Thursday, 13 November 2014

Computer Abbreviations and Meanings

A
ACE – Access Control Entry
ACL – Access Control List
ADO – Active Data Objects
ADSL – Asymmetric Digital Subscriber Line
AGP – Accelerated Graphics Port
AI – Artificial Intelligence
ALGOL – Algorithmic Language
ALU – Arithmetic Logic Unit
ANSI – American National Standards Institute
AOL – America Online
API – Application Program Interface
APIPA – Automatic Private Internet Protocol Addressing
APT – Automatically Programmed Tooling
ARP – Address Resolution Protocol
ARPANET – Advanced Research Projects Agency Network
ASCII – American Standard Code for Information Interchange
ASF – Advanced Streaming Format
ASM – Association for Systems Management
ASP – Active Server Pages
ATAPI – Advanced Technology Attachment Packet Interface
ATM – Asynchronous Transfer Mode
AUI – Attachment Unit Interface
AVI – Audio Video Interleave

B
B2B – Business to Business
B2C – Business to Commerce
BASIC – Beginner's All Purpose Symbolic Instruction Code
BCD – Binary Coded Decimal
BDPS – Business Data Processing Systems
BHTML – Broadcast Hyper Text Markup Language
BIOS – Basic Input Output System
BIU – Bus Interface Unit
BMP – Bitmap
BPS – Bytes Per Seconds

C
CAD – Computer Aided Design
CADD – Computer Added Drafting and Design
CAI – Computer Aided Instructuion
CAM – Computer Aided Manufacturing
CAR – Control Address Register
CASE – Computer Aided Software Engineering
CCIS – Common Channel Interoffice Signaling
CCNA – Cisco Certified Network Associate
CD–WORM – Compact Disc – Write Once Read Many
CD RW – Compact Disc ReWritable
CD – Compact Disc
C-DAC – Centre for Development of Advanced Computing
CDMA – Code Division Multiple Access
CDONTS – Collabaration on Data Objects for Windows NT Server
CDROM – Compact Disc Read Only Memory
CFG – Control Flow Graph
CGI – Common Gateway Interface
CGM – Computer Graphics Metafile
CIDR – Classless Inter–Domain Routing 
CIM– Computer Integrated Manufacture
CISC – Complex Instruction Set Computers
CIX – Commercial Internet Exchange
CLR – Common Language Runtime
CMOS – Complementary Metal Oxide Semiconductor
CMS – Content Management System
CMYK – Cyan, Magenta, Yellow, Key (black)
COBOL – Common Business Oriented Language
COM – Component Object Model
CORBA – Common Object Request Broker Architecture
CPI – Clock Cycle Per Instruction
CPU – Central Processing Unit
CRC – Cyclic Redundancy Check
CRM – Customer Relationship Management
CROM – Control Read Only Memory
CRT – Cathode Ray Tube
CUI – Character User Interface

D
DAC – Digital to Analog Converter
DAO – Data Access Objects
DARPANET – Defense Advanced Research Projects Agency Network
DAT – Digital Audio Tape
DBA – Data Base Administrator
DBMS – Data Base Management System
DCA – Defence Communication Agency
DCL – Data Control Language
DCOM – Distributed Component Object Model
DCP – Data Communication Processor
DDL – Data Definition Language
DDOS – Distributed Denial of Service
DDP – Distributed Data Processing
DFD – Data Flow Diagram
DFS – Distributed File System
DHCP – Domain Host Configuration Protocol
DHTML – Dynamics Hyper Text Markup Language
DLC – Data Link Control
DLL– Dynamic Link Library
DMA – Direct Memory Access
DML – Data Manipulation Language
DMTF – Distributed Management Test Force
DNA – Distributed Internet Architecture
DNS – Domain Name System
DOM – Document Object Model
DOS – Disk Operating System, Denial Of Service
DPI – Dots Per Inch
DRAM – Dynamic Random Access Memory
DSL – Digital Subscriber Line
DSN – Digital Subscriber Network
DTD – Document Type Definition
DVD – Digital Versatile Disc

E
E – Electronic
EAROM – Electrically Alterable Read Only Memory
EBCDIC – Extended Binary Coded Decimal Interchange Code
EDC – Electronic Digital Computer
EDCDIC – Extended Binary Coded Decimal Interchange Code
EEPROM – Electrically Erasable Programmable Read Only Memory
EFS – Encrypted File System
EJB – Enterprise Java Beans
ENIAC – Electronics Numerical Integrator and Calculator
EPROM – Erasable Programmable Read Only Memory
EROM – Erasable Read Only Memory
ERP – Enterprise Resource Planning
EULA – End User License Agreement

F
FAT – File Allocation Table
FDD – Floppy Disk Drive
FDDI – Fiber Distributed Data Interface
FDMA – Frequency Division Multiple Access
FIFO – First In First Out
FLOPS – Floating Point Operations Per Second
FO – Fiber Optics
FORTRAN – Formula Translation
FPS – Frames Per Second
FRAM – Ferro–electric Random Access Memory
FTP – File Transfer Protocol

G
GB – Giga Bytes
GIF – Graphic Interchange Format
GIGO – Garbage In Garbage Out
GML – General Markup Language
GNU – GNU's Not Unix
GPL – General Public License
GUI – Graphical User Interface

H
HDD – Hard Disk Drive
HFS – Hierarchical File System
HP – Hewlett Packard
HPC – High Performance Computing
HPFS – High Performance File System
HSR – Horizontal Scan Rate
HTML – Hyper Text Markup Language
HTTP – Hyper Text Transfer Protocol

I
IBM – International Business Machines
IC – Integrated Circuit
ICMP – Internet Control Message Protocol
ICS – Reduce Instruction Set Computer
ICT – Information and Communication Technology
IDE – Integrated Development Environment
IE – Internet Explorer
IGMP – Internet Group Management Protocol
IIS – Internet Information Server
IL – Intermediate Language
IO – Input Output
IOP – Input Output Processor
IP – Internet Protocol
IPX – Internetworked Packet Exchange
IRAM – Integration Ram
IRC – Internet Relay Chat
IrDA – Infrared Data Association
IRQ – Interrupt Request
ISAPI – Internet Server Application Program Interface
ISDN – Integrated Services Digital Network
ISO – International Standard Organization
ISP – Internet Service Provider
ISR – Interrupt Service Routine
IT – Information Technology
ITPL – Information Technology Park Limited (India)

J
JCL – Job Control Language
JDBC – Java Data Base Connectivity
JHTML – Java within Hyper Text Markup Language
JPEG – Joint Photographic Experts Group
JSP – Java Server Pages

K
KB – Kilo Bytes
KBPS – Kilo Bytes Per Second

L 
L2TP – Layer Two Tunneling Protocol
LAN – Local Area Network
LCD – Liquid Crystal Display
LDAP – Light Weight Directory Access Control
LIFO – Last In First Out
LIPS – Logical Interfaces Per Second
LOC – Lines Of Code
LSI – Large Scale Integration
LSP – Layered Service Provider

