modify
4) Only 1 and 3
5) All the above

3. Pop-ups are a form of ..... on the World Wide Web?
1) Instant Messaging
2) Search Engines
3) Browsers
4) Mark-up Languages
5) Online Advertising

4. Which of the following is not used to align text in a document?
1) Left
2) Right
3) Center
4) Diagonal
5) Justify

5. Which of the following characteristics is/are used to compute the results from excel data?
1) Goto
2) Table
3) Diagram
4) Formula and Function
5) None of these

6. ....... is a combination of text, audio, still images, animation, video.
1) Multiplexer
2) Multiplier
3) Multimedia
4) Multiuser
5) None of these

7. Which of the following refers to the process of trading goods over the internet?
1) E-seva
2) E-Trading
3) E-Finance
4) E-Sales
5) E-Commerce

8. Multiple autonomous computers communicating through a computer network to achieve a common goal is called .......
1) Centralized Computing
2) Co-operative Computing
3) Distributed Computing
4) Connected Computing
5) None of these

9. In order to change page margins in a word document:
1) Drag the scroll box on the scroll bars.
2) Delete the margin boundaries on the ruler
3) Right Click on the ruler
4) Drag the margin boundaries on the ruler
5) None of these

10. USB 3.0 is the second major revision of the Universal Serial Bus standard for Computer Connectivity. Which of the following is true about USB 3.0?
1) It is more than 10 times as fast as USB 2.0
2) Its Data transfer rate is up to 5 Gbits/sec
3) Power consumption is less than USB 2.0
4) All the above
5) None of the above


Saturday, 27 October 2012

IBPS CLERKS COMPUTER KNOWLEDGE EXPECTED MODEL QUESTIONS


1. Which of the following memory chip is programmed during the manufacturing process?
1) RAM
2) ROM
3) PROM
4) EEPROM
5) None

2. Computer uses which of the following languages to process data?
1) High Level
2) Assembly
3) Binary
4) Hexa Decimal
5) Octal

3. Magnetic Disk medium uses ..... method for accessing data.
1) Direct
2) Serial
3) Sequential
4) Rotational
5) None

4. Which of the following is the India's first Super Computer?
1) Aakash
2) Sea Deep
3) First PC
4) PARAM 8000
5) Cray - 1

5. Parallelogram in a flowchart usually represents:
1) Input
2) Output
3) Process
4) Both 1 & 2
5) Decision

6. Registers are located in?
1) Memory
2) ALU
3) OS
4) CPU
5) None

7. ...... terminals are often connected to complex inventory and sales computer systems.
1) Data
2) Information
3) Credit Cards
4) Query
5) Point-of-Sale (POS)

8. Which of the following is true about Dial-up internet access?
1) It utilizes the existing telephone services
2) It uses a router for security
3) It utilizes the broadband technology
4) Modem speeds are very fast
5) All are Correnct

9. Icons, Windows, Menu and buttons are features of ?
1) DOS
2) GUI
3) Command Driven Interface
4) All the above
5) None

10. Which of the following is true about URL ?
1) It is a web browser
2) It is a messenger
3) It is a mail service
4) It is a global address of documents and other resources on World Wide Web
5) It is same as internet


Tuesday, 16 October 2012

IBPS CLERKS EXAM COMPUTER KNOWLEDGE PRACTICE MCQs


1. Which of the following peripheral devices displays information to a user?
1) Monitor
2) Keyboard
3) Secondary Storage Devices
4) Secondary Storage Media
5) None

2. Bandwidth refers to
1) The cost of the cable required to implement a WAN
2) The cost of the cable required to implement a LAN
3) The amount of information a peer-to-peer network can store
4) The amount of information a communication medium can transfer in a given amount of time
5) None of these

3. A processor that collects the transmissions from several communication media and send them over a single line that operates at a higher capacity is called ........
1) Multiplexer
2) Bridge
3) Hub
4) Router
5) None of these

4. Which of the following is not a form of Biometrics?
1) Fingerprint
2) Password
3) Retina Scan
4) Breath Scan
5) None of these

