1. If you are working in English (US), Chinese or Japanese, Excel 2002 can speak data as you enter it, to help you verify accuracy. How do you activate the feature?
1) Point to Speech on the Tool menu, and then click Show Text To Speech Toolbar.
2) Click validation on the data menu.
3) Point to speech on the tools menu, and then click speech recognition.
4) All of the above
5) None of these
2. ...... are a type of inexpensive digital camera that remains tethered to a computer and are used for video conferencing, video chatting and live web broadcast.
1) Webcams
2) Webpicks
3) Browser cams
4) Browser pics
5) None
3. Which of the following statements is true?
1) To insert link in Ms Excel, Ctrl + K is used.
2) One can edit selected cell in Excel by pressing the F2 key.
3) Shift + space is used to select the entire row in Excel.
4) Ctrl + space is used to select the entire column in Excel.
5) All 1), 2), 3) and 4) are true
4. For multiple selection in any file system you have..
1) Radio button
2) Local area network
3) Notification area
4) Yes/ No box
5) None
5. A(n) ...... is a private corporate network used exclusively by company employees.
1) Internet
2) Local area network
3) Peer-to-peer
4) Intranet
5) None
6. Which of the following is the characteristic of a file server?
1) It manages file operations and is shared on a network.
2) It manages file operations and is limited to one PC.
3) It acts as fat client and is shared on a network.
4) It acts as fat client and is limited to one PC.
5) None of these
7. The && and operators.........
1) compare two numeric values
2) combine two numeric values
3) combine two Boolean values
4) All the above
5) None of these
8. Advantage of X.25 network is that...
1) frame delivery is more reliable
2) frames are delivered in order
3) flow control is provided
4) All the above
5) None of these
9. A ........ is a pre-designed document that already has co-ordinating fonts, a layout, and
a background.
1) guide
2) model
3) ruler
4) template
5) None of these
10. An output device that lets you see what the computer is doing is called....
1) a disk drive
2) monitor screen
3) shift key
4) printer
5) None of these
11. Computer's hard disk is....
1) an arithmetic and logical unit
2) computer software
3) operating system
4) computer hardware
5) None of these
12. To make a notebook act as a desktop model, the notebook can be connected to a ...... which
is connected to a monitor and other devices.
1) bay
2) docking station
3) port
4) network
5) None of these
13. Each cell in a Microsoft Office Excel document is referred to by its cell address, which
is the...
1) cell's column label
2) cell's column label and worksheet tab menu
3) cell's row
4) cell's row and column labels
5) None
14. The secret code that restricts entry to some programs is called.....
1) password
2) passport
3) entry-code
4) access-code
5) None of these
15. ...... is a field that uniquely identifies which person, thing or event the record describes
1) File
2) Data
3) Folder
4) Key
5) None
16. The .... directory is mandatory for every disk.
1) Root
2) Base
3) Sub
4) Case
5) None of these
17. You must install a ..... on a network if you want to share a Broadband Internet connection.
1) router
2) modem
3) node
4) cable
5) None of these
18. This can be another word of a program...
1) software
2) disk
3) floppy
4) hardware
5) None of these
19. First Technopark in India is in....
1) Bangalore
2) Kolkata
3) Thiruvananthapuram
4) Delhi
5) None
20. The simultaneous processing of two or more programs by a multiple processor is known as
1) Multiprogramming
2) Multitasking
3) Time sharing
4) Multiprocessing
5) None of these
ANSWERS:
1-1, 2-1, 3-5, 4-2, 5-4, 6-1, 7-3, 8-4, 9-4, 10-2
11-4, 12-2, 13-4, 14-1, 15-4, 16-1, 17-1, 18-1, 19-3, 20-4
Computer Knowledge is highly scoring section in IBPS POs and RRB (Regional Rural Banks) Examinations. All the questions will be from well known concepts such as Computer Terminology, Basic Computer Architecture, Internet, MS-Office, E-Commerce, Computer Network etc. The questions may be theoretical and also require knowledge of facts and application.
Sunday, 26 October 2014
Sunday, 19 October 2014
COMPUTER AWARENESS PRACTICE MCQs FOR ALL BANK EXAMS
1. We cannot delete the ____ icon, but we can made it invisible.
a) Recycle
b) My Computer
c) Internet explorer
d) All the above
e) None of the above
2. What is the meaning of 'Hibernate' in Windows XP/ Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications
e) Restart the computers all the running applications
3. The RF communication can be broadly classified in how many types?
a) Three
b) Four
c) Two
d) Six
e) Ten
4. _____ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by invoking methods on their handles.
a) Windows NT
b) Windows XP
c) Windows VISTA
d) Windows 95/98
e) Windows 7
5. Which of the following is not available on the Ruler of MS Word screen?
a) Tab stop box
b) Left Indent
c) Right Indent
d) Center Indent
e) All of them are available on ruler
6. In OSI network architecture, the dialogue control and token management are responsibility of __
a) session layer
b) network layer
c) transport layer
d) data link layer
e) None of the above
7. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Average case
d) Null case
e) All of the above
8. A computer program that converts an entire program into machine language is called a/ an
a) Interpreter
b) Simulator
c) Compiler
d) Commander
e) Proposer
9. Which of the following formulas will Excel not be able to calculate?
a) =SUM(Sales)−A3
b) =SUM(A1:A5)*.5
c) =SUM(A1:A5)/(10−10)
d) =SUM(A1:A5)−10
e) = SUM(A1:A5)−A5
10. What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?
a) Customer relationship management systems cards
b) E-government identity cards
c) FEDI cards
d) Smart cards
e) Aadhar card
11. What is the shortcut key you can press to create a copyright symbol?
a) Alt+Ctrl+C
b) Alt + C
c) Ctrl + C
d) Ctrl + Shift + C
e) Ctrl + Shift + D
12. During software development which factor is most crucial?
a) People
b) Process
c) Product
d) Project
e) Purpose
13. How many OSI layers are covered in the X.25 standard?
a) Two
b) Three
c) Seven
d) Six
e) eight
14. The transmission signal coding method of TI carrier is called ___
a) Bipolar
b) NRZ
c) Manchester
d) Binary
e) Bit
15. The idea of MFC document architecture was created by:
a) Microsoft
b) Oracle
c) Xerox
d) IBM
e) Java
16. What is the name of the display feature that highlights are of the screen which requires operator
attention?
a) Pixel
b) Reverse video
c) Touch screen
d) Cursor
e) Image
17. What kind of architecture does mobile computing deploy?
a) Two layered
b) Three layered
c) Four layered
d) Five layered
e) Six layered
18. A word processor would most likely be used to do ___
a) Keep an account of money spent
b) Do a computer search in media center
c) Maintain an inventory
d) Type a biography
e) All the above
19. SDLC stands for?
a) Software Design Life Cycle
b) Software Development Life Cycle
c) System Design Life Cycle
d) System Development Life Cycle
e) None of these
20. When a subroutine is called, the address of the instruction following the CALL instructions
stored in/ on the ___
a) stack pointer
b) accumulator
c) program counter
d) stack
e) pointer
21. What component of .NET includes services used to support web services?
a) Platform
b) Framework
c) Visual Studio
d) System
e) Mather board
22. Which of the following is not one of the four primary focuses of e-government?
a) G2G
b) G2B
c) IG2B
d) IG2G
e) IG2I
23. ____is not a category of EPS.
a) E banking
b) Direct payments
c) Retailing payments
d) Cash on delivery
e) All of these
24. One of the distinguished features of super-computer over other category of computer is ____
a) parallel processing
b) highest accuracy level
c) more speed
d) more capacity
e) less speed
25. Which class is used to control the data being used by application?
a) Document class
b) View class
c) Frame class
d) Application class
e) Software class
26. What is the control unit's function in the CPU?
a) Transfers data to primary storage
b) Stores program instruction
c) Performs logic operations
d) Decodes program instruction
e) Performs logic storage
27. Which of the following is the most common method for online payment?
a) Card based system
b) Cheque based system
c) e cash system
d) All the above
e) None of the above
28. Which of the following is not a product matrix?
a) Size
b) Reliability
c) Productivity
d) Functionality
e) Quality
29. Which of the following transmission systems provide the highest data rate in individual device?
a) Computer bus
b) Telephone lines
c) Voice and mode
d) Lease lines
e) Only voice
30. The most common addressing techniques employed by a CPU is ___
a) Immediate
b) Direct
c) Indirect
d) Register
e) All of the above
31. The key F12 opens a:
a) Save As dialog box
b) Open dialog box
c) Save dialog box
d) Close dialog box
e) Edit dialog box
32. Which of the following signal is not standard RS-232-C signal?
a) VDR
b) RTS
c) CTS
d) DSR
e) DLR
33. The indirect change of the values of a variable in one module by another module is called ___
a) internal change
b) inter-module change
c) side effect
d) side-module update
e) internal effect
34. Operating system is also known as:
a) Database
b) System software
c) Hardware
d) Printer
e) Operating system
35. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
a) Leech
b) Squid
c) Slug
d) Glitch
e) Bug
36. What happens if you press Ctrl + Shift + F8?
a) It activates extended selection
b) It activates the rectangular selection
c) It selects the paragraph on which the insertion line is
d) All of the above
e) None of the above
37. Which of the following is the latest version of Excel?
a) Excel 2000
b) Excel 2002
c) Excel ME
d) Excel 7
e) Excel XP
38. Which of the following statement is correct?
a) Terminal section of a synchronous modem contains the scrambler
b) Receiver section of a synchronous modem contains the scrambler
c) Transmission section of a synchronous modem contains the scrambler
d) Control section of a synchronous modem contains the scrambler
e) None of the above
39. Human beings are referred to as Homo sapiens, which device is called Silico Sapiens?
a) Monitor
b) Hardware
c) Robot
d) Computer
e) Mouse
40. ____ share characteristics with both hardware and software.
a) Operating system
b) Software
c) Data
d) File
e) None
ANSWERS:
1) a 2) d 3) a 4) a 5) d 6) a 7) d 8) c 9) a 10) d
11) a 12) a 13) b 14) a 15) c 16) b 17) b 18) d 19) b 20) d
21) b 22) c 23) d 24) c 25) a 26) d 27) a 28) c 29) a 30) e
31) a 32) a 33) c 34) b 35) d 36) b 37) e 38) c 39) d 40) a
a) Recycle
b) My Computer
c) Internet explorer
d) All the above
e) None of the above
2. What is the meaning of 'Hibernate' in Windows XP/ Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications
e) Restart the computers all the running applications
3. The RF communication can be broadly classified in how many types?
a) Three
b) Four
c) Two
d) Six
e) Ten
4. _____ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by invoking methods on their handles.
a) Windows NT
b) Windows XP
c) Windows VISTA
d) Windows 95/98
e) Windows 7
5. Which of the following is not available on the Ruler of MS Word screen?
a) Tab stop box
b) Left Indent
c) Right Indent
d) Center Indent
e) All of them are available on ruler
6. In OSI network architecture, the dialogue control and token management are responsibility of __
a) session layer
b) network layer
c) transport layer
d) data link layer
e) None of the above
7. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Average case
d) Null case
e) All of the above
8. A computer program that converts an entire program into machine language is called a/ an
a) Interpreter
b) Simulator
c) Compiler
d) Commander
e) Proposer
9. Which of the following formulas will Excel not be able to calculate?
a) =SUM(Sales)−A3
b) =SUM(A1:A5)*.5
c) =SUM(A1:A5)/(10−10)
d) =SUM(A1:A5)−10
e) = SUM(A1:A5)−A5
10. What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored?
a) Customer relationship management systems cards
b) E-government identity cards
c) FEDI cards
d) Smart cards
e) Aadhar card
11. What is the shortcut key you can press to create a copyright symbol?
a) Alt+Ctrl+C
b) Alt + C
c) Ctrl + C
d) Ctrl + Shift + C
e) Ctrl + Shift + D
12. During software development which factor is most crucial?
a) People
b) Process
c) Product
d) Project
e) Purpose
13. How many OSI layers are covered in the X.25 standard?
a) Two
b) Three
c) Seven
d) Six
e) eight
14. The transmission signal coding method of TI carrier is called ___
a) Bipolar
b) NRZ
c) Manchester
d) Binary
e) Bit
15. The idea of MFC document architecture was created by:
a) Microsoft
b) Oracle
c) Xerox
d) IBM
e) Java
16. What is the name of the display feature that highlights are of the screen which requires operator
attention?
a) Pixel
b) Reverse video
c) Touch screen
d) Cursor
e) Image
17. What kind of architecture does mobile computing deploy?
a) Two layered
b) Three layered
c) Four layered
d) Five layered
e) Six layered
18. A word processor would most likely be used to do ___
a) Keep an account of money spent
b) Do a computer search in media center
c) Maintain an inventory
d) Type a biography
e) All the above
19. SDLC stands for?
a) Software Design Life Cycle
b) Software Development Life Cycle
c) System Design Life Cycle
d) System Development Life Cycle
e) None of these
20. When a subroutine is called, the address of the instruction following the CALL instructions
stored in/ on the ___
a) stack pointer
b) accumulator
c) program counter
d) stack
e) pointer
21. What component of .NET includes services used to support web services?
a) Platform
b) Framework
c) Visual Studio
d) System
e) Mather board
22. Which of the following is not one of the four primary focuses of e-government?
a) G2G
b) G2B
c) IG2B
d) IG2G
e) IG2I
23. ____is not a category of EPS.
a) E banking
b) Direct payments
c) Retailing payments
d) Cash on delivery
e) All of these
24. One of the distinguished features of super-computer over other category of computer is ____
a) parallel processing
b) highest accuracy level
c) more speed
d) more capacity
e) less speed
25. Which class is used to control the data being used by application?
a) Document class
b) View class
c) Frame class
d) Application class
e) Software class
26. What is the control unit's function in the CPU?
a) Transfers data to primary storage
b) Stores program instruction
c) Performs logic operations
d) Decodes program instruction
e) Performs logic storage
27. Which of the following is the most common method for online payment?
a) Card based system
b) Cheque based system
c) e cash system
d) All the above
e) None of the above
28. Which of the following is not a product matrix?
a) Size
b) Reliability
c) Productivity
d) Functionality
e) Quality
29. Which of the following transmission systems provide the highest data rate in individual device?
a) Computer bus
b) Telephone lines
c) Voice and mode
d) Lease lines
e) Only voice
30. The most common addressing techniques employed by a CPU is ___
a) Immediate
b) Direct
c) Indirect
d) Register
e) All of the above
31. The key F12 opens a:
a) Save As dialog box
b) Open dialog box
c) Save dialog box
d) Close dialog box
e) Edit dialog box
32. Which of the following signal is not standard RS-232-C signal?
a) VDR
b) RTS
c) CTS
d) DSR
e) DLR
33. The indirect change of the values of a variable in one module by another module is called ___
a) internal change
b) inter-module change
c) side effect
d) side-module update
e) internal effect
34. Operating system is also known as:
a) Database
b) System software
c) Hardware
d) Printer
e) Operating system
35. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
a) Leech
b) Squid
c) Slug
d) Glitch
e) Bug
36. What happens if you press Ctrl + Shift + F8?
a) It activates extended selection
b) It activates the rectangular selection
c) It selects the paragraph on which the insertion line is
d) All of the above
e) None of the above
37. Which of the following is the latest version of Excel?
a) Excel 2000
b) Excel 2002
c) Excel ME
d) Excel 7
e) Excel XP
38. Which of the following statement is correct?
a) Terminal section of a synchronous modem contains the scrambler
b) Receiver section of a synchronous modem contains the scrambler
c) Transmission section of a synchronous modem contains the scrambler
d) Control section of a synchronous modem contains the scrambler
e) None of the above
39. Human beings are referred to as Homo sapiens, which device is called Silico Sapiens?
a) Monitor
b) Hardware
c) Robot
d) Computer
e) Mouse
40. ____ share characteristics with both hardware and software.
a) Operating system
b) Software
c) Data
d) File
e) None
ANSWERS:
1) a 2) d 3) a 4) a 5) d 6) a 7) d 8) c 9) a 10) d
11) a 12) a 13) b 14) a 15) c 16) b 17) b 18) d 19) b 20) d
21) b 22) c 23) d 24) c 25) a 26) d 27) a 28) c 29) a 30) e
31) a 32) a 33) c 34) b 35) d 36) b 37) e 38) c 39) d 40) a
Monday, 13 October 2014
Computer Knowledge Practice Questions for Bank Exams
1. What is an 'internet'?
1) Internal internet used to transfer information internally.