M
MAC
 – Media Access Control
MAN – Metropolitan Area Network 
MAU – Multi–station Access Unit
MB – Mega Bytes
MBONE – Multicast Backbone
MBPS – Mega Bytes Per Second
MBR – Master Boot Record
MCP – Microsoft Certified Professional
MCS – Multicast Server
MCSA – Microsoft® Certified Systems Administrator
MCSD – Microsoft® Certified Solution Developer 
MCSE – Microsoft® Certified System Engineer
MDI – Multiple Document Interface
MDS– Microcomputer Development System
MFC – Microsoft Foundation Classes
MFT – Master File Table
MG – Mega Bytes
MICR – MagneticInk Characters Reader
MIDI – Musical Instrument Digital Interface
MIMD – Multiple Instruction Multiple Data
MIME – Multipurpose Internet Mail Extensions
MIPS – Millions of Instructions Per Second
MISD – Multiple Instruction Single Data
MODEM – Modulator and Demodulator
MP3 – Motion Pictures Experts Group Layer – 3
MPEG – Motion Pictures Experts Group
MS – MicroSoft
MSDN – MicroSoft Developer Network
MSIIS – Microsoft Internet Information Server
MSIL – Microsoft Intermediate Language
MSMQ – Microsoft Message Queue
MSN – MicroSoft Network
MSRAP – Microsoft Remote Administration Protocol
MSRPC – Microsoft Remote Procedure Call
MTS – Microsoft Transaction Server
MTU – Maximum Transmission Unit
MUDS – MultiUser Dungeons

N
NAS – Network Attached Storage
NASSCOM – National Association of Software and Service Companies
NCP – Network Control Protocol
NDIS – Network Driver Interface Specification
NDRO – Nondestructive Read Out
NetBEUI – NetBIOS Enhanced User Interface
NIC – National Informatics Centre, 
NIIT – National Institute of Information Technology
NNTP – Network News Transfer Protocol
NOW – Network Of Workstations
NSFNET – National Science Foundation Network
NT (Windows) – New Technology
NTFS – New Technology File System
NTP – Network Time Protocol

O
OCP – Oracle Certified Professional
OCR – Optical Character Readers
ODBC – Open Data Base Connectivity
OLE – Object Linking and Embedding
OMR – Optical Mark Reader
ONE – Open Network Architecture
OOA – Object Orient Analysis
OOAD – Object Oriented Analysis and Design
OOP – Object Oriented Programming
OOPS – Object Oriented Programming System
OPEN GL – Open Graphics Library
OS – Operating System
OSI – Open System Interconnection

P
PC – Personal Computer
PCI – Peripheral Component Interconnect
PCMCIA – Personal Computer Memory Card International Association
PDA – Personal Digital Assistant
PDF – Portable Document Format
PDL – Page Description Language
PDU – Protocol Data Unit
PHP – PHP Hypertext Processor
PIC – Programming Interrupt Control
PILOT – Programmed Inquiry Learning Or Teaching
PLA – Programmable Logic Array
PLC – Programmable Logic Controller
PNG – Portable Network Graphics
PNP – Plug And Play
POP – Post Office Protocol
POST – Power On Self Test
PPP – Peer to Peer Protocol
PPTP – Point To Point Tunneling Protocol
PROM – Programmable Read Only Memory
PS – Post Script
PSN – Processor Serial Number

Q 
QoS – Quality of Service

R
RADSL – RateAdaptive Digital Subscribes Line
RAID – Redundant Array of Independent Disks
RAM – Random Access Memory
RAMDAC – Random Access Memory Digital to Analog Converter
RAS – Remote Access Network
RD RAM – Rambus Dynamic Random Access Memory
R-DAT – Rotating Digital Audio Tape
RDBMS – Relational Data Base Management System
RDO – Remote Data Objects
RDP – Remote Desktop Protocol
RFC – Request for Comments
RGB – Red Green Blue
RICS – Reduced Instruction Set Computer
RIP – Raster Image Processor
RISC – Reduced Instruction Set Computer
ROM – Read Only Memory
RPC – Remote Procedure Call
RTC – Real Time Clock
RTF – Rich Text Format
RTOS – Real Time Operating System


S-DAT – Stationary Digital Audio Tape
SACK – Selective Acknowledgements
SAM – Security Access Manager
SAP – Service Access Point, Systems Applications Products
SCMP – Software Configuration Management Plan
SCSI – Small Computers Systems Interface
SD RAM – Synchronous Dynamic Random Access Memory
SDD – Software Design Description
SDK – Software Development Kit
SDL – Storage Definition Language
SDN – Integrated Service Digital Network
SDRAM – Static Dynamic Random Access Memory
SDSL – Symmetric Digital Subscribes Line
SG RAM – Synchronous Graphics Random Access Memory
SGML – Standard Generalized Markup Language
SIM – Subscriber Identification Module
SIMD – Single Instruction Multiple Data
SISD – Single Instruction Single Data
SIU – Serial Interface Unit
SMP – Symmetric Multi Process
SMS – Short Message Service
SMTP – Simple Mail Transfer Protocol
SNA – System Network Architecture
SNAP – Sub Network Access Protocol
SNMP – Simple Network Management Protocol
SNOBOL – String Oriented Symbolic Language
SOAP – Simple Object Access Protocol
SPX – Sequenced Packet Exchange
SQA – Statistical Quality Assurance
SQL – Structured Query Language
SRAM – Static Random Access Memory
SRS – Software Requirements Specification
STP – Shielded Twisted Pair
SVVP – Software Verification and Validation Plan
SW – Software

T
TAPI – Telephony Application Program Interface
TB – Tera Bytes
TCP – Transmission Control Protocol
TCP/IP – Transmission Control Protocol / Internet Protocol
TDI – Transport Data Interface
TDMA – Time Division Multiple Access
TPM – Transactions Processing Monitor
TSR – Terminate and Stay Residents

U
UDD – User Datagram Protocol
UDP – User Datagram Protocol
UI – User Interface
UML – Unified Modelling Language
UNC – Universal Naming Convention
UNIX – Uniplexed Information and Computer Systems
URL – Universal Resource Locator
USB – Universal Serial Bus
USRT– Universal Synchronous Receiver Transmitted
UTP – Unshielded Twisted Pair

V
VAN – Virtual Area Network
VAST– Very Small Aperture Terminal
VB – Visual Basic
VC++ – Visual C++
VCD – Video Compact Disc
VDL – View Definition Language
VGA – Video Graphics Array
VHS – Video Home System
VLIW – Very Long Instruction Words
VLSI – Very Large Scale Integrated Circuits
VPN – Virtual Private Network
VRAM – Video Random Access Memory
VRML – Virtual Reality Modelling Language
VS – Visual Studio
VSNL – Videsh Sanchar Nigam Limited
VVR – Software Validation and Validation Report
VXD – Virtual Device Driver

