1. Constant is a value written into a program instruction—
(A) that does not change during the execution of the program
(B) that can change during the execution of the program
C) that can vary during the execution of the program
(D) none of these
Ans : (A)
2. A removable direct-access storage medium containing multiple magnetic
disks mounted vertically on a single-shaft is referred as—
(A) Tape pack (B) Disk pack
(C) Cylinder (D) None of these
Ans : (B)
3. Diskette is a—
(A) A low-cost, thin flexible magnetic disk storage device
(B) High volume storage device
(C) Primary storage device
(D) None of these
Ans : (A)
4. An optical input device that is used to read documents printed in a special type font is known as—
(A) Document reader (B) Documentation
(C) Printer (D) None of these
Ans : (A)
5. For checking spelling one uses—
(A) Dictionary Disk (B) Index disk
(C) Directory (D) None of these
Ans : (A)
6. APL is—
(A) A high level language for specifying complex algorithms.
(B) A real-time language primarily for scientific applications.
(C) Only A is true
(D) Both A & B true
Ans : (D)
7. The overall design, construction, organization and interconnecting of
the various components of a computer system is referred as—
(A) Computer Architecture (B) Computer Flow chart
(C) Computer Algorithm (D) None of these
Ans : (A)
8. Asynchronous communication is—
(A) Communication between independently operating units
(B) Communication between dependent operating units
(C) Communication between independent and dependent operating units
(D) None of these
Ans : (A)
9. Audio response is—
(A) output medium
(B) produces verbal responses from the computer system
(C) Both A & B true
(D) None is true
Ans : (C)
10. Automated Office refers to the merger of …………… in an office environment.
(A) Computers (B) office
(C) telecommunications (D) All the above
Ans : (D)
11. Technique of placing software/programs in a ROM semiconductor chip is called—
(A) PROM (B) EPROM
(C) firm ware (D) microprocessor
Ans : (C)
12. Following is not true for magnetic tape ?
(A) low cost (B) direct-access storage medium
(C) compact and portable (D) highly reliable
Ans : (B)
13. The following is an nonvolatile memory?
(A) ROM (B) RAM
(C) LSI (D) VLSI
Ans : (A)
14. The……………can be programmed one time by either the manufacturer or the computer user. Once programmed, it cannot be modified.
(A) RAM (B) ROM
(C) PROM (D) EPROM
Ans : (C)
15. Which of the following is not true of a magnetic disk?
(A) Users can update records by writing over the old data
(B) It provides sequential access to stored data
(C) It is slow relative to magnetic tape
(D) All of the above are true
Ans : (B)
16. A term used for diskette is—
(A) disk cartridge (B) disk pack
(C) floppy disk (D) none of these
Ans : (C)
17. Following is true for the digital computer?
(A) Information is in form of a string of binary digits
(B) It can be used as analog processor
(C) It is less accurate than the analog computer
(D) None of these.
Ans : (A)
18. Comparing with secondary storage, primary storage is—
(A) slow and inexpensive (B) fast and inexpensive
(C) fast and expensive (D) slow and expensive
Ans : (C)
19. CPU performs read/write operations at any point in time in—
(A) ROM (B) PROM
(C) EPROM (D) RAM
Ans : (C)
20. Following is not the from of secondary storage—
(A) magnetic tape (B) CD’s
(C) Disk (D) Hard disk
Ans : (D)
Computer Knowledge is highly scoring section in IBPS POs and RRB (Regional Rural Banks) Examinations. All the questions will be from well known concepts such as Computer Terminology, Basic Computer Architecture, Internet, MS-Office, E-Commerce, Computer Network etc. The questions may be theoretical and also require knowledge of facts and application.
Saturday, 2 March 2013
Wednesday, 21 November 2012
IBPS CLERKS EXAM COMPUTER KNOWLEDGE PRACTICE MCQs
1. Which of the following is a disadvantage of machine language?
1) Machine Dependent
2) Slower Execution
3) Machine Independent
4) It requires Translation
5) None of these
2. Android Operating system is an example of which kind of Source Model?
1) Open Source
2) Vertical Market Software
3) Horizontal Market Software
4) Shareware
5) None of these
3. Cache memory is an example of which of the following?
1) Virtual Memory
2) Non Volatile Memory
3) Static Random Access Memory
4) Secondary Memory
5) None of these
4. A software that is not protected by copyright or trademark is ......
1) Vertical Market Software
2) Public Domain Software
3) Shareware Software
4) Trialware
5) Adware
5. Which of the following programming languages is associated with Artificial Intelligence?
1) C
2) B
3) C++
4) JAVA
5) PROLOG
6. AltaVista is a(n)
1) Windows Utility
2) Search engine
3) Program
4) Antivirus
5) None of these
7. The term Hard copy is related to:
1) Storing data on Hard Disk
2) Output displayed on Monitor
3) Scanned Image
4) Printouts
5) None of the above
8. MIME is an acronym for ....
1) Multiprogramming Internet Mail Extension
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension
4) Multipurpose Internet Mail Extension
5) None of these
9. Any crime that involves a Computer and a Network is called:
1) Virus
2) Malware
3) Trojan Horse
4) Cyber crime
5) Identity Theft
10. Which of the following generation computers is referred to an expert system?
1) 2nd
2) 1st
3) 4th
4) 3rd
5) 5th
Wednesday, 7 November 2012
IBPS CLERKS CWE COMPUTER KNOWLEDGE QUESTIONS
1. The Title and Page number of a document can be displayed using which of the following options?
1) Insert table
2) Spelling and Grammar
3) Header and Footer
4) Thesaurus
5) File
2. Which of the following is the advantage of Assembly language over Machine language?
1) Easy to use
2) Easy to understand
3) Easy to modify
4) Only 1 and 3
5) All the above
3. Pop-ups are a form of ..... on the World Wide Web?
1) Instant Messaging
2) Search Engines
3) Browsers
4) Mark-up Languages
5) Online Advertising
4. Which of the following is not used to align text in a document?
1) Left
2) Right
3) Center
4) Diagonal
5) Justify
5. Which of the following characteristics is/are used to compute the results from excel data?
1) Goto
2) Table
3) Diagram
4) Formula and Function
5) None of these
6. ....... is a combination of text, audio, still images, animation, video.