2) Internal internet used to transfer information to the outside company.
3) Internal network designed to serve the internal informational needs of a single organisation.
4) Internal network designed to transfer the information between two organisations.
5) None of the above
2. To send another station a message, the main thing a user has to know is
1) how the network works
2) the other station's address
3) whether the network is packet-switched or circuit - switched
4) whether this is a voice or data network
5) None of the above
3. The data base administrator's function in an organization is
1) to be responsible for the more technical aspects of managing the information contained in organizational databases.
2) to be responsible for the executive level aspects of decisions regarding the information management
3) to show the relationship among entity classes in a data warehouse
4) to define which data mining tools must be used to extract data
5) None of the above
4. A ...... is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these
5. Each of the following is a true statement except
1) online systems continually update the master file
2) in online processing, the user enters transactions into a device that is directly connected to the computer system
3) batch processing is still used today in older systems or in some systems with massive volumes of transactions
4) information in batch systems will always be up-to-date
5) None of the above
6. When you save a presentation, ............
1) all slides in a presentation are saved in the same file
2) two files are created; one for graphics and one for content
3) a file is created for each slide
4) a file is created for each animation or graphic
5) None of the above
7. In a client/ server model, a client program
1) asks for information
2) provides information and files
3) serves software files to other computers
4) distributes data files to other computers
5) None of the above
8. Every device on the internet has a unique ....... address (also called an ‘Internet address’) that identifies it in the same way that a street address identifies the location of a house.
1) DH
2) DA
3) IP
4) IA
5) None
9. In a customer data base a customer’s surname would be keyed into a...
1) row
2) text field
3) record
4) computed field
5) None of these
10. A set of interrelated components that collect, process, store and distribute information to support decision making and control in an organization best defines
1) communications technology
2) a network
3) an information system
4) hardware
5) None of the above
11. Control in design of an information system is used to
1) inspect the system and check that it is built as per specifications
2) ensure that the system processes data as it was designed to and that the results are reliable
3) ensure privacy of data processed by it
4) protect data from accidental or intentional loss
5) None of the above
12. Storing same data in many places is called
1) iteration
2) concurrency
3) redundancy
4) enumeration
5) None of these
13. Which of the following is the first step in the 'transaction processing cycle', which captures business data through various modes such as optical scanning or at an electronic commerce website?
1) Document and report generation
2) Database maintenance
3) Transaction processing
4) Data Entry
5) None of the above
14. What is part of a database that holds only one type of information?
1) Report
2) Field
3) Record
4) File
5) None
15. 'MPG' extension refers usually to what kind of file?
1) Word Perfect Document file
2) MS Office document
3) Animation/ movie file
4) Image file
5) None of these
16. If you want to secure a message, use a(n):
1) cryptology source
2) encryption key
3) encryption software package
4) cryptosystem
5) None of these
17. Which key do you press to check spelling?
1) F3
2) F5
3) F7
4) F9
5) None
18. Which area in an Excel window allows entering values and formulas?
1) Title Bar
2) Menu Bar
3) Formula Bar
4) Standard Tool Bar
5) None of these
19. Which of the following helps to reduce spelling error in the document?
1) Auto Format
2) Auto Correct
3) Smart Tags
4) Auto Text
5) None
20. Which of the following is valid IP address?
1) 984.12.787.76
2) 192.168.321.10
3) 1.888.234.3456
4) 192.168.56.115
5) None of these
ANSWERS:
1-1, 2-2, 3-1, 4-2, 5-4, 6-1, 7-4, 8-3, 9-3, 10-3
11-2, 12-3, 13-4, 14-2, 15-3, 16-4, 17-3, 18-3, 19-2, 20-4.
1) Internal internet used to transfer information internally.
2) Internal internet used to transfer information to the outside company.
3) Internal network designed to serve the internal informational needs of a single organisation.
4) Internal network designed to transfer the information between two organisations.
5) None of the above
2. To send another station a message, the main thing a user has to know is
1) how the network works
2) the other station's address
3) whether the network is packet-switched or circuit - switched
4) whether this is a voice or data network
5) None of the above
3. The data base administrator's function in an organization is
1) to be responsible for the more technical aspects of managing the information contained in organizational databases.
2) to be responsible for the executive level aspects of decisions regarding the information management
3) to show the relationship among entity classes in a data warehouse
4) to define which data mining tools must be used to extract data
5) None of the above
4. A ...... is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these
5. Each of the following is a true statement except
1) online systems continually update the master file
2) in online processing, the user enters transactions into a device that is directly connected to the computer system
3) batch processing is still used today in older systems or in some systems with massive volumes of transactions
4) information in batch systems will always be up-to-date
5) None of the above
6. When you save a presentation, ............
1) all slides in a presentation are saved in the same file
2) two files are created; one for graphics and one for content
3) a file is created for each slide
4) a file is created for each animation or graphic
5) None of the above
7. In a client/ server model, a client program
1) asks for information
2) provides information and files
3) serves software files to other computers
4) distributes data files to other computers
5) None of the above
8. Every device on the internet has a unique ....... address (also called an ‘Internet address’) that identifies it in the same way that a street address identifies the location of a house.
1) DH
2) DA
3) IP
4) IA
5) None
9. In a customer data base a customer’s surname would be keyed into a...
1) row
2) text field
3) record
4) computed field
5) None of these
10. A set of interrelated components that collect, process, store and distribute information to support decision making and control in an organization best defines
1) communications technology
2) a network
3) an information system
4) hardware
5) None of the above
11. Control in design of an information system is used to
1) inspect the system and check that it is built as per specifications
2) ensure that the system processes data as it was designed to and that the results are reliable
3) ensure privacy of data processed by it
4) protect data from accidental or intentional loss
5) None of the above
12. Storing same data in many places is called
1) iteration
2) concurrency
3) redundancy
4) enumeration
5) None of these
13. Which of the following is the first step in the 'transaction processing cycle', which captures business data through various modes such as optical scanning or at an electronic commerce website?
1) Document and report generation
2) Database maintenance
3) Transaction processing
4) Data Entry
5) None of the above
14. What is part of a database that holds only one type of information?
1) Report
2) Field
3) Record
4) File
5) None
15. 'MPG' extension refers usually to what kind of file?
1) Word Perfect Document file
2) MS Office document
3) Animation/ movie file
4) Image file
5) None of these
16. If you want to secure a message, use a(n):
1) cryptology source
2) encryption key
3) encryption software package
4) cryptosystem
5) None of these
17. Which key do you press to check spelling?
1) F3
2) F5
3) F7
4) F9
5) None
18. Which area in an Excel window allows entering values and formulas?
1) Title Bar
2) Menu Bar
3) Formula Bar
4) Standard Tool Bar
5) None of these
19. Which of the following helps to reduce spelling error in the document?
1) Auto Format
2) Auto Correct
3) Smart Tags
4) Auto Text
5) None
20. Which of the following is valid IP address?
1) 984.12.787.76
2) 192.168.321.10
3) 1.888.234.3456
4) 192.168.56.115
5) None of these
ANSWERS:
1-1, 2-2, 3-1, 4-2, 5-4, 6-1, 7-4, 8-3, 9-3, 10-3
11-2, 12-3, 13-4, 14-2, 15-3, 16-4, 17-3, 18-3, 19-2, 20-4.
Wednesday, 1 October 2014
COMPUTER AWARENESS PRACTICE QUESTIONS FOR ALL BANK EXAMS
1. India's largest wide area network is:
a) INDONET
b) NICNET
c) INET
d) SWIFT
e) Beam
2. A computer system consists of several devices like CPU, monitor, mouse etc. together they are called:
a) computer peripherals
b) computer components
c) computer bits
d) computer equipments
e) none of the above
3. Number of devices supported by LAN can be maximum of:
a) 7
b) 12
c) 100
d) 1000
e) 25
4. An information system that immediately responds to the physical systems is called:
a) Live system
b) On-line System
c) Off-line system
d) Real time system
e) none
5. Route adopted by large companies for payment of dividends to shareholders is called
a) ECS Debit
b) RTGS
c) ECS Credit
d) either (b) or (c)
e) either (a) or (c)
6. Which combination of keys needs to be pressed to make a percent sign?
a) Shift+2
b) Shift+3
c) Shift+4
d) Shift+5
e) Shift+9
7. Which function calculates the largest value in a set of numbers?
a) Average
b) Count
c) Minimum
d) Maximum
e) None of these
8. Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?
a) Daughter board
b) Motherboard
c) Father board
d) Breadboard
e) CPU
9. MB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tan don, operating system from Microsoft, the printer from Epson and the application
software from everywhere. Can you name the country which contributed the video display?
a) India
b) China
c) Germany
d) Taiwan
e) Japan
10. What is meant by a dedicated computer?
a) Which is used by one person only
b) Which is assigned one and only one task
c) Which uses one kind of software
d) Which is meant for application software
e) All the above
11. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
a) 1978
b) 1984
c) 1990
d) 1989
e) 1991
12. The information stored in storage devices can be accessed in ______
a) RAM access & ROM access
b) Memory access & Disk access
c) Random access & shift access
d) Sequential access & Direct access
e) All the above
13. Which of the following is the most commonly used encoding standard of Unicode?
a) UTF-6
b) UTF-7
c) UTF-5
d) UTF-9
e) UTF-8
14. UML is stands for
a) Universal Modelling Language
b) Unified Modelling Language
c) United Modelling Language
d) Unit Modelling Language
e) Uni Modelling Language
15. Which of the following translator program converts assembly language program to object program?
a) assembler
b) compiler
c) microprocessor
d) linker
e) sender
16. Which protocol is used to transfer web pages?
a) TCP/IP
b) SMTP
c) POP3
d) HTTP
e) HPTP
17. A self-sufficient computer that acts as both a server and a client is known as
a) Host
b) Client
c) Server
d) Terminal
e) Peer
18. The interactive transmission of data within a time sharing system may be best suited to
a) simplex lines
b) half-duplex lines
c) full duplex lines
d) bi flex-lines
e) tri flex lines
19. A system program that sets up an executable program in main memory ready for execution is
a) assembler
b) linker
c) compiler
d) Coding
e) loader
20. A table can be logically connected to another table by defining a
a) Super key
b) Candidate key
c) Primary key
d) Unique key
e) Common attribute.
21. Missing slot covers on a computer can cause?
a) Over heat
b) Power surges
c) EMI
d)Incomplete path for ESD
e) None of the above
22. From what location are the 1st computer instructions available on boot up?
a) ROM BIOS
b) CPU
c) boot.ini
d) CONFIG.SYS
e) .bat
23. Acollaborative network that uses Internet Technology to link business with their suppliers is ---
a) Internet
b) Intranet
c) Extranet
d) WAN
e) LAN
24. Open Systems Interconnection (OSI) Model consists of -
a) 5-layers
b) 6-layers
c) 7-layers
d) 8-layers
e) 9-layers
25. A communication processor that connects dissimilar networks by providing the translation from
one set of protocol to another is -
a) Bridge
b) Gateway
c) Router
d) Modem
e) CPU
26. A collection of raw facts is called -
a) Output
b) Information
c) Bits
d) Data
e) Files
27. A __ is an additional set of commands that the computer displays after you make a selection from the main menu.
a) dialog box
b) submenu
c) menu selection
d) all the above
e) None
28. What is the permanent memory built into your computer called?
a) RAM
b) Floppy
c) CPU
d) ROM
e) Hard disk
29. Storage that retains its data after the power is turned off is referred to as
a) volatile storage
b) non-volatile storage
c) sequential storage
d) direct storage
e) indirect storage
30. Which of the following is an example of connectivity?
a) internet
b) floppy disk
c) power card
d) data
e) file
31. ___ is the process of finding errors in software code.
a) Compiling
b) Testing
c) Running
d) Debugging
e) Marking
32. Which of the following is not as language for computer programming
a) Windows
b) PASCAL
c) BASIC
d) COBOL
e) .net
33. ____is the process of dividing the disk into tracks and sectors.
a) Tracking
b) Formatting
c) Crashing
d) Allotting
e) Storing
34. What is the shortcut key to "Undo" the last action in a document?
a) Ctrl + X
b) Ctrl + y
c) Ctrl + Z
d) Ctrl + U
e) Ctrl + V
35. The language that the computer can understand and execute is called
a) machine language
b) application software
c) system program
d) all of these
e) none of these
36. Which of the following is not hardware
a) magnetic tape
b) printer
c) VDU terminal
d) assembler
e) pointer
37. What are the basic types of memory that your computer uses
a) RAM
b) RW/RAM
c) ROM
d) both A and C
e) both A,B and C
38. The total set of interlinked hypertext documents worldwide is
a) HTTP
b) Browser
c) WWW
d) B2B
e) B2A
39. The ___ enables you to simultaneously keep multiple Web pages open in one browser window.
a) tab box
b) pop-up helper
c) tab row
d) address bar
e) none
40. Which ports connect special types of music instruments to sound cards?
a) BUS
b) CPU
c) USB
d) MIDI
e) RAM
41. You can ____ a search by providing more information the search engine can use to select a smaller, more useful set of results.
