Sunday, 17 August 2014

COMPUTER KNOWLEDGE PRACTICE MCQs FOR ALL BANK EXAMS

1. What is required when more than one person uses a central computer at the same time?
a) Light pen
b) Mouse
c) Digitizer
d) Terminal
e) None of the above

2. One nibble is equal to ___
a) 4 bits
b) 8 bits
c) 16 bits
d) 32bits
e) None of the above

3. Which of the following terms is the most closely related to main memory?
a) Non-volatile
b) Permanent
c) Control unit
d) Temporary
e) None of the above

4. A picture, map or graphics or image that can be used in a document is known as ___
a) Hypertext
b) Clipboard
c) Object
d) Drag drop
e) None of these

5. The amount of vertical space between lines of text in a document is called:
a) Double spacing
b) Line spacing
c) Single space
d) Vertical spacing
e) None of these

6. Which of the following is a smallest dot that can be uniquely drawn on a computer screen?
a) Bexel
b) Computer dot
c) Cursor
d) Pixel
e) None of these

7. _____means to enlarge a window to its maximum area so that it will fill entire desktop.
a) Maximise
b) Zoom
c) Enlarge
d) Extend
e) None of these

8. The computer's capability of distinguishing spoken words is called ___
a) voice analysis
b) speech acknowledgement
c) voice recognition
d) speech interpretation
e) none of these

9. Which of the following is the process of getting access to the computer?
a) Sign up
b) Log in
c) Log off
d) Enter
e) None of these

10.Aseries of instructions that tells a computer what to do and how to do it, is called a ____
a) program
b) command
c) user response
d) processor
e) None of these

11. The full step wise process of closing a computer is called _____
a) Hibernating
b) Closing
c) Log off
d) Shut down
e) None of these

12. Which key combination is used for special tasks?
a) Insert, Delete
b) Ctrl, Shift
c) Left Arrow, Right Arrow
d) Page up, Page Down
e) None of These

13. ____ allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.
a) TCP/ IP
b) Ethernet
c) WAP
d) Token ring
e) Internet

14. The _____ enables you to simultaneously keep multiple Web pages open in one browser window.
a) Tab box
b) Pop-up helper
c) Tab row
d) Address bar
e) None of these

15. The most important or powerful computer in a typical network is ____
a) Desktop
b) Network client
c) Network server
d) Network station
e) None of these

16. The primary purpose of software is to turn data into ____
a) Websites
b) Information
c) Programs
d) Objects
e) None of these

17. Grouping and processing all of a firm's transactions at one time is called ___
a) a database management system
b) a real-time system
c) an on-line system
d) batch processing
e) None of these

18. Which of the following is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user?
a) Interrupt request
b) Forward DNS lookup
c) Data-Link layer
d) Common gateway interface
e) None of these

19. What is the shortcut key to “Undo” the last action in a document?
a) Ctrl + X
b) Ctrl + Y
c) Ctrl + U
d) Ctrl + N
e) Ctrl + Z

20. The errors that can be pointed out by the compiler:
a) Syntax errors
b) Semantic errors
c) Logic errors
d) System errors
e) All of the above

21. Pick out the wrong definition.
a) COBOL : A language used for business data processing
b) CPU: Is the brain of computer
c) LAN: Is used in local areas
d) FORTRAN: Is used for logical processing
e) None of these

22. Modulator is a device that converts:
a) Digital signal into Ana log signal
b) Ana log signal into digital signal
c) Both A and B
d) Sometimes only A and B
e) None of the above

23. What is the capacity of a 3.5” Floppy Disk?
a) 360 KB
b) 720 KB
c) 1.2 MB
d) 1.44 MB
e) 1.8 MB

24. Which command of MS-DOS is used to copy only files that have been modified on or after the date you specify?
a) XCOPY/D : date
b) COPY/D : date
c) COPY/M
d) XCOPY/V
e) None of the above

25. If the processor of a computer does not have a direct and unassisted access to data items, these items are said to be ___
a) Offline
b) Remote
c) Disconnected
d) Detached
e) None of the above

26. The input and output devices are located away from the central computer facility in which particular type of processing?
a) Time sharing
b) Batch processing
c) Interactive mode
d) Real time processing
e) None of the above

27. What is the minimum number of operations required, for a microprocessor with 8 data  pins, to read a 32-bit word?
a) 1
b) 2
c) 4
d) 8
e) 16

28. Which of the following is a special purpose language used to describe to a computer's operating system?
a) LOGO
b) APL
c) ICU
d) CORAL
e) ICL

29. The part of machine level instruction, which tells the central processor what has to be done, is ___
a) Operation code
b) Address
c) Locator
d) Flip-Flop
e) None of the above

30. A system program that sets up an executable program in main memory ready for execution:
a) Assembler
b) Linker
c) Loader
d) Compiler
e) None of the above

31. Which of the following are loaded into main memory when the computer is booted?
a) External command instructions
b) Internal command instructions
c) Utility programs
d) Word processing instructions
e) None of the above

32. In which addressing mode the contents of a register specified in the instruction are first decremented and then these contents are used as the effective address of the operands?
a) Index addressing
b) Indirect addressing
c) Auto increment
d) Auto decrement
e) None of the above

33. From what location are the 1st computer instructions available on boot up?
a) ROM BIOS
b) CPU
c) boot.ini
d) CONFIG.SYS
e) None of the above

34. You were installing an application in Windows 95, and the computer crashes, what do you do?
a) Press alt + Ctrl + delete, twice
b) Press alt + Ctrl + delete and end task
c) Press the reset button on the computer
d) Turn off computer and boot from a floppy disk
e) None of the above

35. Each of data files has a _____ that describe the way the data is stored in the file.
a) File structure
b) Records
c) Fields
d) Database
e) None of the above

36. In a ___ a parent record type can be linked to one or more "child" record types, but a child record type can have only one parent.
a) Network database
b) Relational database
c) Distributed database
d) Hierarchical database
e) None of the above

37. In the accompanying figure, the _____ is a special toolbar that displays a series of names, each of which represents a list of commands that can be used to perform tasks.
a) Scroll bar
b) Status bar
c) Title bar
d) Menu bar
e) None of these

38. When the Language bar is _____, it means that you do not see it on the screen but it will be displayed the next time you start your computer.
a) Restored
b) Hidden
c) Minimized
d) Closed
e) All of the above

39. What is the name of the memory card which is conceptually related to the smart card but is similar to the video disk?
a) Laser card
b) Master card
c) Visa
d) Optical card
e) None of the above

40. Which of the following is not an alternative name for primary memory?
a) Main memory
b) Primary storage
c) Internal storage
d) Mass storage
e) None of the above


ANSWERS:
1) d; 2) a; 3) d; 4) c; 5) b; 6) d; 7) a; 8) c; 9) b; 10) a;
11) d; 12) b; 13) c; 14) c; 15) c; 16) b; 17) d; 18) d; 19) e; 20) a;
21) d; 22) c; 23) d; 24) a; 25) a; 26) b; 27) c; 28) e; 29) a; 30) c;
31) b; 32) d; 33) a; 34) d; 35) a; 36) d; 37) d; 38) b; 39) a; 40) d;

Wednesday, 6 August 2014

COMPUTER AWARENESS PRACTICE MCQs FOR ALL BANK EXAMINATIONS 2014

1. The MS-DOS file extension usually attached to a file containing backup data is ...........
1) DOCX
2) BAK
3) BAC
4) DOC
5) MSD
2. The amount of data that can flow through a channel is called ...........
1) Bandlength
2) Capacity
3) Bandwidth
4) Digital Speed
5) None

3. ........ is made of static RAM
1) Cache memory
2) Buffer space
3) Clipboard
4) Virtual memory
5) None

4. COBOL, a high level programming language developed for ...........
1) Teaching children in schools
2) Designing plan for buildings
3) Maintaining the data of a firm
4) Business data processing applications
5) None

5. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ...........
1) Copy and paste
2) Copy, cut and paste
3) Cut, copy and paste
4) Cut and paste
5) None of these

6. The software tools that enable a user to interact with a computer for specific purposes
are known as ...........
1) Hardware
2) Network Software
3) Shareware
4) Applications
5) None of these

7. A(n) ......... backup contains a copy of every program, data, and system file on a computer
1) Restoration
2) Bootstrap
3) Differential
4) Full
5) None of these

8. Where is data saved permanently?
1) Memory
2) Storage device
3) CPU
4) Printer
5) None of these
9. Which is not a basic function of a computer?
1) Copy text 2) Accept input
3) Process data 4) Store data
5) None of these

10. A MODEM is connected in between a telephone line and a ...........
1) Network
2) Computer
3) Communication Adapter
4) Serial Port
5) All of these

