Computer Knowledge is highly scoring section in IBPS POs and RRB (Regional Rural Banks) Examinations. All the questions will be from well known concepts such as Computer Terminology, Basic Computer Architecture, Internet, MS-Office, E-Commerce, Computer Network etc. The questions may be theoretical and also require knowledge of facts and application.
Wednesday, 7 March 2012
IBPS COMPUTER KNOWLEDGE PRACTICE QUESTIONS
1. Computer uses the .......... number system to store data and perform calculations.
(1) binary
(2) octal
(3) decimal
(4) hexadecimal
(5) None of these
2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is-
(1) Memory-only
(2) Write-only
(3) Once-only
(4) Run-only
(5) Read-only
3. Which of the following can be used to select the entire document?
(1) CTRL + A
(2) ALT + F5
(3) SHIFT + A
(4) CTRL + K
(5) CTRL + H
4. .......... are attempts by individuals to obtain confidential information from you by falsifying their identity.
(1) Phishing
(2) Computer viruses
(3) Spyware scams
(4) Viruses
(5) None of the above
5. Part number, part description, and number of parts ordered are examples of
(1) control
(2) output
(3) processing
(4) feedback
(5) input
6. A Web site's main page is called its-
(1) Home Page
(2) Browser Page
(3) Search Page
(4) Bookmark
(5) None of these
7. The simultaneous processing of two or more programs by multiple processors is-
(1) multiprogramming
(2) multitasking
(3) time-sharing
(4) multiprocessing
(5) None of these
8. Codes consisting of lines of varying widths or lengths that are computer-readable are known as-
(1) an ASCII code
(2) a magnetic tape
(3) an OCR scanner
(4) a bar code
(5) None of these
9. To instruct Word to fit the width of a column to the contents of a table automatically, click the ..... button and then point to AutoFit Contents.
(1) Fit to Form
(2) Format
(3) Autosize
(4) Contents
(5) AutoFit
10. Why is it unethical to share copyrighted files with your friends?
(1) It is not unethical, because it is legal.
(2) It is unethical because the files are being given for free.
(3) Sharing copyrighted files without permission breaks copyright laws.
(4) It is not unethical because the files are being given for free.
(5) It is not unethical-anyone can access a computer
11. Reusable optical storage will typically have the acronym-
(1) CD
(2) DVD
(3) ROM
(4) RW
(5) ROS
12. The most common type of storage devices are-
(1) persistent
(2) optical
(3) magnetic
(4) flash
(5) steel
13. A device that connects to a network without the use of cables is said to be-
(1) distributed
(2) free
(3) centralized
(4) open source
(5) None of these
14. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a-
(1) hacker
(2) analyst
(3) instant messenger
(4) programmer
(5) spammer
15. To access properties of an object, the mouse technique to use is-
(1) dragging
(2) dropping
(3) right-clicking
(4) shift-clicking
(5) None of these
16. To change selected text to all capital letters, click the change case button, then click-
(1) UPPERCASE
(2) UPPER ALL
(3) CAPS LOCK
(4) Lock Upper
(5) Large Size
17. The basic unit of a worksheet into which you enter data in Excel is called a-
(1) tab
(2) cell
(3) box
(4) range
(5) None of these
18. You can keep your personal files / folders in-
(1) My folder
(2) My Documents
(3) My Files
(4) My Text
(5) None of these
19. In Word you can force a page break-
(1) By positioning your cursor at the appropriate place and pressing the F1 key
(2) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
(3) By using the Insert/Section Break
(4) By changing the font size of your document
(5) None of these
20. A DVD is an example of a(n)-
(1) hard disk
(2) optical disc
(3) output device
(4) solid-state storage device
(5) None of these
21. The default view in Excel is ......... view.
(1) Work
(2) Auto
(3) Normal
(4) Roman
(5) None of these
22. The process of transferring files from a computer on the Internet to your computer is called
(1) downloading
(2) uploading
(3) FTP
(4) JPEG
(5) downsizing
23. .......... is the process of dividing the disk into tracks and sectors.
(1) Tracking
(2) Formatting
(3) Crashing
(4) Allotting
(5) None of these
24. Help Menu is available at which button?
(1) End
(2) Start
(3) Turnoff
(4) Restart
(5) Reboot
25. The contents of .......... are lost when the computer turns off.
(1) storage
(2) input
(3) output
(4) memory
(5) None of these
26. When you enter text in a cell in Excel, it also appears in which of the following?
(1) Status bar
(2) Formula bar
(3) Row heading
(4) Name box
(5) None of these
27. Which elements of a Word document can be displayed in colour?
(1) Only graphics
(2) Only text
(3) Only the first word of each line
(4) All elements, but only if you have a colour printer
(5) All elements
28. A workbook is a collection of
(1) Page Setup
(2) Buttons
(3) Diagrams
(4) Charts
(5) Worksheets
29. __ appear at the bottom of the Excel Window.
(1) Sheet tabs
(2) Name Box
(3) Formula bar
(4) Title bar
(5) None of these
30. EPROM stands for
(1) Erasable Programmable Read-Only Memory
(2) Electronic Programmable Read-Only Memory
(3) Enterprise Programmable Read-Only Memory
(4) Extended Programmable Read-Only Memory
(5) Electrical Programmable Read-Only Memory
31. The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as
(1) CISC
(2) RISC
(3) CD-ROM
(4) Wi-Fi
(5) MISC
32. Which is not a basic function of a computer?
(1) Store data
(2) Accept input
(3) Process data
(4) Copy text
(5) Accept and process data
33. ASCII is a coding system that provides
(1) 256 different characters
(2) 512 different characters
(3) 1024 different characters
(4) 128 different characters
(5) 1000 different characters
34. Which part of the computer is directly invoked in executing the instructions of the computer program?
(1) The scanner
(2) The main storage
(3) The secondary storage
(4) The printer
(5) The processor
35. In order to create column data in Word, you need to
(1) tab consecutively until your cursor reaches the desired place
(2) set tabs or use the Table menu
(3) use Excel
(4) press the space bar until your cursor reaches the desired place
(5) None of these
36. Files are organised by storing them in
(1) tables
(2) databases
(3) folders
(4) graphs
(5) diagrams
37. When a computer is switched on, the booting process performs
(1) Integrity Test
(2) Power-On Self-Test
(3) Correct Functioning Test
(4) Reliability Test
(5) Shut-down
38. In Word, the feature that automatically detects common errors is called
(1) Autocorrect
(2) Autograph
(3) Spelling and Grammar
(4) Go to
(5) Thesaurus
39. A computer system that is old and perhaps not satisfactory is referred to as a(n)
(1) Ancient system
(2) Historical system
(3) Age old system
(4) Legacy system
(5) Legal System
40. Which of the following is not a binary number?
(1) 001
(2) 101
(3) 202
(4) 110
(5) 011
41. Which of the following does not store data permanently?
(1) ROM
(2) RAM
(3) Floppy Disk
(4) Hard Disk
(5) None of these
42. Which of the following is the smallest storage?
(1) Megabyte
(2) Gigabyte
(3) Kilobyte
(4) Terabyte
(5) None of these
43. Which menu enables the user to choose toolbars?
(1) View
(2) Format
(3) Insert
(4) Edit
(5) Help
44. By viewing the properties of the local hard disk of a computer, the user can find out
(1) the amount of space that has been used up and the remaining free space on the disk.
(2) the name of the user viewing the properties of the disk.
(3) nothing useful to the user.
(4) the number of programs available in the computer,
(5) None of these
45. Pre-defined and built-in formulas in Excel are known as
(1) Autosheets
(2) Diagrams
(3) Charts
(4) Tables
(5) Functions
46. Which of the following contains permanent data and gets updated during the processing of transactions?
(1) Operating System File
(2) Transaction file
(3) Software File
(4) Master file
(5) Any File
47. The keyboard shortcut to centralise the selected text in Word is
(1) Ctrl + Esc
(2) Ctrl + C
(3) Alt + C
(4) There is no keyboard shortcut for this operation
(5) Ctrl + E
48. Which of the following helps to protect floppy disks from data getting accidentally erased?
(1) Access notch
(2) Write-protect notch
(3) Entry notch
(4) Input notch
(5) None of these
49. A modem is connected to
(1) a telephone line
(2) a keyboard
(3) a printer
(4) a monitor
(5) a scanner
50. Large transaction processing systems in automated organisations use
(1) Online processing
(2) Batch Processing
(3) Once-a-day Processing
(4) End-of-day processing
(5) Once-a-week processing
51. The operation of combining two cells into a single cell in Excel is referred to as
(1) join cells
(2) merge cells
(3) merge table
(4) join table
(5) None of these
52. Which of the following can be used to store a large number of files in a small amount of storage space?
(1) File adjustment
(2) File copying
(3) File reading
(4) File compatibility
(5) File compression
53. In a computer, most processing takes place in
(1) memory
(2) RAM
(3) motherboard
(4) CUP
(5) None of these
54. Data is organized in a worksheet as
(1) charts and diagrams
(2) rows and columns
(3) tables and boxes
(4) graphs
(5) None of the above
55. Which of the following is an example of a binary number?
(1) 6AH1
(2) 100101
(3) 005
(4) ABCD
(5) 23456
56. Spell Check will find errors in which of the following?
(1) Today is a rainy day
(2) Today is a rainy a day
(3) Is a rainy
(4) Rainy today a day
(5) None of the above
57. Which of the following is not a storage medium?
(1) Hard disk
(2) Flash drive
(3) DVD
(4) CD
(5) Keyboard
58. In Excel, when the contents and attributes of a cell or range of cells have to be erased using the menu, the user must