W
W3C – World Wide Web Consortium
WAIS – Wide Area Information Servers
WAN – Wide Area Network
WAP – Wireless Application Protocol
WBEM – Web Base Enterprise Management
WDM – Wave Division Multiplexing
WHQL – Windows Hardware Quality Lab
Windows ME – Windows Millennium Edition
Windows NT – Windows New Technology
Windows XP – Windows eXPerienced
WINS – Windows Internet Name Services
WMI – Windows Management Instrumentation
WML – Wireless Markup Language
WORM – Write Once Read Many
WSH – Windows Script Host
WWW – World Wide Web
WYSIWYG – What You See Is What You Get


XHTML – eXtensible Hyper Text Markup Language
XML – eXtensible Markup Language
XSL – eXtensible Style Sheet language

Y
Y2K – Year 2000

Z

ZIF – Zero Insertion Force

Sunday, 26 October 2014

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. If you are working in English (US), Chinese or Japanese, Excel 2002 can speak data as you enter it, to help you verify accuracy. How do you activate the feature?
1) Point to Speech on the Tool menu, and then click Show Text To Speech Toolbar.
2) Click validation on the data menu.
3) Point to speech on the tools menu, and then click speech recognition.
4) All of the above
5) None of these

2. ...... are a type of inexpensive digital camera that remains tethered to a computer and are used for video conferencing, video chatting and live web broadcast.
1) Webcams
2) Webpicks
3) Browser cams
4) Browser pics
5) None

3. Which of the following statements is true?
1) To insert link in Ms Excel, Ctrl + K is used.
2) One can edit selected cell in Excel by pressing the F2 key.
3) Shift + space is used to select the entire row in Excel.
4) Ctrl + space is used to select the entire column in Excel.
5) All 1), 2), 3) and 4) are true

4. For multiple selection in any file system you have..
1) Radio button
2) Local area network
3) Notification area
4) Yes/ No box
5) None

5. A(n) ...... is a private corporate network used exclusively by company employees.
1) Internet
2) Local area network
3) Peer-to-peer
4) Intranet
5) None

6. Which of the following is the characteristic of a file server?
1) It manages file operations and is shared on a network.
2) It manages file operations and is limited to one PC.
3) It acts as fat client and is shared on a network.
4) It acts as fat client and is limited to one PC.
5) None of these

7. The && and operators.........
1) compare two numeric values
2) combine two numeric values
3) combine two Boolean values
4) All the above
5) None of these

8. Advantage of X.25 network is that...
1) frame delivery is more reliable
2) frames are delivered in order
3) flow control is provided
4) All the above
5) None of these

9. A ........ is a pre-designed document that already has co-ordinating fonts, a layout, and
a background.
1) guide
2) model
3) ruler
4) template
5) None of these

10. An output device that lets you see what the computer is doing is called....
1) a disk drive
2) monitor screen
3) shift key
4) printer
5) None of these

11. Computer's hard disk is....
1) an arithmetic and logical unit
2) computer software
3) operating system
4) computer hardware
5) None of these

12. To make a notebook act as a desktop model, the notebook can be connected to a ...... which
is connected to a monitor and other devices.
1) bay
2) docking station
3) port
4) network
5) None of these

13. Each cell in a Microsoft Office Excel document is referred to by its cell address, which
is the...
1) cell's column label
2) cell's column label and worksheet tab menu
3) cell's row
4) cell's row and column labels
5) None

14. The secret code that restricts entry to some programs is called.....
1) password
2) passport
3) entry-code
4) access-code
5) None of these

15. ...... is a field that uniquely identifies which person, thing or event the record describes
1) File
2) Data
3) Folder
4) Key
5) None

16. The .... directory is mandatory for every disk.
1) Root
2) Base
3) Sub
4) Case
5) None of these

17. You must install a ..... on a network if you want to share a Broadband Internet connection.
1) router
2) modem
3) node
4) cable
5) None of these

18. This can be another word of a program...
1) software
2) disk
3) floppy
4) hardware
5) None of these

19. First Technopark in India is in....
1) Bangalore
2) Kolkata
3) Thiruvananthapuram
4) Delhi
5) None

20. The simultaneous processing of two or more programs by a multiple processor is known as
1) Multiprogramming
2) Multitasking
3) Time sharing
4) Multiprocessing
5) None of these

ANSWERS:

1-1, 2-1, 3-5, 4-2, 5-4, 6-1, 7-3, 8-4, 9-4, 10-2
11-4, 12-2, 13-4, 14-1, 15-4, 16-1, 17-1, 18-1, 19-3, 20-4

Sunday, 19 October 2014

COMPUTER AWARENESS PRACTICE MCQs FOR ALL BANK EXAMS

1. We cannot delete the ____ icon, but we can made it invisible.
a) Recycle
b) My Computer
c) Internet explorer
d) All the above
e) None of the above

2. What is the meaning of 'Hibernate' in Windows XP/ Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications
e) Restart the computers all the running applications

3. The RF communication can be broadly classified in how many types?
a) Three
b) Four
c) Two
d) Six
e) Ten

4. _____ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by invoking methods on their handles.
a) Windows NT
b) Windows XP
c) Windows VISTA
d) Windows 95/98
e) Windows 7

5. Which of the following is not available on the Ruler of MS Word screen?
a) Tab stop box
b) Left Indent
c) Right Indent
d) Center Indent
e) All of them are available on ruler

6. In OSI network architecture, the dialogue control and token management are responsibility of __
a) session layer
b) network layer
c) transport layer
d) data link layer
e) None of the above

7. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Average case
d) Null case
e) All of the above

8. A computer program that converts an entire program into machine language is called a/ an
a) Interpreter
b) Simulator
c) Compiler
d) Commander
e) Proposer

9. Which of the following formulas will Excel not be able to calculate?
a) =SUM(Sales)−A3
b) =SUM(A1:A5)*.5
c) =SUM(A1:A5)/(10−10)
d) =SUM(A1:A5)−10
e) = SUM(A1:A5)−A5

10. What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?
a) Customer relationship management systems cards
b) E-government identity cards
c) FEDI cards
d) Smart cards
e) Aadhar card

11. What is the shortcut key you can press to create a copyright symbol?
a) Alt+Ctrl+C
b) Alt + C
c) Ctrl + C
d) Ctrl + Shift + C
e) Ctrl + Shift + D

12. During software development which factor is most crucial?
a) People
b) Process
c) Product
d) Project
e) Purpose

13. How many OSI layers are covered in the X.25 standard?
a) Two
b) Three
c) Seven
d) Six
e) eight

14. The transmission signal coding method of TI carrier is called ___
a) Bipolar
b) NRZ
c) Manchester
d) Binary
e) Bit

15. The idea of MFC document architecture was created by:
a) Microsoft
b) Oracle
c) Xerox
d) IBM
e) Java

16. What is the name of the display feature that highlights are of the screen which requires operator
attention?
a) Pixel
b) Reverse video
c) Touch screen
d) Cursor
e) Image

17. What kind of architecture does mobile computing deploy?
a) Two layered
b) Three layered
c) Four layered
d) Five layered
e) Six layered