a) refine
b) expand
c) load
d) query
e) unload
42. The primary purpose of software is to turn data into
a) web sites
b) information
c) programs
d) objects
e) web engines
43. The metal or plastic case that holds all the physical parts of the computer is the:
a) Hard disk
b) CPU
c) Mainframe
d) Platform
e) System unit
44. The difference between people with access to computers and the Internet and those without this access is known as the:
a) Digital divide
b) Internet divides
c) Web divides
d) Broadband divide
e) None
45. DSL is an example of a(n) _____ connection.
a) Network
b) Wireless
c) Slow
d) Cable
e) Broadband
46. The Analytical Engine developed during First Generation of computers used ___ as a memory unit?
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) Rooms
47. Which type of DOS program can you run to see which serial ports are detected?
a) combing
b) MSD
c) command.com
d) SDET
e) serial.chk
ANSWERS:
1) b 2) a 3) b 4) d 5) c 6) d 7) d 8) b 9) d 10) b
11) e 12) d 13) e 14) b 15) b 16) d 17) e 18) c 19) e 20) c
21) a 22) a 23) c 24) c 25) b 26) d 27) a 28) d 29) b 30) a
31) b 32) a 33) b 34) c 35) a 36) d 37) d 38) a 39) c 40) b
41) a 42) b 43) e 44) a 45) e 46) d 47) b
a) INDONET
b) NICNET
c) INET
d) SWIFT
e) Beam
2. A computer system consists of several devices like CPU, monitor, mouse etc. together they are called:
a) computer peripherals
b) computer components
c) computer bits
d) computer equipments
e) none of the above
3. Number of devices supported by LAN can be maximum of:
a) 7
b) 12
c) 100
d) 1000
e) 25
4. An information system that immediately responds to the physical systems is called:
a) Live system
b) On-line System
c) Off-line system
d) Real time system
e) none
5. Route adopted by large companies for payment of dividends to shareholders is called
a) ECS Debit
b) RTGS
c) ECS Credit
d) either (b) or (c)
e) either (a) or (c)
6. Which combination of keys needs to be pressed to make a percent sign?
a) Shift+2
b) Shift+3
c) Shift+4
d) Shift+5
e) Shift+9
7. Which function calculates the largest value in a set of numbers?
a) Average
b) Count
c) Minimum
d) Maximum
e) None of these
8. Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?
a) Daughter board
b) Motherboard
c) Father board
d) Breadboard
e) CPU
9. MB launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tan don, operating system from Microsoft, the printer from Epson and the application
software from everywhere. Can you name the country which contributed the video display?
a) India
b) China
c) Germany
d) Taiwan
e) Japan
10. What is meant by a dedicated computer?
a) Which is used by one person only
b) Which is assigned one and only one task
c) Which uses one kind of software
d) Which is meant for application software
e) All the above
11. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
a) 1978
b) 1984
c) 1990
d) 1989
e) 1991
12. The information stored in storage devices can be accessed in ______
a) RAM access & ROM access
b) Memory access & Disk access
c) Random access & shift access
d) Sequential access & Direct access
e) All the above
13. Which of the following is the most commonly used encoding standard of Unicode?
a) UTF-6
b) UTF-7
c) UTF-5
d) UTF-9
e) UTF-8
14. UML is stands for
a) Universal Modelling Language
b) Unified Modelling Language
c) United Modelling Language
d) Unit Modelling Language
e) Uni Modelling Language
15. Which of the following translator program converts assembly language program to object program?
a) assembler
b) compiler
c) microprocessor
d) linker
e) sender
16. Which protocol is used to transfer web pages?
a) TCP/IP
b) SMTP
c) POP3
d) HTTP
e) HPTP
17. A self-sufficient computer that acts as both a server and a client is known as
a) Host
b) Client
c) Server
d) Terminal
e) Peer
18. The interactive transmission of data within a time sharing system may be best suited to
a) simplex lines
b) half-duplex lines
c) full duplex lines
d) bi flex-lines
e) tri flex lines
19. A system program that sets up an executable program in main memory ready for execution is
a) assembler
b) linker
c) compiler
d) Coding
e) loader
20. A table can be logically connected to another table by defining a
a) Super key
b) Candidate key
c) Primary key
d) Unique key
e) Common attribute.
21. Missing slot covers on a computer can cause?
a) Over heat
b) Power surges
c) EMI
d)Incomplete path for ESD
e) None of the above
22. From what location are the 1st computer instructions available on boot up?
a) ROM BIOS
b) CPU
c) boot.ini
d) CONFIG.SYS
e) .bat
23. Acollaborative network that uses Internet Technology to link business with their suppliers is ---
a) Internet
b) Intranet
c) Extranet
d) WAN
e) LAN
24. Open Systems Interconnection (OSI) Model consists of -
a) 5-layers
b) 6-layers
c) 7-layers
d) 8-layers
e) 9-layers
25. A communication processor that connects dissimilar networks by providing the translation from
one set of protocol to another is -
a) Bridge
b) Gateway
c) Router
d) Modem
e) CPU
26. A collection of raw facts is called -
a) Output
b) Information
c) Bits
d) Data
e) Files
27. A __ is an additional set of commands that the computer displays after you make a selection from the main menu.
a) dialog box
b) submenu
c) menu selection
d) all the above
e) None
28. What is the permanent memory built into your computer called?
a) RAM
b) Floppy
c) CPU
d) ROM
e) Hard disk
29. Storage that retains its data after the power is turned off is referred to as
a) volatile storage
b) non-volatile storage
c) sequential storage
d) direct storage
e) indirect storage
30. Which of the following is an example of connectivity?
a) internet
b) floppy disk
c) power card
d) data
e) file
31. ___ is the process of finding errors in software code.
a) Compiling
b) Testing
c) Running
d) Debugging
e) Marking
32. Which of the following is not as language for computer programming
a) Windows
b) PASCAL
c) BASIC
d) COBOL
e) .net
33. ____is the process of dividing the disk into tracks and sectors.
a) Tracking
b) Formatting
c) Crashing
d) Allotting
e) Storing
34. What is the shortcut key to "Undo" the last action in a document?
a) Ctrl + X
b) Ctrl + y
c) Ctrl + Z
d) Ctrl + U
e) Ctrl + V
35. The language that the computer can understand and execute is called
a) machine language
b) application software
c) system program
d) all of these
e) none of these
36. Which of the following is not hardware
a) magnetic tape
b) printer
c) VDU terminal
d) assembler
e) pointer
37. What are the basic types of memory that your computer uses
a) RAM
b) RW/RAM
c) ROM
d) both A and C
e) both A,B and C
38. The total set of interlinked hypertext documents worldwide is
a) HTTP
b) Browser
c) WWW
d) B2B
e) B2A
39. The ___ enables you to simultaneously keep multiple Web pages open in one browser window.
a) tab box
b) pop-up helper
c) tab row
d) address bar
e) none
40. Which ports connect special types of music instruments to sound cards?
a) BUS
b) CPU
c) USB
d) MIDI
e) RAM
41. You can ____ a search by providing more information the search engine can use to select a smaller, more useful set of results.
a) refine
b) expand
c) load
d) query
e) unload
42. The primary purpose of software is to turn data into
a) web sites
b) information
c) programs
d) objects
e) web engines
43. The metal or plastic case that holds all the physical parts of the computer is the:
a) Hard disk
b) CPU
c) Mainframe
d) Platform
e) System unit
44. The difference between people with access to computers and the Internet and those without this access is known as the:
a) Digital divide
b) Internet divides
c) Web divides
d) Broadband divide
e) None
45. DSL is an example of a(n) _____ connection.
a) Network
b) Wireless
c) Slow
d) Cable
e) Broadband
46. The Analytical Engine developed during First Generation of computers used ___ as a memory unit?
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) Rooms
47. Which type of DOS program can you run to see which serial ports are detected?
a) combing
b) MSD
c) command.com
d) SDET
e) serial.chk
ANSWERS:
1) b 2) a 3) b 4) d 5) c 6) d 7) d 8) b 9) d 10) b
11) e 12) d 13) e 14) b 15) b 16) d 17) e 18) c 19) e 20) c
21) a 22) a 23) c 24) c 25) b 26) d 27) a 28) d 29) b 30) a
31) b 32) a 33) b 34) c 35) a 36) d 37) d 38) a 39) c 40) b
41) a 42) b 43) e 44) a 45) e 46) d 47) b
Sunday, 28 September 2014
COMPUTER AWARENESS PRACTICE QUESTIONS FOR SBI P.O. EXAM
1. The memory address of the first element of an array is called ___
a) floor address
b) foundation address
c) first address
d) base address
e) second address
2. The term "push" and "pop" is related to the ___
a) Array
b) Lists
c) Stacks
d) All the above
e) None of these
3. A data structure where elements can be added or removed at either end but not in the middle:
a) Linked lists
b) Deque
c) Stacks
d) Queues
e) Bugs
4. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Null case
d) Average case
e) Middle case
5. The operation of processing each element in the list is known as ___
a) Traversal
b) Sorting
c) Merging
d) Inserting
e) Layout
6. Human beings are referred to as Homo Sapiens, which device is called Sillico Sapien?
a) Hardware
b) Robot
c) Computer
d) Monitor
e) RAM
7. Asmall or intelligent device is so called because it contains within it a ___
a) Computer
b) Microcomputer
c) Programmable
d) Sensor
e) Cursor
8. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) Floppies
b) RAM
c) Counter Wheels
d) Cards
e) Wires
9. Which of the following devices is specially designed to forward packets to specific ports based on the packet's address?
a) Switching hub
b) Specialty hub
c) Filtering hub
d) Port hub
e) Pin hub
10. What is the Operating System used in ATM machine?
a) Windows XP
b) Windows 7
c) Linux
d) Windows 8.1
e) Windows XP or Linux based
11. BOSS is developed in which country?
a) Japan
b) USA
c) UK
d) India
e) China
12. A system call is a method by which a program makes a request to the ____
a) Input Management
b) Interrupt processing
c) Output Management
d) Operating system
e) Operating Management
13. Which of the following is the older high-level (non-assembler) programming language?
a) C
b) LISP
c) FORTRAN
d) BASIC
e) C++
14. Which device is used as the standard pointing device in a Graphical User Environment?
a) Keyboard
b) Mouse
c) Joystick
d) Trackball
e) Printer
15. The section of the CPU that is responsible for performing mathematical operations:
a) Memory
b) Register Unit
c) Control Unit
d) ALU
e) None of the above
16. Which of the following might be used by a company to satisfy its growing communication needs?
a) Front end processor
b) Multiplexer
c) Controller
d) Concentrator
e) All of the above
17. Microsoft .NET is ___
a) Open Source
b) Closed Source
c) Browser
d) Middle Source
e) All the above
18. Technical documentation is prepared by?
a) Users
b) Coders
c) Mangers
d) Marketing & sales people
e) Students
19. Comments can be added using __
a) \comments
b) /* */
c) //
d) %
e) $
20. What are the three main types of computer programming languages?
a) Machine language, assembly language, high level language
b) Imperative language, functional language, declarative language
c) COBOL, FORTRAN-77, C++
d) a and c
e) None of these
21. Which of the following network access standard is used for connecting stations to a circuitswitched network?
a) X.3
b) X.21
c) X.25
d) X.75
e) X.8
22. Which of the following is usually a special one-time operation that must be completed over a limited time period?
a) Batch
b) Patch
c) Project
d) Word
e) File
23. The latest PC keyboards use a circuit that senses the movement by the change in its capacitance. What are these keyboards called?
a) Capacitance keyboards
b) Mechanical keyboards
c) Qwerty keyboards
d) Dvorak keyboards
e) Normal keyboard
24. An IC contains 50 gates each of which consists of 6 components. Its belong to:
a) VLSI
b) LSI
c) MSI
d) SSI
e) SSC
25. Controls of data communication deal with ___
a) the communication channel
b) the computer
c) terminals
d) All of the above
e) None of the above
26. Inventory is also referred to as:
a) Stock
b) Warehouse capacity
c) Materials
d) Materials in hand
e) Storage
27. A server that can perform no other task besides network services is called ___
a) Uno server
b) Dedicated server
c) Committed server
d) Service server
e) Client server
28. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Del + P
d) Ctrl + Shift + P
e) Ctrl + P
29. The processing of an application takes place between a client and a ___ processor.
a) Front end
b) Back end
c) Middle end
d) Only a and b
e) a, b and c
30. ___ transforms one interface into another interface.
a) Program
b) Software
c) Data
d) File
e) Data Base
31. What is the full form of CRT?
a) Current Ray Tube
b) Current Ray Technology
c) Cathode Ray Tube
d) Cathode Ray Technology
e) Cat Ray Tube
32. The Analytical Engine developed during First Generation of computers used ___ as a memory
unit.