1) Multiplexer
2) Multiplier
3) Multimedia
4) Multiuser
5) None of these
7. Which of the following refers to the process of trading goods over the internet?
1) E-seva
2) E-Trading
3) E-Finance
4) E-Sales
5) E-Commerce
8. Multiple autonomous computers communicating through a computer network to achieve a common goal is called .......
1) Centralized Computing
2) Co-operative Computing
3) Distributed Computing
4) Connected Computing
5) None of these
9. In order to change page margins in a word document:
1) Drag the scroll box on the scroll bars.
2) Delete the margin boundaries on the ruler
3) Right Click on the ruler
4) Drag the margin boundaries on the ruler
5) None of these
10. USB 3.0 is the second major revision of the Universal Serial Bus standard for Computer Connectivity. Which of the following is true about USB 3.0?
1) It is more than 10 times as fast as USB 2.0
2) Its Data transfer rate is up to 5 Gbits/sec
3) Power consumption is less than USB 2.0
4) All the above
5) None of the above
Thursday, 1 November 2012
IBPS CWE COMPUTER KNOWLEDGE PRACTICE QUESTIONS
1. Digital Camera is an?
1) Input Device
2) Output Device
3) Storage Device
4) Controller Device
5) None
2. Adwords is a(n)?
1) Advertising Service by Microsoft
2) Advertising Service by Google
3) Advanced Search Engine
4) Automatic words Search Engine by Yahoo
5) Advertising Service by Yahoo
3. When a computer is switched on, during which process POST is performed?
1) In booting process
2) In integrity process
3) During reliability test
4) In shut down process
5) None
4. Which of the following is the largest storage?
1) Mega Byte
2) Kilo Byte
3) Giga Byte
4) Byte
5) Tera Byte
5. Application software contains programs designed for a(n)?
1) Computer Administrator
2) Computer Programmer
3) Initiator
4) End User
5) None
6. System Software includes which of the following?
1) Linkers
2) Debuggers
3) Loaders
4) Compilers
5) All the above
7. Which of the following best defines batch processing?
1) Sharing of a computing resource among many users
2) Execution of bulk jobs at a time
3) Allocation of computer system and its resources to more than one user
4) Execution of series of jobs on a computer without manual intervention
5) None
8. Which of the following is true about RAM and ROM?
1) They belong to internal storage
2) They are directly accessible
3) They are read only memories
4) All of these
5) Only 1 and 2
9. The secret code that restricts entry to some programs / software is:
1) Password
2) Pass code
3) Entry - code
4) Access code
5) None
10. Which of the following is true about CPU?
1) It contains electronic circuits that cause processing to occur
2) It makes the information resulting from processing available for use
3) It allows data, programs, commands to be entered into a computer
4) It is comprised of electronic components that store data
5) None
Saturday, 27 October 2012
IBPS CLERKS COMPUTER KNOWLEDGE EXPECTED MODEL QUESTIONS
1. Which of the following memory chip is programmed during the manufacturing process?
1) RAM
2) ROM
3) PROM
4) EEPROM
5) None
2. Computer uses which of the following languages to process data?
1) High Level
2) Assembly
3) Binary
4) Hexa Decimal
5) Octal
3. Magnetic Disk medium uses ..... method for accessing data.
1) Direct
2) Serial
3) Sequential
4) Rotational
5) None
4. Which of the following is the India's first Super Computer?
1) Aakash
2) Sea Deep
3) First PC
4) PARAM 8000
5) Cray - 1
5. Parallelogram in a flowchart usually represents:
1) Input
2) Output
3) Process
4) Both 1 & 2
5) Decision
6. Registers are located in?
1) Memory
2) ALU
3) OS
4) CPU
5) None
7. ...... terminals are often connected to complex inventory and sales computer systems.
1) Data
2) Information
3) Credit Cards
4) Query
5) Point-of-Sale (POS)
8. Which of the following is true about Dial-up internet access?
1) It utilizes the existing telephone services
2) It uses a router for security
3) It utilizes the broadband technology
4) Modem speeds are very fast
5) All are Correnct
9. Icons, Windows, Menu and buttons are features of ?
1) DOS
2) GUI
3) Command Driven Interface
4) All the above
5) None
10. Which of the following is true about URL ?
1) It is a web browser
2) It is a messenger
3) It is a mail service
4) It is a global address of documents and other resources on World Wide Web
5) It is same as internet
Tuesday, 16 October 2012
IBPS CLERKS EXAM COMPUTER KNOWLEDGE PRACTICE MCQs
1. Which of the following peripheral devices displays information to a user?
1) Monitor
2) Keyboard
3) Secondary Storage Devices
4) Secondary Storage Media
5) None
2. Bandwidth refers to
1) The cost of the cable required to implement a WAN
2) The cost of the cable required to implement a LAN
3) The amount of information a peer-to-peer network can store
4) The amount of information a communication medium can transfer in a given amount of time
5) None of these
3. A processor that collects the transmissions from several communication media and send them over a single line that operates at a higher capacity is called ........