5. Which of the following best defines a compiler?
1) Translates machine language into a high level language
2) Translates one statement at a time as the program executes
3) Translates two statements at a time as the program executes
4) Produces object code
5) is less sophisticated than an assembler

6. Which of the following is not a web browser?
1) Opera
2) Netscape
3) Microsoft Outlook
4) Internet Explorer
5) Safari

7. What is the cell content alignment by default in a Excel?
1) Left Aligned
2) Centrally Aligned
3) Text is left aligned and numbers are right aligned
4) Text is right aligned and numbers are left aligned
5) None of these

8. Which of the following device is used to transmit data over telecommunication lines?
1) Drive
2) Folder
3) Modem
4) Platforms
5) None of these


Monday, 8 October 2012

COMPUTER KNOWLEDGE PRACTICE MCQs FOR BANK EXAMS


1. Pick the odd one out:
1) Interpreter
2) Operating System
3) Compiler
4) Assembler
5) None of these

2. When a particular object or an image is copied, in which of the following places it is stored?
1) Notice Board
2) Interim Board
3) Notepad
4) Clipboard
5) None of these

3. The Term 'BIT' is the short form for:
1) Mega Byte
2) Binary Language
3) Binary Digit
4) Binary Number
5) None of these

4. Servers are computers that provide resources to other computers connected to a 1) Network
2) Super Computer
3) Micro Computer
4) Client
5) None of these

5. A bar which is seen at the bottom of the screen (usually) when the computer is turned on is known as:
1) Address Bar
2) Task Bar
3) Windows Bar
4) Line bar
5) None of these

6. Something which has easily understood instructions is said to be:
1) User friendly
2) Information
3) Word Processing
4) Icon
5) None of these

7. To save an existing file with a new name or to a new location, you should use the ..... command.
1) Save
2) Save and Replace
3) Save as
4) New file
5) None of these

8. Peripheral devices such as printers and monitors are considered to be:
1) Hardware
2) Software
3) Data
4) Information
5) None of these

9. In a database, ....... fields store numbers used to perform calculations.
1) Next
2) Key
3) Alpha Numeric
4) Numeric
5) None of these

10. Where is data saved permanently?
1) RAM
2) ROM
3) CPU
4) Printer
5) None of these



Tuesday, 25 September 2012

SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER KNOWLEDGE MCQs


1. Internet Protocol Version 4, Consists of how many bits?
1) 16 bits
2) 8 bits
3) 30 bits
4) 32 bits
5) 64 bits

2. A computer virus is a software program which has the essential ability to-
1) Clone itself
2) Hide itself
3) Damage Program
4) Damage Data
5) None

3. Which of the following is the short cut for opening Task Manager?
1) Ctrl + Shift + Del
2) Alt + Shift + Del
3) Ctrl + Alt + Del
4) Alt + Windows + Del
5) None

4. A ....... is approximately equal to one billion bytes.
1) Kilobyte
2) Bit
3) Gigabyte
4) Megabyte
5) None

5. Which of the following operations is not performed by Computer?
1) Taking the input
2) Processing
3) Controlling
4) Understanding
5) None

6. ....... is a set of computer programs used on a computer to help perform tasks.
1) An instruction
2) Software
3) Memory
4) Processor
5) None

7. What is the capacity of a standard 3.5'' floppy disk?
1) 1.44 GB
2) 1.44 MB
3) 1.44 KB
4) 1.44 B
5) None

8. Which of the following Operating Systems does not have a Graphical User Interface?
1) UNIX
2) LINUX
3) Microsoft Windows
4) Mac OS
5) None

9. Which of the following shortcut keys is used to check spelling in Microsoft Word?
1) F1
2) F5
3) F4
4) F7
5) None


Thursday, 20 September 2012

COMPUTER KNOWLEDGE PRACTICE QUESTIONS


1. Which of the following is most essential for effective multimedia presentations incorporates user participation or ....
1) Links
2) Buttons
3) Interactivity
4) Integration
5) None