11. The ........... is the box that houses the most important parts of a computer system.
1) Software
2) Hardware
3) Input device
4) System unit
5) None of these

12. The first computer introduced in Nepal was
1) IBM 1400
2) IBM 1401
3) IBM 1402
4) IBM 1403
5) None of these

13. Data that is copied from an application is stored in the ...........
1) Driver
2) Terminal
3) Prompt
4) Clipboard
5) None of these

14. In a spreadsheet program the ....... contains related work sheets and documents.
1) Workbook
2) Column
3) Cell
4) Formula
5) None of these

15. What is the permanent memory built into your computer called?
1) RAM
2) ROM
3) CPU
4) CD-ROM
5) None of these

16. Another word for software is....
1) input
2) output
3) program
4) system
5) None of these

17. An input device that can interpret pencil marks on paper media is called as ...........
1) Pencil Mark Reader
2) Scanner
3) Optical Character Reader
4) Overlapped Pencil Marker
5) Optical Mark Reader

18. A register in CPU that is used to store the address of the next instruction to be executed
is ...........
1) Program runner
2) Next program data counter
3) Program counter
4) Processing desk
5) Cache memory

19. An electronic circuit with about 10,000 transistors fabricated in a single silicon chip is...
1) Valves
2) Mega Transistor
3) VLSI
4) SMEP
5) IC

20. Which of the following is not a set of instructions?
1) Program
2) Program File
3) Software
4) Data File
5) None

21. CP/M stands for ___
1) Command Program /Management
2) Control Program / Micro Computer
3) Control Program / Mini Computer
4) Control Program / Super Computer
5) None of these

22. Find the odd man out.
1) Internet
2) Intranet
3) RING
4) MID
5) None

23. What does 'S' stand for in ISP?
1) Service
2) Sources
3) Select
4) Server
5) Sketch

ANSWERS:
1-2, 2-3, 3-1, 4-4, 5-4, 6-4, 7-4, 8-2, 9-5, 10-2
11-4, 12-2, 13-4, 14-1, 15-2, 16-3, 17-5, 18-3, 19-3, 20-4, 21-2, 22-4, 23-1

Sunday, 3 August 2014

COMPUTER KNOWLEDGE PRACTICE MCQs FOR ALL ABANK EXAMS

1. The physical parts of a computer are known as:
a) Software
b) Hardware
c) Shareware
d) Fixed - ware
e) Digital - ware

2. Which type of the following software is used by a person for preparation of text documents?
a) Data processor
b) Word processor
c) Complier
d) Multimedia
e) b and c

3. The complete picture of data stored in database is known as:
a) Record
b) Schema
c) System flow chart
d) DBMS
e) None of these

4. Most of the errors blamed on computers are actually due to ____
a) programming errors
b) hardware figure
c) defects of floppy disks
d) data entry errors
e) None of these

5. Information retrieval is fastest from ____
a) floppy disks
b) magnetic tapes
c) hard disk
d) All of the above
e) None of the above

6. In addition to keying data directly into a database, data entry can
also be done from a/ an ____
a) field
b) table
c) data dictionary
d) input form
e) None of these

7. Assembly instructions are in the form of ____
a) binary digits
b) digits and numbers
c) general English
d) a new format different from all of the above
e) None of the above

8. You must install a ____ on a network if you want to share an internet connection.
a) Router
b) Modem
c) Node
d) Cable
e) None of these

9. The ___ software contains lists of commands and options.
a) menu bar
b) tool bar
c) title bar
d) formula bar
e) None of these

10. A computer program which could infect the other programs or data is called:
a) System software
b) Application software
c) Cybercrime
d) Virus
e) Computer fraud

11. Which of the following parts of the computer makes use of primary memory?
a) Storage unit
b) Central Processing Unit
c) Output devices
d) All of the above
e) None of the above

12. The term ATM stands for:
a) Automatic Teller Mechanism
b) Automated Teller Mechanism
c) Automated Teller Machine
d) Atomic Teller Machine
e) Automated Telephone Machine

13. The device that is a kind of computer which does not have its own CPU or storage:
a) Standby computer
b) Terminal
c) Mainframe computer
d) Personal computer
e) None of the above

14. ___ is called as a supervisor of computer activities.
a) Memory
b) OS
c) I/O devices
d) CU
e) ALU

15. Master files contain data of ___ nature.
a) temporary
b) local
c) permanent
d) global
e) None of these

16. Which of the following temporarily stores the data?
a) RAM
b) ROM
c) Floppy disk
d) Hard disk
e) None of these

17. Data division is the third division of a ____ program.
a) LISP
b) FORTH
c) COBOL
d) BASIC
e) PASCAL

18. In Windows XP, which shortcut key is used to cycle through opened items in taskbar?
a) Ctrl + Tab
b) Alt + Tab
c) Ctrl + Esc
d) Alt + Esc
e) None of these

19. A/An___ is a program that makes the computer easier to use.
a) Operating system
b) Application
c) Utility
d) Network
e) None of these

20. Allocator and manager of memory in an operating system is:
a) Keyboard
b) Key punch
c) Kernel
d) Kludge
e) None of these

21. Which of the following is a type of memory chip whose contents cannot be altered by writing
data?
a) RAM
b) PROM
c) ROM
d) EPROM
e) None of these

22. Which computer has been designed to be as compact as possible?
a) Mini
b) Super computer
c) Micro computer
d) Mainframe
e) None of the above

23. Which part is interprets program that converts assembly language to machine language?
a) Input
b) Storage unit
c) Logic unit
d) Control unit
e) None these

24. A memory that does not change it's contents without external causes is known as:
a) Dynamic memory
b) Static memory
c) RAM
d) EEPROM
e) None of these

25. The computer program that ensure interface between the user and the computer hardware:
a) Application software
b) Operating software
c) Processing software
d) Complier
e) Interpreter

26. Which of the following better describes the term internet?
a) A network of standard alone computers
b) A network servers
c) A network of networks
d) A network of world - wide computers
e) All of the above

27. What is the name of the windows software that is used for managing data base format?
a) MS Word
b) MS Power Point
c) MS Access
d) MS Excel
e) b and d

28. The computer related storage device used for the purpose of making permanent record:
a) CD -ROM
b) Floppy disk
c) Hard Disk
d) WORM Drive
e) All of the above

29. Which of the following takes care of processing of the information in a computer system?
a) ALU
b) CPU
c) Storage unit
d) Control unit
e) Processors

30. Devices that let the computer communicate with you are called ____ devices.
a) input
b) output
c) type
d) print
e) None of these

31. To move down a page in a document we use
a) Task bar
b) My computer
c) Recycle bin
d) Only (b) and (c)
e) None of these

32. To find a saved document in the computer's memory and bring it on the screen to view is called
___
a) reserve
b) rerun
c) retrieve
d) return
e) None of these

33. ____ servers store and manage files for network users.
a) Authentication
b) Main
c) Web
d) File
e) None of these

34. The ____ manual tells you how to use a software program.
a) documentation
b) programming
c) technical
d) user
e) None of these

35. Which of the following can be another word for program?
a) Software
b) Disk
c) Floppy
d) Hardware
e) None of these

36. ____ is the process of finding errors in software code.
a) Debugging
b) Compiling
c) Testing
d) Running
e) None of these

37. A name applied by Intel corp. to high speed MOS technology is ___
a) HDLC
b) LAP
c) HMOS
d) SDLC
e) None of the above

ANSWERS:
1) b 2) b 3) b 4) d 5) c 6) d 7) e 8) a 9) a 10) d
11) b 12) c 13) b 14) b 15) c 16) a 17) c 18) b 19) c 20) c
21) c 22) c 23) d 24) b 25) b 26) c 27) c 28) e 29) b 30) b
31) e 32) c 33) d 34) d 35) a 36) c 37) c

Sunday, 27 July 2014

COMPUTER AWARENESS PRACTICE QUESTIONS FOR BANK EXAMS

1. Which one of the following is different from other three?
1) MAC Address
2) Hardware Address
3) Physical Address
4) IP Address
5) None of these

2. dentify the IP address from the following:
1) 300.215.317.3
2) 302.215@417.5
3) 202.50.20.148
4) 202-50-20-148
5) 101.50. 2 0.148

3. Which one of the following is not a/an image/ graphic file format?
1) PNG
2) GIF
3) BMP
4) GUI
5) None of these

4. Which of the following command is used to set the task priority in UNIX?
1) init
2) nice
3) PS
4) Kill
5) Loss

5. ____ is a protocol used by email clients to download e-mails to your computer.
1) SMTP
2) POP
3) FTP
4) MAIL
5) None of these