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) ROM
33. Which of the following companies is a leader in manufacture of Hard Disk Drives?
a) Samsung
b) IBM
c) Fujitsu
d) Seagate
e) Acer
34. ____ store data or information temporarily and pass it on as directed by the control unit?
a) Address
b) Register
c) Number
d) Memory
e) None of these
35. In ___ mode, the communication channel is used in both directions at the same time?
a) Full-duplex
b) Simplex
c) Half-duplex
d) Duplex
e) None of these
36. "New Comment" option can be found under ___ tab?
a) Insert
b) Data
c) Review
d) View
e) File
37. Which key moves the cursor to the beginning of the next line of text?
a) Shift
b) Enter/ return
c) Tab
d) Backspace/ delete
e) None of these
38. Identify the IP address from the following:
a) 300.215.317.3
b) 302.215@417.5
c) 202.50.20.148
d) 202-50-20-148
e) 101.50. 2 0.148
39. Which one of the following is not a/an image/ graphic file format?
a) PNG
b) GIF
c) BMP
d) GUI
e) None of these
40. In a client/ server model, a client program ___
a) asks for information
b) provides information and files
c) serves software files to other computers
d) distributes data files to other computers
e) All the above
41. Dot-matrix, DeskJet, Inkjet and Laser are all types of which computer peripherals?
a) Keyboard
b) Software
c) Monitor
d) Hardware
e) Printer
42. What is the meaning of 'Hibernate' in Windows XP / Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications.
e) None of these
ANSWERS:
1) d; 2) c; 3) b; 4) c; 5) a; 6) c; 7) d; 8) c; 9) a; 10) e;
11) c; 12) d; 13) c; 14) b; 15) d; 16) e; 17) b; 18) b; 19) d; 20) a;
21) b; 22) c; 23) a; 24) c; 25) d; 26) a; 27) b; 28) e; 29) d; 30) b;
31) c; 32) d; 33) d; 34) b; 35) a; 36) c; 37) b; 38) c; 39) d; 40) a; 41) e; 42) d.
a) floor address
b) foundation address
c) first address
d) base address
e) second address
2. The term "push" and "pop" is related to the ___
a) Array
b) Lists
c) Stacks
d) All the above
e) None of these
3. A data structure where elements can be added or removed at either end but not in the middle:
a) Linked lists
b) Deque
c) Stacks
d) Queues
e) Bugs
4. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Null case
d) Average case
e) Middle case
5. The operation of processing each element in the list is known as ___
a) Traversal
b) Sorting
c) Merging
d) Inserting
e) Layout
6. Human beings are referred to as Homo Sapiens, which device is called Sillico Sapien?
a) Hardware
b) Robot
c) Computer
d) Monitor
e) RAM
7. Asmall or intelligent device is so called because it contains within it a ___
a) Computer
b) Microcomputer
c) Programmable
d) Sensor
e) Cursor
8. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) Floppies
b) RAM
c) Counter Wheels
d) Cards
e) Wires
9. Which of the following devices is specially designed to forward packets to specific ports based on the packet's address?
a) Switching hub
b) Specialty hub
c) Filtering hub
d) Port hub
e) Pin hub
10. What is the Operating System used in ATM machine?
a) Windows XP
b) Windows 7
c) Linux
d) Windows 8.1
e) Windows XP or Linux based
11. BOSS is developed in which country?
a) Japan
b) USA
c) UK
d) India
e) China
12. A system call is a method by which a program makes a request to the ____
a) Input Management
b) Interrupt processing
c) Output Management
d) Operating system
e) Operating Management
13. Which of the following is the older high-level (non-assembler) programming language?
a) C
b) LISP
c) FORTRAN
d) BASIC
e) C++
14. Which device is used as the standard pointing device in a Graphical User Environment?
a) Keyboard
b) Mouse
c) Joystick
d) Trackball
e) Printer
15. The section of the CPU that is responsible for performing mathematical operations:
a) Memory
b) Register Unit
c) Control Unit
d) ALU
e) None of the above
16. Which of the following might be used by a company to satisfy its growing communication needs?
a) Front end processor
b) Multiplexer
c) Controller
d) Concentrator
e) All of the above
17. Microsoft .NET is ___
a) Open Source
b) Closed Source
c) Browser
d) Middle Source
e) All the above
18. Technical documentation is prepared by?
a) Users
b) Coders
c) Mangers
d) Marketing & sales people
e) Students
19. Comments can be added using __
a) \comments
b) /* */
c) //
d) %
e) $
20. What are the three main types of computer programming languages?
a) Machine language, assembly language, high level language
b) Imperative language, functional language, declarative language
c) COBOL, FORTRAN-77, C++
d) a and c
e) None of these
21. Which of the following network access standard is used for connecting stations to a circuitswitched network?
a) X.3
b) X.21
c) X.25
d) X.75
e) X.8
22. Which of the following is usually a special one-time operation that must be completed over a limited time period?
a) Batch
b) Patch
c) Project
d) Word
e) File
23. The latest PC keyboards use a circuit that senses the movement by the change in its capacitance. What are these keyboards called?
a) Capacitance keyboards
b) Mechanical keyboards
c) Qwerty keyboards
d) Dvorak keyboards
e) Normal keyboard
24. An IC contains 50 gates each of which consists of 6 components. Its belong to:
a) VLSI
b) LSI
c) MSI
d) SSI
e) SSC
25. Controls of data communication deal with ___
a) the communication channel
b) the computer
c) terminals
d) All of the above
e) None of the above
26. Inventory is also referred to as:
a) Stock
b) Warehouse capacity
c) Materials
d) Materials in hand
e) Storage
27. A server that can perform no other task besides network services is called ___
a) Uno server
b) Dedicated server
c) Committed server
d) Service server
e) Client server
28. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Del + P
d) Ctrl + Shift + P
e) Ctrl + P
29. The processing of an application takes place between a client and a ___ processor.
a) Front end
b) Back end
c) Middle end
d) Only a and b
e) a, b and c
30. ___ transforms one interface into another interface.
a) Program
b) Software
c) Data
d) File
e) Data Base
31. What is the full form of CRT?
a) Current Ray Tube
b) Current Ray Technology
c) Cathode Ray Tube
d) Cathode Ray Technology
e) Cat Ray Tube
32. The Analytical Engine developed during First Generation of computers used ___ as a memory
unit.
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) ROM
33. Which of the following companies is a leader in manufacture of Hard Disk Drives?
a) Samsung
b) IBM
c) Fujitsu
d) Seagate
e) Acer
34. ____ store data or information temporarily and pass it on as directed by the control unit?
a) Address
b) Register
c) Number
d) Memory
e) None of these
35. In ___ mode, the communication channel is used in both directions at the same time?
a) Full-duplex
b) Simplex
c) Half-duplex
d) Duplex
e) None of these
36. "New Comment" option can be found under ___ tab?
a) Insert
b) Data
c) Review
d) View
e) File
37. Which key moves the cursor to the beginning of the next line of text?
a) Shift
b) Enter/ return
c) Tab
d) Backspace/ delete
e) None of these
38. Identify the IP address from the following:
a) 300.215.317.3
b) 302.215@417.5
c) 202.50.20.148
d) 202-50-20-148
e) 101.50. 2 0.148
39. Which one of the following is not a/an image/ graphic file format?
a) PNG
b) GIF
c) BMP
d) GUI
e) None of these
40. In a client/ server model, a client program ___
a) asks for information
b) provides information and files
c) serves software files to other computers
d) distributes data files to other computers
e) All the above
41. Dot-matrix, DeskJet, Inkjet and Laser are all types of which computer peripherals?
a) Keyboard
b) Software
c) Monitor
d) Hardware
e) Printer
42. What is the meaning of 'Hibernate' in Windows XP / Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications.
e) None of these
ANSWERS:
1) d; 2) c; 3) b; 4) c; 5) a; 6) c; 7) d; 8) c; 9) a; 10) e;
11) c; 12) d; 13) c; 14) b; 15) d; 16) e; 17) b; 18) b; 19) d; 20) a;
21) b; 22) c; 23) a; 24) c; 25) d; 26) a; 27) b; 28) e; 29) d; 30) b;
31) c; 32) d; 33) d; 34) b; 35) a; 36) c; 37) b; 38) c; 39) d; 40) a; 41) e; 42) d.
Wednesday, 24 September 2014
COMPUTER KNOWLEDGE PRACTICE MCQs FOR SBI P.O. EXAM
1. The memory address of the first element of an array is called ___
a) floor address
b) foundation address
c) first address
d) base address
e) second address
2. The term "push" and "pop" is related to the ___
a) Array
b) Lists
c) Stacks
d) All the above
e) None of these
3. A data structure where elements can be added or removed at either end but not in the middle:
a) Linked lists
b) Deque
c) Stacks
d) Queues
e) Bugs
4. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Null case
d) Average case
e) Middle case
5. The operation of processing each element in the list is known as ___
a) Traversal
b) Sorting
c) Merging
d) Inserting
e) Layout
6. Human beings are referred to as Homo Sapiens, which device is called Sillico Sapien?
a) Hardware
b) Robot
c) Computer
d) Monitor
e) RAM
7. Asmall or intelligent device is so called because it contains within it a ___
a) Computer
b) Microcomputer
c) Programmable
d) Sensor
e) Cursor
8. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) Floppies
b) RAM
c) Counter Wheels
d) Cards
e) Wires
9. Which of the following devices is specially designed to forward packets to specific ports based on the packet's address?
a) Switching hub
b) Specialty hub
c) Filtering hub
d) Port hub
e) Pin hub
10. What is the Operating System used in ATM machine?
a) Windows XP
b) Windows 7
c) Linux
d) Windows 8.1
e) Windows XP or Linux based
11. BOSS is developed in which country?
a) Japan
b) USA
c) UK
d) India
e) China
12. A system call is a method by which a program makes a request to the ____
a) Input Management
b) Interrupt processing
c) Output Management
d) Operating system
e) Operating Management
13. Which of the following is the older high-level (non-assembler) programming language?
a) C
b) LISP
c) FORTRAN
d) BASIC
e) C++
14. Which device is used as the standard pointing device in a Graphical User Environment?
a) Keyboard
b) Mouse
c) Joystick
d) Trackball
e) Printer
15. The section of the CPU that is responsible for performing mathematical operations:
a) Memory
b) Register Unit
c) Control Unit
d) ALU
e) None of the above
16. Which of the following might be used by a company to satisfy its growing communication needs?
a) Front end processor
b) Multiplexer
c) Controller
d) Concentrator
e) All of the above
17. Microsoft .NET is ___
a) Open Source
b) Closed Source
c) Browser
d) Middle Source
e) All the above
18. Technical documentation is prepared by?
a) Users
b) Coders
c) Mangers
d) Marketing & sales people
e) Students
19. Comments can be added using __
a) \comments
b) /* */
c) //
d) %
e) $
20. What are the three main types of computer programming languages?
a) Machine language, assembly language, high level language
b) Imperative language, functional language, declarative language
c) COBOL, FORTRAN-77, C++
d) a and c
e) None of these
21. Which of the following network access standard is used for connecting stations to a circuitswitched network?
a) X.3
b) X.21
c) X.25
d) X.75
e) X.8
22. Which of the following is usually a special one-time operation that must be completed over a limited time period?
a) Batch
b) Patch
c) Project
d) Word
e) File
23. The latest PC keyboards use a circuit that senses the movement by the change in its capacitance. What are these keyboards called?
a) Capacitance keyboards
b) Mechanical keyboards
c) Qwerty keyboards
d) Dvorak keyboards
e) Normal keyboard
24. An IC contains 50 gates each of which consists of 6 components. Its belong to:
a) VLSI
b) LSI
c) MSI
d) SSI
e) SSC
25. Controls of data communication deal with ___
a) the communication channel
b) the computer
c) terminals
d) All of the above
e) None of the above
26. Inventory is also referred to as:
a) Stock
b) Warehouse capacity
c) Materials
d) Materials in hand
e) Storage
27. A server that can perform no other task besides network services is called ___
a) Uno server
b) Dedicated server
c) Committed server
d) Service server
e) Client server
28. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Del + P
d) Ctrl + Shift + P
e) Ctrl + P
29. The processing of an application takes place between a client and a ___ processor.
a) Front end
b) Back end
c) Middle end
d) Only a and b
e) a, b and c
30. ___ transforms one interface into another interface.
a) Program
b) Software
c) Data
d) File
e) Data Base
31. What is the full form of CRT?
a) Current Ray Tube
b) Current Ray Technology
c) Cathode Ray Tube
d) Cathode Ray Technology
e) Cat Ray Tube
32. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) ROM
33. Which of the following companies is a leader in manufacture of Hard Disk Drives?
a) Samsung
b) IBM
c) Fujitsu
d) Seagate
e) Acer
34. ____ store data or information temporarily and pass it on as directed by the control unit?
a) Address
b) Register
c) Number
d) Memory
e) None of these
35. In ___ mode, the communication channel is used in both directions at the same time?
a) Full-duplex
b) Simplex
c) Half-duplex
d) Duplex
e) None of these
36. "New Comment" option can be found under ___ tab?
a) Insert
b) Data
c) Review
d) View
e) File
37. Which key moves the cursor to the beginning of the next line of text?
a) Shift
b) Enter/ return
c) Tab
d) Backspace/ delete
e) None of these
38. Identify the IP address from the following:
a) 300.215.317.3
b) 302.215@417.5
c) 202.50.20.148
d) 202-50-20-148
e) 101.50. 2 0.148
39. Which one of the following is not a/an image/ graphic file format?
a) PNG
b) GIF
c) BMP
d) GUI
e) None of these
40. In a client/ server model, a client program ___
a) asks for information
b) provides information and files
c) serves software files to other computers
d) distributes data files to other computers
e) All the above
41. Dot-matrix, DeskJet, Inkjet and Laser are all types of which computer peripherals?
a) Keyboard
b) Software
c) Monitor
d) Hardware
e) Printer
42. What is the meaning of 'Hibernate' in Windows XP / Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications.
e) None of these
ANSWERS:
1) d; 2) c; 3) b; 4) c; 5) a; 6) c; 7) d; 8) c; 9) a; 10) e;
11) c; 12) d; 13) c; 14) b; 15) d; 16) e; 17) b; 18) b; 19) d; 20) a;
21) b; 22) c; 23) a; 24) c; 25) d; 26) a; 27) b; 28) e; 29) d; 30) b;
31) c; 32) d; 33) d; 34) b; 35) a; 36) c; 37) b; 38) c; 39) d; 40) a;
41) e; 42) d.
a) floor address
b) foundation address
c) first address
d) base address
e) second address
2. The term "push" and "pop" is related to the ___
a) Array
b) Lists
c) Stacks
d) All the above
e) None of these
3. A data structure where elements can be added or removed at either end but not in the middle:
a) Linked lists
b) Deque
c) Stacks
d) Queues
e) Bugs
4. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Null case
d) Average case
e) Middle case
5. The operation of processing each element in the list is known as ___
a) Traversal
b) Sorting
c) Merging
d) Inserting
e) Layout
6. Human beings are referred to as Homo Sapiens, which device is called Sillico Sapien?
a) Hardware
b) Robot
c) Computer
d) Monitor
e) RAM
7. Asmall or intelligent device is so called because it contains within it a ___
a) Computer
b) Microcomputer
c) Programmable
d) Sensor
e) Cursor
8. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) Floppies
b) RAM
c) Counter Wheels
d) Cards
e) Wires
9. Which of the following devices is specially designed to forward packets to specific ports based on the packet's address?