1) Multiplexer
2) Bridge
3) Hub
4) Router
5) None of these
4. Which of the following is not a form of Biometrics?
1) Fingerprint
2) Password
3) Retina Scan
4) Breath Scan
5) None of these
5. Which of the following best defines a compiler?
1) Translates machine language into a high level language
2) Translates one statement at a time as the program executes
3) Translates two statements at a time as the program executes
4) Produces object code
5) is less sophisticated than an assembler
6. Which of the following is not a web browser?
1) Opera
2) Netscape
3) Microsoft Outlook
4) Internet Explorer
5) Safari
7. What is the cell content alignment by default in a Excel?
1) Left Aligned
2) Centrally Aligned
3) Text is left aligned and numbers are right aligned
4) Text is right aligned and numbers are left aligned
5) None of these
8. Which of the following device is used to transmit data over telecommunication lines?
1) Drive
2) Folder
3) Modem
4) Platforms
5) None of these
Monday, 8 October 2012
COMPUTER KNOWLEDGE PRACTICE MCQs FOR BANK EXAMS
1. Pick the odd one out:
1) Interpreter
2) Operating System
3) Compiler
4) Assembler
5) None of these
2. When a particular object or an image is copied, in which of the following places it is stored?
1) Notice Board
2) Interim Board
3) Notepad
4) Clipboard
5) None of these
3. The Term 'BIT' is the short form for:
1) Mega Byte
2) Binary Language
3) Binary Digit
4) Binary Number
5) None of these
4. Servers are computers that provide resources to other computers connected to a 1) Network
2) Super Computer
3) Micro Computer
4) Client
5) None of these
5. A bar which is seen at the bottom of the screen (usually) when the computer is turned on is known as:
1) Address Bar
2) Task Bar
3) Windows Bar
4) Line bar
5) None of these
6. Something which has easily understood instructions is said to be:
1) User friendly
2) Information
3) Word Processing
4) Icon
5) None of these
7. To save an existing file with a new name or to a new location, you should use the ..... command.
1) Save
2) Save and Replace
3) Save as
4) New file
5) None of these
8. Peripheral devices such as printers and monitors are considered to be:
1) Hardware
2) Software
3) Data
4) Information
5) None of these
9. In a database, ....... fields store numbers used to perform calculations.
1) Next
2) Key
3) Alpha Numeric
4) Numeric
5) None of these
10. Where is data saved permanently?
1) RAM
2) ROM
3) CPU
4) Printer
5) None of these
Tuesday, 25 September 2012
SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER KNOWLEDGE MCQs
1. Internet Protocol Version 4, Consists of how many bits?
1) 16 bits
2) 8 bits
3) 30 bits
4) 32 bits
5) 64 bits
2. A computer virus is a software program which has the essential ability to-
1) Clone itself
2) Hide itself
3) Damage Program
4) Damage Data
5) None
3. Which of the following is the short cut for opening Task Manager?
1) Ctrl + Shift + Del
2) Alt + Shift + Del
3) Ctrl + Alt + Del
4) Alt + Windows + Del
5) None
4. A ....... is approximately equal to one billion bytes.
1) Kilobyte
2) Bit
3) Gigabyte
4) Megabyte
5) None
5. Which of the following operations is not performed by Computer?
1) Taking the input
2) Processing
3) Controlling
4) Understanding
5) None
6. ....... is a set of computer programs used on a computer to help perform tasks.
1) An instruction
2) Software
3) Memory
4) Processor
5) None
7. What is the capacity of a standard 3.5'' floppy disk?
1) 1.44 GB
2) 1.44 MB
3) 1.44 KB
4) 1.44 B
5) None
8. Which of the following Operating Systems does not have a Graphical User Interface?
1) UNIX
2) LINUX
3) Microsoft Windows
4) Mac OS
5) None
9. Which of the following shortcut keys is used to check spelling in Microsoft Word?
1) F1
2) F5
3) F4
4) F7
5) None
Thursday, 20 September 2012
COMPUTER KNOWLEDGE PRACTICE QUESTIONS
1. Which of the following is most essential for effective multimedia presentations incorporates user participation or ....
1) Links
2) Buttons
3) Interactivity
4) Integration
5) None
2. Most of the websites have moving graphics, which are called as:
1) animations
2) vectors
3) links
4) morphs
5) None
3. Which of the following is the term used to enlarge a window to its maximum area so that it fills the entire desktop?
1) Maximize
2) Zoom
3) Enlarge
4) Extend
5) None of these
4. Microsoft Windows and Apple Mac are widely used Operating systems in today's world. Which of the following feature makes them so popular?
1) Multitasking Capacity
2) Calligraphy
3) User-friendly GUI
4) Being Inexpensive
5) None of these
5. Physical components of a computer are called:
1) Hardware
2) Software
3) Viruses
4) Internet
5) None of these
6. Which of the following is an object oriented feature:
1) Structured Programming
2) Multi-Tasking
3) Linking
4) Inheritance
5) None of these
7. In Windows XP, which of the following views is the best to see the file size and modified dates of all files in a folder.
1) List
2) Icon
3) Thumbnails
4) Details
5) None of these
8. Which of the following keys is used to remove a character on the right of the cursor
in a word document?
1) Home
2) End
3) Delete
4) Backspace
5) None of these
Thursday, 6 September 2012
COMPUTER KNOELEDGE MCQ CAPSULES FOR ALL BANK EXAMS
1. Which of the following powerpoint view displays each slide of the presentation as a thumbnail and is useful for rearranging slides?
1) Slide show
2) Slide master
3) Slide sorter
4) Notes Page
5) Design Slide
2. A set of rules for telling the computer what operations to perform is / are called:
1) Structures
2) Procedural Language
3) Command Language
4) Natural Language
5) Programming Language
3. Devices that enter information and let you communicate with the computer are called:
1) Software
2) Hardware
3) Output Devices
4) Input / Output devices
5) Input Devices
4. The speed of which of the following memory chips is faster?
1) Not Fixed
2) DRAM
3) SRAM
4) For smaller chips SRAM is faster
5) For larger chips DRAM is faster
5. Mahesh Babu has his cute childhood photos in an album which might fade out in a couple of years, which he wants to show it to his fans by uploading it in his twitter account. Which of the following devices can he use to do that?
1) Keyboard
2) Mouse
3) Printer
4) Scanner
5) None of these
6. Which of the following is not a social networking site?
1) WAYN
2) Hi 5
3) Orkut
4) Yahoo
5) Facebook
7. In the URL https://twitter.com, what does 's' represent in 'https'?
1) Safe
2) System
3) Start-up
4) Semantic
5) Secured
Wednesday, 29 August 2012
SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER AWARENESS MCQs
1. Which type of memory gets lost when you switch off?
1) ROM
2) RAM
3) CACHE
4) Dynamic
5) Static
2. Which type of network would use phone lines?
1) WAN
2) LAN
3) WWAN
4) Wireless
5) None of these
3. Speakers / Headphones are ____ devices.
1) Input
2) Input/ Output
3) Software
4) Storage
5) Output
4. A program for viewing web pages is called:
1) hardware
2) software
3) storage
4) browser
5) None of these
5. A computer cannot perform which of the following functions?
1) Addition
2) Subtraction
3) Bake a cake
4) Division
5) None of these
6. CD's or DVD's are ____ type of devices.
1) Input
2) Output
3) Software
4) Storage
5) Input/output
7. In the URL 'www.dbsdynamic.blogspot.in' what does the domain name extension '.in' represent?
1) International
2) internet
3) intra net
4) India
5) None of these
8. Free of cost repair of the software bug available in internet is called:
1) Version
2) Ad-on
3) Tutorial
4) FAR
5) Patch
9. Which of the following is READ only disc?
1) DVD-R
2) DVD-ROM
3) DVD-RW
4) CD-R
5) None of these
10. Which of the following is an/ are advantages of LAN?
1) Sharing peripherals
2) Backing up your data
3) Saving all your data
4) Accessing the web
5) Automatic printing of data
Monday, 30 July 2012
SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER AWARENESS PRACTICE QUESTIONS