6. Which of the following is not a CPU trade name?
1) Intel
2) Dell
3) AMD
4) Cyrix
5) All of the above

7. The idea of stored-program concept was revealed by:
1) Pascal
2) Babbage
3) Neumann
4) Bill gates
5) James

8. Memories which can be read only are called ____ memories.
1) RAM
2) Secondary Memory
3) EERAM
4) Dynamic Memories
5) ROM

9. In a client/ server model, a client program ___
1) asks for information
2) provides information and files
3) serves software files to other computers
4)distributes data files to other computers
5) All of the above

10. Dot-matrix, DeskJet, Inkjet and Laser.. these all are which type of computer peripherals?
1) Keyboards
2) Software
3) Monitors
4) Hardware
5) Printers

11. Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?
1) MAC Layer
2) Data link layer
3) Transport layer
4) Application layer
5) Network layer

12.What is the meaning of 'Hibernate' in Windows XP/ Windows 7?
1) Restart the computers in safe mode
2) Restart the computers in normal mode
3) Shutdown the computer terminating all the running applications
4) Shutdown the computer without closing the running applications
5) None of these

13. Decisions or Conditions in flowchart is represented by ____.
1) Diamond
2) Parallelogram
3) Rectangle
4) Circle
5) All of the above

14. ____ is technology that allows someone to turn on a network computer remotely by sending a special data packet.
1) WAN
2) WHOL
3) WOL
4)Windows Mesh
5) None of these

15. Which of the following memory allocation scheme suffers from external fragmentation?
1) Segmentation
2) Pure demand paging
3) Swapping
4) Paging
5) None of these

16.A computer program that translates a program statement by statement into machine language is called a/an ____
1) Compiler
2) Simulator
3) Translator
4) Interpreter
5) Assembler

17. Mnemonic codes and variable name are used in a/ an ___
1) Machine language
2) Assembly language
3) High level language
4) All of the above
5) None of the above

18. CGI stands for:
1) Common Graphics Interface
2) Common Gateway Interchange
3) Common Gateway Interface
4) Computer Gateway Interface
5) None of these

19. If user is not able to see the image on the web page, the text that is displayed in place of the image, is specified by which of the following attributes in HTML?
1) ALTERNATE
2) ALTLINK
3) ALT_TEXYT
4) ALT
5) None of these

20. Which one of the following is different from other three?
1) Google
2) Windows
3) Linux
4) Mac
5) None of these

ANSWERS:
1) 4; 2) 3; 3) 4; 4) 2; 5) 2; 6) 2; 7) 3; 8) 5; 9) 1; 10) 5;
11) 5; 12) 4; 13) 1; 14) 3; 15) 1; 16) 4; 17) 1; 18) 3; 19) 4; 20) 1

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. A hard disk is divided into tracks which is further subdivided into?
a) Clusters
b) Sectors
c) Vectors
d) Heads
e) None of these

2. What is the radix of Binary Number System?
a) 3
b) 1
c) 2
d) 4
e) 0

3. Which of the following holds the ROM, RAM, CPU?
a) Hard Disk
b) ALU
c) Mother Board
d) All of the above
e) None of the above

4. Portable program means:
a) Program with wheels
b) Independent from its authors
c) Independent of platform
d) All of the above
e) None of the above

5. 1 GB is equal to ____.
a) 230 bits
b) 230 bytes
c) 220 bits
d) 220 bytes
e) None of these

6. Which of the following are the 5 generic software engineering framework activities?
a) Communication, Planning, Modeling, Construction, Deployment
b) Communication, Risk management, Measurement, Production, Reviewing
c) Analysis, Designing, Programming, Debugging, Maintenance
d) Analysis, Planning, Designing, Programming, Testing
e) None of these

7. The principal electronic payment system for electronic commerce is ____.
a) Credit Card
b) Digital Wallet
c) Electronic Cheque
d) All of the above
e) None of these

8. The name of first super computer of India:
a) Saga 220
b) PARAM 8000
c) ENIAC
d) PARAM 6000
e) None of these

9. The machine readable form of a program is called as ___
a) Source code
b) Object code
c) Compiler
d) Executable File
e) All of the above

10. AVI format was developed by:
a) IBM
b) Apple
c) Microsoft
d) Macromedia
e) Sun Microsoft

11. Which of the following IP address class is a multicast address?
a) Class A
b) Class B
c) Class C
d) Class D
e) Class F

12. Each character on the keyboard of computer has an ASCII value which stands for:
a) African Standard Code for Information Interchange
b) American Standard Code for Information Interchange
c) American Stock Code for Information Interchange
d) American Standard Code for Information Interfere
e) None of these

13. Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?
a) Network layer
b) Data link layer
c) Transport layer
d) Application layer
e) Mac layer

14. What is the meaning of 'Hibernate' in Windows XP/ Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications
e) None of these

15. The basic unit of a worksheet into which you enter data in Excel is called a ___
a) Cell
b) Table
c) Box
d) Column
e) None of these

16. Which of the following is a correct format of e-mail address?
a) sales@website; info
b) sales@website.info
c) saleswebsite.info
d) sales.website.info
e) All of the above

17. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Ctrl + P
d) Ctrl+Shift+P
e) None of these

18. The operating system does all of the following EXCEPT:
a) Provide a way for the user to interact with the computer
b) Manage the Central Processing Unit (CPU)
c) Manage memory and storage
d) Enable users to perform a specific task such as document editing
e) All of the above

19. ____ is the ability of an operating system to control the activities of multiple programs at the
same time.
a) Streamlining
b) Multiuser
c) Multitasking
d) Simulating
e) None of these

20. Verification of a login name and password is known as:
a) Configuration
b) Accessibility
c) Authentication
d) Logging in
e) Logging off

21. All of the following statements concerning windows are true EXCEPT:
a) Windows are an example of a command-driven environment
b) Windows can be resized and repositioned on the desktop
c) More than one window can be open at a time
d) Toolbars and scrollbars are features of windows
e) None of these

22. All of the following statements concerning files are true EXCEPT:
a) A file is a collection of related pieces of information stored together for easy reference
b) Files can be generated from an application
c) Files are stored in RAM
d) Files should be organized in folders
e) None of these

23. What are the four things needed to connect to the Internet?
a) Monitor, Keyboard, Mouse and Modem
b) Telephone line, PDA, Modem and Computer
c) Telephone line, Modem, Computer and an ISP
d) Modem, Computer, PDA and ISP
e) None of the above

24. Which of the following is true about firewalls?
a) Follows a set of rules
b) Can be either a hardware or software device
c) Filters network traffic
d) All of the above
e) None of these

25. Data that are accumulated and processed in group called:
a) Group processing
b) Batch Processing
c) Time sharing
d) All of the above
e) None of the above

26. Allocation of resources in a time dependent manner to several program simultaneously called as:
a) Multi user
b) Multi tasking
c) Time sharing
d) All of the above
e) None of the above

27. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called:
a) Simulation
b) Animation
c) Robotics
d) Computer forensics
e) None of these

28. In the binary language each letter of the alphabet, each number and each special character is made up
of a unique combination of:
a) Eight bytes
b) Eight characters
c) Eight bits
d) Eight kilobytes
e) None of the above

29. Servers are computers that provide resources to other computers connected to a:
a) Mainframe
b) Supercomputer
c) Network
d) Client
e) User

30. The difference between people with access to computers and the Internet and those without this
access is known as the:
a) Digital divide
b) Internet divide
c) Web divide
d) Cyber way divide
e) All of the above


ANSWERS:
1) b; 2) c; 3) c; 4) c; 5) b; 6) a; 7) d; 8) b; 9) b; 10) c;
11) d; 12) b; 13) a; 14) d; 15) a; 16) b; 17) c; 18) d; 19) c; 20) c;
21) a; 22) c; 23) c; 24) d; 25) b; 26) c; 27) d; 28) c; 29) c; 30) a;

Tuesday, 22 July 2014

COMPUTER KNOWLEDGE PRACTICE MCQs FOR IBPS EXAMS

1. The number of pixels displayed on a screen is known as the _____ screen.
a) Viewing size
b) Color depth
c) Refresh rate
d) Resolutions
e) None of these

2. A proxy server is used for which of the following?
a) To process client requests for web pages
b) To process client requests for database access
c) To provide TCP/IP
d) To provide security against unauthorized users
e) None of these

3. A contains buttons and menus that provide quick access to commonly used commands?
a) Menu bar
b) Tool bar
c) Window
d) Action bar
e) None of these

4. Which among the following is not a security / privacy risk?
a) Hacking
b) Virus
c) Spam
d) Phishing
e) None of these

5. Which of the key is not on the number keypad?
a) Ctrl
b) Del
c) Enter
d) Num Lock
e) None of these

6. Which of the following refers to stand alone programs?
a) Executable programs
b) Source program
c) Object programs
d) All of the above
e) None of the above