18. A word processor would most likely be used to do ___
a) Keep an account of money spent
b) Do a computer search in media center
c) Maintain an inventory
d) Type a biography
e) All the above

19. SDLC stands for?
a) Software Design Life Cycle
b) Software Development Life Cycle
c) System Design Life Cycle
d) System Development Life Cycle
e) None of these

20. When a subroutine is called, the address of the instruction following the CALL instructions
stored in/ on the ___
a) stack pointer
b) accumulator
c) program counter
d) stack
e) pointer

21. What component of .NET includes services used to support web services?
a) Platform
b) Framework
c) Visual Studio
d) System
e) Mather board

22. Which of the following is not one of the four primary focuses of e-government?
a) G2G
b) G2B
c) IG2B
d) IG2G
e) IG2I

23. ____is not a category of EPS.
a) E banking
b) Direct payments
c) Retailing payments
d) Cash on delivery
e) All of these

24. One of the distinguished features of super-computer over other category of computer is ____
a) parallel processing
b) highest accuracy level
c) more speed
d) more capacity
e) less speed

25. Which class is used to control the data being used by application?
a) Document class
b) View class
c) Frame class
d) Application class
e) Software class

26. What is the control unit's function in the CPU?
a) Transfers data to primary storage
b) Stores program instruction
c) Performs logic operations
d) Decodes program instruction
e) Performs logic storage

27. Which of the following is the most common method for online payment?
a) Card based system
b) Cheque based system
c) e cash system
d) All the above
e) None of the above

28. Which of the following is not a product matrix?
a) Size
b) Reliability
c) Productivity
d) Functionality
e) Quality

29. Which of the following transmission systems provide the highest data rate in individual device?
a) Computer bus
b) Telephone lines
c) Voice and mode
d) Lease lines
e) Only voice

30. The most common addressing techniques employed by a CPU is ___
a) Immediate
b) Direct
c) Indirect
d) Register
e) All of the above

31. The key F12 opens a:
a) Save As dialog box
b) Open dialog box
c) Save dialog box
d) Close dialog box
e) Edit dialog box

32. Which of the following signal is not standard RS-232-C signal?
a) VDR
b) RTS
c) CTS
d) DSR
e) DLR

33. The indirect change of the values of a variable in one module by another module is called ___
a) internal change
b) inter-module change
c) side effect
d) side-module update
e) internal effect

34. Operating system is also known as:
a) Database
b) System software
c) Hardware
d) Printer
e) Operating system

35. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
a) Leech
b) Squid
c) Slug
d) Glitch
e) Bug

36. What happens if you press Ctrl + Shift + F8?
a) It activates extended selection
b) It activates the rectangular selection
c) It selects the paragraph on which the insertion line is
d) All of the above
e) None of the above

37. Which of the following is the latest version of Excel?
a) Excel 2000
b) Excel 2002
c) Excel ME
d) Excel 7
e) Excel XP

38. Which of the following statement is correct?
a) Terminal section of a synchronous modem contains the scrambler
b) Receiver section of a synchronous modem contains the scrambler
c) Transmission section of a synchronous modem contains the scrambler
d) Control section of a synchronous modem contains the scrambler
e) None of the above

39. Human beings are referred to as Homo sapiens, which device is called Silico Sapiens?
a) Monitor
b) Hardware
c) Robot
d) Computer
e) Mouse

40. ____ share characteristics with both hardware and software.
a) Operating system
b) Software
c) Data
d) File
e) None


ANSWERS: 
1) a 2) d 3) a 4) a 5) d 6) a 7) d 8) c 9) a 10) d
11) a 12) a 13) b 14) a 15) c 16) b 17) b 18) d 19) b 20) d
21) b 22) c 23) d 24) c 25) a 26) d 27) a 28) c 29) a 30) e
31) a 32) a 33) c 34) b 35) d 36) b 37) e 38) c 39) d 40) a 

Monday, 13 October 2014

Computer Knowledge Practice Questions for Bank Exams

1. What is an 'internet'?
1) Internal internet used to transfer information internally.
2) Internal internet used to transfer information to the outside company.
3) Internal network designed to serve the internal informational needs of a single organisation.
4) Internal network designed to transfer the information between two organisations.
5) None of the above

2. To send another station a message, the main thing a user has to know is
1) how the network works
2) the other station's address
3) whether the network is packet-switched or circuit - switched
4) whether this is a voice or data network
5) None of the above

3. The data base administrator's function in an organization is
1) to be responsible for the more technical aspects of managing the information contained in organizational databases.
2) to be responsible for the executive level aspects of decisions regarding the information management
3) to show the relationship among entity classes in a data warehouse
4) to define which data mining tools must be used to extract data
5) None of the above

4. A ...... is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these

5. Each of the following is a true statement except
1) online systems continually update the master file
2) in online processing, the user enters transactions into a device that is directly connected to the computer system
3) batch processing is still used today in older systems or in some systems with massive volumes of transactions
4) information in batch systems will always be up-to-date
5) None of the above

6. When you save a presentation, ............
1) all slides in a presentation are saved in the same file
2) two files are created; one for graphics and one for content
3) a file is created for each slide
4) a file is created for each animation or graphic
5) None of the above

7. In a client/ server model, a client program
1) asks for information
2) provides information and files
3) serves software files to other computers
4) distributes data files to other computers
5) None of the above

8. Every device on the internet has a unique ....... address (also called an ‘Internet address’) that identifies it in the same way that a street address identifies the location of a house.
1) DH
2) DA
3) IP
4) IA
5) None

9. In a customer data base a customer’s surname would be keyed into a...
1) row
2) text field
3) record
4) computed field
5) None of these

10. A set of interrelated components that collect, process, store and distribute information to support decision making and control in an organization best defines
1) communications technology
2) a network
3) an information system
4) hardware
5) None of the above

11. Control in design of an information system is used to
1) inspect the system and check that it is built as per specifications
2) ensure that the system processes data as it was designed to and that the results are reliable
3) ensure privacy of data processed by it
4) protect data from accidental or intentional loss
5) None of the above

12. Storing same data in many places is called
1) iteration
2) concurrency
3) redundancy
4) enumeration
5) None of these

13. Which of the following is the first step in the 'transaction processing cycle', which captures business data through various modes such as optical scanning or at an electronic commerce website?
1) Document and report generation
2) Database maintenance
3) Transaction processing
4) Data Entry
5) None of the above

14. What is part of a database that holds only one type of information?
1) Report
2) Field
3) Record
4) File
5) None

15. 'MPG' extension refers usually to what kind of file?
1) Word Perfect Document file
2) MS Office document
3) Animation/ movie file
4) Image file
5) None of these

16. If you want to secure a message, use a(n):
1) cryptology source
2) encryption key
3) encryption software package
4) cryptosystem
5) None of these

17. Which key do you press to check spelling?
1) F3
2) F5
3) F7
4) F9
5) None

18. Which area in an Excel window allows entering values and formulas?
1) Title Bar
2) Menu Bar
3) Formula Bar
4) Standard Tool Bar
5) None of these

19. Which of the following helps to reduce spelling error in the document?
1) Auto Format
2) Auto Correct
3) Smart Tags
4) Auto Text
5) None

20. Which of the following is valid IP address?
1) 984.12.787.76
2) 192.168.321.10
3) 1.888.234.3456
4) 192.168.56.115
5) None of these

ANSWERS:
1-1, 2-2, 3-1, 4-2, 5-4, 6-1, 7-4, 8-3, 9-3, 10-3
11-2, 12-3, 13-4, 14-2, 15-3, 16-4, 17-3, 18-3, 19-2, 20-4.