(1) select the Cells. choose Edit. and select Clear, then All
(2) select the Cells. and click Delete on the keyboard
(3) select the Cells. choose Tools. and select Clear. then Formats
(4) select the Cells. choose Tools. and select Formula Audit. then Delete
(5) None of the above
59. The computer abbreviation KB usually means
(1) Key Block
(2) Kernel Boot
(3) Kilo Byte
(4) Kit Bit
(5) None of these
60. If an Excel Worksheet is to be linked for use in a Powerpoint presentation, the following should be clicked
(1) Edit, Paste Special
(2) Edit, Paste
(3) Edit, Copy
(4) File, Copy
(5) None of the above
61. RAM stands for
(1) Random Access Memory
(2) Ready Application Module
(3) Read Access Memory
(4) Remote Access Machine
(5) None of the above
62. Which of the following is the hardware and not the software?
(1) Excel
(2) Printer driver
(3) Operating system
(4) Powerpoint
(5) Control Unit
63. In Word, which menu would the user select to print a document?
(1) Tools
(2) File
(3) View
(4) Wind0Vob
(5) None of these
64. Which of the following is not true about computer files?
(1) They are collections of data saved to a Storage medium
(2) Every file has a filename
(3) A file extension is established by the user to indicate the date it was created
(4) Usually files contain data
(5) None of the above
65. The common name for a modulator-demodulator is
(1) modem
(2) joiner
(3) networker
(4) connector
(5) demod
66. What do you see when you click the right mouse button?
(1) The same effect as the left click
(2) A special menu
(3) No effect
(4) A mouse cannot be right clicked
(5) Computer goes to sleep mode
67. In order to choose the font for a sentence in a Word document,
(1) select Font in the Format menu
(2) select Font in the Edit menu
(3) select Font in the Tools menu
(4) select Font in the Insert menu
(5) None of the above
68. The ALU performs .......... operations.
(1) logarithm-based
(2) ASCII
(3) algorithm-based
(4) arithmetic
(5) None of the above
69. Excel is a program that is used to prepare a
(1) Database
(1) Text Document
(3) Spreadsheet
(4) Slide Presentation
(5) None of the above
70. .......... consists of volatile chips that temporarily store data or instructions.
(1) CPU
(2) ROM
(3) RMA
(4) RAM
(5) None of these
Thursday, 1 March 2012
BANK EXAMS COMPUTER KNOWLEDGE MCQs
1. Which of the following is a part of the Central Processing Unit?
a. Printer
b. Key board
c. Mouse
d. Arithmetic & Logic unit
e. None of these
2. CAD stands for
a. Computer aided design
b. Computer algorithm for design
c. Computer application in design
d. All of the above
e. None of these
3. Which of the following printer cannot print graphics?
a. Ink-jet
b. Daisy Wheel
c. Laser
d. Dot-matrix
e. None of these
4. A program written in machine language is called?
a. Assembler
b. Object
c. Computer
d. Machine
e. None of these
5. The father of Modern Computer is
a. Charles Babbage
b. Von-nuumann
c. Danies Ritchel
d. Blaise Pascal
e. None of these
6. The Word FTP stands for
a. File Translate Protocol
b. File Transit Protocol
c. File Transfer protocol
d. file typing protocol
e. None of these
7. The lowest form of Computer language is called
a. BASIC
b. FORTRAN
c. Machine Language
d. COBOL
e. None of these
8. Best Quality graphics is produced by
a. Dot Matix
b. Laser Printer
c. Inkjet Printer
d. Plotter
e. None of these
9. Memory which forgets every thing when you switch off the power is known as
a. Corrupted
b. Volatile
c. Non-Volatile
d. Non-Corrupted
e.None of these
10.The linking of computers with a communication system is called
a. Networking
b. Pairing
c. Interlocking
d. Assembling
e. Sharing
11.The 16 bit Microprocessor means that it has
a. 16 address lines
b. 16 Buses
c. 16 Data lines
d. 16 routes
e. None of these
12. Data going into the computer is called
a. Output
b. algorithm
c. Input
d. Calculations
e. flow chart
13. Which of the following refers to a small, single-site network?
a. LAN
b. DSL
c. RAM
d. USB
e. CPU
14. Microsoft Office is
a. Shareware
b.Public domain software
c. Open-sourse software
d. A vertical market application
e. An application suite
15. How many options does a BINARY choice offer
a. None of these
b. One
c. Two
d. it depends on the amount of memory on the computer
e. It depends on the speed of the computer’s processor
16. A collection of program that controls how your computer system runs and processes information is called
a. Operating System
b. Computer
c. Office
d. Compiler
e. Interpreter
17. Computer connected to a LAN (Local Area Network) can
a. run faster
b. go on line
c. share information and /or share peripheral equipment
d. E-mail
e. None of these
18. Information travels between components on the mother board through
a. Flash memory
b. CMOS
c. Bays
d. Buses
e. Peripherals
19. How are data organized in a spreadsheet?
a. Lines & spaces
b. Layers & Planes
c. Height & Width
d. Rows & Columns
e. None
20. The blinking symbol on the computer screen is called the
a. mouse
b. logo
c. hand
d. palm
e. cursor
21. A fault in a computer program which prevents it from working correctly is known as
a. Boot
b. Bug
c. Biff
d. Strap
e. None of these
22. A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is _________
a. Bug
b. Vice
c. Lice
d. Worm
e. None of these
23. A _______ is a bi-stable electronic circuit that has two stable states.
a. Multivibrator
b. Flip-flop
c. Logic gates
d. laten
e. None of these
24. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as
a. Spam
b. Trash
c. Calibri
d. Courier
e. None of these
25.DOS stands for
a. Disk Operating System
b. Disk operating session
c. Digital Operating System
d. Digital Open system
e. None of these
26. Who is the chief of Miocrosoft
a. Babbage
b. Bill Gates
c. Bill Clinton
d. Bush
e. None of these
27. Which of the following are input devices.
a. Keyboard
b. Mouse
c. Card reader
d. Scanner
e. All of these
28. Examples of output devices are
a. Screen
b. Printer
c. Speaker
d. All of these
e. None of these
29. Which of the following is also known as brain of computer
a. Control unit
b. Central Processing unit
c. Arithmatic and language unit
d. Monitor
e. None of these
30. IBM stands for
a. Internal Business Management
b. International Business Management
c. International Business Machines
d. Internal Business Machines
e. None of these
31.___________ translates and executes program at run time line by line
a. Compiler
b. Interpreter
c. Linker
d. Loader
e. None of these
32. ___________ is an OOP principle
a. Structured programming
b. Procedural programming
c. Inheritance
d. Linking
e. None of these
33. COBOL is widely used in _________ applications
a. Commercial
b. Scientific
c. Space
d. Mathematical
e. None of these
34. RAM stands for
a. Random origin money
b. Random only memory
c. Read only memory
d. Random access memory
e. None of these
35. 1 Byte = ?
a. 8 bits
b. 4 bits
c. 2 bits
d. 9 bits
e. None of these
36. SMPS stands for
a. Switched mode Power Suply
b. Start mode power supply
c. Store mode power supply
d. Single mode power supply
e. None of these
37. The device used to carry digital data on analog lines is called as
a. Modem
b. Multiplexer
c. Modulator
d. Demodulator
e. None of these
38. VDU is also called
a. Screen
b. Monitor
c. Both 1 & 2
d. printer
e. None of these
39. BIOS stands for
a. Basic Input Output system
b. Binary Input output system
c. Basic Input Off system
d. all the above
e. None of these
40. Father of ‘C’ programming language
a. Dennis Ritchie
b. Prof Jhon Kemeny
c. Thomas Kurtz
d. Bill Gates
e. None of these
6. (c) 7. (c) 8. (d) 9. (b) 10. (a)
11. (c) 12. (c) 13. (a) 14. (e) 15. (c)
16. (a) 17. (c) 18. (c) 19. (d) 20. (e)
21. (b) 22. (d) 23. (b) 24. (a) 25. (a)
26. (b) 27. (e) 28. (d) 29. (b) 30. (c)
31. (b) 32. (c) 33. (a) 34. (d) 35. (a)
36. (a) 37. (a) 38. (c) 39. (a) 40. (a)