1. What is e-commerce?
1) Buying and selling of international goods
2) Buying and selling of products and services over the internet
3) Buying and selling of products having to do with computers
4) Buying and selling of products and services not found in stores
5) Buying and selling of electronic goods
2. The term user Interface refers to :
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to the user commands
3) The means by which the user interacts with the peripheral devices on the computer
4) All of these
5) None of these
3. Which of the following is not an input device?
1) Keyboard
2) Joystick
3) Monitor
4) Microphone
5) None of these
4. An error is also known as :
1) Debug
2) Bug
3) Cursor
4) Icon
5) None of these
5. Archive is :
1) Back-up Storage
2) Forward Operation
3) Primary Storage
4) Name of famous processor
5) None of these
6. Which media has the ability to have data/information written on them by users more than once
1) CD-R disks
2) CD-RW disks
3) Zip disks
4) Opti disks
5) Both CD-RW and Zip disks
7. BCC in regard to emails, stands for :
1) Best Client Copy
2) Better Communication Copy
3) Best Computer Copy
4) Better Client Copy
5) None of these
Tuesday, 17 July 2012
COMPUTER AWARENESS PRACTICE QUESTIONS
1. Hackers ………………
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) break into other people's computers
Answer: break into other peoples computers
2. Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
Answer: software piracy
3. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
Answer: spam
4. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
Answer: Overhead Projections
5. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
Answer: A Sound Format
6. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
Answer: PCs
7. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
Answer: Microphone
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) break into other people's computers
Answer: break into other peoples computers
2. Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
Answer: software piracy
3. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
Answer: spam
4. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
Answer: Overhead Projections
5. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
Answer: A Sound Format
6. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
Answer: PCs
7. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
Answer: Microphone
COMPUTER KNOWLEDGE PRACTICE QUESTIONS
1. If you wish to extend the length of the network without having the signal
degrade, you would use a ………………
(A) resonance
(B) router
(C) gateway
(D) repeater
Answer: repeater
2. A repair for a known software bug, usually available at no charge on the Internet, is called a ………………
(A) version
(B) patch
(C) tutorial
(D) FAQ
Answer: patch
3. URL stands for ………………
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
Answer: Uniform Resource Locator
4. When data changes in multiple lists and all lists are not updated, this causes ………………
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
Answer: data inconsistency
5. What is a backup ?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
Answer: An exact copy of a systems information
6. The Internet is ………………
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) a communication system for some states of India
Answer: a large network of networks
7. Computers that are portable and convenient for users who travel are known as ………………
(A) supercomputers
(B) planners
(C) minicomputers
(D) laptops
Answer: laptops
(A) resonance
(B) router
(C) gateway
(D) repeater
Answer: repeater
2. A repair for a known software bug, usually available at no charge on the Internet, is called a ………………
(A) version
(B) patch
(C) tutorial
(D) FAQ
Answer: patch
3. URL stands for ………………
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
Answer: Uniform Resource Locator
4. When data changes in multiple lists and all lists are not updated, this causes ………………
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
Answer: data inconsistency
5. What is a backup ?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
Answer: An exact copy of a systems information
6. The Internet is ………………
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) a communication system for some states of India
Answer: a large network of networks
7. Computers that are portable and convenient for users who travel are known as ………………
(A) supercomputers
(B) planners
(C) minicomputers
(D) laptops
Answer: laptops
Monday, 16 July 2012
COMPUTER KNOWLEDGE PRACTICE MCQs
1.What is the ultimate purpose of Defragmentation ?
1) Make the PC faster
2) Create More Free Space
3) Delete temporary files
4) Reduce Power consumption
5) All of the above
2.Computers process data into information by working exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these
3.You must install a (n) ......... on a network if you want to share a broadband Internet connection
1) router
2) modem
3) node
4) cable
5) None of these
4.The purpose of the primary key in a database is to :
1) unlock the database
2) provide a map of the data
3) uniquely identify a record
4) establish constraints on database operations
5) None of these
5.The design of the network is called the network
1) architecture
2) server
3) transmission
4) type
5) None of these
6.The most frequently used instructions of a computer program are likely to be fetched from:
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these
7.Personal logs or journal entries posted on the Web are known as :
1) listservs
2) Webcasts
3) blogs
4) subject directories
5) None of these
COMPUTER KNOWLEDGR PRACTICE QUESTIONS FOR BANK EXAMS
1. Compiler is the
(a) name given to the computer operator
(b) part of the digital machine to store the information
(c) translator of source program to object
(d) part of arithmetic logic unit
(e) operator of Boolean Algebra
Ans (c)
2. Main memory is
(a) Random Access Memory (b) Read only Memory
(c) Serial Access Memory (d) None of these
Ans (a)
3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer (b) Quantum Computer
(c) Param-10,000 (d) IBM chips
Ans (b)
4. A compact disc (CD) is a data storage of the type
(a) Magnetic (b) Optical (c) Electrical (d) Electromechanical
Ans (a)
5. Which of the following is not as language for computer programming?
(a) WINDOWS (b) PASCAL (c) BASIC
(d) COBOL (e) All of these
Ans (a)
6. What are the two basic types of memory that your computer uses?
(a) RAM (b) RW/RAM (c) ROM (d) ERAM (e) POST
Ans (a)
7. The term gigabyte refers to(a) 1024 bytes (b) 1024 kilobytes (c) 1024 megabytes
(d) 1024 gigabytes (e) None of the above
Ans (c)
(a) name given to the computer operator
(b) part of the digital machine to store the information
(c) translator of source program to object
(d) part of arithmetic logic unit
(e) operator of Boolean Algebra
Ans (c)
2. Main memory is
(a) Random Access Memory (b) Read only Memory
(c) Serial Access Memory (d) None of these
Ans (a)
3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer (b) Quantum Computer
(c) Param-10,000 (d) IBM chips
Ans (b)
4. A compact disc (CD) is a data storage of the type
(a) Magnetic (b) Optical (c) Electrical (d) Electromechanical
Ans (a)
5. Which of the following is not as language for computer programming?
(a) WINDOWS (b) PASCAL (c) BASIC
(d) COBOL (e) All of these
Ans (a)
6. What are the two basic types of memory that your computer uses?
(a) RAM (b) RW/RAM (c) ROM (d) ERAM (e) POST
Ans (a)
7. The term gigabyte refers to(a) 1024 bytes (b) 1024 kilobytes (c) 1024 megabytes
(d) 1024 gigabytes (e) None of the above
Ans (c)
COMPUTER KNOWLEDGE
Generation of Computers
It is important to realize that major changes and trends in computer systems have occurred during the major stages-or generations-of computing, and will continue into the future. The first generation of computers developed in the early 1950s, the second generation blossomed during the late 1960s, the third generation took computing into the 1970s, and the fourth generation has been the computer technology of the 1980s and 1990s. A fifth generation of computers that accelerates the trends of the previous generations is expected to evolve as we enter the 21st century. Notice that computers continue to become smaller, faster, more reliable, less costly to purchase and maintain, and more interconnected within computer networks.