a) Switching hub
b) Specialty hub
c) Filtering hub
d) Port hub
e) Pin hub
10. What is the Operating System used in ATM machine?
a) Windows XP
b) Windows 7
c) Linux
d) Windows 8.1
e) Windows XP or Linux based
11. BOSS is developed in which country?
a) Japan
b) USA
c) UK
d) India
e) China
12. A system call is a method by which a program makes a request to the ____
a) Input Management
b) Interrupt processing
c) Output Management
d) Operating system
e) Operating Management
13. Which of the following is the older high-level (non-assembler) programming language?
a) C
b) LISP
c) FORTRAN
d) BASIC
e) C++
14. Which device is used as the standard pointing device in a Graphical User Environment?
a) Keyboard
b) Mouse
c) Joystick
d) Trackball
e) Printer
15. The section of the CPU that is responsible for performing mathematical operations:
a) Memory
b) Register Unit
c) Control Unit
d) ALU
e) None of the above
16. Which of the following might be used by a company to satisfy its growing communication needs?
a) Front end processor
b) Multiplexer
c) Controller
d) Concentrator
e) All of the above
17. Microsoft .NET is ___
a) Open Source
b) Closed Source
c) Browser
d) Middle Source
e) All the above
18. Technical documentation is prepared by?
a) Users
b) Coders
c) Mangers
d) Marketing & sales people
e) Students
19. Comments can be added using __
a) \comments
b) /* */
c) //
d) %
e) $
20. What are the three main types of computer programming languages?
a) Machine language, assembly language, high level language
b) Imperative language, functional language, declarative language
c) COBOL, FORTRAN-77, C++
d) a and c
e) None of these
21. Which of the following network access standard is used for connecting stations to a circuitswitched network?
a) X.3
b) X.21
c) X.25
d) X.75
e) X.8
22. Which of the following is usually a special one-time operation that must be completed over a limited time period?
a) Batch
b) Patch
c) Project
d) Word
e) File
23. The latest PC keyboards use a circuit that senses the movement by the change in its capacitance. What are these keyboards called?
a) Capacitance keyboards
b) Mechanical keyboards
c) Qwerty keyboards
d) Dvorak keyboards
e) Normal keyboard
24. An IC contains 50 gates each of which consists of 6 components. Its belong to:
a) VLSI
b) LSI
c) MSI
d) SSI
e) SSC
25. Controls of data communication deal with ___
a) the communication channel
b) the computer
c) terminals
d) All of the above
e) None of the above
26. Inventory is also referred to as:
a) Stock
b) Warehouse capacity
c) Materials
d) Materials in hand
e) Storage
27. A server that can perform no other task besides network services is called ___
a) Uno server
b) Dedicated server
c) Committed server
d) Service server
e) Client server
28. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Del + P
d) Ctrl + Shift + P
e) Ctrl + P
29. The processing of an application takes place between a client and a ___ processor.
a) Front end
b) Back end
c) Middle end
d) Only a and b
e) a, b and c
30. ___ transforms one interface into another interface.
a) Program
b) Software
c) Data
d) File
e) Data Base
31. What is the full form of CRT?
a) Current Ray Tube
b) Current Ray Technology
c) Cathode Ray Tube
d) Cathode Ray Technology
e) Cat Ray Tube
32. The Analytical Engine developed during First Generation of computers used ___ as a memory unit.
a) RAM
b) Floppies
c) Cards
d) Counter Wheels
e) ROM
33. Which of the following companies is a leader in manufacture of Hard Disk Drives?
a) Samsung
b) IBM
c) Fujitsu
d) Seagate
e) Acer
34. ____ store data or information temporarily and pass it on as directed by the control unit?
a) Address
b) Register
c) Number
d) Memory
e) None of these
35. In ___ mode, the communication channel is used in both directions at the same time?
a) Full-duplex
b) Simplex
c) Half-duplex
d) Duplex
e) None of these
36. "New Comment" option can be found under ___ tab?
a) Insert
b) Data
c) Review
d) View
e) File
37. Which key moves the cursor to the beginning of the next line of text?
a) Shift
b) Enter/ return
c) Tab
d) Backspace/ delete
e) None of these
38. Identify the IP address from the following:
a) 300.215.317.3
b) 302.215@417.5
c) 202.50.20.148
d) 202-50-20-148
e) 101.50. 2 0.148
39. Which one of the following is not a/an image/ graphic file format?
a) PNG
b) GIF
c) BMP
d) GUI
e) None of these
40. In a client/ server model, a client program ___
a) asks for information
b) provides information and files
c) serves software files to other computers
d) distributes data files to other computers
e) All the above
41. Dot-matrix, DeskJet, Inkjet and Laser are all types of which computer peripherals?
a) Keyboard
b) Software
c) Monitor
d) Hardware
e) Printer
42. What is the meaning of 'Hibernate' in Windows XP / Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications.
e) None of these
ANSWERS:
1) d; 2) c; 3) b; 4) c; 5) a; 6) c; 7) d; 8) c; 9) a; 10) e;
11) c; 12) d; 13) c; 14) b; 15) d; 16) e; 17) b; 18) b; 19) d; 20) a;
21) b; 22) c; 23) a; 24) c; 25) d; 26) a; 27) b; 28) e; 29) d; 30) b;
31) c; 32) d; 33) d; 34) b; 35) a; 36) c; 37) b; 38) c; 39) d; 40) a;
41) e; 42) d.
Tuesday, 16 September 2014
COMPUTER AWARENESS PRACTICE MCQs FOR ALL BANK EXAMS
1. ROM stands for
A. Random Only Memory
B. Readable Only Memory
C. Real Online Memory
D. Random Other Memory
E. Read Only Memory
2. Another name for a logic chip is
A. PROM
B. Memory
C. Microprocessor
D. ROM
E. None of these
3. The Number System based on 0 and 1 only is known as..........................
A. Binary System
B. Barter System
C. Number System
D. Hexadecimal System
E. Special System
4. The capacity of 0.5 inch floppy disk is.....
A. 1.40MB
B. 1.44GB
C. 1.40GB
D. 1.45MB
E. 1.44MB
5. Which of the following is not an integral part of computer ?
A. CPU
B. Mouse
C. Monitor
D. UPS
E. None of these
6. Which of the following is/are not part of the CPU ?
A. Primary storage
B. Registers
C. Control unit
D. ALU
E. None of these
7. The device that reconciles the differences between computers and phones is the ......
A. LAN
B. Wand reader
C. TCP/IP
D. scanner
E. modem
8. A combination of hardware and software that allows communication and electronic transfer of information between computers
A. Network
B. Backup System
C. Server
D. Peripheral
E. Modem
9. Which of the following represents the fastest data transmission speed ?
A. bandwidth
B. bps
C. gbps
D. kbps
E. mbps
10. What is a major feature of the World Wide Web that makes it simple to learn and use ?
A. Database interface
B. Graphical text interface
C. Graphical user interface
D. Point-to-Point Protocol
E. None of these
11. Which of the following is an input device that, when moved by the user on a flat surface, causes a pointer on the screen to move accordingly ?
A. Wand reader
B. Mouse
C. Keyboard
D. Bar code reader
E. Scanner
12. A bar code reader is an example of a(n}.......
A. processing device
B. storage device
C. input device
D. output device
E. printer
13. If your regularly send letters to people, what type of program would you use to create the letters ?
A. Hardware
B. System software
C. Utility software
D. Application software
E. None of these
14. Computer gets && with the help of mouse or keyboard.
A. insert
B. instructions
C. guides
D. input
E. None
15. Dot-matrix is a type of ................
A. Tape
B. Printer
C. Disk
D. Bus
E. None
16. Which of the following represents one billion characters ?
A. Byte
B. Gigabyte
C. Kilobyte
D. Megabyte
E. Terabyte
17. Which of the following menu types is also called a drop-down menu ?
A. Fly-down
B.Pop-down
C. Pop-up
D. Pull-up
E. Pull-down
18. What is an onscreen picture that represents an object, such as a program or file ?
A. Spool
B. NOS
C. Page
D. Pointer
E. Icon
19. Which of the following is not necessary to be considered computer literate ?
A. The ability to write the instructions that direct a computer
B. An awareness of the computers importance, versatility, and pervasiveness in society
C. Knowledge of what computers are and how they work
D. The ability to interact with computers using simple applications
E. None of these
20. An area of the microprocessor chip used to temporarily store instructions and data that the processor is likely to use frequently is termed a(n)....
(A) ALL
(B) Bus
(C) Cache
(D) CPU
(E) Flash
21. Kilobyte equals to how many bytes?
(A) 1000
(B) 1035
(C) 100
(D) 1008
(E) 1024
22. The central processing unit is an ex-ample of
A. peripheral
(B) an output unit
(C) software
(D) a program
(E) hardware
23. CD-ROM stands for ........
(A) Compactable Read Only Memory
(B) Compact Data Read Only Memory
(C) Compactable Disk Read Only Memo ry
(D) Compact Disk Read Only Memory
(E) Connected Disk Read Only Memory
24. Which of the following terms refers to the ability of a computer to automatically configure a new hardware component that is added to it ?
(A) Formatting
(B) Multiprocessing
(C) Multiprogramming
(D) Multitasking
(E) Plug and Play
25. Free hard-disk space used to extend the capacity of RAM is ten:
(A) Cache
(B) Flash memory
(C) ROM
(D) Virtual memory
(E) Volatile
26. Making illegal copies of copy-righted software is called ......
(A) Collaboration
(B) software piracy
(C) electronic distribution
(D) Browsing
(E) software legacy
27. What is loading the operating system into a personal computer called ?
(A) Booting
(B) Prompting
(C) Paging
(D) Interrupting
(E) Readying
28. Which of the following is not an example of application software ?
(A) Database software
(B) Graphics software
(C) Operating system software
(D) Spreadsheet software
(E) Word processing software
29. Pie charts are typically created by using which of the follow ing ?
(A) browser software
(B) database software
(C) desk-top publishing software
(D) word-processing software
(E) spreadsheet software
30. The computer to which a users computer connects in order to access the Internet is called a ........
(A) notebook
(B) PDA
(C) supercomputer
(D) server
(E) laptop
31. Which of the following domains is used by for-profit businesses ?
(A) .com
(B) .edu
(C) .mil
(D) .net
(E) .org
32. WAN stands for ...................
(A) Wired Area Network
(B) Wide Area Network
(C) Wide Array Net
(D) Wireless Area Network
(E) Wanted Area Network
33. What are lists of programs waiting to be run called ?
(A) Shells
(B) The background
(C) Queues
(D) Page frames
(E) Lists
34. An example of peripheral equipm-ent is the
(A) printer
(B) CPU
(C) spreadsheet
(D) microcomputer
(E) ALU
35. Which of the following commercial software products are examples of operating system software and application soft-ware, respectively ?
(A) Microsoft Windows XP and Microsoft Word
(B) Microsoft Office XP and Micro soft Windows XP
(C) MS DOS and Microsoft Windows XP
(D) UNIX and LINUX
(E) UNIX and Java
36. MS Excel is used for ?
(A) Letter writing
(B) Spread Sheet Calculation
(C) Presentation
(D) Painting
(E) None of these
37. Computer users who are not; computer professionals, are someti-mes called.....
(A) peripheral users
(B) programmers
(C) librarians
(D) information officers
(E) end-users
38. Desktop and personal computers are also known as.....
(A) supercomputers
(B) servers
(C) mainframes
(D) peripheral equipment
(E) microcomputers
39. The ability to exchange information through the use of computer equipment and software is
(A) Data entry
(B) The Internet
(C) Data retrieval
(D) Electronic communication
(E) None
40. A computer professional who writes and tests software is called a /an .....
(A) hardware consultant
(B) librarian
(C) programmer
(D) computer operator
(E) data entry operator
ANSWERS:
1-E, 2-C, 3-A, 4-E, 5-D, 6-E, 7-E, 8-A, 9-C, 10-C
11-B, 12-D, 13-D, 14-D, 15-B, 16-B, 17-E, 18-E, 19-E, 20-C
21-E, 22-E, 23-D, 24-E, 25-B, 26-B, 27-A, 28-C, 29-E, 30-D
31-E, 32-B, 33-D, 34-A, 35-A, 36-B, 37-E, 38-E, 39-D, 40-C
A. Random Only Memory
B. Readable Only Memory
C. Real Online Memory
D. Random Other Memory
E. Read Only Memory
2. Another name for a logic chip is
A. PROM
B. Memory
C. Microprocessor
D. ROM
E. None of these
3. The Number System based on 0 and 1 only is known as..........................
A. Binary System
B. Barter System
C. Number System
D. Hexadecimal System
E. Special System
4. The capacity of 0.5 inch floppy disk is.....
A. 1.40MB
B. 1.44GB
C. 1.40GB
D. 1.45MB
E. 1.44MB
5. Which of the following is not an integral part of computer ?
A. CPU
B. Mouse
C. Monitor
D. UPS
E. None of these
6. Which of the following is/are not part of the CPU ?
A. Primary storage
B. Registers
C. Control unit
D. ALU
E. None of these
7. The device that reconciles the differences between computers and phones is the ......
A. LAN
B. Wand reader
C. TCP/IP
D. scanner
E. modem
8. A combination of hardware and software that allows communication and electronic transfer of information between computers
A. Network
B. Backup System
C. Server
D. Peripheral
E. Modem
9. Which of the following represents the fastest data transmission speed ?
A. bandwidth
B. bps
C. gbps
D. kbps
E. mbps
10. What is a major feature of the World Wide Web that makes it simple to learn and use ?
A. Database interface
B. Graphical text interface
C. Graphical user interface
D. Point-to-Point Protocol
E. None of these
11. Which of the following is an input device that, when moved by the user on a flat surface, causes a pointer on the screen to move accordingly ?
A. Wand reader
B. Mouse
C. Keyboard
D. Bar code reader
E. Scanner
12. A bar code reader is an example of a(n}.......
A. processing device
B. storage device
C. input device
D. output device
E. printer
13. If your regularly send letters to people, what type of program would you use to create the letters ?
A. Hardware
B. System software
C. Utility software
D. Application software
E. None of these
14. Computer gets && with the help of mouse or keyboard.
A. insert
B. instructions
C. guides
D. input
E. None
15. Dot-matrix is a type of ................
A. Tape
B. Printer
C. Disk
D. Bus
E. None
16. Which of the following represents one billion characters ?
A. Byte
B. Gigabyte
C. Kilobyte
D. Megabyte
E. Terabyte
17. Which of the following menu types is also called a drop-down menu ?
A. Fly-down
B.Pop-down
C. Pop-up
D. Pull-up
E. Pull-down
18. What is an onscreen picture that represents an object, such as a program or file ?
A. Spool
B. NOS
C. Page
D. Pointer
E. Icon
19. Which of the following is not necessary to be considered computer literate ?
A. The ability to write the instructions that direct a computer
B. An awareness of the computers importance, versatility, and pervasiveness in society
C. Knowledge of what computers are and how they work
D. The ability to interact with computers using simple applications
E. None of these
20. An area of the microprocessor chip used to temporarily store instructions and data that the processor is likely to use frequently is termed a(n)....