a. Printer
b. Key board
c. Mouse
d. Arithmetic & Logic unit
e. None of these
2. CAD stands for
a. Computer aided design
b. Computer algorithm for design
c. Computer application in design
d. All of the above
e. None of these
3. Which of the following printer cannot print graphics?
a. Ink-jet
b. Daisy Wheel
c. Laser
d. Dot-matrix
e. None of these
4. A program written in machine language is called?
a. Assembler
b. Object
c. Computer
d. Machine
e. None of these
5. The father of Modern Computer is
a. Charles Babbage
b. Von-nuumann
c. Danies Ritchel
d. Blaise Pascal
e. None of these
6. The Word FTP stands for
a. File Translate Protocol
b. File Transit Protocol
c. File Transfer protocol
d. file typing protocol
e. None of these
7. The lowest form of Computer language is called
a. BASIC
b. FORTRAN
c. Machine Language
d. COBOL
e. None of these
8. Best Quality graphics is produced by
a. Dot Matix
b. Laser Printer
c. Inkjet Printer
d. Plotter
e. None of these
9. Memory which forgets every thing when you switch off the power is known as
a. Corrupted
b. Volatile
c. Non-Volatile
d. Non-Corrupted
e.None of these
10.The linking of computers with a communication system is called
a. Networking
b. Pairing
c. Interlocking
d. Assembling
e. Sharing
11.The 16 bit Microprocessor means that it has
a. 16 address lines
b. 16 Buses
c. 16 Data lines
d. 16 routes
e. None of these
12. Data going into the computer is called
a. Output
b. algorithm
c. Input
d. Calculations
e. flow chart
13. Which of the following refers to a small, single-site network?
a. LAN
b. DSL
c. RAM
d. USB
e. CPU
14. Microsoft Office is
a. Shareware
b.Public domain software
c. Open-sourse software
d. A vertical market application
e. An application suite
15. How many options does a BINARY choice offer
a. None of these
b. One
c. Two
d. it depends on the amount of memory on the computer
e. It depends on the speed of the computer’s processor
16. A collection of program that controls how your computer system runs and processes information is called
a. Operating System
b. Computer
c. Office
d. Compiler
e. Interpreter
17. Computer connected to a LAN (Local Area Network) can
a. run faster
b. go on line
c. share information and /or share peripheral equipment
d. E-mail
e. None of these
18. Information travels between components on the mother board through
a. Flash memory
b. CMOS
c. Bays
d. Buses
e. Peripherals
19. How are data organized in a spreadsheet?
a. Lines & spaces
b. Layers & Planes
c. Height & Width
d. Rows & Columns
e. None
20. The blinking symbol on the computer screen is called the
a. mouse
b. logo
c. hand
d. palm
e. cursor
21. A fault in a computer program which prevents it from working correctly is known as
a. Boot
b. Bug
c. Biff
d. Strap
e. None of these
22. A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is _________
a. Bug
b. Vice
c. Lice
d. Worm
e. None of these
23. A _______ is a bi-stable electronic circuit that has two stable states.
a. Multivibrator
b. Flip-flop
c. Logic gates
d. laten
e. None of these
24. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as
a. Spam
b. Trash
c. Calibri
d. Courier
e. None of these
25.DOS stands for
a. Disk Operating System
b. Disk operating session
c. Digital Operating System
d. Digital Open system
e. None of these
26. Who is the chief of Miocrosoft
a. Babbage
b. Bill Gates
c. Bill Clinton
d. Bush
e. None of these
27. Which of the following are input devices.
a. Keyboard
b. Mouse
c. Card reader
d. Scanner
e. All of these
28. Examples of output devices are
a. Screen
b. Printer
c. Speaker
d. All of these
e. None of these
29. Which of the following is also known as brain of computer
a. Control unit
b. Central Processing unit
c. Arithmatic and language unit
d. Monitor
e. None of these
30. IBM stands for
a. Internal Business Management
b. International Business Management
c. International Business Machines
d. Internal Business Machines
e. None of these
31.___________ translates and executes program at run time line by line
a. Compiler
b. Interpreter
c. Linker
d. Loader
e. None of these
32. ___________ is an OOP principle
a. Structured programming
b. Procedural programming
c. Inheritance
d. Linking
e. None of these
33. COBOL is widely used in _________ applications
a. Commercial
b. Scientific
c. Space
d. Mathematical
e. None of these
34. RAM stands for
a. Random origin money
b. Random only memory
c. Read only memory
d. Random access memory
e. None of these
35. 1 Byte = ?
a. 8 bits
b. 4 bits
c. 2 bits
d. 9 bits
e. None of these
36. SMPS stands for
a. Switched mode Power Suply
b. Start mode power supply
c. Store mode power supply
d. Single mode power supply
e. None of these
37. The device used to carry digital data on analog lines is called as
a. Modem
b. Multiplexer
c. Modulator
d. Demodulator
e. None of these
38. VDU is also called
a. Screen
b. Monitor
c. Both 1 & 2
d. printer
e. None of these
39. BIOS stands for
a. Basic Input Output system
b. Binary Input output system
c. Basic Input Off system
d. all the above
e. None of these
40. Father of ‘C’ programming language
a. Dennis Ritchie
b. Prof Jhon Kemeny
c. Thomas Kurtz
d. Bill Gates
e. None of these
ANSWERS
1. (d) 2. (a) 3. (b) 4. (a) 5. (a)6. (c) 7. (c) 8. (d) 9. (b) 10. (a)
11. (c) 12. (c) 13. (a) 14. (e) 15. (c)
16. (a) 17. (c) 18. (c) 19. (d) 20. (e)
21. (b) 22. (d) 23. (b) 24. (a) 25. (a)
26. (b) 27. (e) 28. (d) 29. (b) 30. (c)
31. (b) 32. (c) 33. (a) 34. (d) 35. (a)
36. (a) 37. (a) 38. (c) 39. (a) 40. (a)
Sunday, 19 February 2012
COMPUTER AWARENESS PRACTICE MCQs
1. The instructions that tell a computer how to carry out the processing tasks are referred to as computer .........
1) programs2) processors
3) input devices
4) memory modules
5) None of these
2. An area of a computer that temporarily holds data waiting to be processed is ..........
1) CPU
2) Memory
3) Storage
4) File
5) None of these
3. To select or unselect one word to the right
1) CTRL + SHIFT
2) CTRL + SHIFT + UP Arrow
3) CTRL + SHIFT + Down Arrow
4) CTRL + SHIFT + Right Arrow
5) None of these
4. To maximize or restore a selected window
1) CTRL + F7
2) CTRL + F10
3) CTRL + F8
4) CTRL + F9
5) None of these
5. To Copy a picture of the selected window to the clipboard
1) ALT + TAB
2) Ctrl + TAB
3) ALT + Print Screen
4) Both (1) and (2)
5) None of these
6. .......... is the key to close a selected drop - down list; cancel a comm-and and close a dialog box.
1) TAB
2) SHIFT
3) ESC
4) F10
5) None of these
7. ......... is the key we use to run the selected command.
1) SHIFT
2) TAB
3) ENTER
4) CTRL
5) None of these
8. ............ is the functional key to display save-as box.
1) F5
2) F6
3) F9
4) F12
5) None of these
9. ............ is the combination of keys to switch between the last four places that you have edited
1) ALT + CTRL + Z
2) ALT + CTRL + Y
3) ALT + TAB + Z
4) ALT + SHIFT + Z
5) None of these
10. ............ is the Keyboard shortcut key to insert auto sum
1) ALT
2) ALT=
3) ALT+
4) ALT–
5) ALT+CTRL
11. Data becomes ................ when it is presented in a format that people can understand and use
1) processed
2) graphs
3) information
4) presentation
5) None of these
12. The term ............. designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
13. A ............ is a microprocessor - based computing device.
1) personal computer
2) mainframe
3) workstation
4) server
5) None of these
14. RAM can be thought of as the ......... for the computer's processor
1) factory
2) operating room
3) waiting room
4) planning room
5) None of these
15. Which of the following are the functions of a operating system
1) Allocates resources
2) Monitors Activities
3) Manages disks and files
4) All of the above
5) Only 1 and 2
16. To move a copy of file from one computer to another over a communication channel is called ?
1) File transfer
2) File encryption
3) File modification
4) File copying
5) None of these
17. The primary function of the ............ is to set up the hardware and load and start an operating system
1) System Programs
2) BIOS
3) CP
4) Memory
5) None of these
18. What kind of memory is both static and non - volatile ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) 5) None of these
19. .......... is computer software designed to operate the computer hardware and to provide platform for running application software
1) Application software
2) System software
3) Software
4) Operating system
5) None of these
20. The ......... is the amount of data that a storage device can move from the storage medium to the Computer per second
1) data migration rate
2) data digitizing rate
3) data transfer rate
4) data access rate
5) None of these
21. A device, which is not connected to CPU, is called as .......
1) land-line device
2) On-line device
3) Off-line device
4) Device
5) None of the above
22. What is the other name for programmed chip?
1) RAM
2) ROM
3) LSIC
4) PROM
5) None of these
23. On-line real time systems become popular in ........... generation
1) First Generation
2) Second Generation
3) Third Generation
4) FOurth Generation
5) None of thes
24. You use a(n) ....., such as a keyboard or mouse, to input information
1) output device
2) input device
3) storage device
4) processing device
5) None of these
25. ............ is the ability of a device to "jump" directly to the requested data
1) Sequential access
2) Random access
3) Quick access
4) All of the above
5) None of these
26. ............ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously
1) Multitasking
2) Multithreading
3) Multiprocessing
4) Multicoputing
5) None of these
27. The task of performing operations like arithmetic and logical operations is called ......
1) Processing
2) Storing
3) Editing
4) Sorting
5) None of these
28. The ALU and Control Unit joinly known as
1) RAM
2) ROM
3) CPU
4) PC
5) None of these
29. RAM is an example of
1) Secondary memory
2) Primary memory
3) Main memory
4) Both (1) and (2)
5) None of these
30.Magnetic disk is an example of
1) Secondary memory
2) Primary meory
3) Main memory
4) Both (1) and (2)
5) None of these
31. Which one of the following is NOT a computer language /
1) MS-Excel
2) BASIC
3) COBOL
4) C++
5) None of these
32. Each memory cell has a unique number, assigned to it is called as the ....... of the cell
1) Address
2) Register
3) Number
4) Path
5) None of these
33. RAM is also called as
1) Read / Write Memory
2) Long Memory
3) Permanent Memory
4) Primary Memory
5) None of these
34. ............ Store data or information temporarily and pass it on as directed by the control unit
1) Address
2) Register
3) Number
4) Memory
5) None of these
35. Select the Odd one
1) Operating system
2) Interpreter
3) Compiler
4) Assembler
5) None of these
36. A ............ is an additional set of commands that the computer displays after you make a selection from the main menu
1) dialog box
2) submenu
3) menu selection
4) All of the above
5) None of these
37. COBOL is an acronym for .............
1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these
38. All of the following are examples of real security and privacy risks EXCEPT
1) hackers
2) Spam
3) viruses
4) identity theft
5) None of these
39. Which of the following is NOT one of the four major data processing functions of a computer?
1) gathering data
2) processing data into information
3) analyzing the data or information
4) storing the data or information
5) None of these
40. All of the following are examples of storage devices EXCEPT :
1) hard disk drives
2) printers
3) floppy disk drives
4) CD drives
5) Pen drives
41. The CPU and memory are located on the :
1) expansion board
2) motherboard
3) storage device
4) output device
5) display board
42. .............. is the science that attempts to produce machines that display the same type of intelligence that humans do
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Aritificial intelligence (Al)
5) None of these
43. Servers are computers that provide resources to other computers connected to a :
1) networkd
2) mainframe
3) supercomputer
4) client
5) internet
44. When creating a computer program, the ......... designs the structure of the program
1) End user
2) System Analyst
3) Programmer
4) All of the above
5) None of these
45. A computer program that converts an entire program into machine language at one time is called a/ an
1) interpreter
2) simulator
3) characters
4) numbers
5) None of these
46. Computers process data into information by working exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these
47. The difference between people with access to computers and the Internet and those without this access is known as the :