First-generation computing involved massive computers using hundreds or thousands of vacuum tubes for their processing and memory circuitry. These large computers generated enormous amounts of heat; their vacuum tubes had to be replaced frequently. Thus, they had large electrical power, air conditioning, and maintenance requirements. First-generation computers had main memories of only a few thousand characters and millisecond processing speeds. They used magnetic drums or tape for secondary storage and punched cards or paper tape as input and output media.
Second-generation computing used transistors and other solid-state, semiconductor devices that were wired to circuit boards in the computers. Transistorized circuits were much smaller and much more reliable, generated little heat, were less expensive, and required less power than vacuum tubes. Tiny magnetic cores were used for the computer’s memory, or internal storage. Many second-generation computers had main memory capacities of less than 100 kilobytes and microsecond processing, speeds. Removable magnetic disk packs were introduced, and magnetic tape merged as the major input, output, and secondary storage medium for large computer installations.
It is important to realize that major changes and trends in computer systems have occurred during the major stages-or generations-of computing, and will continue into the future. The first generation of computers developed in the early 1950s, the second generation blossomed during the late 1960s, the third generation took computing into the 1970s, and the fourth generation has been the computer technology of the 1980s and 1990s. A fifth generation of computers that accelerates the trends of the previous generations is expected to evolve as we enter the 21st century. Notice that computers continue to become smaller, faster, more reliable, less costly to purchase and maintain, and more interconnected within computer networks.
First-generation computing involved massive computers using hundreds or thousands of vacuum tubes for their processing and memory circuitry. These large computers generated enormous amounts of heat; their vacuum tubes had to be replaced frequently. Thus, they had large electrical power, air conditioning, and maintenance requirements. First-generation computers had main memories of only a few thousand characters and millisecond processing speeds. They used magnetic drums or tape for secondary storage and punched cards or paper tape as input and output media.
Second-generation computing used transistors and other solid-state, semiconductor devices that were wired to circuit boards in the computers. Transistorized circuits were much smaller and much more reliable, generated little heat, were less expensive, and required less power than vacuum tubes. Tiny magnetic cores were used for the computer’s memory, or internal storage. Many second-generation computers had main memory capacities of less than 100 kilobytes and microsecond processing, speeds. Removable magnetic disk packs were introduced, and magnetic tape merged as the major input, output, and secondary storage medium for large computer installations.
Sunday, 1 July 2012
IBPS Probationary Officers' Exam 2011
Computer Knowledge
(Exam Held On: 18-09-2011)
1. Computer uses the_________number system to store data and perform calculations.
(A) binary(B) octal
(C) decimal
(D) hexadecimal
(E) None of these
Ans : (A)
2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is_______________
(A) Memory-only(B) Write-only
(C) Once-only
(D) Run-only
(E) Read-only
Ans : (E)
3. Which of the following can be used to select the entire document ?
(A) CTRL+A(B) ALT+F5
(C) SHIFT+A
(D) CTRL+K
(E) CTRL+H
Ans : (A)
4___________are 'attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above
Ans : (A)
5. Part number, part description, and number of parts ordered are examples of__________
(A) control(B) output
(C) processing
(D) feedback
(E) input
Ans : (E)
6. A Web site's main page is called its______________
(A) Home Page(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these
Ans : (A)
7. The simultaneous processing of two or more programs by multiple processors is_____________
(A) multiprogramming(B) multitasking
(C) time-sharing
(D) multiprocessing
(E) None of these
Ans : (D)
COMPUTER ABBREVIATIONS FOR BANK EXAMS
ACE | Access Control Entry |
ADSL | Asymmetric Digital Subscriber Line |
AGP | Accelerated Graphics Port |
AI | Artificial Intelligence |
ALGOL | Algorithmic Language |
ALU | Arithmetic Logic Unit |
ANSI | American National Standards Institute |
API | Application Program Interface |
APIPA | Automatic Private Internet Protocol Addressing |
APT | Automatically Programmed Tooling |
ARP | Address Resolution Protocol |
ARPANET | Advanced Research Projects Agency Network |
ASCII | American Standard Code For Information Interchange |
ASF | Advanced Streaming Format |
ASP | Active Server Pages |
ATAPI | Advanced Technology Attachment Packet Interface |
ATM | Asynchronous Transfer Mode |
AUI | Attachment Unit Interface |
AVI | Audio Video Interleave |
BASIC | Beginner`s All Purpose Symbolic Instruction Code |
BCD | Binary Coded Decimal |
BDPS | Business Data Processing Systems |
BHTML | Broadcast Hyper Text Markup Language |
BIOS | Basic Input Output System |
BIU | Bus Interface Unit |
BMP | Bitmap |
BPS | Bytes Per Seconds |
C-DAC | Centre For Development Of Advanced Computing |
CAD | Computer Aided Design |
CADD | Computer Added Drafting And Design |
CAI | Computer Aided Instructuion |
CAM | Computer Aided Manufacturing |
CAR | Control Address Register |
CASE | Computer Aided Software Engineering |
CCIS | Common Channel Interoffice Signaling |
CCNA | Cisco Certified Network Associate |
CD | Compact Disc |