(A) ALL
(B) Bus
(C) Cache
(D) CPU
(E) Flash
21. Kilobyte equals to how many bytes?
(A) 1000
(B) 1035
(C) 100
(D) 1008
(E) 1024
22. The central processing unit is an ex-ample of
A. peripheral
(B) an output unit
(C) software
(D) a program
(E) hardware
23. CD-ROM stands for ........
(A) Compactable Read Only Memory
(B) Compact Data Read Only Memory
(C) Compactable Disk Read Only Memo ry
(D) Compact Disk Read Only Memory
(E) Connected Disk Read Only Memory
24. Which of the following terms refers to the ability of a computer to automatically configure a new hardware component that is added to it ?
(A) Formatting
(B) Multiprocessing
(C) Multiprogramming
(D) Multitasking
(E) Plug and Play
25. Free hard-disk space used to extend the capacity of RAM is ten:
(A) Cache
(B) Flash memory
(C) ROM
(D) Virtual memory
(E) Volatile
26. Making illegal copies of copy-righted software is called ......
(A) Collaboration
(B) software piracy
(C) electronic distribution
(D) Browsing
(E) software legacy
27. What is loading the operating system into a personal computer called ?
(A) Booting
(B) Prompting
(C) Paging
(D) Interrupting
(E) Readying
28. Which of the following is not an example of application software ?
(A) Database software
(B) Graphics software
(C) Operating system software
(D) Spreadsheet software
(E) Word processing software
29. Pie charts are typically created by using which of the follow ing ?
(A) browser software
(B) database software
(C) desk-top publishing software
(D) word-processing software
(E) spreadsheet software
30. The computer to which a users computer connects in order to access the Internet is called a ........
(A) notebook
(B) PDA
(C) supercomputer
(D) server
(E) laptop
31. Which of the following domains is used by for-profit businesses ?
(A) .com
(B) .edu
(C) .mil
(D) .net
(E) .org
32. WAN stands for ...................
(A) Wired Area Network
(B) Wide Area Network
(C) Wide Array Net
(D) Wireless Area Network
(E) Wanted Area Network
33. What are lists of programs waiting to be run called ?
(A) Shells
(B) The background
(C) Queues
(D) Page frames
(E) Lists
34. An example of peripheral equipm-ent is the
(A) printer
(B) CPU
(C) spreadsheet
(D) microcomputer
(E) ALU
35. Which of the following commercial software products are examples of operating system software and application soft-ware, respectively ?
(A) Microsoft Windows XP and Microsoft Word
(B) Microsoft Office XP and Micro soft Windows XP
(C) MS DOS and Microsoft Windows XP
(D) UNIX and LINUX
(E) UNIX and Java
36. MS Excel is used for ?
(A) Letter writing
(B) Spread Sheet Calculation
(C) Presentation
(D) Painting
(E) None of these
37. Computer users who are not; computer professionals, are someti-mes called.....
(A) peripheral users
(B) programmers
(C) librarians
(D) information officers
(E) end-users
38. Desktop and personal computers are also known as.....
(A) supercomputers
(B) servers
(C) mainframes
(D) peripheral equipment
(E) microcomputers
39. The ability to exchange information through the use of computer equipment and software is
(A) Data entry
(B) The Internet
(C) Data retrieval
(D) Electronic communication
(E) None
40. A computer professional who writes and tests software is called a /an .....
(A) hardware consultant
(B) librarian
(C) programmer
(D) computer operator
(E) data entry operator
ANSWERS:
1-E, 2-C, 3-A, 4-E, 5-D, 6-E, 7-E, 8-A, 9-C, 10-C
11-B, 12-D, 13-D, 14-D, 15-B, 16-B, 17-E, 18-E, 19-E, 20-C
21-E, 22-E, 23-D, 24-E, 25-B, 26-B, 27-A, 28-C, 29-E, 30-D
31-E, 32-B, 33-D, 34-A, 35-A, 36-B, 37-E, 38-E, 39-D, 40-C
Saturday, 13 September 2014
COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR ALL BANK EXAMS
1. Which of the following is an example of non volatile memory?
1) VLSI
2) LSI
3) ROM
4) RAM
5) Hard disk
2. IEEE 802.16 popularly called ___
1) Ethernet
2) Wi-Fi
3) WIMAX
4) Wireless Network
5) None of these
3. To protect system, there are how many security levels?
1) One
2) Two
3) Three
4) Four
5) Five
4. Java was originally invented by
1) Oracle
2) Microsoft
3) Novell
4) Sun
5) IBM
5. Asmall network making up the internet and also having a small number of computers with in it is called ___
1) Host
2) Address
3) Sub domain
4) Domain
5) URL
6. The operating system of a computer serves as a software interface between the user and ___
1) Software
2) Hardware
3) Processor
4) Compiler
5) RAM
7. Both the ALU and control section of CPU employ special purpose storage locations called:
1) Decoders
2) Buffers
3) Multiplexer
4) Registers
5) Flip flops
8. The address of the next instruction to be executed by the current process is provided by the ___
1) CPU registers
2) program counter
3) process stack
4) pipe
5) coding counter
9. Which command combines the contents of one file with another?
1) Restore
2) Rename
3) Append
4) Add
5) Store
10. The ___ is the administrative section of the computer system.
1) Memory Unit
2) Input Unit
3) Central Processing Unit
4) Control Unit
5) Logic Unit
11. Coded entries which are used to gain access to a computer system are called
1) Codeword's
2) Entry codes
3) Entry words
4) Security commands
5) Data codes
12. What is the primary requisite of a good computer programmer?
1) Mathematical mind
2) Artistic mind
3) Logical mind
4) Scientific knowledge
5) Memory Knowledge
13. The errors that can be pointed out by the compiler:
1) Syntax errors
2) Internal errors
3) Semantic errors
4) Coding errors
5) Logical errors
14. Which of the following is an advantage to using fibre optics data transmission?
1) Resistance to data theft
2) Fast data transmission rate
3) Few transmission errors
4) Low noise level
5) All the above
15. Which one of the following when added can reduce the processing time of a computer?
1) A buffer
2) A co-processor
3) 1024 megabyte
4) A converter
5) 1064 megabyte
16. A program that neither replicates or copies itself, but does damage or compromises the security of the computer. Which 'Computer Virus' it is?
1) Hoax
2) Worm
3) Trojan
4) Joke program
5) Juke program
17. 'DB' computer abbreviation usually means?
1) Driver Boot
2) Double Byte
3) Data Block
4) Database
5) None of these
18. What do we call a network whose elements may be separated by some distance? It usually involves two or more small networks and dedicated high-speed telephone lines.
1) WAN (Wide Area Network)
2) World Wide Web
3) URL (Universal Resource Locator)
4) LAN (Local Area Network)
5) All the above
19. Hardware devices that are not part of the main computer system and are often added later to the system.
1) Execute
2) Highlight
3) Peripheral
4) Clip art
5) Insert
20. '.BAK' extension refers usually to what kind of file?
1) Audio file
2) MS Encarta document
3) Backup file
4) Animation/ movie file
5) Restore file
21. The main computer that stores the files that can be sent to computers that are networked together is ___
1) Clip art
2) File server
3) Peripheral
4) Mother board
5) IC
22. Which of the following word processors came first?
1) MS Word
2) Lotus Notes
3) WordPerfect
4) WordStar
5) WordPad
23. Which of the following operating systems is produced by IBM?
1) UNIX
2) Windows
3) DOS
4) OS-2
5) OS-3
24. Computers calculate numbers in what mode?
1) Decimal
2) Octal
3) Binary
4) Primary
5) Secondary
25. Which of the following software is used to view web pages?
1) Web Browser
2) Internet Browser
3) Page Browser
4) Crème Browser
5) All the above
26. ____ is the process in which a user sends computer information from his computer to another computer through modem.
1) Downloading
2) Uploading
3) Processing
4) Programming
5) Seeding
27. Which of the following is used to save the frequently visited web sites?
1) Frequent List
2) Favourites List
3) Explorer List
4) File list
5) Data list
28. Which of the following performs arithmetic and logical operations?
1) CU
2) PU
3) ALU
4) Memory
5) CPU
29. A ____ is a group of independent computers attached to one another through communication media.
1) Internet
2) E-mail
3) Network
4) Software
5) Hard ware
30. Which of the following is a presentation program?
1) MS-Word
2) MS-Excel
3) MS-Power Point
4) MS- Access
5) MS-Outlook
31. Collection of 1024 Bytes:
1) 1MB
2) 1KB
3) 1TB
4) 1GB
5) 100 MB
32. How would you be able to protect yourself from phishing?
1) Call your local fish store.
2) Get an Anti-Virus Program
3) Change Passwords Every 4-6 months
4) 2 & 3
5) All the above
33. Why is identity theft something hackers usually go for?
1) Personal Information
2) Being able to have another name
3) Send them emails
4) Take their victim's address for future use
5) All the above
34. This type of software is on computers and collects small pieces of information from users. It is also difficult to detect, what is it?
1) Spam
2) Malware
3) Phishing
4) Spyware
5) Under ware
35. Many malware programs gather information that leads to loss of privacy. How can you generally be protected from this?
1) Close window
2) Never use your computer
3) Anti-Virus Program
4) Turn Off Computer
5) Restart Computer
36. Older networks often use another type of cable, called ________
1) Unshielded twisted-pair cable
2) Coaxial cable
3) Optical Fibre
4) Twisted-pair cable
5) Data cable
37. Which device can understand difference between data & programs?
1) Input device
2) Output device
3) Memory
4) Microprocessor
5) RAM
38. Total keys keyboard is most popular
1) 123
2) 111
3) 101
4) 134
5) 143
39. What is the name of the software that allows us to browse through web pages?
1) Mail Client
2) FTP Client
3) Messenger
4) Browser
5) Server
40. Which of the following best suits the statement below? It's the main memory of the computer system and is volatile.
1) RAM
2) ROM
3) PROM
4) Primary storage
5) Secondary storage
ANSWERS:
1) 3; 2) 3; 3) 4; 4) 4 ; 5) 1; 6) 2 ; 7) 4; 8) 2; 9) 3; 10) 3;
11) 4; 12) 3; 13) 5 14) 2; 15) 2; 16) 3; 17) 4; 18) 1; 19) 3; 20) 3;
21) 2; 22) 4; 23) 4; 24) 3; 25) 1; 26) 2; 27) 2; 28) 3; 29) 3; 30) 3;
31) 2; 32) 4; 33) 1; 34) 4; 35) 3; 36) 2; 37) 4; 38) 3; 39) 4; 40) 1;
1) VLSI
2) LSI
3) ROM
4) RAM
5) Hard disk
2. IEEE 802.16 popularly called ___
1) Ethernet
2) Wi-Fi
3) WIMAX
4) Wireless Network
5) None of these
3. To protect system, there are how many security levels?
1) One
2) Two
3) Three
4) Four
5) Five
4. Java was originally invented by
1) Oracle
2) Microsoft
3) Novell
4) Sun
5) IBM
5. Asmall network making up the internet and also having a small number of computers with in it is called ___
1) Host
2) Address
3) Sub domain
4) Domain
5) URL
6. The operating system of a computer serves as a software interface between the user and ___
1) Software
2) Hardware
3) Processor
4) Compiler
5) RAM
7. Both the ALU and control section of CPU employ special purpose storage locations called:
1) Decoders
2) Buffers
3) Multiplexer
4) Registers
5) Flip flops
8. The address of the next instruction to be executed by the current process is provided by the ___
1) CPU registers
2) program counter
3) process stack
4) pipe
5) coding counter
9. Which command combines the contents of one file with another?
1) Restore
2) Rename
3) Append
4) Add
5) Store
10. The ___ is the administrative section of the computer system.
1) Memory Unit
2) Input Unit
3) Central Processing Unit
4) Control Unit
5) Logic Unit
11. Coded entries which are used to gain access to a computer system are called
1) Codeword's
2) Entry codes
3) Entry words
4) Security commands
5) Data codes
12. What is the primary requisite of a good computer programmer?
1) Mathematical mind
2) Artistic mind
3) Logical mind
4) Scientific knowledge
5) Memory Knowledge
13. The errors that can be pointed out by the compiler:
1) Syntax errors
2) Internal errors
3) Semantic errors
4) Coding errors
5) Logical errors
14. Which of the following is an advantage to using fibre optics data transmission?
1) Resistance to data theft
2) Fast data transmission rate
3) Few transmission errors
4) Low noise level
5) All the above
15. Which one of the following when added can reduce the processing time of a computer?
1) A buffer
2) A co-processor
3) 1024 megabyte
4) A converter
5) 1064 megabyte
16. A program that neither replicates or copies itself, but does damage or compromises the security of the computer. Which 'Computer Virus' it is?
1) Hoax
2) Worm
3) Trojan
4) Joke program
5) Juke program
17. 'DB' computer abbreviation usually means?
1) Driver Boot
2) Double Byte
3) Data Block
4) Database
5) None of these
18. What do we call a network whose elements may be separated by some distance? It usually involves two or more small networks and dedicated high-speed telephone lines.
1) WAN (Wide Area Network)
2) World Wide Web
3) URL (Universal Resource Locator)
4) LAN (Local Area Network)
5) All the above
19. Hardware devices that are not part of the main computer system and are often added later to the system.
1) Execute
2) Highlight
3) Peripheral
4) Clip art
5) Insert
20. '.BAK' extension refers usually to what kind of file?
1) Audio file
2) MS Encarta document
3) Backup file
4) Animation/ movie file
5) Restore file
21. The main computer that stores the files that can be sent to computers that are networked together is ___
1) Clip art
2) File server
3) Peripheral
4) Mother board
5) IC
22. Which of the following word processors came first?
1) MS Word
2) Lotus Notes
3) WordPerfect
4) WordStar
5) WordPad
23. Which of the following operating systems is produced by IBM?
1) UNIX
2) Windows
3) DOS
4) OS-2
5) OS-3
24. Computers calculate numbers in what mode?
1) Decimal
2) Octal
3) Binary
4) Primary
5) Secondary
25. Which of the following software is used to view web pages?
1) Web Browser
2) Internet Browser
3) Page Browser
4) Crème Browser
5) All the above
26. ____ is the process in which a user sends computer information from his computer to another computer through modem.
1) Downloading
2) Uploading
3) Processing
4) Programming
5) Seeding
27. Which of the following is used to save the frequently visited web sites?
1) Frequent List
2) Favourites List
3) Explorer List
4) File list
5) Data list
28. Which of the following performs arithmetic and logical operations?
1) CU
2) PU
3) ALU
4) Memory
5) CPU
29. A ____ is a group of independent computers attached to one another through communication media.
1) Internet
2) E-mail
3) Network
4) Software
5) Hard ware
30. Which of the following is a presentation program?
1) MS-Word
2) MS-Excel
3) MS-Power Point
4) MS- Access
5) MS-Outlook
31. Collection of 1024 Bytes:
1) 1MB
2) 1KB
3) 1TB
4) 1GB
5) 100 MB
32. How would you be able to protect yourself from phishing?
1) Call your local fish store.