7. What is the keyboard shortcut to move backward through the tabs?
a) SHIFT+TAB
b) CTRL+SHIFT+TAB
c) CTRL+TAB
d) ALT+TAB
e) None of these

8. What is the most common tool used to restrict access?
a) Access control software
b) Computer keys
c) User logins
d) Passwords
e) None of these

9. Which of the following is not an example of a document file?
a) Spreadsheet
b) Memo
c) Letter
d) Term paper
e) Thesis

10. What menu is selected to cut, copy, and paste?
a) File
b) Edit
c) Tools
d) Table
e) None of the above

11. A network geometric arrangement in which a single connection line is shared by a number of nodes is called?
a) Ring Topology
b) Bus Topology
c) Star topology
d) All of these
e) None of these

12. In Windows operating system the shortcut key CTRL+R is used to?
a) Open the print dialog box
b) Update the current web page
c) Close the current window
d) Close the current window
e) None of these

13. What is the other name for a LAN Card?
a) Network Connector
b) MODEM
c) Internet Card
d) Network Interface Card
e) None of these

14. MS Word allows creation of _____ type of documents by default?
a) .txt
b) .win
c) .dot
d) .doc
e) None of these

15. The process of a computer receiving information from a server on the Internet is known as?
a) Pulling
b) Pushing
c) Downloading
d) Transferring
e) None of these

16. Which of the following is the "Bubble Memory"?
a) Nonvolatile
b) Volatile
c) Permanent
d) Primary memory
e) None of these

17. Which of the following is not a standard MS Office Edition?
a) Standard
b) Professional
c) Normal
d) Advanced
e) None of these

18. Windows Explorer is a __________?
a) Drive
b) Browser
c) Network
d) Data Base
e) File Manager

19. Which type of protocol is used for accessing internet/ web on mobile phones?
a) HTTP
b) PPP
c) FTP
d) WAP
e) SMPT

20. When sending an e-mail, the _____ line describes the contents
of the message?
a) Subject
b) to
c) Contents
d) cc
e) None of these

21. Uniform resource locator is another name of________?
a) Title bar
b) Web address
c) Title bar
d) Address bar
e) Formula bar

22. What is the default font size of cell content in EXCEL?
a) 8
b) 9
c) 10
d) 11
e) 12

23. Basic Input Output System (BIOS) is necessary for?
a) Boot-up
b) Mouse and keyboard only
c) Revolutions
d) Audio and video system
e) None of these

24. Which of the following cables can transmit data at high speeds?
a) Coaxial Cable
b) Optic Fiber Cable
c) UTP Cable
d) Twisted pair Cable
e) None of these

25. The software that allows users to surf the Internet is called an?
a) Search engine
b) Internet Service Provider (ISP)
c) Multimedia application
d) Browser
e) None of these

26. Shimmer Sparkle Text, Blinking Background, etc are known as?
a) Front style
b) Word Art
c) Font effects
d) Text Layout
e) Text effect

27. The Output Quality of a printer is measured by?
a) Dots per sq inch
b) Dots per inch
c) Dots printed per unit
d) Dots printed per line
e) None of these

28. Which of the following is not an Internet connection?
a) Broadband
b) WWAN
c) DSL
d) WLAN
e) Dial-up

29. Unsolicited commercial email is commonly known as?
a) Junk
b) Spam
c) Hoaxes
d) Hypertext
e) None of these

30. Which of the following is not an output device?
a) Plotter
b) Printer
c) Monitor
d) Touch Screen
e) None of these

31. Which process checks to ensure that the components of the computer are operating and connected properly?
a) Processing
b) Saving
c) Editing
d) Booting
e) None of these

32. ________ file format is used for data compression and archiving?
a) .exe
b) .in
c) .com
d) .zip
e) .win

33. ________ is a combination of software and hardware?
a) Firmware
b) Shareware
c) Freeware
d) Netware
e) Software

34. To move to the beginning of a line of text, press the _______ key?
a) Alt
b) Page up
c) Enter
d) Home
e) None of these

35. 'DOS' floppy disk does not have?
a) A Boot Record
b) A File Allocation Table
c) A Root Directory
d) Virtual Memory
e) BIOS

36. ISDN is an Acronym?
a) Integrated Standard Digital Network
b) Intelligent Services Digital Network
c) Integrated Services Digital Network
d) Integrated Services Data Network
e) None of these

37. Which of the following is not a term pertaining to the internet?
a) Link
b) Touch Pad
c) Browser
d) Search engine
e) All of these

38. To insert a new slide in the current presentation, we can choose?
a) CTRL + N
b) CTRL + O
c) CTRL + F
d) CTRL + M
e) None of these

39. Multiple calculations can be made in a single formula using?
a) Standard Formula
b) Array Formula
c) Complex Formula
d) Smart Formula
e) None of these

40. Which of the following is used to identify a user who returns to a Website?
a) ASPs
b) Scripts
c) Plug-ins
d) Cookies
e) None of these

ANSWERS:
1) d 2) d 3) b 4) c 5) a 6) a 7) b 8) d 9) a 10) b
11) b 12) b 13) d 14) d 15) c 16) a 17) d 18) e 19) d 20) a
21) b 22) d 23) a 24) b 25) d 26) e 27) a 28) b 29) b 30) d
31) d 32) d 33) b 34) d 35) d 36) c 37) b 38) d 39) b 40) d

COMPUTER AWARENESS PRACTICE QUESTIONS FOR IBPS CWE

1. Computer audit involves review of ____
a) Established policies
b) Efficiency of operations
c) Checking of data integrity
d) a, b, c
e) None of these

2. Which of the following is not available in Font Spacing?
a) Normal
b) Loosely
c) Condensed
d) Expanded
e) None of these

3. Dynamic Adhoc Wireless Networks (DAWN) usually come under?
a) 2G
b) 3G
c) 4G
d) 5G
e) None of these

4. Which of the following is Not a characteristic of e-mail?
a) Low cost
b) Record maintenance in data base
c) High speed
d) Waste reduction
e) None of these

5. Which of the following is not an example of hard ware?
a) Scanner
b) Printer
c) Mouse
d) Monitor
e) Interpreter

6. A magnetic strip is fixed on the back of the cards, which holds information about the customer such as his account number etc also contains his:
a) Personal Identification Number
b) Address
c) Age
d) Occupation
e) None

7. What is used in most programs that is a part of program and guides the user through certain steps?
a) Wizard
b) Software
c) Wiki
d) Hardware
e) None of these

8. Which one of the following input device is user-programmable?
a) Dumb terminal
b) Smart terminal
c) VDT
d) Intelligent terminal
e) None of these

9. The most frequently used instructions of a computer program are likely to be fetched from?
a) The hard disk
b) Cache memory
c) RAM
d) Registers
e) None

10. In Excel, this is a prerecorded formula that provides a shortcut for complex calculations?
a) Value
b) Data Series
c) Function
d) Field
e) None of these

11. The secondary storage devices can only store data but they cannot perform?
a) Arithmetic Operation
b) Logic operation
c) Fetch operations
d) All of the above
e) None of the above

12. The One-time password (OTPs) can be obtained by a customer, via which among the following?
a) Approaching the nearest Bank Branch
b) e-mail by applying for OTP online
c) SMS on Mobile
d) All of the above
e) None of these

13. The ____ component is used by the data analyst to create the queries that access the database?
a) Data extraction
b) End User Presentation Tool
c) Data store
d) End User Query Tool
e) None Of These

14. Which of the following is used To access a mainframe or supercomputer?
a) PDA
b) Terminal
c) Modem
d) Node
e) None of these

15. "Bitmap" is a ?
a) Format which windows use for desktop wall paper
b) Graphic file format made up of small dots
c) Specific kind of bitmap files with the BMP extension
d) All of the above
e) None of these

16. ADSL stands for ?
a) Automatic Digital Subscriber Line
b) Asymmetric Direct Subscriber Line
c) Asymmetric Digital Subscriber Line
d) Automatic Direct Subscriber Line
e) None of these

17. The most common method of signing digitally is with the help of______cryptography, as contemplated
by the Information Technology Act 2000:
a) Public Key
b) Biometrics
c) Firewall
d) b and c
e) None of these

18. Objects on the slide which holds text are called ______
a) Object holders
b) Text holders
c) Auto layout
d) Data holders
e) Place holders

19. What is the shortcut key to "Undo" the last action in a document?
a) Ctrl + U
b) Ctrl + Y
c) Ctrl + X
d) Ctrl + Z
e) None of these

20. End-to-end connectivity is provided from Host-to-Host in?
a) Network layer
b) Session layer
c) Data link layer
d) Transport layer
e) None

21. "www" is based on which of the following modes?
a) Local Server
b) 2-tier
c) Client server
d) 3- tier
e) None of these