CD RW | Compact Disc ReWritable |
CDMA | Code Division Multiple Access |
CDROM | Compact Disc Read Only Memory |
CFG | Control Flow Graph |
CGI | Common Gateway Interface |
CGM | Computer Graphics Metafile |
CIDR | Classless InterDomain Routing |
CIM | Computer Integrated Manufacture |
CISC | Complex Instruction Set Computers |
CIX | Commercial Internet Exchange |
CLR | Common Language Runtime |
CMOS | Complementary Metal Oxide Semiconductor |
CMS | Content Management System |
CMYK | Cyan, Magenta, Yellow, Key (Black) |
COBOL | Common Business Oriented Language |
CORBA | Common Object Request Broker Architecture |
CPI | Clock Cycle Per Instruction |
CPU | Central Processing Unit |
CRC | Cyclic Redundancy Check |
CRM | Customer Relationship Management |
CROM | Control Read Only Memory |
CRT | Cathode Ray Tube |
CUI | Character User Interface |
DAC | Digital To Analog Converter |
DAO | Data Access Objects |
DARPANET | Defense Advanced Research Projects Agency Network |
DBA | Data Base Administrator |
DBMS | Data Base Management System |
DCA | Defence Communication Agency |
DCL | Data Control Language |
DCOM | Distributed Component Object Model |
DCP | Data Communication Processor |
DDL | Data Definition Language |
DDOS | Distributed Denial Of Service |
DDP | Distributed Data Processing |
DFD | Data Flow Diagram |
DFS | Distributed File System |
DHCP | Dynamic Host Control Protocol |
DHTML | Dynamics Hyper Text Markup Language |
DLC | Data Link Control |
DLL | Dynamic Link Library |
DMA | Direct Memory Access |
DML | Data Manipulation Language |
DMTF | Distributed Management Test Force |
DNA | Distributed Internet Architecture |
DNS | Domain Name System (Server) |
DOM | Document Object Model |
DOS | Disk Operating System, Denial Of Service |
DPI | Dots Per Inch |
DRAM | Dynamic Random Access Memory |
DSL | Digital Subscriber Line |
DSN | Digital Subscriber Network |
DTD | Document Type Definition |
DVD | Digital Versatile Disc |
E | Electronic |
EAROM | Electrically Alterable Read Only Memory |
EBCDIC | Extended Binary Coded Decimal Interchange Code |
EDC | Electronic Digital Computer |
EDCDIC | Extended Binary Coded Decimal Interchange Code |
EEPROM | Electrically Erasable Programmable Read Only Memory |
EFS | Encrypted File System |
EJB | Enterprise Java Beans |
ENIAC | Electronics Numerical Integrator And Calculator |
EPROM | Erasable Programmable Read Only Memory |
EROM | Erasable Read Only Memory |
ERP | Enterprise Resource Planning |
EULA | End User License Agreement |
FAT | File Allocation Table |
FDD | Floppy Disk Drive |
FDDI | Fiber Distributed Data Interface |
FDMA | Frequency Division Multiple Access |
FIFO | First In First Out |
FLOPS | Floating Point Operations Per Second |
FO | Fiber Optics |
FORTRAN | Formula Translation |
FPS | Frames Per Second |
FRAM | Ferro Electric Random Access Memory |
FTP | File Transfer Protocol |
GB | Giga Bytes |
GIF | Graphic Interchange Format |
GIGO | Garbage In Garbage Out |
GML | General Markup Language |
GPL | General Public License |
GUI | Graphical User Interface |
HDD | Hard Disk Drive |
HFS | Hierarchical File System |
HP | Hewlett Packard |
HPC | High Performance Computing |
HPFS | High Performance File System |
HSR | Horizontal Scan Rate |
HTML | Hyper Text Markup Language |
HTTP | Hyper Text Transfer Protocol |
IO | Input Output |
IBM | International Business Machines |
IC | Integrated Circuit |
ICMP | Internet Control Message Protocol |
ICS | Reduce Instruction Set Computer |
ICT | Information And Communication Technology |
IDE | Integrated Development Environment |
IE | Internet Explorer |
IGMP | Internet Group Management Protocol |
IL | Intermediate Language |
IOP | InputOutput Processor |
IP | Internet Protocol |
IPX | Internetworked Packet Exchange |
IRAM | Integration Ram |
IRC | Internet Relay Chat |
IRDA | Infrared Data Association |
IRQ | Interrupt Request |
ISAPI | Internet Server Application Program Interface |
ISDN | Integrated Services Digital Network |
ISO | International Standard Organization |
ISP | Internet Service Provider |
ISR | Interrupt Service Routine |
IT | Information Technology |
ITPL | Information Technology Park Limited (India) |
JCL | Job Control Language |
JDBC | Java Data Base Connectivity |
JHTML | Java Within Hyper Text Markup Language |
JPEG | Joint Photographic Experts Group |
JSP | Java Server Pages |
KB | Kilo Bytes |
KBPS | Kilo Bytes Per Second |
L2TP | Layer Two Tunneling Protocol |
LAN | Local Area Network |
LCD | Liquid Crystal Display |
LDAP | Light Weight Directory Access Control |
LIFO | Last In First Out |
LIPS | Logical Interfaces Per Second |
LOC | Lines Of Code |
LSI | Large Scale Integration |
LSP | Layered Service Provider |
MAC | Media Access Control |
MAN | Metropolitan Area Network |
MAU | MultiStation Access Unit |
MB | Mega Bytes |
MBONE | Multicast Backbone |
MBPS | Mega Bytes Per Second |
MBR | Master Boot Record |
MCP | Microsoft Certified Professional |
MCS | Multicast Server |
MDI | Multiple Document Interface |
MDS | Microcomputer Development System |
MFC | Microsoft Foundation Classes |
MFT | Master File Table |
MG | Mega Bytes |
MICR | MagneticInk Characters Reader |
MIDI | Musical Instrument Digital Interface |
MIMD | Multiple Instruction Multiple Data |
MIME | Multipurpose Internet Mail Extensions |
MIPS | Millions Of Instructions Per Second |
MISD | Multiple Instruction Single Data |
MODEM | Modulator And Demodulator |
MP3 | Motion Pictures Experts Group Layer 3 |
MPEG | Motion Pictures Experts Group |
MS | Microsoft |
MSDN | Microsoft Developer Network |
MSIIS | Microsoft Internet Information Server |
MSIL | Microsoft Intermediate Language |
MSMQ | Microsoft Message Queue |
MSN | Microsoft Network |
MSRAP | Microsoft Remote Administration Protocol |