2. Most of the websites have moving graphics, which are called as:
1) animations
2) vectors
3) links
4) morphs
5) None

3. Which of the following is the term used to enlarge a window to its maximum area so that it fills the entire desktop?
1) Maximize
2) Zoom
3) Enlarge
4) Extend
5) None of these

4. Microsoft Windows and Apple Mac are widely used Operating systems in today's world. Which of the following feature makes them so popular?
1) Multitasking Capacity
2) Calligraphy
3) User-friendly GUI
4) Being Inexpensive
5) None of these

5. Physical components of a computer are called:
1) Hardware
2) Software
3) Viruses
4) Internet
5) None of these

6. Which of the following is an object oriented feature:
1) Structured Programming
2) Multi-Tasking
3) Linking
4) Inheritance
5) None of these

7. In Windows XP, which of the following views is the best to see the file size and modified dates of all files in a folder.
1) List
2) Icon
3) Thumbnails
4) Details
5) None of these

8. Which of the following keys is used to remove a character on the right of the cursor
in a word document?
1) Home
2) End
3) Delete
4) Backspace
5) None of these


Thursday, 6 September 2012

COMPUTER KNOELEDGE MCQ CAPSULES FOR ALL BANK EXAMS


1. Which of the following powerpoint view displays each slide of the presentation as a thumbnail and is useful for rearranging slides?
1) Slide show
2) Slide master
3) Slide sorter
4) Notes Page
5) Design Slide

2. A set of rules for telling the computer what operations to perform is / are called:
1) Structures
2) Procedural Language
3) Command Language
4) Natural Language
5) Programming Language

3. Devices that enter information and let you communicate with the computer are called:
1) Software
2) Hardware
3) Output Devices
4) Input / Output devices
5) Input Devices

4. The speed of which of the following memory chips is faster?
1) Not Fixed
2) DRAM
3) SRAM
4) For smaller chips SRAM is faster
5) For larger chips DRAM is faster

5. Mahesh Babu has his cute childhood photos in an album which might fade out in a couple of years, which he wants to show it to his fans by uploading it in his twitter account. Which of the following devices can he use to do that?
1) Keyboard
2) Mouse
3) Printer
4) Scanner
5) None of these

6. Which of the following is not a social networking site?
1) WAYN
2) Hi 5
3) Orkut
4) Yahoo
5) Facebook

7. In the URL https://twitter.com, what does 's' represent in 'https'?
1) Safe
2) System
3) Start-up
4) Semantic
5) Secured

Wednesday, 29 August 2012

SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER AWARENESS MCQs


1. Which type of memory gets lost when you switch off?
1) ROM
2) RAM
3) CACHE
4) Dynamic
5) Static

2. Which type of network would use phone lines?
1) WAN
2) LAN
3) WWAN
4) Wireless
5) None of these

3. Speakers / Headphones are ____ devices.
1) Input
2) Input/ Output
3) Software
4) Storage
5) Output

4. A program for viewing web pages is called:
1) hardware
2) software
3) storage
4) browser
5) None of these

5. A computer cannot perform which of the following functions?
1) Addition
2) Subtraction
3) Bake a cake
4) Division
5) None of these

6. CD's or DVD's are ____ type of devices.
1) Input
2) Output
3) Software
4) Storage
5) Input/output

7. In the URL 'www.dbsdynamic.blogspot.in' what does the domain name extension '.in' represent?
1) International
2) internet
3) intra net
4) India
5) None of these

8. Free of cost repair of the software bug available in internet is called:
1) Version
2) Ad-on
3) Tutorial
4) FAR
5) Patch

9. Which of the following is READ only disc?
1) DVD-R
2) DVD-ROM
3) DVD-RW
4) CD-R
5) None of these

10. Which of the following is an/ are advantages of LAN?
1) Sharing peripherals
2) Backing up your data
3) Saving all your data
4) Accessing the web
5) Automatic printing of data


Monday, 30 July 2012

SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER AWARENESS PRACTICE QUESTIONS