22. Which command will be used to duplicate the entire disk?
a) Copy
b) Undo
c) Format
d) Disk copy
e) None

23. To select the entire column in a worksheet, which of the following options can be used?
a) Shift + Space
b) Alt + Space
c) Shift + Alt
d) Ctrl + Space
e) None of these

24. The errors that can be pointed out by the compiler are?
a) Semantic errors
b) Logic errors
c) System errors
d) Syntax errors
e) None of these

ANSWERS:
1) d 2) b 3) d 4) b 5) e 6) a 7) a 8) d 9) b 10) c
11) d 12) c 13) d 14) b 15) d 16) c 17) a 18) e 19) d 20) d
21) c 22) d 23) d 24) d

Friday, 18 July 2014

COMPUTER AWARENESS PRACTICE MCQs FOR IBPS EXAMS

1. To access properties of an object, the mouse technique to use is .........
1) right-clicking
2) shift-clicking
3) dragging
4) dropping
5) None of these

2. What is the term for unsolicited e-mail?
1) news group
2) use net
3) backbone
4) flaming
5) spam

3. A device operating at the physical layer is called a......
1) Bridge
2) Router
3) Repeater
4) All of the above
5) None of these

4. A ..... can make it easier to play games.
1) mouse
2) joystick
3) keyboard
4) pen
5) None of these

5. The blinking symbol on the computer screen is called the .....
1) mouse
2) logo
3) hand
4) palm
5) cursor

6. To make the number pad act as directional arrows, you press the ........ key.
1) shift
2) arrow lock
3) num lock
4) caps lock
5) None of these

7. Something which has easily-understood instructions is said to be ........
1) user friendly
2) information
3) word processing
4) icon
5) None of these

8. What is output?
1) what the processor takes from the user
2) what the user gives to the processor
3) what the processor gets from the user
4) what the processor gives to the user
5) None of these

9. The basic building block of a database that contains related record is .......
1) Query
2) Form
3) Table
4) Edited page
5) Report

10. Softcopy is the intangible output, so then what is hardcopy?
1) the physical parts of the computer
2) the printed parts of the computer
3) the printed output
4) the physical output devices
5) None of these

11. Difference between Direct and Indirect Bank Marketing is .......
1) Direct Marketing is to Bank's employees, Indirect is to outsiders
2) Direct Marketing is to outsiders, Indirect is to employees
3) Direct Marketing is to Bank's owners, Indirect is to outsiders
4) Direct Marketing is to other Bank's, Indirect is to outsiders
5) None of these

12. Transaction Marketing means ......
1) Marketing only to strangers
2) Mere selling of goods
3) Doing banking transactions
4) All of the above
5) None of these

13. In marketing it is necessary to identify ....
1) Potential sellers
2) Selling employees
3) Potential products and services
4) Key existing and potential customers
5) All of the above

14. NRI is an easy target for effective marketing because .........
1) he likes Indian goods
2) he does not like Indian goods
3) he is easily approachable
4) it is cheaper to contact NRIs
5) There are special products designed for NRIs

15. A DSA helps in .......
1) Boosting direct sales
2) Contacting customers on the net
3) Indirect marketing
4) Direct telemarketing
5) None of these

16. Marketing is required for .........
1) Boosting productions
2) Boosting sales
3) Boosting profits
4) Improving customer service
5) All of the above

17. A cold call is ......
1) Best way to do marketing
2) A last resort for marketers
3) Marketing at random
4) All of the above
5) None of these

18. A call can be effective by .......
1) Making a phone call
2) Sending an e-mail
3) Calling on friends
4) Service with several facilities
5) Personally calling on prospective customers

19. Good selling skills involves .......
1) Alertness
2) Knowledge
3) Perseverance
4) Empathy
5) None of these

20. Which of the following is not channel for bank marketing?
1) Telemarketing
2) Internet Banking
3) Mobile banking
4) Existing satisfied customers
5) None of these

21. A Prospect means .....
1) A person likely to work in a bank
2) College syllabus
3) A religious buyer
4) A likely buyer
5) None of these

22. Product development is ......
1) Useful for bank marketing
2) Not useful for bank marketing
3) They have no role to play in bank marketing
4) All of the above
5) None of these

23. Marketing is successful when .......
1) Demand exceeds supply
2) Supply exceeds demand
3) Exports are heavy and costly
4) Salesmen are effectively trained
5) All the above situations

24. In marketing, market penetration means ...
1) Entering likely purchasers houses
2) Entering stores and shops
3) Covering a wide area of the market
4) All of the above
5) None of these

25. Innovation helps in ........
1) Designing new products
2) Improving marketing functions
3) Increasing sales
4) New methods for increasing prospects
5) All of the above

26. Marketing strategy means ......
1) New ideas to true more customers
2) New methods to retain the customers
3) New ways to contact the new customers
4) New marketing techniques
5) All of the above

27. Successful marketing strategies need......
1) Knowledge of customers tastes
2) Good leadership
3) Proper direction and guidance
4) Knowledge of peers
5) All of the above

28. Promotion means .....
1) Additional responsibility
2) Doing research in marketing
3) Advertisement and publicity for marketing
4) Going up the ladder in Government establishments
5) All of the above

29. Diversification means ......
1) Marketing in diverse countries
2) Marketing in diverse companies
3) Making new diverse products
4) Used only for transactions with foreign countries
5) All of the above

30. Motivation is very much required effective marketing. What other qualities are required?
1) Confidence
2) Effective communication skills
3) Team work
4) Perseverance
5) All of the above

ANSWERS:

1-1, 2-2, 3-3, 4-2, 5-5, 6-3, 7-1, 8-4, 9-5, 10-3
11-5, 12-4, 13-5, 14-5, 15-4, 16-5, 17-2, 18-5, 19-5, 20-5
21-4, 22-1, 23-4, 24-3, 25-1, 26-5, 27-5, 28-3, 29-3, 30-5.

Saturday, 14 June 2014

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. The number of pixels displayed on a screen is known as the _____ screen.
a) Viewing size
b) Color depth
c) Refresh rate
d) Resolutions
e) None of these

2. A proxy server is used for which of the following?
a) To process client requests for web pages
b) To process client requests for database access
c) To provide TCP/IP
d) To provide security against unauthorized users
e) None of these

3. A contains buttons and menus that provide quick access to commonly used commands?
a) Menu bar
b) Tool bar
c) Window
d) Action bar
e) None of these

4. Which among the following is not a security / privacy risk?
a) Hacking
b) Virus
c) Spam
d) Phishing
e) None of these

5. Which of the key is not on the number keypad?
a) Ctrl
b) Del
c) Enter
d) Num Lock
e) None of these

6. Which of the following refers to stand alone programs?
a) Executable programs
b) Source program
c) Object programs
d) All of the above
e) None of the above

7. What is the keyboard shortcut to move backward through the tabs?
a) SHIFT+TAB
b) CTRL+SHIFT+TAB
c) CTRL+TAB
d) ALT+TAB
e) None of these

8. What is the most common tool used to restrict access?
a) Access control software
b) Computer keys
c) User logins
d) Passwords
e) None of these

9. Which of the following is not an example of a document file?
a) Spreadsheet
b) Memo
c) Letter
d) Term paper
e) Thesis

10. What menu is selected to cut, copy, and paste?
a) File
b) Edit
c) Tools
d) Table
e) None of the above

11. A network geometric arrangement in which a single connection line is shared by a number of nodes is called?
a) Ring Topology
b) Bus Topology
c) Star topology
d) All of these
e) None of these

12. In Windows operating system the shortcut key CTRL+R is used to?
a) Open the print dialog box
b) Update the current web page
c) Close the current window
d) Close the current window
e) None of these

13. What is the other name for a LAN Card?
a) Network Connector
b) MODEM
c) Internet Card
d) Network Interface Card
e) None of these

14. MS Word allows creation of _____ type of documents by default?
a) .txt
b) .win
c) .dot
d) .doc
e) None of these

15. The process of a computer receiving information from a server on the Internet is known as?
a) Pulling
b) Pushing
c) Downloading
d) Transferring
e) None of these

16. Which of the following is the "Bubble Memory"?
a) Nonvolatile
b) Volatile
c) Permanent
d) Primary memory
e) None of these

17. Which of the following is not a standard MS Office Edition?
a) Standard
b) Professional
c) Normal
d) Advanced
e) None of these

18. Windows Explorer is a __________?
a) Drive
b) Browser
c) Network
d) Data Base
e) File Manager

19. Which type of protocol is used for accessing internet/ web on mobile phones?
a) HTTP
b) PPP
c) FTP
d) WAP
e) SMPT

20. When sending an e-mail, the _____ line describes the contents of the message?
a) Subject
b) to
c) Contents
d) cc
e) None of these