MSRPC | Microsoft Remote Procedure Call |
MTS | Microsoft Transaction Server |
MTU | Maximum Transmission Unit |
MUDS | MultiUser Dungeons |
NAS | Network Attached Storage |
NASSCOM | National Association Of Software & Service Companies |
NCP | Network Control Protocol |
NDIS | Network Driver Interface Specification |
NDRO | Nondestructive Read Out |
NETBEUI | Netbios Enhanced User Interface |
NIC | National Informatics Centre, |
NIIT | National Institute Of Information Technology |
NNTP | Network News Transfer Protocol |
NSFNET | National Science Foundation Network |
NTFS | New Technology File System |
NTP | Network Time Protocol |
OCR | Optical Character Readers |
ODBC | Open Data Base Connectivity |
OLE | Object Linking And Embedding |
OMR | Optical Mark Reader |
ONE | Open Network Architecture |
OOA | Object Orient Analysis |
OOAD | Object Oriented Analysis And Design |
OOP | Object Oriented Programming |
OOPS | Object Oriented Programming System |
OPEN GL | Open Graphics Library |
OS | Operating System |
OSI | Open System Interconnection |
PC | Personal Computer |
PCI | Peripheral Component Interconnect |
PCMCIA | Personal Computer Memory Card International Association |
PDA | Personal Digital Assistant |
Portable Document Format | |
PDL | Page Description Language |
PDU | Protocol Data Unit |
PIC | Programming Interrupt Control |
PILOT | Programmed Inquiry Learning Or Teaching |
PLA | Programmable Logic Array |
PLC | Programmable Logic Controller |
PNG | Portable Network Graphics |
PNP | Plug And Play |
PPP | Peer To Peer Protocol |
PPTP | Point To Point Tunneling Protocol |
PROM | Programmable Read Only Memory |
PS | Post Script |
RADSL | RateAdaptive Digital Subscribes Line |
RAID | Redundant Array Of Independent Disks |
RAM | Random Access Memory |
RAMDAC | Random Access Memory Digital To Analog Converter |
RAS | Remote Access Network |
RD RAM | Rambus Dynamic Random Access Memory |
RDBMS | Relational Data Base Management System |
RDO | Remote Data Objects |
RDP | Remote Desktop Protocol |
RFC | Request For Comments |
RGB | Red Green Blue |
RICS | Reduced Instruction Set Computer |
RIP | Raster Image Processor |
RISC | Reduced Instruction Set Computer |
ROM | Read Only Memory |
RPC | Remote Procedure Call |
RTC | Real Time Clock |
RTF | Rich Text Format |
RTOS | Real Time Operating System |
SACK | Selective Acknowledgements |
SAM | Security Access Manager |
SAP | Service Access Point, Systems Applications Products |
SCMP | Software Configuration Management Plan |
SD RAM | Synchronous Dynamic Random Access Memory |
SDD | Software Design Description |
SDK | Software Development Kit |
SDL | Storage Definition Language |
SDN | Integrated Service Digital Network |
SDRAM | Static Dynamic Random Access Memory |
SDSL | Symmetric Digital Subscribes Line |
SG RAM | Synchronous Graphics Random Access Memory |
SGML | Standard Generalized Markup Language |
SIM | Subscriber Identification Module |
SIMD | Single Instruction Multiple Data |
SISD | Single Instruction Single Data |
SIU | Serial Interface Unit |
SMP | Symmetric MultiProcess |
SMS | Short Message Service |
SMTP | Simple Mail Transfer Protocol |
SNA | System Network Architecture |
SNAP | Sub Network Access Protocol |
SNMP | Simple Network Management Protocol |
SNOBOL | String Oriented Symbolic Language |
SOAP | Simple Object Access Protocol |
SPX | Sequenced Packet Exchange |
SQA | Statistical Quality Assurance |
SQL | Structured Query Language |
SRAM | Static Random Access Memory |
SRS | Software Requirements Specification |
STP | Shielded Twisted Pair |
SVVP | Software Verification And Validation Plan |
SW | Software |
TAPI | Telephony Application Program Interface |
TB | Tera Bytes |
TCP | Transmission Control Protocol |
TCPIP | Transmission Control Protocol Internet Protocol |
TDI | Transport Data Interface |
TDMA | Time Division Multiple Access |
TPM | Transactions Processing Monitor |
TSR | Terminate And Stay Residents |
UDD | User Datagram Protocol |
UDP | User Datagram Protocol |
UI | User Interface |
UML | Unified Modelling Language |
UNC | Universal Naming Convention |
UNIX | Uniplexed Information And Computer Systems |
URL | Universal Resource Locator |
USB | Universal Serial Bus |
USRT | Universal Synchronous Receiver Transmitted |
UTP | Unshielded Twisted Pair |
VAN | Virtual Area Network |
VAST | Very Small Aperture Terminal |
VB | Visual Basic |
VC++ | Visual C++ |
VCD | Video Compact Disc |
VDL | View Definition Language |
VGA | Video Graphics Array |
VHS | Video Home System |
VLIW | Very Long Instruction Words |
VLSI | Very Large Scale Integrated Circuits |
VPN | Virtual Private Network |
VRAM | Video Random Access Memory |
VRML | Virtual Reality Modelling Language |
VS | Visual Studio |
VSNL | Videsh Sanchar Nigam Limited |
VVR | Software Validation And Validation Report |
VXD | Virtual Device Driver |
W3C | World Wide Web Consortium |
WAIS | Wide Area Information Servers |
WAN | Wide Area Network |
WAP | Wireless Application Protocol |
WBEM | WebBase Enterprise Management |
WDM | Wave Division Multiplexing |
WHQL | Windows Hardware Quality Lab |
WINDOWS ME | Windows Millennium Edition |
WINDOWS NT | Windows New Technology |
WINDOWS XP | Windows Experienced |
WINS | Windows Internet Name Service |
WMI | Windows Management Instrumentation |
WML | Wireless Markup Language |
WORM | Write Once Read Many |
WSH | Windows Script Host |
WWW | World Wide Web |
WYSIWYG | What You See Is What You Get |
XHTML | Extensible Hyper Text Markup Language |
XML | Extensible Markup Language |
XSL | Extensible Style Sheet Langauge |
Saturday, 9 June 2012
COMPUTER KNOWLEDGE PRACTICE QUESTIONS
1. Hackers ………………
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) break into other people's computers