1. What is e-commerce?
1) Buying and selling of international goods
2) Buying and selling of products and services over the internet
3) Buying and selling of products having to do with computers
4) Buying and selling of products and services not found in stores
5) Buying and selling of electronic goods

2. The term user Interface refers to :
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to the user commands
3) The means by which the user interacts with the peripheral devices on the  computer
4) All of these
5) None of these

3. Which of the following is not an input device?
1) Keyboard
2) Joystick
3) Monitor
4) Microphone

5) None of these

4. An error is also known as :
1) Debug
2) Bug
 3) Cursor
4) Icon
5) None of these

5. Archive is :
1) Back-up Storage
2) Forward Operation
3) Primary Storage
4) Name of famous processor
5) None of these

6. Which media has the ability to have data/information written on them by users more than once
1) CD-R disks
2) CD-RW disks
3) Zip disks
4) Opti disks
5) Both CD-RW and Zip disks

7. BCC in regard to emails, stands for :
1) Best Client Copy
2) Better Communication Copy
3) Best Computer Copy
4) Better Client Copy
5) None of these

Tuesday, 17 July 2012

COMPUTER AWARENESS PRACTICE QUESTIONS

1. Hackers ………………
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) break into other people's computers
Answer: break into other peoples computers

2. Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
Answer: software piracy

3. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
Answer: spam

4. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
Answer: Overhead Projections

5. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
Answer: A Sound Format

6. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
Answer: PCs

7. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
Answer: Microphone

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. If you wish to extend the length of the network without having the signal degrade, you would use a ………………
(A) resonance
(B) router
(C) gateway
(D) repeater
Answer: repeater

2. A repair for a known software bug, usually available at no charge on the Internet, is called a ………………
(A) version
(B) patch
(C) tutorial
(D) FAQ
Answer: patch

3. URL stands for ………………
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
Answer: Uniform Resource Locator

4. When data changes in multiple lists and all lists are not updated, this causes ………………
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
Answer: data inconsistency

5. What is a backup ?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
Answer: An exact copy of a systems information

6. The Internet is ………………
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) a communication system for some states of India
Answer: a large network of networks

7. Computers that are portable and convenient for users who travel are known as ………………
(A) supercomputers
(B) planners
(C) minicomputers
(D) laptops
Answer: laptops

Saturday, 9 June 2012

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. Hackers ………………
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) break into other people's computers
Answer: break into other peoples computers

2. Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
Answer: software piracy

3. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
Answer: spam

4. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
Answer: Overhead Projections

5. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
Answer: A Sound Format

6. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
Answer: PCs

7. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
Answer: Microphone

8. The life-span of a CD-ROM is………………
(A) approximately one year
(B) approximately two years
(C) approximately five years
(D) approximately twenty-five years
Answer: approximately five years

9. The ……………… settings are automatic and standard.
(A) default
(B) CPU
(C) peripheral
(D) user frien9ly
Answer: default

10. What are the two parts of an E-mail address ?
(A) User name and street address
(B) Legal name and phone number
(C) User name and domain name
(D) Initials and password
Answer: User name and domain name

11. Participants can see and hear each other in a/an ………………
(A) electronic mail system
(B) message system
(C) tele-conference
(D) bulletin board
Answer: tele-conference

12. Magnetic tape is not practical for applications where data must be quickly recalled because tape is ………………
(A) a random-access medium
(B) expensive
(C) a read-only medium
(D) a sequential-access medium
Answer: a sequential-access medium

13. Why should you delete unknown e-mail attachments ?
(A) You could go to jail
(B) The person could track you down and hurt you
(C) It is bad manners
(D) It might contain a virus that could hurt your computer
Answer: It might contain a virus that could hurt your computer

14. How is it possible that both programs and data can be stored on the same floppy disk ?
(A) A floppy disk has two sides, one for data and one for programs
(B) A floppy disk has to be formatted for one or for the other
(C) Programs and data are both software, and both can be stored on any memory device
(D) Floppy disks can only store data, not programs
Answer: Programs and data are both software, and both can be stored on any memory device