21. Uniform resource locator is another name of________?
a) Title bar
b) Web address
c) Title bar
d) Address bar
e) Formula bar

22. What is the default font size of cell content in EXCEL?
a) 8
b) 9
c) 10
d) 11
e) 12

23. Basic Input Output System (BIOS) is necessary for?
a) Boot-up
b) Mouse and keyboard only
c) Revolutions
d) Audio and video system
e) None of these

24. Which of the following cables can transmit data at high speeds?
a) Coaxial Cable
b) Optic Fiber Cable
c) UTP Cable
d) Twisted pair Cable
e) None of these

25. The software that allows users to surf the Internet is called an?
a) Search engine
b) Internet Service Provider (ISP)
c) Multimedia application
d) Browser
e) None of these

26. Shimmer Sparkle Text, Blinking Background, etc are known as?
a) Front style
b) Word Art
c) Font effects
d) Text Layout
e) Text effect

27. The Output Quality of a printer is measured by?
a) Dots per sq inch
b) Dots per inch
c) Dots printed per unit
d) Dots printed per line
e) None of these

28. Which of the following is not an Internet connection?
a) Broadband
b) WWAN
c) DSL
d) WLAN
e) Dial-up

29. Unsolicited commercial email is commonly known as?
a) Junk
b) Spam
c) Hoaxes
d) Hypertext
e) None of these

30. Which of the following is not an output device?
a) Plotter
b) Printer
c) Monitor
d) Touch Screen
e) None of these

31. Which process checks to ensure that the components of the computer are operating and connected properly?
a) Processing
b) Saving
c) Editing
d) Booting
e) None of these

32. ________ file format is used for data compression and archiving?
a) .exe
b) .in
c) .com
d) .zip
e) .win

33. ________ is a combination of software and hardware?
a) Firmware
b) Shareware
c) Freeware
d) Netware
e) Software

34. To move to the beginning of a line of text, press the _______ key?
a) Alt
b) Page up
c) Enter
d) Home
e) None of these

35. 'DOS' floppy disk does not have?
a) A Boot Record
b) A File Allocation Table
c) A Root Directory
d) Virtual Memory
e) BIOS

36. ISDN is an Acronym?
a) Integrated Standard Digital Network
b) Intelligent Services Digital Network
c) Integrated Services Digital Network
d) Integrated Services Data Network
e) None of these

37. Which of the following is not a term pertaining to the internet?
a) Link
b) Touch Pad
c) Browser
d) Search engine
e) All of these

38. To insert a new slide in the current presentation, we can choose?
a) CTRL + N
b) CTRL + O
c) CTRL + F
d) CTRL + M
e) None of these

39. Multiple calculations can be made in a single formula using?
a) Standard Formula
b) Array Formula
c) Complex Formula
d) Smart Formula
e) None of these

40. Which of the following is used to identify a user who returns to a Website?
a) ASPs
b) Scripts
c) Plug-ins
d) Cookies
e) None of these

ANSWERS:
1) d 2) d 3) b 4) c 5) a 6) a 7) b 8) d 9) a 10) b
11) b 12) b 13) d 14) d 15) c 16) a 17) d 18) e 19) d 20) a
21) b 22) d 23) a 24) b 25) d 26) e 27) a 28) b 29) b 30) d
31) d 32) d 33) b 34) d 35) d 36) c 37) b 38) d 39) b 40) d

Sunday, 8 June 2014

COMPUTER AWARENESS PRACTICE QUESTIONS FOR SBI P.O. & ASSISTANTS EXAM

1. Fire Wall is used to…..
a) Select Network
b) Protect Network
c) Highlight Network
d) All of these
e) None of these

2. The button that displays the window over the entire screen is?
a) Scroll box down size
b) Restore down
c) Minimize
d) Maximize
e) None of these

3. Which of the following cannot be done by a computer virus……?
a) Loss of Data
b) Deletion of File
c) Corruption of a Program
d) All of these
e) None of these

4. What do we call a copy printed through a computer printer……?
a) Soft Copy
b) Hard Copy
c) Computer Printed
d) Laser Print
e) None of these

5. The .xls extension is used for ______ files?
a) Windows
b) Access
c) Power Point
d) Word
e) Excel

6. What is the term for calculations used within spreadsheets?
a) Analyses
b) Ranges
c) Formulas
d) Recalculations
e) Values

7. A collection of Raw Facts is…?
a) Input
b) Output
c) Information
d) Data
e) File

8. A _________ is a computer connected to two networks?
a) link
 b) Server
c) Gateway
d) Bridge way
e) None of these

9. In a customer database, a customer's surname would be keyed into a?
a) Row
b) Text field
c) Record
d) Computed field
e) None of these

10. A flaw in a program may that causes it to produce incorrect or inappropriate results is called a.….?
a) Bug
b) Hacking
c) Phishing
d) Attribute
e) None of these

11. Which of the following can input graphical images and picture for computers?
a) Plotter
 b) Scanner
c) Mouse
d) Printer
e) Keyboard

12. Attributes can defined as?
a) Entity
b) Switch board
c) Macro
d) Pages
e) None of the above

13. Where will we find the referential integrity command?
a) Tools
b) Switch Board
c) Format
d) Table
e) None of these

14. What refers to a set of characters of a particular design?
a) Key face
b) Formation
c) Calligraph
d) Stencil
e) Type face

15. Smart Card is….?
a) Special Purpose Card
b) Micro Processor Card
c) Processing unit contains memory for storing data
d) Processing unit for Software handling
e) None of these

16. Which of the following would you find on LinkedIn?
a) Games
b) Connections
c) Chat
d) Applications
e) None of these

17. What is a URL?
a) A computers software program
b) Atype of programming object
c) The address of a documents or 'page' on the World Wide Web
d) An Acronym for Unlimited Resources for learning
e) A piece of Hardware

18. ______ is a technique that is used to send more than one call over a single line?
a) Digital transmission
b) Infrared transmission
c) Digitizing
d) Multiplexing
e) Streaming

19. To access properties of an object, the mouse technique to use is?
a) Dragging
b) Dropping
c) Right-clicking
d) Shift-clicking
e) None of these

20. For internet banking a customer requires…….?
a) Personal Computer and a telephone line
b) Personal Computer, telephone line and modem
c) Personal Computer, telephone line & Internet Service Provider
d) Personal Computer, telephone line, modem & Internet Service Providers
e) None of these

21. A touchpad responds to?
a) Light
b) Pressure
c) clicking
d) the sense of heat from fingerprints
e) None of these

22. The computer that hosts your email account is known as ?
a) Host
b) e-mail client
c) e-mail server
d) Listserv
e) None of these

23. The most common pointing input devices?
a) Trackball
b) Touchpad
c) Touch screen
d) Mouse
e) Scanner

24. What does a website address uniquely specify?
a) Web Browser
b) Web site
c) PDA
d) Storage
e) Hard disk

25. Expansion cards are inserted into?
a) Slots
b) Peripheral devices
c) The CPU
d) The Back of the computers
e) Pegs

26. The Name of a Microsoft office word document is displayed in both the _________ and the taskbar?
a) Menu bar
b) Task bar
c) Formatting Tool bar
d) Standard Tool bar
e) Title bar

27. The display size of a monitor is measured ?
a) Zig- zag
b) Horizontally
c) Vertically
d) From center to the furthest corner
e) Diagonally

28. Operating system's and utility program are in a class of software known as?
a) Application Software
b) Sequential software
c) Software suites
d) BIOS Software
e) System software

29. The justification that aligns text on both margins of document in Word is?
a) Justify
b) Bold
c) Centre
d) Right
e) Balanced

30. What do we call the Inbuilt Storage Device in the Computer……?
a) Hard Disk
b) Mother Board
c) RAM
d) ROM
e) None of these

31. A byte can represent any number between 0 and _____?
a) 2
b) 255
c) 256
d) 1024
e) 1025

32. Which part of the computer helps to store information?
a) Monitor
b) Keyboard
c) Disk drive
d) Printer
e) None of these

33. Linux is a type of____ software?
a) Share ware
b) Commercial
c) Proprietary
d) Open source
e) Hidden type

34. Which key is used to delete one character to the left of the current position of the cursor?
a) Backspace
b) Delete
c) Insert
d) Esc
e) Ctrl

35. What of the following means the altering of computer system software to achieve a task for which it was not originally designed…?
a) Breaking
b) Hacking
c) Trekking
d) Pegging
e) None of these

36. POST stands for?
a) Power on Self Test
b) Program on self test
c) Power on system test
d) Program on system test
e) None of these

37. An educational institution would generally have the following in its domain name?
a) .org
b) .edu
c) .inst
d) .com
e) .sch