1) digital divide
2) Internet divide
3) Web divide
4) broadband divide
5) None of these
48. Computers manipulate data in many ways, and this manipulation is calld ......
1) upgrading
2) processing
3) batching
4) utilizing
5) None of these
49. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:
1) robotics
2) simulation
3) computer forensics
4) animation
5) None of these
50. Where does most data go first with in a computer memory hierarchy ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) None of these
ANSWERS:
1) 1 2) 2 3) 4 4) 2 5) 3 6) 3 7) 3 8) 4 9) 1 10) 2
11) 3 12) 4 13) 1 14) 3 15) 4 16) 1 17) 2 18) 2 19) 2
20) 3 21) 3 22) 2 23) 3 24) 2 25) 2 26) 1 27) 1 28) 3 29) 2 30) 1
31) 1 32) 1 33) 1 34) 2 35) 1 36) 1 37) 1 38) 2 39) 3 40) 2
41) 2 42) 4 43) 2 44) 2 45) 3 46) 4 47) 1 48) 2 49) 3 50) 1
11) 3 12) 4 13) 1 14) 3 15) 4 16) 1 17) 2 18) 2 19) 2
20) 3 21) 3 22) 2 23) 3 24) 2 25) 2 26) 1 27) 1 28) 3 29) 2 30) 1
31) 1 32) 1 33) 1 34) 2 35) 1 36) 1 37) 1 38) 2 39) 3 40) 2
41) 2 42) 4 43) 2 44) 2 45) 3 46) 4 47) 1 48) 2 49) 3 50) 1
Wednesday, 15 February 2012
COMPUTER KNOWLEDGE MCQs
1. The instructions that tell a computer how to carry out the processing tasks are referred to as computer .........
1) programs2) processors
3) input devices
4) memory modules
5) None of these
2. An area of a computer that temporarily holds data waiting to be processed is ..........
1) CPU
2) Memory
3) Storage
4) File
5) None of these
3. To select or unselect one word to the right
1) CTRL + SHIFT
2) CTRL + SHIFT + UP Arrow
3) CTRL + SHIFT + Down Arrow
4) CTRL + SHIFT + Right Arrow
5) None of these
4. To maximize or restore a selected window
1) CTRL + F7
2) CTRL + F10
3) CTRL + F8
4) CTRL + F9
5) None of these
5. To Copy a picture of the selected window to the clipboard
1) ALT + TAB
2) Ctrl + TAB
3) ALT + Print Screen
4) Both (1) and (2)
5) None of these
6. .......... is the key to close a selected drop - down list; cancel a comm-and and close a dialog box.
1) TAB
2) SHIFT
3) ESC
4) F10
5) None of these
7. ......... is the key we use to run the selected command.
1) SHIFT
2) TAB
3) ENTER
4) CTRL
5) None of these
8. ............ is the functional key to display save-as box.
1) F5
2) F6
3) F9
4) F12
5) None of these
9. ............ is the combination of keys to switch between the last four places that you have edited
1) ALT + CTRL + Z
2) ALT + CTRL + Y
3) ALT + TAB + Z
4) ALT + SHIFT + Z
5) None of these
10. ............ is the Keyboard shortcut key to insert auto sum
1) ALT
2) ALT=
3) ALT+
4) ALT–
5) ALT+CTRL
11. Data becomes ................ when it is presented in a format that people can understand and use
1) processed
2) graphs
3) information
4) presentation
5) None of these
12. The term ............. designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
13. A ............ is a microprocessor - based computing device.
1) personal computer
2) mainframe
3) workstation
4) server
5) None of these
14. RAM can be thought of as the ......... for the computer's processor
1) factory
2) operating room
3) waiting room
4) planning room
5) None of these
15. Which of the following are the functions of a operating system
1) Allocates resources
2) Monitors Activities
3) Manages disks and files
4) All of the above
5) Only 1 and 2
16. To move a copy of file from one computer to another over a communication channel is called ?
1) File transfer
2) File encryption
3) File modification
4) File copying
5) None of these
17. The primary function of the ............ is to set up the hardware and load and start an operating system
1) System Programs
2) BIOS
3) CP
4) Memory
5) None of these
18. What kind of memory is both static and non - volatile ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) 5) None of these
19. .......... is computer software designed to operate the computer hardware and to provide platform for running application software
1) Application software
2) System software
3) Software
4) Operating system
5) None of these
20. The ......... is the amount of data that a storage device can move from the storage medium to the Computer per second
1) data migration rate
2) data digitizing rate
3) data transfer rate
4) data access rate
5) None of these
21. A device, which is not connected to CPU, is called as .......
1) land-line device
2) On-line device
3) Off-line device
4) Device
5) None of the above
22. What is the other name for programmed chip?
1) RAM
2) ROM
3) LSIC
4) PROM
5) None of these
23. On-line real time systems become popular in ........... generation
1) First Generation
2) Second Generation
3) Third Generation
4) FOurth Generation
5) None of thes
24. You use a(n) ....., such as a keyboard or mouse, to input information
1) output device
2) input device
3) storage device
4) processing device
5) None of these
25. ............ is the ability of a device to "jump" directly to the requested data
1) Sequential access
2) Random access
3) Quick access
4) All of the above
5) None of these
26. ............ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously
1) Multitasking
2) Multithreading
3) Multiprocessing
4) Multicoputing
5) None of these
27. The task of performing operations like arithmetic and logical operations is called ......
1) Processing
2) Storing
3) Editing
4) Sorting
5) None of these
28. The ALU and Control Unit joinly known as
1) RAM
2) ROM
3) CPU
4) PC
5) None of these
29. RAM is an example of
1) Secondary memory
2) Primary memory
3) Main memory
4) Both (1) and (2)
5) None of these
30. Magnetic disk is an example of
1) Secondary memory
2) Primary meory
3) Main memory
4) Both (1) and (2)
5) None of these
31. Which one of the following is NOT a computer language /
1) MS-Excel
2) BASIC
3) COBOL
4) C++
5) None of these
32. Each memory cell has a unique number, assigned to it is called as the ....... of the cell
1) Address
2) Register
3) Number
4) Path
5) None of these
33. RAM is also called as
1) Read / Write Memory
2) Long Memory
3) Permanent Memory
4) Primary Memory
5) None of these
34. ............ Store data or information temporarily and pass it on as directed by the control unit
1) Address
2) Register
3) Number
4) Memory
5) None of these
35. Select the Odd one
1) Operating system
2) Interpreter
3) Compiler
4) Assembler
5) None of these
36. A ............ is an additional set of commands that the computer displays after you make a selection from the main menu
1) dialog box
2) submenu
3) menu selection
4) All of the above
5) None of these
37. COBOL is an acronym for .............
1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these
38. All of the following are examples of real security and privacy risks EXCEPT
1) hackers
2) Spam
3) viruses
4) identity theft
5) None of these
39. Which of the following is NOT one of the four major data processing functions of a computer?
1) gathering data
2) processing data into information
3) analyzing the data or information
4) storing the data or information
5) None of these
40. All of the following are examples of storage devices EXCEPT :
1) hard disk drives
2) printers
3) floppy disk drives
4) CD drives
5) Pen drives
41. The CPU and memory are located on the :
1) expansion board
2) motherboard
3) storage device
4) output device
5) display board
42. .............. is the science that attempts to produce machines that display the same type of intelligence that humans do
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Aritificial intelligence (Al)
5) None of these
43. Servers are computers that provide resources to other computers connected to a :
1) networkd
2) mainframe
3) supercomputer
4) client
5) internet
44. When creating a computer program, the ......... designs the structure of the program
1) End user
2) System Analyst
3) Programmer
4) All of the above
5) None of these
45. A computer program that converts an entire program into machine language at one time is called a/ an
1) interpreter
2) simulator
3) characters
4) numbers
5) None of these
46. Computers process data into information by working exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these
47. The difference between people with access to computers and the Internet and those without this access is known as the :
1) digital divide
2) Internet divide
3) Web divide
4) broadband divide
5) None of these
48. Computers manipulate data in many ways, and this manipulation is calld ......
1) upgrading
2) processing
3) batching
4) utilizing
5) None of these
49. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:
1) robotics
2) simulation
3) computer forensics
4) animation
5) None of these
50. Where does most data go first with in a computer memory hierarchy ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) None of these
ANSWERS:
1) 1 2) 2 3) 4 4) 2 5) 3 6) 3 7) 3 8) 4 9) 1 10) 211) 3 12) 4 13) 1 14) 3 15) 4 16) 1 17) 2 18) 2 19) 2
20) 3 21) 3 22) 2 23) 3 24) 2 25) 2 26) 1 27) 1 28) 3 29) 2 30) 1
31) 1 32) 1 33) 1 34) 2 35) 1 36) 1 37) 1 38) 2 39) 3 40) 2
41) 2 42) 4 43) 2 44) 2 45) 3 46) 4 47) 1 48) 2 49) 3 50) 1
COMPUTER KNOWLEDGE PRACTICE MCQs
1.Which command devides the surface of the blank disk into sectors and assign a unique address to each one
1) Ver2) Format
3) Fat
4) Chkdsk
5) None of these
2.If you need to duplicate the entire disk, which command will you use ?
1) Copy
2) Diskcopy
3) Chkdsk
4) Format
5) None of these
3.A
.............. sometimes called a boot sector virus, executes when a
computer boots up because it resides in the boot sector of a floppy disk
or the master boot record of a hard disk
1) system virus
2) Trojan horse virus
3) file virus
4) macro virus
5) None of these
4.A result of a computer virus can not lead to ......
1) Disk Crash
2) Mother Board Crash
3) Corruption o f program
4) Deletion of files
5) None of these
5.Every computer connected to an intranet or extranet must have a distinct .......
1) firewall
2) proxy server
3) IP address
4) domain name
5) None of these
6.Programming language built into user programs such as Word and Excel are known as ......
1) 4GLs
2) Macro languages
3) object-oriented languages
4) visual programming languages
5) None of these
7.Firewalls are used to protect against .......
1) unauthorized Attacks
2) virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) None of these
8.Which of the following extensions suggest that the file is a backup copy
1) Bak
2) Bas
3) Com
4) Txt
5) None of these
9.Computer
programs are written in a high - level programming language; however,
the human readable version of a program is called .......
1) cache
2) instruction set
3) source code
4) word size
5) None of these
10.The software tools that enable a user to interact with a computer for specific purposes are known as .......