15. What is an embedded system ?
(A) A program that comes wrapped in a box
(B) A program that is permanently part of a computer
(C) A computer that is part of a larger computer
(D) A computer and software system that controls a machine or appliance
Answer: A computer and software system that controls a machine or appliance

16. Which of the following will you require to hear music on your computer ?
(A) Video Card
(B) Tape Recorder
(C) Mouse
(D) Sound Card
Answer: Sound Card

17. The signal that a computer is waiting for a command from the user is ………………
(A) prompt
(B) event
(C) time slice
(D) interrupt
Answer: prompt

18. This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page ………………
(A) Web browser
(B) Web search engine
(C) Web homepage
(D) Web service
Answer: Web browser

19. For viewing video CDs, you would use………………
(A) CD Player
(B) Windows Media Player
(C) Windows Video Player
(D) Windows Movie Player
Answer: Windows Media Player

20. Executing more than one program concurrently by one user on one computer is known as ………………
(A) multi-programming
(B) multi-processing
(C) time-sharing
(D) multi-tasking
Answer: multi-tasking

21. Which of the following controls the manner of interaction between the user and the operating system ?
(A) language translator
(B) platform
(C) user interface
(D) icon
Answer: user interface

22. You can keep your personal flies / folders in ………………
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text
Answer: My Documents

23. Three types of compact disks include CD-ROM, CD-R, and ………………
(A) CD-W
(B) CD-RAM
(C) CD-DVD
(D) CD-RW
Answer: CD-RW

24. All computers must have ………………
(A) Word processing software
(B) An operating system
(C) A printer attached
(D) A virus checking program
Answer: An operating system

25. Collecting personal information and effectively posing as another individual is known as the crime of ………………
(A) spooling
(B) spoofing
(C) hacking
(D) identity theft
Answer: identity theft

Thursday, 17 May 2012

COMPUTER KNOWLEDGE MODEL PRACTICE QUESTIONS


1. Which of the following is NOT a computer programming language?
(1) C
(2) C++
(3) Java
(4) COBOL
(5) Microsoft

2. A computer virus normally attaches itself to another computer program known as-
(1) Trojan horse 
(3) Host program
(3) Boot program
(4) Spyware
(5) Malware

3. A terminal that cannot process any information is called-
(1) Direct access terminal
(2) Intelligent terminal
(3) Dumb terminal 
(4) Smart terminal
(5) Blind terminal

4. ____ is a high speed memory that can be used in between CPU and main memory.
(1) CPU
(2) Buffer
(3) Spooling
(4) Cache 
(5) None of these

5. A ____ port is primarily used to connect printers to a computer.
(1) Serial port
(2) USB port
(3) Parallel port 
(4) Address bus
(5) None of these

6. ____ is responsible for overall control and co-ordination of instruction execution.
(1) CPU
(2) ALU
(3) RAM 
(4) Control Unit
(5) None of these

7. When you start your computer from the off position then it is known as-
(1) Hard booting 
(2) Processing
(3) Storage
(4) Soft booting
(5) None of these

8. The component is required to process data into information and consists of integrated circuit.
(1) RAM
(2) Control Unit
(3) Processor 
(4) Motherboard
(5) None of these

9. ____ is known as network virus.
(1) Trojan horse
(2) Brain Virus
(3) Worm 
(4) All of these
(5) None of these

10. ____ is a technique of temporarily removing inactive programs from the memory of computer system.
(1) Swapping
(2) Spooling 
(3) Semaphore
(4) Scheduler
(5) None of these

11. A computer program that translates one program instructions at a time into machine language is called-
(1) Interpreter 
(2) CPU
(3) Compiler
(4) Simulator
(5) None of these

12. ____ are device used to transmit data over telecommunication lines.
(1) Drives
(2) Drive bays
(3) Modems 
(4) Platforms
(5) None of these

13. Who introduced Internet E-mail?
(1) Jerry Yang
(2) David Filo
(3) Ray Tomlinson
(4) Sergey Brinn
(5) None of these

14. Granting an outside organization access to internet web pages is often implemented using a(n)-
(1) extranet 
(2) intranet
(3) internet
(4) hacker
(5) None of these