2) Get an Anti-Virus Program
3) Change Passwords Every 4-6 months
4) 2 & 3
5) All the above
33. Why is identity theft something hackers usually go for?
1) Personal Information
2) Being able to have another name
3) Send them emails
4) Take their victim's address for future use
5) All the above
34. This type of software is on computers and collects small pieces of information from users. It is also difficult to detect, what is it?
1) Spam
2) Malware
3) Phishing
4) Spyware
5) Under ware
35. Many malware programs gather information that leads to loss of privacy. How can you generally be protected from this?
1) Close window
2) Never use your computer
3) Anti-Virus Program
4) Turn Off Computer
5) Restart Computer
36. Older networks often use another type of cable, called ________
1) Unshielded twisted-pair cable
2) Coaxial cable
3) Optical Fibre
4) Twisted-pair cable
5) Data cable
37. Which device can understand difference between data & programs?
1) Input device
2) Output device
3) Memory
4) Microprocessor
5) RAM
38. Total keys keyboard is most popular
1) 123
2) 111
3) 101
4) 134
5) 143
39. What is the name of the software that allows us to browse through web pages?
1) Mail Client
2) FTP Client
3) Messenger
4) Browser
5) Server
40. Which of the following best suits the statement below? It's the main memory of the computer system and is volatile.
1) RAM
2) ROM
3) PROM
4) Primary storage
5) Secondary storage
ANSWERS:
1) 3; 2) 3; 3) 4; 4) 4 ; 5) 1; 6) 2 ; 7) 4; 8) 2; 9) 3; 10) 3;
11) 4; 12) 3; 13) 5 14) 2; 15) 2; 16) 3; 17) 4; 18) 1; 19) 3; 20) 3;
21) 2; 22) 4; 23) 4; 24) 3; 25) 1; 26) 2; 27) 2; 28) 3; 29) 3; 30) 3;
31) 2; 32) 4; 33) 1; 34) 4; 35) 3; 36) 2; 37) 4; 38) 3; 39) 4; 40) 1;
Sunday, 7 September 2014
COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR SBI P.O. EXAM
1. Which of the following condition is used to transmit two packets over a medium at the same time?
1) Contention
2) Collision
3) Synchronous
3) Asynchronous
5) None of the above
2. Which of the following is not an option of the spelling dialog box?
1) Ignore
2) Ignore all
3) Edit
4) Change
5) Select
3. Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
1) 4
2) 8
3) 16
4) 15
5) 32
4. A message with replies on a newsgroup is often called a _____
1) post
2) list
3) thread
4) comment
5) format
5. Which of the following network is used to connect a number of computers to each other by cables in a single location?
1) WAN
2) LAN
3) GAN
4) PAN
5) MAN
6. News servers utilize _____ to distribute documents to readers.
1) NNTP
2) NEWS
3) HTTP
4) FTP
5) HTML
7. The Software which contains rows and columns is called ___
1) Database
2) Drawing
3) Word processing
4) Spreadsheet
5) All the above
8. Addresses separate the user name from the ISP using the ____ symbol.
1) &
2) @
3) %
4) *
5) $
9. The ___ layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames
a) Data Link
b) Physical
c) Network
d) Session
e) MAC
10. The spelling tool is placed on ___ toolbar
1) Standard
2) Formatting
3) Drawing
4) Reviewing
5) Viewing
11. The maximum size of the window in a Sliding Window Protocol is _____
1) 2m + 1
2) 2m
3) 2(m-1)
4) 2m*1
5) 2m - 1
12. A name in the ____ name space is a sequence of characters without structure
1) address
2) oman
3) flat
4) Both a and b
5) location
13. Which of the following is not a valid Zoom percentage in Excel?
1) 10
2) 100
3) 300
4) 500
5) 750
14. Distance Vector Routing is a ____ routing algorithm; it consists of a data structure called a ____
1) Static, routing table
2) Dynamic, look-up table
3) Dynamic, routing table
4) Static, look-up table
5) dynamic, less table
15. What is the short cut key to replace a data with another in sheet?
1) Ctrl + R
2) Ctrl + Shift + R
3) Ctrl + H
4) Ctrl + F
5) Ctrl + V
16. The ___ protocol is based on end-toend delivery.
1) SCTP
2) TCP
3) SMTP
4) SCTP
5) HTTP
17. If you need to change the typeface of a document, which menu will you choose?
1) Edit
2) View
3) Tools
4) File
5) Format
18. What is the size of Network bits & Host bits of Class A of IP address?
1) Network bits 7, Host bits 24
2) Network bits 8, Host bits 24
3) Network bits 7, Host bits 23
4) Network bits 8, Host bits 23
5) Network bits 4, Host bits 25
19. ____ is a uniform naming scheme for locating resources on the web.
1) URI
2) HTTP
3) WEBNAME
4) RESOURCENAME
5) URL
20. The options like Relationship, SQL Server etc. are found in ___
1) External data tab
2) Database tools tab
3) Create tab
4) Home tab
5) Format tab
21. A Database Language Concerned with the Definition of the Whole Database Structure and Schema is ____
1) DCL
2) DML
3) DDL
4) DCO
5) DDI
22. A ____ Enables You To View Data From A Table Based On A Specific Criterion
1) Form
2) Query
3) Macro
4) Report
5) Bug
23. A____ normal form normalization will be needed where all attributes in relation tuple are not functionally dependent only on the key attribute.
1) First
2) Second
3) Third
4) Fourth
5) Fifth
24. An outstanding functionality of SQL is its support for automatic ____ to the target data.
1) programming
2) functioning
3) navigation
4) notification
5) none of these
25. The hardware component used to control the operation of a computer system is:
1) Ram
2) Processor
3) Keyboard
4) Hard disk
5) Monitor
26. Which output device is suited to presenting information that is likely to change very frequently?
1) Sound card
2) Monitor
3) Plotter
4) Printer
5) COM
27. Which is the most difficult environmentally to dispose of?
1) Floppy drives
2) Hard drives
3) Power supplies
4) CRTs
5) System boards
28. Which type of system hoard is the MOST likely candidate for processor upgrading if you want maximum performance and future compatibility?
1) ML
2) PCI
3) ISA
4) EISA
5) ISO
29. Which of the following is a type of preventative maintenance used on a hard drive?
1) Disk check diagnostics
2) Head alignment diagnostics
3) Initializing
4) Uninstalling programs
5) None of the above
30. How many IRQs does a chain of USB devices require?
1) 1
2) 2
3) 3
4) 4
5) 5
31. Which of the following addressing modes, facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears?
1) ascending
2) sorting
3) index
4) indirect
5) direct
32. Which command will be used with vi editor to replace text from cursor to right?
1) r
2) R
3) s
4) S
5) Q
33. Which of the following is not a filter?
1) cat
2) grep
3) wc
4) sort
5) None of the above
34. Which of the following commands is used to view your file 24 lines at a time?
1) pg
2) cat
3) //p
4) /p
5) ///p
35. The rise time of a pulse waveform is the time required for the voltage to rise:
1) from zero to its rms value
2) from zero to its peak value
3) from 10% of the peak value to 70.7% of the peak value
4) from 10% of the peak value to 90% of the peak value
5) from 10% of the peak value to 80% of the peak value
36. Holes are the minority carriers in which type of semiconductor?
1) Extrinsic
2) Intrinsic
3) n-type
4) p-type
5) m-type
37. While working with MS-DOS, which command is used to restore files that were backed up using the BACKUP command?
1) COPY
2) DISKCOPY
3) RESTORE
4) STORE
5) DELETE
38. Which of the following commands will take you directly to the root directory no matter what subdirectory you are currently in?
1) CD \root
2) CD\
3) CD\..
4) CD..
5) CD\\..
39. Batch files contain a group of MSDOS commands that are run in successive order. What filename extension identifies batch files?
1) COM
2) BAT
3) EXE
4) SYS
5) DOC
40. The _____ command allows you to modify the default prompt to provide other information
1) prompt
2) windows
3) cursor
4) click
5) double click
ANSWERS:
1) 2; 2) 3; 3) 4; 4) 3; 5) 5; 6) 1; 7) 4; 8) 2; 9) 1; 10) 1 ;
11) 5; 12) 3; 13) 4; 14) 3; 15) 3; 16) 3; 17) 5; 18) 1; 19) 1: 20) 2;
21) 3; 22) 2; 23) 3; 24) 3; 25) 2; 26) 2; 27) 4; 28) 2; 29) 1; 30) 1;
31) 3; 32) 2; 33) 5; 34) 1; 35) 4; 36) 3; 37) 3; 38) 2; 39) 2; 40) 1;
1) Contention
2) Collision
3) Synchronous
3) Asynchronous
5) None of the above
2. Which of the following is not an option of the spelling dialog box?
1) Ignore
2) Ignore all
3) Edit
4) Change
5) Select
3. Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
1) 4
2) 8
3) 16
4) 15
5) 32
4. A message with replies on a newsgroup is often called a _____
1) post
2) list
3) thread
4) comment
5) format
5. Which of the following network is used to connect a number of computers to each other by cables in a single location?
1) WAN
2) LAN
3) GAN
4) PAN
5) MAN
6. News servers utilize _____ to distribute documents to readers.
1) NNTP
2) NEWS
3) HTTP
4) FTP
5) HTML
7. The Software which contains rows and columns is called ___
1) Database
2) Drawing
3) Word processing
4) Spreadsheet
5) All the above
8. Addresses separate the user name from the ISP using the ____ symbol.
1) &
2) @
3) %
4) *
5) $
9. The ___ layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames
a) Data Link
b) Physical
c) Network
d) Session
e) MAC
10. The spelling tool is placed on ___ toolbar
1) Standard
2) Formatting
3) Drawing
4) Reviewing
5) Viewing
11. The maximum size of the window in a Sliding Window Protocol is _____
1) 2m + 1
2) 2m
3) 2(m-1)
4) 2m*1
5) 2m - 1
12. A name in the ____ name space is a sequence of characters without structure
1) address
2) oman
3) flat
4) Both a and b
5) location
13. Which of the following is not a valid Zoom percentage in Excel?
1) 10
2) 100
3) 300
4) 500
5) 750
14. Distance Vector Routing is a ____ routing algorithm; it consists of a data structure called a ____
1) Static, routing table
2) Dynamic, look-up table
3) Dynamic, routing table
4) Static, look-up table
5) dynamic, less table
15. What is the short cut key to replace a data with another in sheet?
1) Ctrl + R
2) Ctrl + Shift + R
3) Ctrl + H
4) Ctrl + F
5) Ctrl + V
16. The ___ protocol is based on end-toend delivery.
1) SCTP
2) TCP
3) SMTP
4) SCTP
5) HTTP
17. If you need to change the typeface of a document, which menu will you choose?
1) Edit
2) View
3) Tools
4) File
5) Format
18. What is the size of Network bits & Host bits of Class A of IP address?
1) Network bits 7, Host bits 24
2) Network bits 8, Host bits 24
3) Network bits 7, Host bits 23
4) Network bits 8, Host bits 23
5) Network bits 4, Host bits 25
19. ____ is a uniform naming scheme for locating resources on the web.
1) URI
2) HTTP
3) WEBNAME
4) RESOURCENAME
5) URL
20. The options like Relationship, SQL Server etc. are found in ___
1) External data tab
2) Database tools tab
3) Create tab
4) Home tab
5) Format tab
21. A Database Language Concerned with the Definition of the Whole Database Structure and Schema is ____
1) DCL
2) DML
3) DDL
4) DCO
5) DDI
22. A ____ Enables You To View Data From A Table Based On A Specific Criterion
1) Form
2) Query
3) Macro
4) Report
5) Bug
23. A____ normal form normalization will be needed where all attributes in relation tuple are not functionally dependent only on the key attribute.
1) First
2) Second
3) Third
4) Fourth
5) Fifth
24. An outstanding functionality of SQL is its support for automatic ____ to the target data.
1) programming
2) functioning
3) navigation
4) notification
5) none of these
25. The hardware component used to control the operation of a computer system is:
1) Ram
2) Processor
3) Keyboard
4) Hard disk
5) Monitor
26. Which output device is suited to presenting information that is likely to change very frequently?
1) Sound card
2) Monitor
3) Plotter
4) Printer
5) COM
27. Which is the most difficult environmentally to dispose of?
1) Floppy drives
2) Hard drives
3) Power supplies
4) CRTs
5) System boards
28. Which type of system hoard is the MOST likely candidate for processor upgrading if you want maximum performance and future compatibility?
1) ML
2) PCI
3) ISA
4) EISA
5) ISO
29. Which of the following is a type of preventative maintenance used on a hard drive?
1) Disk check diagnostics
2) Head alignment diagnostics
3) Initializing
4) Uninstalling programs
5) None of the above
30. How many IRQs does a chain of USB devices require?
1) 1
2) 2
3) 3
4) 4
5) 5
31. Which of the following addressing modes, facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears?
1) ascending
2) sorting
3) index
4) indirect
5) direct
32. Which command will be used with vi editor to replace text from cursor to right?
1) r
2) R
3) s
4) S
5) Q
33. Which of the following is not a filter?
1) cat
2) grep
3) wc
4) sort
5) None of the above
34. Which of the following commands is used to view your file 24 lines at a time?
1) pg
2) cat
3) //p
4) /p
5) ///p
35. The rise time of a pulse waveform is the time required for the voltage to rise:
1) from zero to its rms value
2) from zero to its peak value
3) from 10% of the peak value to 70.7% of the peak value
4) from 10% of the peak value to 90% of the peak value
5) from 10% of the peak value to 80% of the peak value
36. Holes are the minority carriers in which type of semiconductor?
1) Extrinsic
2) Intrinsic
3) n-type
4) p-type
5) m-type
37. While working with MS-DOS, which command is used to restore files that were backed up using the BACKUP command?
1) COPY
2) DISKCOPY
3) RESTORE
4) STORE
5) DELETE
38. Which of the following commands will take you directly to the root directory no matter what subdirectory you are currently in?
1) CD \root
2) CD\
3) CD\..
4) CD..
5) CD\\..
39. Batch files contain a group of MSDOS commands that are run in successive order. What filename extension identifies batch files?