1) Hardware
2) Networked Software
3) Shareware
4) Applications
5) None of these
11...............
proessing is used when a large mail-order company accumulates orders
and processes them together in one large set
1) Batch
2) Online
3) Real-time
4) Group
5) None of these
12.When a file contains instructions that can be carried out by the computer, it is often called a(n) ...... file
1) data
2) information
3) executable
4) application
5) None of these
13.A complier translates a program written in a high - level language into ........
1) Machine language
2) An algorithm
3) A debugged program
4) Java
5) None of these
14.A set of step - by - step procedures for accomplishing a task is known as a(n) .....
1) algorithm
2) hardware program
3) software bug
4) firmware program
5) None of these
15.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) ......
1) Workstation
2) CPU
3) Magnetic disk
4) Integrated circuit
5) None of these
16.A saved document is referred to as a .....
1) file
2) word
3) folder
4) project
5) None of these
17.What is output ?
1) What the processor takes from the user
2) What the user gives to the processor
3) What the processor gets from the user
4) What the processor gives to the user
5) None of these
18.When you turn on the computer, the boot routine will perform this test ........
1) RAM test
2) Disk drive test
3) Memory test
4) Power - on self-test
5) None of these
19.Which of the following storage media provides sequential access only ?
1) Floppy disk
2) Magnetic disk
3) Magnetic tape
4) Optical disk
5) None of these
20.In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ........
1) copy and paste
2) copy, cut and paste
3) cut, copy and paste
4) cut and paste
5) None of these
21. Hardware includes ..........
1) all devices used to input data into a computer
2) sets of instructions that a computer runs or executes
3) the computer and all the devices connected to it that are used to input and output data
4) all devices involved in processing information including the central processing unit, memory and storage
5) None of these
22.The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ....... command
1) Replace
2) Find
3) Lookup
4) Search
5) None of these
23.The term 'user interface' refers to ............
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to user commands
3) the means by which the user interacts with the peripheral devices on the computer
4) the monitor that is available for the computer
5) None of these
24.For creating a document, you use ........ command at File Menu.
1) Open
2) Close
3) New
4) Save
5) None of these
25.The .............. becomes different shapes depending on the task you are performing
1) Active tab
2) Insertion point
3) Mouse pointer
4) Ribbon
5) None of these
26.Specilizd programs that asist users in locating information on the Web are called ....
1) Information engines
2) Search engines
3) Web browsers
4) Resource locators
5) None of these
27.The background of any Word document ......
1) Is always white colour
2) Is the colour you presect under the Options menu
3) Is always the same for the entire document
4) Can have any colour you choose
5) None of these
28.Correcting errors in a program is referred to as .........
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these
29.Any letter, number, or symbol found on the keyboard that you can type into the computer ..........
1) output
2) character
3) type
4) print
5) font
30.A symbol or question on the screen that prompts you to take action and tell the computer what to do next ........
1) scanner
2) questionnaire
3) prompt and dialog box
4) information seeker
5) None of these
31.Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs .....
1) menu bar
2) tool bar
3) user friendly
4) word processor
5) None of these
32.The primary device that a computer uses to store information ......
1) monitor
2) memory
3) disk
4) hard drive
5) None of these
33.A file extension is separated from the main file name with a(n) ......, but no spaces
1) questiion nark
2) exclamation mark
3) underscore
4) period
5) None of these
34.Application software is designed to accomplish .......
1) real -w orld tasks
2) computer-centric tasks
3) gaming tasks
4) operating system tasks
5) None of these
35.A ...... is a device that not only provdes surge protection, but also furnishes your computer with battery backup power during a power outage
1) surge strip
2) USB
3) UPS
4) battery strip
5) None of these
36.The term ............. designates equipment that might be added to a computer system to enhance, its functionality
1) digitial device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
37........... this is the act of copying or downloading a program from a network and making multiple copies of it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
38.When installing ............., the user must copy and usually decompress program files from a CDROM or other medium to the hard disk
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these
39.Which one of the following would be considered as a way that a computer virus can enter a computer system ?
1) Opening an application previously installed on the computer
2) Borrowed an illegal copy of software
3) Viewing a website without causing any additional transctions
4) Running antivirus programs
5) None of these
40.Programs such as Mozila Firefox that serve as navigable windows into the Web are called ..........
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these
41.What is the main difference between a mainframe and a super computer ?
1) Super computer is much larger than mainframe computers
2) Super computers are much smaller than mainframe computers
3) Supercomputers are focused to execute few programs as fast as possible
while mainframe uses its power to execute as many programs concurrently
4) Supercomputers are focused to execute as many programs as possible
while mainframe uses its power to execute few programs as fast as
possible
5) None of these
42.What is the function of Recycle Bin ?
1) Store deleted file
2) Store temporary file
3) Store corrupted file
4) Store Document file
5) None of these
43.Which is the latest version of MS Office ?
1) Office XP
2) Windows XP
3) Office 2007
4) Office 2010
5) None of these
44.Which device can not be shared in network ?
1) Floppy
2) Keyword
3) Computer
4) Printer
5) None of these
45.What is the purpose of query ?
1) Input data
2) Output data
3) Sort & filter
4) All of above
5) None of these
46.Which port doesn't exist in computer ?
1) USB
2) Parallel
3) Com1 / Com2
4) RAW
5) None of these
47.What is the name of exel files ?
1) Workbook
2) Worksheet
3) Spreadsheet
4) Spread book
5) None of these
48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
4) All of he above
5) None of these
49.Synonym can be reviewed with
1) Spelling and grammar
2) Thesaurus
3) Both
4) Synonym viewer
5) None of these
50.Which command allows you to reduce fragments of file and optimize the performance of disk ?
1) Scandisk
2) Diskcomp
3) Chkdsak
4) Defrag
5) None of these
ANSWERS:
1) 2 2) 2 3) 5 4) 2 5) 2 6) 4 7) 1 8) 1 9) 3 10) 411) 1 12) 3 13) 1 14) 1 15) 4 16) 1 17) 4 18) 2 19) 2 20) 4
21) 4 22) 2 23) 1 24) 3 25) 3 26) 2 27) 4 28) 1 29) 2 30) 3
31) 1 32) 4 33) 5 34) 4 35) 3 36) 4 37) 3 38) 1 39) 2 40) 4
41) 3 42) 1 43) 4 44) 2 45) 4 46) 4 47) 1 48) 1 49) 2 50) 4
Wednesday, 8 February 2012
BANK EXAMS COMPUTER KNOWLEDGE MODEL QUESTIONS
1. URL stands for
(a) Universal Research List
(b) Universal Resource List
(c) Uniform Resource Locator
(d) Uniform Research Locator
(e) None of the above
ANSWER: (c)
2. Which of the following is NOT a goal of Transaction processing system?
(a) Capture, process and store transactions
(b) Produce a variety of documents related to Routine business activities
(c) Reduce manual effort associated with Processing business transactions
(d) Produce standard reports used for Management decision making
(e) None of the above
ANSWER: (b)
3.When data changes in multiple lists and all lists are not updated, this causes
(a) Data redundancy
(b) Information overload
(c) Duplicate data
(d) Data inconsistency
(e) None of the above
ANSWER: (d)
4. Data becomes _ when it is presented in a format that people can understand and use.
(1) Processed
(2) Graphs
(3) Information
(4) Presentation
(5) None of these
ANSWER (3)
5. The term _ designates equipment that might be added to a computer system to enhance its functionality.
(1) Digital device
(2) System add-on
(3) Disk pack
(4) Peripheral device
(5) None of these
ANSWER (4)
6. What is the primary difference between viruses and a worm?
(a) A worm has the ability to self-propagate From an infected user’s computer to other Computers
(b) A worm is usually written by a cracker: Script bunnies do not have the skills to Develop a worm program
(c) A virus is very harmful to the computers it Infects: a worm is not a serious, a problem
(d) Anti-virus software is effective in fighting Viruses but not worms
(e) None of the above
ANSWER: (c)
7. You must install this on a network if you want to Share a broadband Internet connection.
(a) router
(b) Modem
(c) Node
(d) Cable
(e) None of these
ANSWER: (a)
8. ______________ is the ability of a device to ‘jump” directly to the requested data.
(1) Sequential access
(2) Random access
(3) Quick access
(4) All of these
(5) None of these
ANSWER (1)
9. Granting an outside organisation access to Internet web pages is often implemented using a (an)
(a) Extranet
(b) Intranet
(c) Internet
(d) Hacker
(e) None of these
ANSWER: (a)
10. The code that relational database management Systems use to perform their database task is Referred to as
(a) QBE
(b) SQL
(c) OLAP
(d) Sequel Server
(e) None of these
ANSWER: (b)
11. The purpose of the primary key in a database is to
(a) Unlock the database
(b) Provide a map of the data
(c) Uniquely identify a record
(d) Establish constraints on database operations
(e) None of the above
ANSWER: (c)
12. The instructions that tell a computer how to carry out the processing tasks are referred to as computer
(1) Programs
(2) Processors
(3) Input devices
(4) Memory modules
(5) None of these
ANSWER (1)
13. The ________________ is the amount of data that a storage device can move from the storage medium to the
computer per second.
(1) Data migration rate
(2) Data digitizing rate
(3) Data transfer rate
(4) Data access rate
(5) None of these
ANSWER (3)
14. C, BASIC, COBOL and Java examples of _languages.
(1) Low-level
(2) Computer
(3) System programming
(4) High-level
(5) None of the above
ANSWER (2)
15. A______________ is a microprocessor-based computing device.
(1) Personal computer
(2) Mainframe
(3) Workstation
(4) Server
(5) None of these
ANSWER (1)
16. The design of the network is called the network
(a) Architecture
(b) Server
(c) Transmission
(d) Type
(e) None of these
ANSWER: (a)
17. A _____________ converts all the statements in a program in a single batch and the resulting collection of Instructions is placed in a new file.