15. BCC stands for-
(1) Bold Carbon Copy
(2) Blue Carbon Copy
(3) Bandwidth Carbon Copy
(4) Blind Carbon Copy 
(5) None of these

16. Which of the following contains information about a single ‘entity’ in the database like a person, place, event or thing?
(1) Query
(2) Field
(3) record 
(4) table
(5) None of these

17. Outlook Express is known as-
(1) E-mal client 
(2) Word processor
(3) Spreadsheet
(4) Database
(5) None of these

18. Which is not closed source software package?
(1) VLC
(2) LINUX
(3) Open Office
(4) MS Word 
(5) None of these

19. Minimum Zoom percentage supported by MS Word is-
(1) 10% 
(2) 15%
(3) 25%
(4) 4%
(5) None of these

20. HTML was introduced by-
(1) Vinton Cerf
(2) Bob Willies
(3) Steve Jobs
(4) Tim Burner Lee 
(5) None of these

21. A message with replies on a newsgroup is often, called a-
(1) post
(2) list
(3) thread 
(4) comment
(5) None of these

22. To send e-mail to a large group at one time, a ____ can be used.
(1) group
(2) alias
(3) mail server
(4) list serv 
(5) None of these

23. The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as-
(1) Business to business
(2) Consumer to business 
(3) Client to business
(4) Business to consumer
(5) None of these

24. A repair for a known software bug, usually available at no change on the internet is called-
(1) Version
(2) Patch 
(3) Tutorial
(4) FAQ
(5) None of these

25. When sending the e-mail, the ____ line describes the contents of the message.
(1) CC
(2) Contents
(3) To
(4) Subject 
(5) BCC

26. A port is a connector located on the –
(1) RAM
(2) CPU
(3) ROM
(4) Memory
 (5) Motherboard

27. Format command is used to create-
(1) Sector
(2) memory
(3) tracks
(4) tracks & sectors 
(5) None of these

28. Disk access time is-
(1) seek time
(2) Latency time
(3) Seek time + Latency time 
(4) Disk time
(5) None of these

29. ____ technology is used by banks for faster processing of large volume of cheques.
(1) OCR
(2) IFSC Code
(3) OMR
(4) MICR 
(5) Bar Code

30. The Operating System is also called the ____ between the user and the computer.
(1) server
(2) interface 
(3) network
(4) intermediate
(5) None of these

31. A human being who writes programs, operate and maintain computer is known as-
(1) Liveware 
(2) Freeware
(3) Spyware
(4) Shareware
(5) None of these

32. A Public Switched-Telephone Network (PSTN) uses ____ switching technique.
(1) Packet
(2) Message
(3) Circuit 
(4) Transport
(5) None of these

33. The PC and the Apple Macintosh are example of two different –
(1) applications
(2) programs
(3) platforms 
(4) storage device
(5) Operating system

34. PROM is a ____ memory that store information even if power is switched off.
(1) Volatile
(2) Buffer
(3) spooling
(4) non-volatile 
(5) None of these

35. When installing a peripheral device you also need to install a –
(1) port
(2) server
(3) driver 
(4) connection
(5) utility software

36. The ____ specifies the operation to be performed and the operands provide the data on which the operation is to be performed.
(1) source code
(2) op code 
(3) object code
(4) program code
(5) None of these

37. Which of the following can hold maximum amount of data?
(1) Optical disk
(2) Floppy disk
(3) Magnetic disk inside computer
(4) Magnetic tape 
(5) None of these

38. A ____ is not a form of Biometrics.
(1) fingerprint
(2) password 
(3) retina scan
(4) breath scan
(5) None of these

39. Full form of OSI is-
(1) Open System Interconnection 
(2) Open Software for Internet
(3) Operational System for Interconnect
(4) Operational Software for Internet
(5) None of these

40. A pixel is-
(1) a computer program that draws picture
(2) a picture stored in the secondary memory
(3) the smallest resolvable part of a picture 
(4) a virus
(5) None of these