Wednesday, 1 October 2014

COMPUTER AWARENESS PRACTICE QUESTIONS FOR ALL BANK EXAMS

1. India's largest wide area network is:
a) INDONET
b) NICNET
c) INET
d) SWIFT
e) Beam

2. A computer system consists of several devices like CPU, monitor, mouse etc. together they are called:
a) computer peripherals
b) computer components
c) computer bits
d) computer equipments
e) none of the above

3. Number of devices supported by LAN can be maximum of:
a) 7
b) 12
c) 100
d) 1000
e) 25

4. An information system that immediately responds to the physical systems is called:
a) Live system
b) On-line System
c) Off-line system
d) Real time system
e) none

5. Route adopted by large companies for payment of dividends to shareholders is called
a) ECS Debit
b) RTGS
c) ECS Credit
d) either (b) or (c)
e) either (a) or (c)

6. Which combination of keys needs to be pressed to make a percent sign?
a) Shift+2
b) Shift+3
c) Shift+4
d) Shift+5
e) Shift+9

7. Which function calculates the largest value in a set of numbers?
a) Average
b) Count
c) Minimum
d) Maximum
e) None of these

8. Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?
a) Daughter board
b) Motherboard
c) Father board
d) Breadboard
e) CPU

9. MB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tan don, operating system from Microsoft, the printer from Epson and the application
software from everywhere. Can you name the country which contributed the video display?
a) India
b) China
c) Germany
d) Taiwan
e) Japan

10. What is meant by a dedicated computer?
a) Which is used by one person only
b) Which is assigned one and only one task
c) Which uses one kind of software
d) Which is meant for application software
e) All the above

11. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
a) 1978
b) 1984
c) 1990
d) 1989
e) 1991

12. The information stored in storage devices can be accessed in ______
a) RAM access & ROM access
b) Memory access & Disk access
c) Random access & shift access
d) Sequential access & Direct access
e) All the above

13. Which of the following is the most commonly used encoding standard of Unicode?
a) UTF-6
b) UTF-7
c) UTF-5
d) UTF-9
e) UTF-8

14. UML is stands for
a) Universal Modelling Language
b) Unified Modelling Language
c) United Modelling Language
d) Unit Modelling Language
e) Uni Modelling Language

15. Which of the following translator program converts assembly language program to object program?
a) assembler
b) compiler
c) microprocessor
d) linker
e) sender

16. Which protocol is used to transfer web pages?
a) TCP/IP
b) SMTP
c) POP3
d) HTTP
e) HPTP

17. A self-sufficient computer that acts as both a server and a client is known as
a) Host
b) Client
c) Server
d) Terminal
e) Peer

18. The interactive transmission of data within a time sharing system may be best suited to
a) simplex lines
b) half-duplex lines
c) full duplex lines
d) bi flex-lines
e) tri flex lines

19. A system program that sets up an executable program in main memory ready for execution is
a) assembler
b) linker
c) compiler
d) Coding
e) loader

20. A table can be logically connected to another table by defining a
a) Super key
b) Candidate key
c) Primary key
d) Unique key
e) Common attribute.

21. Missing slot covers on a computer can cause?
a) Over heat
b) Power surges
c) EMI
d)Incomplete path for ESD
e) None of the above

22. From what location are the 1st computer instructions available on boot up?
a) ROM BIOS
b) CPU
c) boot.ini
d) CONFIG.SYS
e) .bat

23. Acollaborative network that uses Internet Technology to link business with their suppliers is ---
a) Internet
b) Intranet
c) Extranet
d) WAN
e) LAN

24. Open Systems Interconnection (OSI) Model consists of -
a) 5-layers
b) 6-layers
c) 7-layers
d) 8-layers
e) 9-layers

25. A communication processor that connects dissimilar networks by providing the translation from
one set of protocol to another is -
a) Bridge
b) Gateway
c) Router
d) Modem
e) CPU

26. A collection of raw facts is called -
a) Output
b) Information
c) Bits
d) Data
e) Files

27. A __ is an additional set of commands that the computer displays after you make a selection from the main menu.
a) dialog box
b) submenu
c) menu selection
d) all the above
e) None

28. What is the permanent memory built into your computer called?
a) RAM
b) Floppy
c) CPU
d) ROM
e) Hard disk

29. Storage that retains its data after the power is turned off is referred to as
a) volatile storage
b) non-volatile storage
c) sequential storage
d) direct storage
e) indirect storage

30. Which of the following is an example of connectivity?
a) internet
b) floppy disk
c) power card
d) data
e) file

31. ___ is the process of finding errors in software code.
a) Compiling
b) Testing
c) Running
d) Debugging
e) Marking

32. Which of the following is not as language for computer programming
a) Windows
b) PASCAL
c) BASIC
d) COBOL
e) .net

33. ____is the process of dividing the disk into tracks and sectors.
a) Tracking
b) Formatting
c) Crashing
d) Allotting
e) Storing

34. What is the shortcut key to "Undo" the last action in a document?
a) Ctrl + X
b) Ctrl + y
c) Ctrl + Z
d) Ctrl + U
e) Ctrl + V

35. The language that the computer can understand and execute is called
a) machine language
b) application software
c) system program
d) all of these
e) none of these

36. Which of the following is not hardware
a) magnetic tape
b) printer
c) VDU terminal
d) assembler
e) pointer

37. What are the basic types of memory that your computer uses
a) RAM
b) RW/RAM
c) ROM
d) both A and C
e) both A,B and C

38. The total set of interlinked hypertext documents worldwide is
a) HTTP
b) Browser
c) WWW
d) B2B
e) B2A

39. The ___ enables you to simultaneously keep multiple Web pages open in one browser window.
a) tab box
b) pop-up helper
c) tab row
d) address bar
e) none

40. Which ports connect special types of music instruments to sound cards?
a) BUS
b) CPU
c) USB
d) MIDI
e) RAM

41. You can ____ a search by providing more information the search engine can use to select a smaller, more useful set of results.
a) refine
b) expand
c) load
d) query
e) unload

42. The primary purpose of software is to turn data into
a) web sites
b) information
c) programs
d) objects
e) web engines

43. The metal or plastic case that holds all the physical parts of the computer is the:
a) Hard disk
b) CPU
c) Mainframe
d) Platform
e) System unit

44. The difference between people with access to computers and the Internet and those without this access is known as the:
a) Digital divide
b) Internet divides
c) Web divides
d) Broadband divide
e) None