(1) Converter
(2) Compiler
(3) Interpreter
(4) Instruction
(5) None of these
ANSWER (2)
18. It uses pictures (called icons) and menus Displayed on the screen to send commands to the Computer system
(a) command-based user interface
(b) GUI
(c) System utility
(d) API
(e) None of the above
ANSWER: (b)
19. It contains data descriptions and defines the Name, data type, and length of each field in the Database
(a) Data dictionary
(b) Data table
(C) Data record
(d) Data field
(e) None of these
ANSWER: (a)
20. A is an additional set of commands that the computer displays after you make a selection from the main menu.
(1) Dialog box
(2) Submenu
(3) Menu selection
(4) All of these
(5) None of these
ANSWER (2)
21. Which of the following is NOT a type of Broadband internet connection?
(a) Cable
(b) DSL
(c) Dial-up
(d) Satellite
(e) None of these
ANSWER: (c)
22. in making a field this property show that it Cannot be left blank
(a) Numeric
(b) Required
(c) Calculated
(d) Validated
(e) None of these
ANSWER: (b)
23. There are viruses that are triggered by the Passage of time or on a certain date
(a) Boot-sector viruses
(b) Macro viruses
(c) Time bombs
(d) Worms
(e) None of these
ANSWER: (c)
24. What is a backup?
(a) Restoring the information backup
(b) An exact copy of a system’s information
(c) The ability to get a system up and running In the event of a system crash or failure
(d) All of the above
(e) None of the above
ANSWER: (d)
25. The internet is
(a) A large network of networks
(b) An internal communication system for a Business
(c) A communication system for the Indian Government
(d) All of the above
(e) None of the above
ANSWER: (d)
(a) Universal Research List
(b) Universal Resource List
(c) Uniform Resource Locator
(d) Uniform Research Locator
(e) None of the above
ANSWER: (c)
2. Which of the following is NOT a goal of Transaction processing system?
(a) Capture, process and store transactions
(b) Produce a variety of documents related to Routine business activities
(c) Reduce manual effort associated with Processing business transactions
(d) Produce standard reports used for Management decision making
(e) None of the above
ANSWER: (b)
3.When data changes in multiple lists and all lists are not updated, this causes
(a) Data redundancy
(b) Information overload
(c) Duplicate data
(d) Data inconsistency
(e) None of the above
ANSWER: (d)
4. Data becomes _ when it is presented in a format that people can understand and use.
(1) Processed
(2) Graphs
(3) Information
(4) Presentation
(5) None of these
ANSWER (3)
5. The term _ designates equipment that might be added to a computer system to enhance its functionality.
(1) Digital device
(2) System add-on
(3) Disk pack
(4) Peripheral device
(5) None of these
ANSWER (4)
6. What is the primary difference between viruses and a worm?
(a) A worm has the ability to self-propagate From an infected user’s computer to other Computers
(b) A worm is usually written by a cracker: Script bunnies do not have the skills to Develop a worm program
(c) A virus is very harmful to the computers it Infects: a worm is not a serious, a problem
(d) Anti-virus software is effective in fighting Viruses but not worms
(e) None of the above
ANSWER: (c)
7. You must install this on a network if you want to Share a broadband Internet connection.
(a) router
(b) Modem
(c) Node
(d) Cable
(e) None of these
ANSWER: (a)
8. ______________ is the ability of a device to ‘jump” directly to the requested data.
(1) Sequential access
(2) Random access
(3) Quick access
(4) All of these
(5) None of these
ANSWER (1)
9. Granting an outside organisation access to Internet web pages is often implemented using a (an)
(a) Extranet
(b) Intranet
(c) Internet
(d) Hacker
(e) None of these
ANSWER: (a)
10. The code that relational database management Systems use to perform their database task is Referred to as
(a) QBE
(b) SQL
(c) OLAP
(d) Sequel Server
(e) None of these
ANSWER: (b)
11. The purpose of the primary key in a database is to
(a) Unlock the database
(b) Provide a map of the data
(c) Uniquely identify a record
(d) Establish constraints on database operations
(e) None of the above
ANSWER: (c)
12. The instructions that tell a computer how to carry out the processing tasks are referred to as computer
(1) Programs
(2) Processors
(3) Input devices
(4) Memory modules
(5) None of these
ANSWER (1)
13. The ________________ is the amount of data that a storage device can move from the storage medium to the
computer per second.
(1) Data migration rate
(2) Data digitizing rate
(3) Data transfer rate
(4) Data access rate
(5) None of these
ANSWER (3)
14. C, BASIC, COBOL and Java examples of _languages.
(1) Low-level
(2) Computer
(3) System programming
(4) High-level
(5) None of the above
ANSWER (2)
15. A______________ is a microprocessor-based computing device.
(1) Personal computer
(2) Mainframe
(3) Workstation
(4) Server
(5) None of these
ANSWER (1)
16. The design of the network is called the network
(a) Architecture
(b) Server
(c) Transmission
(d) Type
(e) None of these
ANSWER: (a)
17. A _____________ converts all the statements in a program in a single batch and the resulting collection of Instructions is placed in a new file.
(1) Converter
(2) Compiler
(3) Interpreter
(4) Instruction
(5) None of these
ANSWER (2)
18. It uses pictures (called icons) and menus Displayed on the screen to send commands to the Computer system
(a) command-based user interface
(b) GUI
(c) System utility
(d) API
(e) None of the above
ANSWER: (b)
19. It contains data descriptions and defines the Name, data type, and length of each field in the Database
(a) Data dictionary
(b) Data table
(C) Data record
(d) Data field
(e) None of these
ANSWER: (a)
20. A is an additional set of commands that the computer displays after you make a selection from the main menu.
(1) Dialog box
(2) Submenu
(3) Menu selection
(4) All of these
(5) None of these
ANSWER (2)
21. Which of the following is NOT a type of Broadband internet connection?
(a) Cable
(b) DSL
(c) Dial-up
(d) Satellite
(e) None of these
ANSWER: (c)
22. in making a field this property show that it Cannot be left blank
(a) Numeric
(b) Required
(c) Calculated
(d) Validated
(e) None of these
ANSWER: (b)
23. There are viruses that are triggered by the Passage of time or on a certain date
(a) Boot-sector viruses
(b) Macro viruses
(c) Time bombs
(d) Worms
(e) None of these
ANSWER: (c)
24. What is a backup?
(a) Restoring the information backup
(b) An exact copy of a system’s information
(c) The ability to get a system up and running In the event of a system crash or failure
(d) All of the above
(e) None of the above
ANSWER: (d)
25. The internet is
(a) A large network of networks
(b) An internal communication system for a Business
(c) A communication system for the Indian Government
(d) All of the above
(e) None of the above
ANSWER: (d)
BANK EXAMS COMPUTER KNOWLEDGE MCQs
1.The first generation of computers were based upon
(a) transistors
(b) lC’s
(c) valves
(d) conductor
Ans : c
2.Turbo switch on computer is in
(a) back panel
(b) is not there
(c) front panel
(d) All of these
Ans : c
3.The second generation computers were based upon
(a) transistors
(b) ICs
(c) valves
(d) chips
Ans : a
4.RAM stands for
(a) Random Allowed Memory
(b) Ready Access Memory
(c) Random Access Memory
(d) Random Added Memory
Ans : c
5.In programming, you use the following keys
(a) Arrow keys
(b) Function keys
(c) Alpha keys
(d) Num keys
Ans : b
6.Printer is a device which
(a) input
(b) output
(c) Both a and b
(d) None of these
Ans : b
7.Laser printer is device which
(a) input
(b) output
(c) Both a and b
(d) None of these
Ans : b
8.Track ball has a
(a) ball
(b) track
(c) football
(d) None of these
Ans : a
9.Dot matrix printer uses what for printing
(a) hammers
(b) slugs
(c) mouse
(d) nibs
Ans : a
10.A CD can hold approximately how much of data
(a) 200 MB
(b) 700 MB
(c) 1000 MB
(d) 2000 MB
Ans : b
11. Computer program which controls the operations of computer is called
(a) assembles
(b) operating System
(c) interpreter
(d) compiler
Ans : b
12. System software are of two types operating systems and
(a) applications
(b) word processing
(c) language trans
(d) None of these
Ans : c
13.Debugging tools are there to debug errors in
(a) printers
(b) keyboards
(c) programs
(d) language
Ans : c
14. There are two basic types of disks-floppy disk and
(a) low disk
(b) hard disk
(c) soft disk
(d) None of these
Ans : b
15. It is a collection of facts and figures
(a) data
(b) information
(c) processing
(d) file
Ans : a
16.It converts accepted instructions into machine language
(a) input unit
(b) output unit
(c) processing unit
(d) memory unit
Ans : a
17. To open a new file in MS-Word, the shortcut key is
(a) Ctrl + X
(b) Ctrl + N
(c) Ctrl + Y
(d) Ctrl + V
Ans : b
18. What is the term used for the word processing programs that show you directly on the PC screen the appearance of your final document as you might expect on the paper?