Answer: break into other peoples computers
2. Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
Answer: software piracy
3. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
Answer: spam
4. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
Answer: Overhead Projections
5. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
Answer: A Sound Format
6. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
Answer: PCs
7. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
Answer: Microphone
8. The life-span of a CD-ROM is………………
(A) approximately one year
(B) approximately two years
(C) approximately five years
(D) approximately twenty-five years
Answer: approximately five years
9. The ……………… settings are automatic and standard.
(A) default
(B) CPU
(C) peripheral
(D) user frien9ly
Answer: default
10. What are the two parts of an E-mail address ?
(A) User name and street address
(B) Legal name and phone number
(C) User name and domain name
(D) Initials and password
Answer: User name and domain name
11. Participants can see and hear each other in a/an ………………
(A) electronic mail system
(B) message system
(C) tele-conference
(D) bulletin board
Answer: tele-conference
12. Magnetic tape is not practical for applications where data must be quickly recalled because tape is ………………
(A) a random-access medium
(B) expensive
(C) a read-only medium
(D) a sequential-access medium
Answer: a sequential-access medium
13. Why should you delete unknown e-mail attachments ?
(A) You could go to jail
(B) The person could track you down and hurt you
(C) It is bad manners
(D) It might contain a virus that could hurt your computer
Answer: It might contain a virus that could hurt your computer
14. How is it possible that both programs and data can be stored on the same floppy disk ?
(A) A floppy disk has two sides, one for data and one for programs
(B) A floppy disk has to be formatted for one or for the other
(C) Programs and data are both software, and both can be stored on any memory device
(D) Floppy disks can only store data, not programs
Answer: Programs and data are both software, and both can be stored on any memory device
15. What is an embedded system ?
(A) A program that comes wrapped in a box
(B) A program that is permanently part of a computer
(C) A computer that is part of a larger computer
(D) A computer and software system that controls a machine or appliance
Answer: A computer and software system that controls a machine or appliance
16. Which of the following will you require to hear music on your computer ?
(A) Video Card
(B) Tape Recorder
(C) Mouse
(D) Sound Card
Answer: Sound Card
17. The signal that a computer is waiting for a command from the user is ………………
(A) prompt
(B) event
(C) time slice
(D) interrupt
Answer: prompt
18. This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page ………………
(A) Web browser
(B) Web search engine
(C) Web homepage
(D) Web service
Answer: Web browser
19. For viewing video CDs, you would use………………
(A) CD Player
(B) Windows Media Player
(C) Windows Video Player
(D) Windows Movie Player
Answer: Windows Media Player
20. Executing more than one program concurrently by one user on one computer is known as ………………
(A) multi-programming
(B) multi-processing
(C) time-sharing
(D) multi-tasking
Answer: multi-tasking
21. Which of the following controls the manner of interaction between the user and the operating system ?
(A) language translator
(B) platform
(C) user interface
(D) icon
Answer: user interface
22. You can keep your personal flies / folders in ………………
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text
Answer: My Documents
23. Three types of compact disks include CD-ROM, CD-R, and ………………
(A) CD-W
(B) CD-RAM
(C) CD-DVD
(D) CD-RW
Answer: CD-RW
24. All computers must have ………………
(A) Word processing software
(B) An operating system
(C) A printer attached
(D) A virus checking program
Answer: An operating system
25. Collecting personal information and effectively posing as another individual is known as the crime of ………………
(A) spooling
(B) spoofing
(C) hacking
(D) identity theft
Answer: identity theft
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) break into other people's computers
Answer: break into other peoples computers
2. Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
Answer: software piracy
3. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
Answer: spam
4. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
Answer: Overhead Projections
5. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
Answer: A Sound Format
6. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
Answer: PCs
7. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
Answer: Microphone
8. The life-span of a CD-ROM is………………
(A) approximately one year
(B) approximately two years
(C) approximately five years
(D) approximately twenty-five years
Answer: approximately five years
9. The ……………… settings are automatic and standard.
(A) default
(B) CPU
(C) peripheral
(D) user frien9ly
Answer: default
10. What are the two parts of an E-mail address ?
(A) User name and street address
(B) Legal name and phone number
(C) User name and domain name
(D) Initials and password
Answer: User name and domain name
11. Participants can see and hear each other in a/an ………………
(A) electronic mail system
(B) message system
(C) tele-conference
(D) bulletin board
Answer: tele-conference
12. Magnetic tape is not practical for applications where data must be quickly recalled because tape is ………………
(A) a random-access medium
(B) expensive
(C) a read-only medium
(D) a sequential-access medium
Answer: a sequential-access medium
13. Why should you delete unknown e-mail attachments ?
(A) You could go to jail
(B) The person could track you down and hurt you
(C) It is bad manners
(D) It might contain a virus that could hurt your computer
Answer: It might contain a virus that could hurt your computer
14. How is it possible that both programs and data can be stored on the same floppy disk ?
(A) A floppy disk has two sides, one for data and one for programs
(B) A floppy disk has to be formatted for one or for the other
(C) Programs and data are both software, and both can be stored on any memory device
(D) Floppy disks can only store data, not programs
Answer: Programs and data are both software, and both can be stored on any memory device
15. What is an embedded system ?
(A) A program that comes wrapped in a box
(B) A program that is permanently part of a computer
(C) A computer that is part of a larger computer
(D) A computer and software system that controls a machine or appliance
Answer: A computer and software system that controls a machine or appliance
16. Which of the following will you require to hear music on your computer ?
(A) Video Card
(B) Tape Recorder
(C) Mouse
(D) Sound Card
Answer: Sound Card
17. The signal that a computer is waiting for a command from the user is ………………
(A) prompt
(B) event
(C) time slice
(D) interrupt
Answer: prompt
18. This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page ………………
(A) Web browser
(B) Web search engine
(C) Web homepage
(D) Web service
Answer: Web browser
19. For viewing video CDs, you would use………………
(A) CD Player
(B) Windows Media Player
(C) Windows Video Player
(D) Windows Movie Player
Answer: Windows Media Player
20. Executing more than one program concurrently by one user on one computer is known as ………………
(A) multi-programming
(B) multi-processing
(C) time-sharing
(D) multi-tasking
Answer: multi-tasking
21. Which of the following controls the manner of interaction between the user and the operating system ?
(A) language translator
(B) platform
(C) user interface
(D) icon
Answer: user interface
22. You can keep your personal flies / folders in ………………
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text
Answer: My Documents
23. Three types of compact disks include CD-ROM, CD-R, and ………………
(A) CD-W
(B) CD-RAM
(C) CD-DVD
(D) CD-RW
Answer: CD-RW
24. All computers must have ………………
(A) Word processing software
(B) An operating system
(C) A printer attached
(D) A virus checking program
Answer: An operating system
25. Collecting personal information and effectively posing as another individual is known as the crime of ………………
(A) spooling
(B) spoofing
(C) hacking
(D) identity theft
Answer: identity theft
Subscribe to:
Posts (Atom)