45. DSL is an example of a(n) _____ connection.
a) Network
b) Wireless
c) Slow
d) Cable
e) Broadband

46. The Analytical Engine developed during First Generation of computers used ___ as a memory unit?
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) Rooms

47. Which type of DOS program can you run to see which serial ports are detected?
a) combing
b) MSD
c) command.com
d) SDET
e) serial.chk

ANSWERS:
1) b 2) a 3) b 4) d 5) c 6) d 7) d 8) b 9) d 10) b
11) e 12) d 13) e 14) b 15) b 16) d 17) e 18) c 19) e 20) c
21) a 22) a 23) c 24) c 25) b 26) d 27) a 28) d 29) b 30) a
31) b 32) a 33) b 34) c 35) a 36) d 37) d 38) a 39) c 40) b
41) a 42) b 43) e 44) a 45) e 46) d 47) b

Sunday, 28 September 2014

COMPUTER AWARENESS PRACTICE QUESTIONS FOR SBI P.O. EXAM

1. The memory address of the first element of an array is called ___
a) floor address
b) foundation address
c) first address
d) base address
e) second address

2. The term "push" and "pop" is related to the ___
a) Array
b) Lists
c) Stacks
d) All the above
e) None of these

3. A data structure where elements can be added or removed at either end but not in the middle:
a) Linked lists
b) Deque
c) Stacks
d) Queues
e) Bugs

4. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Null case
d) Average case
e) Middle case

5. The operation of processing each element in the list is known as ___
a) Traversal
b) Sorting
c) Merging
d) Inserting
e) Layout

6. Human beings are referred to as Homo Sapiens, which device is called Sillico Sapien?
a) Hardware
b) Robot
c) Computer
d) Monitor
e) RAM

7. Asmall or intelligent device is so called because it contains within it a ___
a) Computer
b) Microcomputer
c) Programmable
d) Sensor
e) Cursor

8. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) Floppies
b) RAM
c) Counter Wheels
d) Cards
e) Wires

9. Which of the following devices is specially designed to forward packets to specific ports based on the packet's address?
a) Switching hub
b) Specialty hub
c) Filtering hub
d) Port hub
e) Pin hub

10. What is the Operating System used in ATM machine?
a) Windows XP
b) Windows 7
c) Linux
d) Windows 8.1
e) Windows XP or Linux based

11. BOSS is developed in which country?
a) Japan
b) USA
c) UK
d) India
e) China

12. A system call is a method by which a program makes a request to the ____
a) Input Management
b) Interrupt processing
c) Output Management
d) Operating system
e) Operating Management

13. Which of the following is the older high-level (non-assembler) programming language?
a) C
b) LISP
c) FORTRAN
d) BASIC
e) C++

14. Which device is used as the standard pointing device in a Graphical User Environment?
a) Keyboard
b) Mouse
c) Joystick
d) Trackball
e) Printer

15. The section of the CPU that is responsible for performing mathematical operations:
a) Memory
b) Register Unit
c) Control Unit
d) ALU
e) None of the above

16. Which of the following might be used by a company to satisfy its growing communication needs?
a) Front end processor
b) Multiplexer
c) Controller
d) Concentrator
e) All of the above

17. Microsoft .NET is ___
a) Open Source
b) Closed Source
c) Browser
d) Middle Source
e) All the above

18. Technical documentation is prepared by?
a) Users
b) Coders
c) Mangers
d) Marketing & sales people
e) Students

19. Comments can be added using __
a) \comments
b) /* */
c) //
d) %
e) $

20. What are the three main types of computer programming languages?
a) Machine language, assembly language, high level language
b) Imperative language, functional language, declarative language
c) COBOL, FORTRAN-77, C++
d) a and c
e) None of these

21. Which of the following network access standard is used for connecting stations to a circuitswitched network?
a) X.3
b) X.21
c) X.25
d) X.75
e) X.8

22. Which of the following is usually a special one-time operation that must be completed over a limited time period?
a) Batch
b) Patch
c) Project
d) Word
e) File

23. The latest PC keyboards use a circuit that senses the movement by the change in its capacitance. What are these keyboards called?
a) Capacitance keyboards
b) Mechanical keyboards
c) Qwerty keyboards
d) Dvorak keyboards
e) Normal keyboard

24. An IC contains 50 gates each of which consists of 6 components. Its belong to:
a) VLSI
b) LSI
c) MSI
d) SSI
e) SSC

25. Controls of data communication deal with ___
a) the communication channel
b) the computer
c) terminals
d) All of the above
e) None of the above

26. Inventory is also referred to as:
a) Stock
b) Warehouse capacity
c) Materials
d) Materials in hand
e) Storage

27. A server that can perform no other task besides network services is called ___
a) Uno server
b) Dedicated server
c) Committed server
d) Service server
e) Client server

28. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Del + P
d) Ctrl + Shift + P
e) Ctrl + P

29. The processing of an application takes place between a client and a ___ processor.
a) Front end
b) Back end
c) Middle end
d) Only a and b
e) a, b and c

30. ___ transforms one interface into another interface.
a) Program
b) Software
c) Data
d) File
e) Data Base

31. What is the full form of CRT?
a) Current Ray Tube
b) Current Ray Technology
c) Cathode Ray Tube
d) Cathode Ray Technology
e) Cat Ray Tube

32. The Analytical Engine developed during First Generation of computers used ___ as a memory
unit.
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) ROM

33. Which of the following companies is a leader in manufacture of Hard Disk Drives?
a) Samsung
b) IBM
c) Fujitsu
d) Seagate
e) Acer

34. ____ store data or information temporarily and pass it on as directed by the control unit?
a) Address
b) Register
c) Number
d) Memory
e) None of these

35. In ___ mode, the communication channel is used in both directions at the same time?
a) Full-duplex
b) Simplex
c) Half-duplex
d) Duplex
e) None of these

36. "New Comment" option can be found under ___ tab?
a) Insert
b) Data
c) Review
d) View
e) File

37. Which key moves the cursor to the beginning of the next line of text?
a) Shift
b) Enter/ return
c) Tab
d) Backspace/ delete
e) None of these

38. Identify the IP address from the following:
a) 300.215.317.3
b) 302.215@417.5
c) 202.50.20.148
d) 202-50-20-148
e) 101.50. 2 0.148

39. Which one of the following is not a/an image/ graphic file format?
a) PNG
b) GIF
c) BMP
d) GUI
e) None of these

40. In a client/ server model, a client program ___
a) asks for information
b) provides information and files
c) serves software files to other computers
d) distributes data files to other computers
e) All the above

41. Dot-matrix, DeskJet, Inkjet and Laser are all types of which computer peripherals?
a) Keyboard
b) Software
c) Monitor
d) Hardware
e) Printer

42. What is the meaning of 'Hibernate' in Windows XP / Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications.
e) None of these

ANSWERS:
1) d; 2) c; 3) b; 4) c; 5) a; 6) c; 7) d; 8) c; 9) a; 10) e;
11) c; 12) d; 13) c; 14) b; 15) d; 16) e; 17) b; 18) b; 19) d; 20) a;
21) b; 22) c; 23) a; 24) c; 25) d; 26) a; 27) b; 28) e; 29) d; 30) b;
31) c; 32) d; 33) d; 34) b; 35) a; 36) c; 37) b; 38) c; 39) d; 40) a; 41) e; 42) d.