(a) Search & Replace
(b) Pagination
(c) Soft Copy
(d) WYSIWYG
Ans : d
19. Alignment buttons are available on which toolbar?
(a) Status
(b) Standard
(c) Formatting
(d) None of these
Ans : c
20. Which of the following is not an option of edit menu?
(a) Cut
(b) Copy
(c) Paste
(d) Page setup
Ans : d
21. By default the bottom margin in the word document is
(a) 2 inch
(b) 1 inch
(c) 3 inch
(d) 1.5 inch
Ans : b
22.A file name cannot contain in MS-Word database file
(a) a letter
(b) number
(c) underscore
(d) space
Ans : d
23.Selection of text involves only
(a) single word
(b) line or multiple lines
(c) paragraph or paragraphs and complete document
(d) All of the above
Ans : d
24.‘Replace’ option is available in
(a) Edit menu
(b) File menu
(c) Tools menu
(d) Insert menu
Ans : a
25.When you start spelling checker, it starts checking the spellings
(a) from the end of the document to upward
(b) from the beginning of the document and downward
(c) from the insertion point
(d) None of the above
Ans : c
(a) transistors
(b) lC’s
(c) valves
(d) conductor
Ans : c
2.Turbo switch on computer is in
(a) back panel
(b) is not there
(c) front panel
(d) All of these
Ans : c
3.The second generation computers were based upon
(a) transistors
(b) ICs
(c) valves
(d) chips
Ans : a
4.RAM stands for
(a) Random Allowed Memory
(b) Ready Access Memory
(c) Random Access Memory
(d) Random Added Memory
Ans : c
5.In programming, you use the following keys
(a) Arrow keys
(b) Function keys
(c) Alpha keys
(d) Num keys
Ans : b
6.Printer is a device which
(a) input
(b) output
(c) Both a and b
(d) None of these
Ans : b
7.Laser printer is device which
(a) input
(b) output
(c) Both a and b
(d) None of these
Ans : b
8.Track ball has a
(a) ball
(b) track
(c) football
(d) None of these
Ans : a
9.Dot matrix printer uses what for printing
(a) hammers
(b) slugs
(c) mouse
(d) nibs
Ans : a
10.A CD can hold approximately how much of data
(a) 200 MB
(b) 700 MB
(c) 1000 MB
(d) 2000 MB
Ans : b
11. Computer program which controls the operations of computer is called
(a) assembles
(b) operating System
(c) interpreter
(d) compiler
Ans : b
12. System software are of two types operating systems and
(a) applications
(b) word processing
(c) language trans
(d) None of these
Ans : c
13.Debugging tools are there to debug errors in
(a) printers
(b) keyboards
(c) programs
(d) language
Ans : c
14. There are two basic types of disks-floppy disk and
(a) low disk
(b) hard disk
(c) soft disk
(d) None of these
Ans : b
15. It is a collection of facts and figures
(a) data
(b) information
(c) processing
(d) file
Ans : a
16.It converts accepted instructions into machine language
(a) input unit
(b) output unit
(c) processing unit
(d) memory unit
Ans : a
17. To open a new file in MS-Word, the shortcut key is
(a) Ctrl + X
(b) Ctrl + N
(c) Ctrl + Y
(d) Ctrl + V
Ans : b
18. What is the term used for the word processing programs that show you directly on the PC screen the appearance of your final document as you might expect on the paper?
(a) Search & Replace
(b) Pagination
(c) Soft Copy
(d) WYSIWYG
Ans : d
19. Alignment buttons are available on which toolbar?
(a) Status
(b) Standard
(c) Formatting
(d) None of these
Ans : c
20. Which of the following is not an option of edit menu?
(a) Cut
(b) Copy
(c) Paste
(d) Page setup
Ans : d
21. By default the bottom margin in the word document is
(a) 2 inch
(b) 1 inch
(c) 3 inch
(d) 1.5 inch
Ans : b
22.A file name cannot contain in MS-Word database file
(a) a letter
(b) number
(c) underscore
(d) space
Ans : d
23.Selection of text involves only
(a) single word
(b) line or multiple lines
(c) paragraph or paragraphs and complete document
(d) All of the above
Ans : d
24.‘Replace’ option is available in
(a) Edit menu
(b) File menu
(c) Tools menu
(d) Insert menu
Ans : a
25.When you start spelling checker, it starts checking the spellings
(a) from the end of the document to upward
(b) from the beginning of the document and downward
(c) from the insertion point
(d) None of the above
Ans : c
BANK EXAMS COMPUTER KNOWLEDGE PRACTICE MCQs
1. Which of the following is not an advantage of magnetic disk storage ?
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) None of the above
ANSWER: (d)
2. A prefix for billion which is equal to _____is called as billi.
(a) 100
(b) 10000
(c) 1000
(d) 10
ANSWER: (a)
3. One kilobyte -byte
(a) 1250
(b) 2088
(c) 1024
(d) 1000
ANSWER: (c)
4. To move the cursor to the end of the document
press
(a) Ctrl + Esc
(b) Ctrl + End
(c) Ctrl + B
(d) Ctrl + c
ANSWER: (B)
5. The shortcut key to print documents is
(a) Ctrl + A
(b) Ctrl + B
(c) Ctrl + P
(d) Ctrl + C
ANSWER: (c)
6. In MICR, C stands for
(a) Code
(b) Colour
(c) Computer
(d) Character
(e) None of these
ANSWER: (d)
7. The simultaneous processing of two or more
Programs by multiple processors is
(a) Multiprogramming
(b) Multitasking
(c) Time-sharing
(d) Multiprocessing
(e) None of these
ANSWER: (d)
8. First layer in the OSI reference model is
(a) Data link
(b) Network
(c) Physical
(d) Application
ANSWER: (c)
9. Viruses, Trojan horses and worms are
(a) Able to harm computer system
(b) Unable to detect if affected on computer
(c) User-friendly applications
(d) Harmless applications resident on computer
ANSWER: (a)
10. Failure of passwords security due to exposure can result from
(a) Electronic monitoring
(b) Visual
(c) Both ‘a’ and ‘b’
(d) Light
ANSWER: (c)
11. Data security threats include
(a) Hardware failure
(b) Privacy invasion
(c) Fraudulent manipulation of data
(d) All of the above
ANSWER (b)
12. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar
(b) Windows
(c) Desktop
(d) Icons
ANSWER (d)
13. Accessing records from a file directly without
searching from the beginning of the file is
(a) Time sharing
(b) Random
(c) Direct access
(d) Access time
ANSWER (c)
14. Database redesign is not terribly difficult if the
(a) Database is structured
(b) Database is well-designed
(c) Database has no data
(d) Database is relatively small
ANSWER (c)
15. Which of the following SQL statements are helpful in database redesign ?
(a) Correlated sub queries only
(b) EXISTS/ NOT EXISTS expressions only
(c) Both of the above are helpful
(d) Creating the database are helpful
ANSWER (c)
16. The EXISTS keyword will be true if
(a) Any row in the sub query meets the condition only
(b) All rows in the sub query fail the condition only
(c) Both of these two conditions are met
(d) Neither of these two conditions is met
ANSWER (a)
17. How can you find rows that do not match some specified condition ?
(a) EXISTS
(b) Double use of NOT EXISTS
(C) NOT EXISTS
(d) ROWS EXIT
ANSWER (c)
18. The process of reading a database schema and producing a data model from that schema is known
as
(a) Data modeling
(b) Database design
(c) Reverse engineering
(d) Inverse engineering
ANSWER (c)
19. Which SQL-92 standard SQL command can be used to change a table name ?
(a) RENAME TABLE
(b) CHANGE TABLE
(c) ALTER TABLE
(d) None of the above is correct
ANSWER (a)
20. What SQL command can be used to delete
columns from a table ?
(a) MODIFY TABLE Table Name DROP COLUMN Column Name
(b) MODIFY TABLE Table Name DROP Column Name Column Name
(d) ALTER TABLE Table Name DROP Column Name
ANSWER (c)
21. Which of the following modifications may not succeed?
(a) Changing a column data type from char to date
(b) Changing a column data type from numeric to char
(c) Both of the above actions should succeed
(d) Neither of the above actions will succeed
ANSWER (a)
22. Changing cardinalities in a database is
(a) A common database design task
(b) A rare database design task, but does occur
(c) A database design task that never occurs
(d) Is impossible to do, so a new database must be constructed and the data moved into it
ANSWER (a)
23. A regular sub query can be processed
(a) From the top down
(b) From the bottom up
(c) By nesting
(d) From the right up
ANSWER (b)
24. How many copies of the database schema are typically used in the redesign process ?
(a) One
(b) Two
(c) Three
(d) Four
ANSWER (c)
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) None of the above
ANSWER: (d)
2. A prefix for billion which is equal to _____is called as billi.
(a) 100
(b) 10000
(c) 1000
(d) 10
ANSWER: (a)
3. One kilobyte -byte
(a) 1250
(b) 2088
(c) 1024
(d) 1000
ANSWER: (c)
4. To move the cursor to the end of the document
press
(a) Ctrl + Esc
(b) Ctrl + End
(c) Ctrl + B
(d) Ctrl + c
ANSWER: (B)
5. The shortcut key to print documents is
(a) Ctrl + A
(b) Ctrl + B
(c) Ctrl + P
(d) Ctrl + C
ANSWER: (c)
6. In MICR, C stands for
(a) Code
(b) Colour
(c) Computer
(d) Character
(e) None of these
ANSWER: (d)
7. The simultaneous processing of two or more
Programs by multiple processors is
(a) Multiprogramming
(b) Multitasking
(c) Time-sharing
(d) Multiprocessing
(e) None of these
ANSWER: (d)
8. First layer in the OSI reference model is
(a) Data link
(b) Network
(c) Physical
(d) Application
ANSWER: (c)
9. Viruses, Trojan horses and worms are
(a) Able to harm computer system
(b) Unable to detect if affected on computer
(c) User-friendly applications
(d) Harmless applications resident on computer
ANSWER: (a)
10. Failure of passwords security due to exposure can result from
(a) Electronic monitoring
(b) Visual
(c) Both ‘a’ and ‘b’
(d) Light
ANSWER: (c)
11. Data security threats include
(a) Hardware failure
(b) Privacy invasion
(c) Fraudulent manipulation of data
(d) All of the above
ANSWER (b)
12. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar
(b) Windows
(c) Desktop
(d) Icons
ANSWER (d)
13. Accessing records from a file directly without
searching from the beginning of the file is
(a) Time sharing
(b) Random
(c) Direct access
(d) Access time
ANSWER (c)
14. Database redesign is not terribly difficult if the
(a) Database is structured
(b) Database is well-designed
(c) Database has no data
(d) Database is relatively small
ANSWER (c)
15. Which of the following SQL statements are helpful in database redesign ?
(a) Correlated sub queries only
(b) EXISTS/ NOT EXISTS expressions only
(c) Both of the above are helpful
(d) Creating the database are helpful
ANSWER (c)
16. The EXISTS keyword will be true if
(a) Any row in the sub query meets the condition only
(b) All rows in the sub query fail the condition only
(c) Both of these two conditions are met
(d) Neither of these two conditions is met
ANSWER (a)
17. How can you find rows that do not match some specified condition ?
(a) EXISTS
(b) Double use of NOT EXISTS
(C) NOT EXISTS
(d) ROWS EXIT
ANSWER (c)
18. The process of reading a database schema and producing a data model from that schema is known
as
(a) Data modeling
(b) Database design
(c) Reverse engineering
(d) Inverse engineering
ANSWER (c)
19. Which SQL-92 standard SQL command can be used to change a table name ?
(a) RENAME TABLE
(b) CHANGE TABLE
(c) ALTER TABLE
(d) None of the above is correct
ANSWER (a)
20. What SQL command can be used to delete
columns from a table ?