38. Which of the following is not a term pertaining to the Internet?
a) Keyboard
b) Link
c) Browser
d) Search engine
e) Hyper link

39. Which of the following is used by the browser to connect to the location of the Internet resources?
a) Linkers
b) Protocol
c) Cable
d) URL
e) None of these

40. Which of the following is Hardware and not software?
a) Excel
b) Printer driver
c) Operating System
d) Power Point
e) CPU

ANSWERS:
1) b 2) d 3) e 4) b 5) e 6) c 7) d 8) b 9) d 10) a
11) b 12) a 13) e 14) c 15) c 16) b 17) c 18) d 19) c 20) d
21) d 22) c 23) c 24) b 25) a 26) d 27) e 28) e 29) a 30) a
31) b 32) c 33) a 34) a 35) b 36) a 37) b 38) a 39) d 40) e

Tuesday, 22 April 2014

COMPUTER KNOWLEDGE PRACTICE MCQs FOR SBI P.O. EXAM

1. Registers are located in _____
a) Memory
b) ALU
c) OS
d) CPU
e) None of these

2. ODBC stands for
a) object database connectivity
b) oral database connectivity
c) oracle database connectivity
d) open database connectivity
e) none of these

3. Which kind of malware typically has a tendency to reside in/to get attach to a computer program?
a) Worm
b) Trojan Horse
c) Computer Virus
d) All the Above
e) None of the above

4. What does router do in a network?
a) forwards a packet to all outgoing links
b) forwards a packet to the next free outgoing links
c) determines on which outgoing link a packet is to be forwarded
d) forwards a packet to all outgoing links except the originated link
e) none of these

5. Each cell in a Microsoft office excel document is referred to by its cell address, which is the…
a) cell's column label
b) cell's column label and work sheet tab name
c) cell's row and column labels
d) cell's row label
e) none of these

6. Windows 7 is an example of a(n)
a) Application software
b) browser
c) operating system
d) shareware
e) none of these

7. Many individuals create their own personal sites called web logs or
a) Social network
b) blogs
c) wikis
d) search engines
e) none of these

8. Programs that automatically submit your search request to several search engines simultaneously are called
a) Meta search engines
b) inclusive search engines
c) spiders
d) hits
e) none of these

9. LINKEDIN is a _____
a) Search Engine
b) Web Browser
c) Social Networking Site
d) Name of Operating System
e) None of these

10. A computer that is on the network is a
a) Node
b) terminal
c) client
d) online
e) none of these

11. The name a user assigns to a document is called a(n)
a) File name
b) Program
c) Record
d) Data
e) None of these

12. The system /tool which has made it possible to reduce paper work in offices is_______:
a) LAN
b) WAN
c) E-mail
d) Paper shredder
e) None of these

13. Decision support system in banking technology means a system which_____:
a) Allows creation of simulations
b) Allows analyzing created situations
c) Dont Allows creation of simulations
d) a, b
e) None of these

14. Computer audit involves review of ____
a) Established policies
b) Efficiency of operations
c) Checking of data integrity
d) All
e) None of these

15. The electronic payment system seeks to automate financial transactions as far as possible. What is the most popular electronic payment system?
a) The ATM
b) The HWAK
c) Electronic Purse
d) Electronic Cheque
e) None of these

16. The ____ is a device that connects in inputs to out puts
a) cross point
b) crossbar
c) modem
d) RAM
e) none of these

17. Which multiplexing technique transmits analogue signals?
a) FDM
b) synchronous TDM
c) asynchronous TDM
d) 2 and 3
e) none

18. ______was a search engine
system for the Gopher protocol
a) gobbler
b) archie
c) mikky
d) veronica
e) none of these

19. array is _____
a) linear data structure
b) object
c) class
d) interface
e) none of these

20. Flash memory is a type of ___ ?
a) ROM
 b) PROM
c) EPROM
d) EEPROM
e) RAM

21. Data going into the computer is called
a) output
b) algorithm
c) input
d) flowchart
e) all of these

22. How many values can be represented by a single byte?
a) 4
b) 16
c) 64
d) 256
e) 512

23. Transformation of input into output is performed by
a) Peripherals
b) memory
c) storage
d) the input output unit
e) the CPU

24. Which of the following refers to a small , single site network?
a) LAN
 b) DSL
c) RAM
d) USB
e) CPU

25. A set of instructions telling the computer what to do is called
a) Mentor
b) instructor
c) compiler
d) program
e) debugger

26. Computer connected to a LAN can
a) run faster
b) go on line
c) share information
d) E-mail
e) none

27. Which of the following refers to the memory in your computer?
a) RAM
b) DSL
c) USB
d) LAN
e) CPU

28. Information travels between components on the motherboard through
a) flash memory
b) CMOS
c) bays
d) buses
e) peripherals

29. One megabyte equals approximately
a) 1000 bytes
b) 1000 bits
c) 1 million bytes
d) 1 million bits
e) 2000 bytes

30. When you are working on a document on pc, where is the document temporarily stored ?
a) RAM
b) ROM
c) the CPU
d) flash memory
e) the cd-ROM

31. If the system has no ability to store data then it is a _____
a) Dump terminal
b) Computer
c) Microprocessor
d) Microcontroller
e) Mini processor

32. _____ is an electronic device for reading printed barcodes.
a) Barcode reader
b) Barcode scanner
c) Bar code converter
d) Both a & b
e) None of these

33. The simultaneous processing of two or more Programs by multiple processors is
a) Multiprogramming
b) Multitasking
c) Time-sharing
d) Multiprocessing
e) None

34. The advantage of touch screen is ____.
a) that it is not as tiring as the keyboard input
b) that it uses little screen space for each choice
c) that it is natural to touch things
d) All of the above
 e) None

35. A hacker contacts you my phone or email and attempts to acquire your password
a) Spoofing
b) phishing
c) spamming
d) bugging
e) None of these

36. Getting an instruction from the main memory to the CPU is known as _______.
a) getting
b) gathering
c) fetching
d) framing
e) downloading

37. A silicon chip containing CPU, ALU and some memory is known as _________.
a) Microcontroller
b) Microprocessor
c) Computer
d) Minicomputer
e) Laptop

38. Which of the following problem causes an exception?
a) Missing semicolon in statement in main
b) A problem in calling function
c) A syntax error
d) A run-time error
e) None of these

39. A computer derives its basic strength from
a) Speed
b) Accuracy
c) Memory
d) All the above
e) None of the above

40. To access a mainframe or supercomputer, users often use a ___.
a) terminal
b) node
c) desktop
d) handheld
e) None of these

41. Which of the following is not a mode in starting windows
a) Command Prompt
b) Safe Mode
c) Normal Mode
d) Turbo Mode
e) None of these

42. Which of the following process rearranges file fragments into contiguous files:
a) Folder folding
b) Defragmentation
c) Unfragging
d) Disk scanning
e) None of these

43. Which of the following server stores and manages files for network users?
a) Authorization Server
b) Main Server
c) Web Server
d) File Server
e) None of these

44. Custom software developed to address specific needs of a company is usually referred to as:
a) Developmental
b) Privately owned
c) Copyrighted
d) Proprietary
e) None of these

45. CD-ROM stands for:
a) Central Disk - Remote Open Mouse
b) CD - Resize
c) CD- Read Only Memory
d) CD-Remote Open Mouse
e) None of these

46. What is the name of an application program that gathers user information and sends it to someone through internet?
a) Virus
b) Spybot
c) Logic Bomb
d) Security Patch
e) None of these

47. Server or computer that provide resources to other computers connected to a?
a) Network
b) Mainframe
c) Supercomputer
d) Client
e) None of these

48. Which of the following is the fastest memory?
a) DDR RAM
b) DDR2 RAM
c) DDR3 RAM
d) Swap Memory
e) None of these

49. "Process" in computer terminology is synonymous to which of the following?
a) Job
b) Program
c) Task
d) Method
e) Call

ANSWERS:

1) d; 2) d; 3) c; 4) c; 5) c;  6) c; 7) b; 8) a; 9) c; 10) a;
11) a; 12) c; 13) d; 14) d; 15) a; 16) c; 17) a; 18) d; 19) a; 20) d;
21) c; 22) d; 23) d; 24) a; 25) d; 26) c; 27) a; 28) d; 29) c; 30) d;
31) a; 32) d; 33) d; 34) c; 35) b; 36) c; 37) b; 38) d; 39) d; 40) a;
41) d; 42) b; 43) d; 44) d; 45) c; 46) b; 47) a; 48) c; 49) c.