Wednesday, 24 September 2014

COMPUTER KNOWLEDGE PRACTICE MCQs FOR SBI P.O. EXAM

1. The memory address of the first element of an array is called ___
a) floor address
b) foundation address
c) first address
d) base address
e) second address

2. The term "push" and "pop" is related to the ___
a) Array
b) Lists
c) Stacks
d) All the above
e) None of these

3. A data structure where elements can be added or removed at either end but not in the middle:
a) Linked lists
b) Deque
c) Stacks
d) Queues
e) Bugs

4. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Null case
d) Average case
e) Middle case

5. The operation of processing each element in the list is known as ___
a) Traversal
b) Sorting
c) Merging
d) Inserting
e) Layout

6. Human beings are referred to as Homo Sapiens, which device is called Sillico Sapien?
a) Hardware
b) Robot
c) Computer
d) Monitor
e) RAM

7. Asmall or intelligent device is so called because it contains within it a ___
a) Computer
b) Microcomputer
c) Programmable
d) Sensor
e) Cursor

8. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) Floppies
b) RAM
c) Counter Wheels
d) Cards
e) Wires

9. Which of the following devices is specially designed to forward packets to specific ports based on the packet's address?
a) Switching hub
b) Specialty hub
c) Filtering hub
d) Port hub
e) Pin hub

10. What is the Operating System used in ATM machine?
a) Windows XP
b) Windows 7
c) Linux
d) Windows 8.1
e) Windows XP or Linux based

11. BOSS is developed in which country?
a) Japan
b) USA
c) UK
d) India
e) China

12. A system call is a method by which a program makes a request to the ____
a) Input Management
b) Interrupt processing
c) Output Management
d) Operating system
e) Operating Management

13. Which of the following is the older high-level (non-assembler) programming language?
a) C
b) LISP
c) FORTRAN
d) BASIC
e) C++

14. Which device is used as the standard pointing device in a Graphical User Environment?
a) Keyboard
b) Mouse
c) Joystick
d) Trackball
e) Printer

15. The section of the CPU that is responsible for performing mathematical operations:
a) Memory
b) Register Unit
c) Control Unit
d) ALU
e) None of the above

16. Which of the following might be used by a company to satisfy its growing communication needs?
a) Front end processor
b) Multiplexer
c) Controller
d) Concentrator
e) All of the above

17. Microsoft .NET is ___
a) Open Source
b) Closed Source
c) Browser
d) Middle Source
e) All the above

18. Technical documentation is prepared by?
a) Users
b) Coders
c) Mangers
d) Marketing & sales people
e) Students

19. Comments can be added using __
a) \comments
b) /* */
c) //
d) %
e) $

20. What are the three main types of computer programming languages?
a) Machine language, assembly language, high level language
b) Imperative language, functional language, declarative language
c) COBOL, FORTRAN-77, C++
d) a and c
e) None of these

21. Which of the following network access standard is used for connecting stations to a circuitswitched network?
a) X.3
b) X.21
c) X.25
d) X.75
e) X.8

22. Which of the following is usually a special one-time operation that must be completed over a limited time period?
a) Batch
b) Patch
c) Project
d) Word
e) File

23. The latest PC keyboards use a circuit that senses the movement by the change in its capacitance. What are these keyboards called?
a) Capacitance keyboards
b) Mechanical keyboards
c) Qwerty keyboards
d) Dvorak keyboards
e) Normal keyboard

24. An IC contains 50 gates each of which consists of 6 components. Its belong to:
a) VLSI
b) LSI
c) MSI
d) SSI
e) SSC

25. Controls of data communication deal with ___
a) the communication channel
b) the computer
c) terminals
d) All of the above
e) None of the above

26. Inventory is also referred to as:
a) Stock
b) Warehouse capacity
c) Materials
d) Materials in hand
e) Storage

27. A server that can perform no other task besides network services is called ___
a) Uno server
b) Dedicated server
c) Committed server
d) Service server
e) Client server

28. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Del + P
d) Ctrl + Shift + P
e) Ctrl + P

29. The processing of an application takes place between a client and a ___ processor.
a) Front end
b) Back end
c) Middle end
d) Only a and b
e) a, b and c

30. ___ transforms one interface into another interface.
a) Program
b) Software
c) Data
d) File
e) Data Base

31. What is the full form of CRT?
a) Current Ray Tube
b) Current Ray Technology
c) Cathode Ray Tube
d) Cathode Ray Technology
e) Cat Ray Tube

32. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) ROM

33. Which of the following companies is a leader in manufacture of Hard Disk Drives?
a) Samsung
b) IBM
c) Fujitsu
d) Seagate
e) Acer

34. ____ store data or information temporarily and pass it on as directed by the control unit?
a) Address
b) Register
c) Number
d) Memory
e) None of these

35. In ___ mode, the communication channel is used in both directions at the same time?
a) Full-duplex
b) Simplex
c) Half-duplex
d) Duplex
e) None of these

36. "New Comment" option can be found under ___ tab?
a) Insert
b) Data
c) Review
d) View
e) File

37. Which key moves the cursor to the beginning of the next line of text?
a) Shift
b) Enter/ return
c) Tab
d) Backspace/ delete
e) None of these

38. Identify the IP address from the following:
a) 300.215.317.3
b) 302.215@417.5
c) 202.50.20.148
d) 202-50-20-148
e) 101.50. 2 0.148

39. Which one of the following is not a/an image/ graphic file format?
a) PNG
b) GIF
c) BMP
d) GUI
e) None of these

40. In a client/ server model, a client program ___
a) asks for information
b) provides information and files
c) serves software files to other computers
d) distributes data files to other computers
e) All the above

41. Dot-matrix, DeskJet, Inkjet and Laser are all types of which computer peripherals?
a) Keyboard
b) Software
c) Monitor
d) Hardware
e) Printer

42. What is the meaning of 'Hibernate' in Windows XP / Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications.
e) None of these

ANSWERS:
1) d; 2) c; 3) b; 4) c; 5) a; 6) c; 7) d; 8) c; 9) a; 10) e;
11) c; 12) d; 13) c; 14) b; 15) d; 16) e; 17) b; 18) b; 19) d; 20) a;
21) b; 22) c; 23) a; 24) c; 25) d; 26) a; 27) b; 28) e; 29) d; 30) b;
31) c; 32) d; 33) d; 34) b; 35) a; 36) c; 37) b; 38) c; 39) d; 40) a;
41) e; 42) d.