(a) MODIFY TABLE Table Name DROP COLUMN Column Name
(b) MODIFY TABLE Table Name DROP Column Name Column Name
(d) ALTER TABLE Table Name DROP Column Name
ANSWER (c)
21. Which of the following modifications may not succeed?
(a) Changing a column data type from char to date
(b) Changing a column data type from numeric to char
(c) Both of the above actions should succeed
(d) Neither of the above actions will succeed
ANSWER (a)
22. Changing cardinalities in a database is
(a) A common database design task
(b) A rare database design task, but does occur
(c) A database design task that never occurs
(d) Is impossible to do, so a new database must be constructed and the data moved into it
ANSWER (a)
23. A regular sub query can be processed
(a) From the top down
(b) From the bottom up
(c) By nesting
(d) From the right up
ANSWER (b)
24. How many copies of the database schema are typically used in the redesign process ?
(a) One
(b) Two
(c) Three
(d) Four
ANSWER (c)
BANK EXAMS COMPUTER KNOWLEDGE PRACTICE MCQs
1. Which of the following is not as language for computer programming ?
(a) WINDOWS
(b) PASCAL
(c) BASIC
(d) COBOL
(e) All of these
ANSWER: (a)
2. What digits are representative of all binary Numbers?
(H) 0
(b) 1
(c) Both ‘a’ and ‘b’
(d) 3
(e) None of these
ANSWER: (c)
3. The term gigabyte refers to
(a) 1024 bytes
(b) 1024 kilobytes
(c) 1024 megabytes
(d) 1024 gigabytes
(e) None of these
ANSWER: (c)
4. Off-line operation is the operation of devices without the control of
(a) Memory
(b) CPU
(C) ALU
(d) Control unit
(e) None of these
ANSWER: (b)
5. Name the first general purpose electronic computer
(a) ADVAC
(b) ADSAC
(c) UNIVAC
(d) EDVAC
(e) None of these
ANSWER: (c)
6. Which of the following statement is wrong?
(a) Windows XP is an operating system
(b) Linux is owned and sold by Microsoft
(c) Photoshop is a graphical design tool by Adobe
(d) Linux is free and open source software
(e) None of the above
ANSWER: (b)
7. A software used to convert source program instructions to object instruction is known as
(a) Compiler
(b) Assembler
(c) Interpreter
(d) Language processor
(e) None of these
ANSWER: (d)
8. The term ‘Operating System’ means
(a) A set of programs which control computer working
(b) The way a user operates the computer system
(c) Conversion of high level language to machine language
(d) The way computer operator works
(e) None of the above
ANSWER: (a)
9. Input, output and processing devices grouped together represent a(n) ……
(a) Mobile device
(b) Information processing cycle
(c) Circuit boards
(d) Computer system
(e) None of the above
ANSWER: (d)
10. The …… is the box that houses the most Important parts of a computer system.
(a) Software
(b) Hardware
(c) Input device
(d) System unit
(e) None of these
ANSWER: (d)
11. The physical arrangement of elements on a page is referred to as a document’s ……
(a) Features
(b) Format
(c) Pagination
(d) Grid
(d) None of these
ANSWER: (b)
12. All of the following are examples of real security and privacy risks EXCEPT
(a) Hackers
(b) Spam
(c) Viruses
(d) Identity theft
(e) None of these
ANSWER: (b)
13. The ability to recover and read deleted or damaged files from a Criminals computer is an example of a law enforcement specialty called
(a) Robotics
(b) Simulation
(C) Computer forensics
(d) Animation
(e) None of these
ANSWER: (c)
14. This tags, when placed on an animal, can be used to record and track in a database all of the
Animal’s movements
(a) POS C
(b) RFID
(C) PPS
(d) GPS
(e) None of these
ANSWER: (b)
15. These terminals (formerly known as cash Registers) are often connected to complex inventory and sales computer systems
(a) Data
(b) Point-of-sale (POS)
(c) Sales
(d) Query
(e) None of the above
ANSWER: (b)
16. Technology no longer protected by copyright,available to everyone, is considered to be
(a) proprietary.
(b) Open
(c) Experimental
(d) In the public domain
(e) None of the above
ANSWER: (a)
17. It is the science that attempts to produce machines that display the same type of Intelligence that humans do
(a) Nano science
(b) Nanotechnology
(c) Simulation
(d) Artificial intelligence (AI)
(e) None of the above
ANSWER: (d)
18. The name for the way that computers manipulate data into information is Called
(a) Programming
(b) Processing
(C) Storing
(d) Organizing
(e) None of these
ANSWER: (b)
19.Computers gather data, which means that they allow users to
(a) Present data
(B) input data
(C) Output data
(d) Store data
(e) None of these
ANSWER: (b)
20. Which type of data has been organized or presented in a meaningful fashion ?
(a) A process
(b) Software
(C) Storage
(d) Information
(e) None of these
ANSWER: (d)
21. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered -
(a) Data
(b) Output
(c) Input
(d) The process
(e) None of these
ANSWER: (b)
22. Computers process data into information by working exclusively with
(a) Multimedia
(b) Words
(c) Characters
(d) Numbers
(e) None of these
ANSWER: (d)
23. The term bit is short for
(a) Megabyte
(b) Binary language
(C) Binary digit
(d) Binary number
(e) None of these
ANSWER: (c)
24. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of
(a) eight bytes
(b) eight kilobytes
(C) Eight characters
(d) eight bits
(e) None of these
ANSWER: (d)
25. Computers use which language to process data?
(a) Processing
(b) Kilobyte
(C) binary
(d) Representational
(e) None of these
ANSWER: (c)
(a) WINDOWS
(b) PASCAL
(c) BASIC
(d) COBOL
(e) All of these
ANSWER: (a)
2. What digits are representative of all binary Numbers?
(H) 0
(b) 1
(c) Both ‘a’ and ‘b’
(d) 3
(e) None of these
ANSWER: (c)
3. The term gigabyte refers to
(a) 1024 bytes
(b) 1024 kilobytes
(c) 1024 megabytes
(d) 1024 gigabytes
(e) None of these
ANSWER: (c)
4. Off-line operation is the operation of devices without the control of
(a) Memory
(b) CPU
(C) ALU
(d) Control unit
(e) None of these
ANSWER: (b)
5. Name the first general purpose electronic computer
(a) ADVAC
(b) ADSAC
(c) UNIVAC
(d) EDVAC
(e) None of these
ANSWER: (c)
6. Which of the following statement is wrong?
(a) Windows XP is an operating system
(b) Linux is owned and sold by Microsoft
(c) Photoshop is a graphical design tool by Adobe
(d) Linux is free and open source software
(e) None of the above
ANSWER: (b)
7. A software used to convert source program instructions to object instruction is known as
(a) Compiler
(b) Assembler
(c) Interpreter
(d) Language processor
(e) None of these
ANSWER: (d)
8. The term ‘Operating System’ means
(a) A set of programs which control computer working
(b) The way a user operates the computer system
(c) Conversion of high level language to machine language
(d) The way computer operator works
(e) None of the above
ANSWER: (a)
9. Input, output and processing devices grouped together represent a(n) ……
(a) Mobile device
(b) Information processing cycle
(c) Circuit boards
(d) Computer system
(e) None of the above
ANSWER: (d)
10. The …… is the box that houses the most Important parts of a computer system.
(a) Software
(b) Hardware
(c) Input device
(d) System unit
(e) None of these
ANSWER: (d)
11. The physical arrangement of elements on a page is referred to as a document’s ……
(a) Features
(b) Format
(c) Pagination
(d) Grid
(d) None of these
ANSWER: (b)
12. All of the following are examples of real security and privacy risks EXCEPT
(a) Hackers
(b) Spam
(c) Viruses
(d) Identity theft
(e) None of these
ANSWER: (b)
13. The ability to recover and read deleted or damaged files from a Criminals computer is an example of a law enforcement specialty called
(a) Robotics
(b) Simulation
(C) Computer forensics
(d) Animation
(e) None of these
ANSWER: (c)
14. This tags, when placed on an animal, can be used to record and track in a database all of the
Animal’s movements
(a) POS C
(b) RFID
(C) PPS
(d) GPS
(e) None of these
ANSWER: (b)
15. These terminals (formerly known as cash Registers) are often connected to complex inventory and sales computer systems
(a) Data
(b) Point-of-sale (POS)
(c) Sales
(d) Query
(e) None of the above
ANSWER: (b)
16. Technology no longer protected by copyright,available to everyone, is considered to be
(a) proprietary.
(b) Open
(c) Experimental
(d) In the public domain
(e) None of the above
ANSWER: (a)
17. It is the science that attempts to produce machines that display the same type of Intelligence that humans do
(a) Nano science
(b) Nanotechnology
(c) Simulation
(d) Artificial intelligence (AI)
(e) None of the above
ANSWER: (d)
18. The name for the way that computers manipulate data into information is Called
(a) Programming
(b) Processing
(C) Storing
(d) Organizing
(e) None of these
ANSWER: (b)
19.Computers gather data, which means that they allow users to
(a) Present data
(B) input data
(C) Output data
(d) Store data
(e) None of these
ANSWER: (b)
20. Which type of data has been organized or presented in a meaningful fashion ?
(a) A process
(b) Software
(C) Storage
(d) Information
(e) None of these
ANSWER: (d)
21. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered -
(a) Data
(b) Output
(c) Input
(d) The process
(e) None of these
ANSWER: (b)
22. Computers process data into information by working exclusively with
(a) Multimedia
(b) Words
(c) Characters
(d) Numbers
(e) None of these
ANSWER: (d)
23. The term bit is short for
(a) Megabyte
(b) Binary language
(C) Binary digit
(d) Binary number
(e) None of these
ANSWER: (c)
24. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of
(a) eight bytes
(b) eight kilobytes
(C) Eight characters
(d) eight bits
(e) None of these
ANSWER: (d)
25. Computers use which language to process data?
(a) Processing
(b) Kilobyte
(C) binary
(d) Representational
(e) None of these
ANSWER: (c)
Subscribe to:
Posts (Atom)