Sunday, 22 December 2013

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1.    A mistake in an algorithm that cause incorrect results is called?
     a) Logical error    b) Syntax error
     c) Compiler error
     d) Machine error
     e) Procedural error
 2.    What is URL?
     a)    A computer software program
     b)    A type of programming object
     c)    The address of a document or page on the World Wide Web
     d)    An acronym for Unlimited Resources for learning
     e)    A piece of hardware
 3.    Which of the following would you find on LinkedIn?
     a) Games     b) Connections
     c) Chat     d) Applications
     e) None of these
 4.    Which of the following is the first step in seizing a window?
     a)    Point to the title bar
     b)    Pull down the view menu to display the toolbar
     c)    Point to any corner or border
     d)    Pull down the view menu and change to large icons
     e)    None of these
 5.    _____ is a technique that is used to send more than one call over a single line?
     a) Digital transmission
     b) Infrared transmission
     c) Digitizing     d) Streaming
     e) Multiplexing
 6.    Which of these is a point-and-draw device?
     a) Mouse     b) Scanner
     c) Printer    d) CD-ROM
     e) Key board
 7.    The letter and number of the intersecting column and row is the?
     a) Cell location    b) Cell position
     c) Cell address
     d) Cell coordinates
     e) Cell contents
 8.    Which of the following is not a means of personal communication on the internet?
     a) Chat    b) Instant messaging
     c) Instanotes    d) Electronic mail
     e) None of these
 9.    NIC is the acronym for?
     a) Network Integrated Card
     b) Network Intranet Card
     c) Network Interface Card
     d) No Internet Connection
     e) None of the above
 10.    In Power Point, the Header & Footer button can be found on the Insert tab in which group?
     a) Object group
     b) Illustrations group
     c) Text group    d) Tables group
     e) None of these
 11.    _____ is a set of computer programs used on a computer to help perform tasks?
     a) An instruction    b) Software
     c) Memory    d) A processor
     e) None of these
 12.    A string of eight 0s and 1s is called a?
     a) Megabyte    b) Byte
     c) Kilobyte    d) Giga byte
     e) Kilo bite
 13.    Which of the following is not a threat to security and privacy?
     a) Hackers    b) Spam
     c) Viruses    d) Identify theft
     e) None of these
 14.    A collection of programs that controls how the computer system runs and processes information is called?
     a) Operating system
     b) Computer    c) office
     d) Compiler     e) Interpreter
 15.    Who among the following is the father of super computer?
     a) Charles Babbage
     b) Billgates    c) Steve Jobs
     d) Jeff Stronstrup
     e) Seymour Cray
 16.    What do you understand by the term 'Booting'?
     a)    The process of starting the computer from the power-off position
     b)    Connecting the computer to the electric switch
     c)    Increasing the memory of the computer
     d)    The process of shut down the computer
     e)    None of these
 17.    Housing all hardware, software, Storage and processing in one site location is called?
     a) Time sharing
     b) A distributed system
     c) Centralized processing
     d) A host computer
     e) None of these
 18.    _____ process rearranges file fragments into contiguous files?
     a) Folder folding
     b) Defragmentation
     c) Unflagging    d) Disk scanning
     e) File filling
 19.    _____ means that the data contained in a database is accurate and reliable?
     a) Data redundancy
     b) Data integrity
     c) Data reliability
     d) Data consistency
     e) None of these
 20.    _____ is the process of carrying out commands?
     a) Fetching    b) Sorting
     c) Executing    d) Decoding
     e) None of these
 21.    In Windows environment Ctrl + Z is used to?
     a) Copy    b) Paste
     c) Cut    d) Undo
     e) None of these
 22.    PCB is the acronym for?
     a) Processing Cache Block
     b) Pixel Control Block
     c) Process Control Block
     d) Program Control Block
     e) None of these
 23.    A hybrid computer uses a _____ to convert digital signals from a computer into analog signals?
     a) Modem     b) Modulator
     c) Demodulator    d) Decoder
     e) None of these
 24.    Hyperlinks cannot be?
     a) Of special shapes like banners
     b) Pictures    c) Text
     d) Drawing objects like ovals
     e)    All of the above can be hyperlinks
 25.    Network components are connected in a linear sequence in _____ topology?
     a) Star    b) Ring
     c) Bus      d) Mesh    e) Mixed
 26.    A directory within the directory?
     a) Mini Directory
     b) Junior Directory
     c) Part Directory
     d) Sub Directory
     e) None of these
 27.    LED stands for?
     a) Laser Emitting Diode
     b) Light Emitting Diode
     c) Liquid Emitting Diode
     d) All        e) None of these
 28.    Which of the following is the mail client which works without internet?
     a) MS Access    b) MS outlook
     c) MS InfoPath    d) MS publisher
     e) Both (2) and (3)
 29.    WI-FI Stands for?
     a) Wireless facility
     b) Wireless network
     c) Wireless fidelity
     d) Features of wireless
     e) None of these
 30.    JVM converts source code in to _____ ?
     a) Source code    b) Object code
     c) Byte code    d) All
     e) None of these
 31.    A table is a collection of _____ ?
     a) Files    b) Worksheets
     c) Fields    d) Records
     e) None of these
 32.    User actions such as key strokes or mouse click are referred to as:
     a) Interrupts    b) Tasks
     c) Events    d) Processes
     e) None of these
 33.    What is the extension flash file format?
     a) .swf    b) .flm
     c) .mfh    d) .fls
     e) None of these
 34.    GSM stands for _____?
     a)    General Solutions of Multiple Access
     b)    Global system for mobile communication
     c)    Generation Subscriber Machine
     d)    Gopher Started for machine communication
     e)    None of these
 35.    Which of the following is not relate to MS-Excel?
     a) Formula    b) Function
     c) Table     d) Frame
     e) None of these
 36.    Which of the following is the Short cut to open New Slide _____ ?
     a) Ctrl + M    b) Ctrl + N
     c) Ctrl + O    d) Ctrl + F
     e) Ctrl + A
 37.    _____ is the security against viruses, which monitors both incoming and outgoing traffic?
     a) Encryption    b) Spanning
     c) Firewall    d) Worms
     e) None of these
 38.    'Web Page Spoofing' is sometimes referred to as:?
     a) Spyware    b) Antivirus
     c) Phishing    d) Browsing
     e) None of these
 39.    The 'Resolution power' of a printer indicates its _____ :
     a) Speed    b) Quality
     c) Model    d) All of these
     e) None of these
 40.    The technique that extends storage capacity of main memory beyond the actual size of the main memory is called?
     a) Multitasking
     b) multiprocessing
     c) Virtual storage
     d) Cache storage    e) Switching
 41.    Internet chatting is an example?
     a) Simplex Communication
     b) Duplex Communication
     c) Half Duplex
     d) All of the above
     e) None of these
 42.    What is the name of the logic circuit which can add two binary digits?
     a) Half Adder    b) Full Adder
     c) Parallel Adder
     d) Serial Adder    e) None of these
 43.    Which of the following best defines access time?
     a)    Interval during which a program is executed by the computer
     b)    Time taken for a computer device to transfer information
     c)    Time taken for a device to transfer information from its storage system to the memory
     d)    Duration for which a user is allowed to access the computer facilities
     e)    None of the above
 44.    Who among the following developed yahoo?
     a) Dennis Ritchie
     b) David File & Jerry Yang
     c) Steve Kaze    d) Robert Kahn
     e) Larry page & Sergy Brin
 45.    Wireless communication is an example of which of the following mode of transmission?
     a) Simplex    b) Half duplex
     c) Duplex    d) Both b and c
     e) None of the above
 46.    Which of the following is not associated with hard disk technology?
     a) SATA     b) IDE
     c) UDMA    d) ATA    e) WAP
 47.    Which of the following best defines Operating System?
     a)    An interface between hardware and software
     b)    An interface between hardware and application program
     c)    An interface between user and an application program
     d)    All of the above
     e)    None of the above
 48.    Which of the following is merely an output device and has no processing capabilities?
     a) Personal Computer
     b) Node    c) Dumb Terminal
     d) Server    
     e) None of the above
 49.    If the data is to be stored into a secondary storage medium it must be:
     a) Partitioned    b) Defragmented
     c) Formatted    d) Labeled
     e) None of the above
 50.    In MS Word, a redline under a word indicates
     a) Grammar mistake
     b) Spelling Mistake
     c) No Mistakes
     d) Virus Infection
     e) None of the above
 
 Answers
     1. a    2. c    3. b    4. a    5. e
     6. a    7. c    8. c    9. c    10. c
     11. b    12. b    13. b    14. a    15. e
     16. a    17. c    18. b    19. b     20. c
     21. d    22. c    23. a    24. e    25. c
     26. d    27. b    28. b    29. c    30. c
     31. d    32. c    33. a    34. b    35. d
     36. a    37. c    38. c    39. b    40. c
     41. b    42. a    43. c    44. b    45. b
     46. e    47. d    48. c    49. c    50. b