Tuesday, 16 September 2014

COMPUTER AWARENESS PRACTICE MCQs FOR ALL BANK EXAMS

1. ROM stands for
A. Random Only Memory 

B. Readable Only Memory
C. Real Online Memory 

D. Random Other Memory
E. Read Only Memory

2. Another name for a logic chip is
A. PROM 

B. Memory 
C. Microprocessor
D. ROM 

E. None of these

3. The Number System based on 0 and 1 only is known as..........................
A. Binary System 

B. Barter System
C. Number System

D. Hexadecimal System
E. Special System
4. The capacity of 0.5 inch floppy disk is.....
A. 1.40MB 

B. 1.44GB
C. 1.40GB 

D. 1.45MB 
E. 1.44MB

5. Which of the following is not an integral part of computer ?
A. CPU

B. Mouse
C. Monitor
D. UPS

E. None of these

6. Which of the following is/are not part of the CPU ?
A. Primary storage

B. Registers
C. Control unit

D. ALU
E. None of these

7. The device that reconciles the differences between computers and phones is the ......
A. LAN 

B. Wand reader
C. TCP/IP 

D. scanner 
E. modem

8. A combination of hardware and software that allows communication and electronic transfer of information between computers
A. Network 

B. Backup System 
C. Server

D. Peripheral 
E. Modem

9. Which of the following represents the fastest data transmission speed ?
A. bandwidth

B. bps
C. gbps 
D. kbps

E. mbps

10. What is a major feature of the World Wide Web that makes it simple to learn and use ?
A. Database interface
B. Graphical text interface
C. Graphical user interface
D. Point-to-Point Protocol 

E. None of these

11. Which of the following is an input device that, when moved by the user on a flat surface, causes a pointer on the screen to move accordingly ?
A. Wand reader 

B. Mouse
C. Keyboard 

D. Bar code reader
E. Scanner

12. A bar code reader is an example of a(n}.......
A. processing device
B. storage device 

C. input device
D. output device 

E. printer

13. If your regularly send letters to people, what type of program would you use to create the letters ?
A. Hardware 

B. System software
C. Utility software 
D. Application software
E. None of these

14. Computer gets && with the help of mouse or keyboard.
A. insert 

B. instructions
C. guides 

D. input 
E. None 

15. Dot-matrix is a type of ................
A. Tape

B. Printer
C. Disk 
D. Bus 
E. None 

16. Which of the following represents one billion characters ?
A. Byte

B. Gigabyte 
C. Kilobyte 

D. Megabyte
E. Terabyte

17. Which of the following menu types is also called a drop-down menu ?
A. Fly-down 

B.Pop-down 
C. Pop-up
D. Pull-up

E. Pull-down

18. What is an onscreen picture that represents an object, such as a program or file ?
A. Spool

B. NOS
C. Page

D. Pointer
E. Icon

19. Which of the following is not necessary to be considered computer literate ?
A. The ability to write the instructions that direct a computer
B. An awareness of the computers importance, versatility, and pervasiveness in society
C. Knowledge of what computers are and how they work
D. The ability to interact with computers using simple applications 
E. None of these

20. An area of the microprocessor chip used to temporarily store instructions and data that the processor is likely to use frequently is termed a(n)....
(A) ALL

(B) Bus
(C) Cache
(D) CPU 

(E) Flash

21. Kilobyte equals to how many bytes?
(A) 1000 

(B) 1035 
(C) 100 

(D) 1008 
(E) 1024

22. The central processing unit is an ex-ample of
A. peripheral 
(B) an output unit

(C) software 
(D) a program
(E) hardware

23. CD-ROM stands for ........
(A) Compactable Read Only Memory 

(B) Compact Data Read Only Memory 
(C) Compactable Disk Read Only Memo ry 
(D) Compact Disk Read Only Memory 

(E) Connected Disk Read Only Memory


24. Which of the following terms refers to the ability of a computer to automatically configure a new hardware component that is added to it ?
(A) Formatting 
(B) Multiprocessing

(C) Multiprogramming
(D) Multitasking
(E) Plug and Play

25. Free hard-disk space used to extend the capacity of RAM is ten:
(A) Cache 
(B) Flash memory 
(C) ROM
(D) Virtual memory 
(E) Volatile

26. Making illegal copies of copy-righted software is called ......
(A) Collaboration 
(B) software piracy
(C) electronic distribution
(D) Browsing
(E) software legacy

27. What is loading the operating system into a personal computer called ?
(A) Booting
(B) Prompting

(C) Paging
(D) Interrupting

(E) Readying

28. Which of the following is not an example of application software ?
(A) Database software
(B) Graphics software
(C) Operating system software
(D) Spreadsheet software
(E) Word processing software

29. Pie charts are typically created by using which of the follow ing ?
(A) browser software
(B) database software
(C) desk-top publishing software
(D) word-processing software
(E) spreadsheet software

30. The computer to which a users computer connects in order to access the Internet is called a ........
(A) notebook 

(B) PDA
(C) supercomputer 

(D) server
(E) laptop

31. Which of the following domains is used by for-profit businesses ?
(A) .com

(B) .edu
(C) .mil

(D) .net 
(E) .org

32. WAN stands for ...................
(A) Wired Area Network
(B) Wide Area Network
(C) Wide Array Net
(D) Wireless Area Network
(E) Wanted Area Network

33. What are lists of programs waiting to be run called ?
(A) Shells 

(B) The background
(C) Queues 

(D) Page frames 
(E) Lists

34. An example of peripheral equipm-ent is the
(A) printer 

(B) CPU 
(C) spreadsheet 
(D) microcomputer 
(E) ALU

35. Which of the following commercial software products are examples of operating system software and application soft-ware, respectively ?
(A) Microsoft Windows XP and Microsoft Word
(B) Microsoft Office XP and Micro soft Windows XP
(C) MS DOS and Microsoft Windows XP
(D) UNIX and LINUX 
(E) UNIX and Java

36. MS Excel is used for ?
(A) Letter writing
(B) Spread Sheet Calculation
(C) Presentation
(D) Painting 
(E) None of these

37. Computer users who are not; computer professionals, are someti-mes called.....
(A) peripheral users
(B) programmers 
(C) librarians
(D) information officers 
(E) end-users

38. Desktop and personal computers are also known as.....
(A) supercomputers
(B) servers 

(C) mainframes
(D) peripheral equipment
(E) microcomputers

39. The ability to exchange information through the use of computer equipment and software is
(A) Data entry
(B) The Internet 
(C) Data retrieval
(D) Electronic communication

(E) None 

40. A computer professional who writes and tests software is called a /an .....
(A) hardware consultant 

(B) librarian 
(C) programmer
(D) computer operator
(E) data entry operator


ANSWERS:
1-E, 2-C, 3-A, 4-E, 5-D, 6-E, 7-E, 8-A, 9-C, 10-C
11-B, 12-D, 13-D, 14-D, 15-B, 16-B, 17-E, 18-E, 19-E, 20-C
21-E, 22-E, 23-D, 24-E, 25-B, 26-B, 27-A, 28-C, 29-E, 30-D
31-E, 32-B, 33-D, 34-A, 35-A, 36-B, 37-E, 38-E, 39-D, 40-C