1) COM
2) BAT
3) EXE
4) SYS
5) DOC
40. The _____ command allows you to modify the default prompt to provide other information
1) prompt
2) windows
3) cursor
4) click
5) double click
ANSWERS:
1) 2; 2) 3; 3) 4; 4) 3; 5) 5; 6) 1; 7) 4; 8) 2; 9) 1; 10) 1 ;
11) 5; 12) 3; 13) 4; 14) 3; 15) 3; 16) 3; 17) 5; 18) 1; 19) 1: 20) 2;
21) 3; 22) 2; 23) 3; 24) 3; 25) 2; 26) 2; 27) 4; 28) 2; 29) 1; 30) 1;
31) 3; 32) 2; 33) 5; 34) 1; 35) 4; 36) 3; 37) 3; 38) 2; 39) 2; 40) 1;
Wednesday, 3 September 2014
COMPUTER AWARENESS PRACTICE MCQs FOR SBI P.O. EXAM 2014
1. Person, who design, program, operates and maintains computer equipment refers to:
a) Console-operator
b) Programmer
c) People ware
d) System Analyst
e) User
2. Who invented the high level language C?
a) Dennis M. Ritchie
b) Niklaus Writh
c) Seymour Papert
d) Donald Kunth
e) A.R John
3. Which of the following is the product of data processing?
a) Information
b) Data
c) Software program
d) System
e) Hardware program
4. How many units in a single bus structure will communicate at a time?
a) 1
b) 2
c) 3
d) 16
e) 32
5. A microcomputer consists of at least an input unit, an output unit, microprocessor unit and a ___
a) stabilizer
b) memory unit
c) printer
d) network
e) monitor
6. For each instructions of program in memory the CPU goes through a ___
a) decode - fetch - execute sequence
b) execute - store - decode sequence
c) fetch - decode - execute sequence
d) fetch - execute - decode sequence
e) None of these
7. The database environment has all of the following components except:
a) Users
b) Database
c) Database administrator
d) Database programmer
e) Separate files
8. Which of the following technique provides dedicated communication channel between two stations?
a) Circuit switching
b) Packet switching
c) Network switching
d) Switch network
e) Modem switching
9. End-to-end connectivity is provided from host-to-host in ___
a) Network layer
b) Session layer
c) Data link layer
d) Transport layer
e) Mac layer
10. A source program is the program written in ____ language.
a) English
b) symbolic
c) high level
d) object
e) French
11. Which of the following is a computer device that primarily used to provide hardcopy?
a) CRT
b) Line printer
c) Computer console
d) Card reader
e) Pen drive
12. In magnetic disks data is organized on the platter in a concentric sets or rings called ___
a) sector
b) track
c) head
d) block
e) bug
13. The memory which is programmed at the time it is manufactured is ___
a) ROM
b) RAM
c) PROM
d) EPROM
e) PRAM
14. In comparison to the internal (main) memory, tape or disk memory is ___
a) slower and more expensive
b) slower and less expensive
c) faster and more expensive
d) faster and less expensive
e) None of these
15. A distributed network configuration in which all data/ information pass through a central computer is ___
a) bus network
b) duplex
c) multiplex
d) multiple
e) star network
16. The process of copying data from a memory location is called ___
a) reading
b) writing
c) controlling
d) booting
e) calling
17. Which of the following is true about primary storage?
a) It is a part of the CPU
b) It allows very fast access to data
c) It is relatively more expensive
d) All of the above
e) None of these
18. 100110 - This binary representation is numerically equivalent to:
a) The decimal representation 46
b) The hexadecimal representation 46
c) The binary representation 26
d) The octal representation 26
e) The octal representation 46
19. Administrative supervision of database activities is the responsibility of ___
a) Data base administrator
b) DP Manager
c) DB Manager
d) VP-DP administrator
e) DO Manager
20. Transmission of computerised data from one location to another is called ___
a) data transfer
b) data flow
c) data communication
d) data management
e) Any of the above
21. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Average case
d) a, b and c
e) Null case
22. The indirect change of the values of a variable in one module by another module is called ___
a) Internal change
b) Inter-module change
c) Side effect
d) Side-module update
e) Top-module update
23. By default, your documents print in ____ mode.
a) landscape
b) portrait
c) page setup
d) print view
e) page layout
24. Which of the following is not available on the Ruler of MS Word screen?
a) Tab stop box
b) Left Indent
c) Right Indent
d) Canter Indent
e) All of them are available on ruler
25. Which American Computer Company is called big blue?
a) Microsoft
b) Compaq Corp
c) IBM
d) Tandy Stevenson
e) Samsung
26. Which of the following is a computer package for preparing/ typing letters/ documents?
a) Word
b) Excel
c) Power Point
d) Windows
e) Adobe Reader
27. Which of the following is true regarding Referential Integrity?
a) Every primary-key value must match a primary-key value in an associated table
b) Every primary-key value must match a foreign-key value in an associated table
c) Every foreign-key value must match a primary-key value in an associated table
d) Every foreign-key value must match a foreign-key value in an associated table
e) None of these
28. If every non-key attribute is functionally dependent on the primary key, the relation will be in ___
a) First Normal Form
b) Second Normal Form
c) Second Formal Form
d) First Formal Form
e) Third Normal Form
29. A desktop computer is also known as a ___
a) PC
b) Laptop
c) Palmtop
d) Mainframe
e) System
30. What does the DOCTYPE declaration defines in HTML?
a) It defines the document Property
b) It defines the document Type
c) It defines the document Size
d) It defines the document Style
e) It defines the document colour
31. In which mode Windows starts with only the core drivers and services?
a) Safe Mode
b) Quick Mode
c) Normal Mode
d) Repair Mode
e) Continue Mode
32. To "Debug" the System means:
a) Find the Correct Software
b) Find the Correct Hardware
c) Find and Install correct System
d) Find and Correct Errors on System
e) Find and fix the Errors on System
33. In Computer Architecture a Bus is ____
a) A collection of various software
b) A collection of various computers
c) A collection of shared communication wires
d) A collection of chairs where the user sits
e) All the above
34. While starting Window XP/7 extra booting options can be shown by pressing
a) F1
b) F8
c) F9
d) F12
e) F11
35. Which of the following is used to add comments in PHP?
a) //
b) /* … */
c) & … &
d) Only a & b
e) All the above
36. How PHP files can be accessed?
a) Through Web Browser
b) Through HTML files
c) Through Web Server
d) Through Internet Server
e) Through .Net Server
37. The first network that planted the seeds of network was?
a) ARPANET
b) NSF net
c) I net
d) V net
e) N net
38. The small size animated pictures moving on WebPages are called?
a) Media
b) Flash
c) Podcast
d) Kris
e) Drag
39. Which of the following is a domain name?
a) .NET
b) .ORG
c) .GOV
d) .IN
e) All the above
40. Firewall is used to prevent unauthorized access from both the sides as software and ___
a) Hardware
b) Malware
c) Spyware
d) Freeware
e) Menswear
41. The unsolicited and bulk mails in e-Mail is called?
a) Spam
b) Scan
c) Storm
d) Virus
e) Trash
42. Graphical pictures that represent an object file, folder, ... are called ___
a) Desktop
b) Icons
c) Windows
d) Taskbar
e) Menus
43. Which of the following keys create symbol copyright as ©?
a) Alt + ctrl + d
b) Alt + Shift + c
c) Ctrl + alt + c
d) Alt +del+ c
e) Alt+ break +c
44. To move to the beginning of a line of text, press the ___ key.
a) Home
b) A
c) Page up
d) Enter
e) Page down
45. Who is responsible for "traffic directing" on Internet?
a) Hub
b) Repeater
c) Router
d) Switch
e) Gateway
ANSWERS:
1) c; 2) a; 3) a; 4) b; 5) b; 6) c; 7) e; 8) a; 9) d; 10) c;
11) b; 12) b; 13) a; 14) b; 15) e; 16) a; 17) d; 18) e; 19) a; 20) c;
21) e; 22) c; 23) b; 24) d; 25) c; 26) a; 27) c; 28) e; 29) a; 30) b;
31) a; 32) d; 33) c; 34) b; 35) d; 36) c; 37) a 38) b; 39) e; 40) a;
41) a; 42) b 43) c; 44) a; 45) c;
a) Console-operator
b) Programmer
c) People ware
d) System Analyst
e) User
2. Who invented the high level language C?
a) Dennis M. Ritchie
b) Niklaus Writh
c) Seymour Papert
d) Donald Kunth
e) A.R John
3. Which of the following is the product of data processing?
a) Information
b) Data
c) Software program
d) System
e) Hardware program
4. How many units in a single bus structure will communicate at a time?
a) 1
b) 2
c) 3
d) 16
e) 32
5. A microcomputer consists of at least an input unit, an output unit, microprocessor unit and a ___
a) stabilizer
b) memory unit
c) printer
d) network
e) monitor
6. For each instructions of program in memory the CPU goes through a ___
a) decode - fetch - execute sequence
b) execute - store - decode sequence
c) fetch - decode - execute sequence
d) fetch - execute - decode sequence
e) None of these
7. The database environment has all of the following components except:
a) Users
b) Database
c) Database administrator
d) Database programmer
e) Separate files
8. Which of the following technique provides dedicated communication channel between two stations?
a) Circuit switching
b) Packet switching
c) Network switching
d) Switch network
e) Modem switching
9. End-to-end connectivity is provided from host-to-host in ___
a) Network layer
b) Session layer
c) Data link layer
d) Transport layer
e) Mac layer
10. A source program is the program written in ____ language.
a) English
b) symbolic
c) high level
d) object
e) French
11. Which of the following is a computer device that primarily used to provide hardcopy?
a) CRT
b) Line printer
c) Computer console
d) Card reader
e) Pen drive
12. In magnetic disks data is organized on the platter in a concentric sets or rings called ___
a) sector
b) track
c) head
d) block
e) bug
13. The memory which is programmed at the time it is manufactured is ___
a) ROM
b) RAM
c) PROM
d) EPROM
e) PRAM
14. In comparison to the internal (main) memory, tape or disk memory is ___
a) slower and more expensive
b) slower and less expensive
c) faster and more expensive
d) faster and less expensive
e) None of these
15. A distributed network configuration in which all data/ information pass through a central computer is ___
a) bus network
b) duplex
c) multiplex
d) multiple
e) star network
16. The process of copying data from a memory location is called ___
a) reading
b) writing
c) controlling
d) booting
e) calling
17. Which of the following is true about primary storage?
a) It is a part of the CPU
b) It allows very fast access to data
c) It is relatively more expensive
d) All of the above
e) None of these
18. 100110 - This binary representation is numerically equivalent to:
a) The decimal representation 46
b) The hexadecimal representation 46
c) The binary representation 26
d) The octal representation 26
e) The octal representation 46
19. Administrative supervision of database activities is the responsibility of ___
a) Data base administrator
b) DP Manager
c) DB Manager
d) VP-DP administrator
e) DO Manager
20. Transmission of computerised data from one location to another is called ___
a) data transfer
b) data flow
c) data communication
d) data management
e) Any of the above
21. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Average case
d) a, b and c
e) Null case
22. The indirect change of the values of a variable in one module by another module is called ___
a) Internal change
b) Inter-module change
c) Side effect
d) Side-module update
e) Top-module update
23. By default, your documents print in ____ mode.
a) landscape
b) portrait
c) page setup
d) print view
e) page layout
24. Which of the following is not available on the Ruler of MS Word screen?
a) Tab stop box
b) Left Indent
c) Right Indent
d) Canter Indent
e) All of them are available on ruler
25. Which American Computer Company is called big blue?
a) Microsoft
b) Compaq Corp
c) IBM
d) Tandy Stevenson
e) Samsung
26. Which of the following is a computer package for preparing/ typing letters/ documents?
a) Word
b) Excel
c) Power Point
d) Windows
e) Adobe Reader
27. Which of the following is true regarding Referential Integrity?
a) Every primary-key value must match a primary-key value in an associated table
b) Every primary-key value must match a foreign-key value in an associated table
c) Every foreign-key value must match a primary-key value in an associated table
d) Every foreign-key value must match a foreign-key value in an associated table
e) None of these
28. If every non-key attribute is functionally dependent on the primary key, the relation will be in ___
a) First Normal Form
b) Second Normal Form
c) Second Formal Form
d) First Formal Form
e) Third Normal Form
29. A desktop computer is also known as a ___
a) PC
b) Laptop
c) Palmtop
d) Mainframe
e) System
30. What does the DOCTYPE declaration defines in HTML?
a) It defines the document Property
b) It defines the document Type
c) It defines the document Size
d) It defines the document Style
e) It defines the document colour
31. In which mode Windows starts with only the core drivers and services?
a) Safe Mode
b) Quick Mode
c) Normal Mode
d) Repair Mode
e) Continue Mode
32. To "Debug" the System means:
a) Find the Correct Software
b) Find the Correct Hardware
c) Find and Install correct System
d) Find and Correct Errors on System
e) Find and fix the Errors on System
33. In Computer Architecture a Bus is ____
a) A collection of various software
b) A collection of various computers
c) A collection of shared communication wires
d) A collection of chairs where the user sits
e) All the above
34. While starting Window XP/7 extra booting options can be shown by pressing
a) F1
b) F8
c) F9
d) F12
e) F11
35. Which of the following is used to add comments in PHP?
a) //
b) /* … */
c) & … &
d) Only a & b
e) All the above
36. How PHP files can be accessed?
a) Through Web Browser
b) Through HTML files
c) Through Web Server
d) Through Internet Server
e) Through .Net Server
37. The first network that planted the seeds of network was?
a) ARPANET
b) NSF net
c) I net
d) V net
e) N net
38. The small size animated pictures moving on WebPages are called?
a) Media
b) Flash
c) Podcast
d) Kris
e) Drag
39. Which of the following is a domain name?
a) .NET
b) .ORG
c) .GOV
d) .IN
e) All the above
40. Firewall is used to prevent unauthorized access from both the sides as software and ___
a) Hardware
b) Malware
c) Spyware
d) Freeware
e) Menswear
41. The unsolicited and bulk mails in e-Mail is called?
a) Spam
b) Scan
c) Storm
d) Virus
e) Trash
42. Graphical pictures that represent an object file, folder, ... are called ___
a) Desktop
b) Icons
c) Windows
d) Taskbar
e) Menus
43. Which of the following keys create symbol copyright as ©?
a) Alt + ctrl + d
b) Alt + Shift + c
c) Ctrl + alt + c
d) Alt +del+ c
e) Alt+ break +c
44. To move to the beginning of a line of text, press the ___ key.
a) Home
b) A
c) Page up
d) Enter
e) Page down
45. Who is responsible for "traffic directing" on Internet?
a) Hub
b) Repeater
c) Router
d) Switch
e) Gateway
ANSWERS:
1) c; 2) a; 3) a; 4) b; 5) b; 6) c; 7) e; 8) a; 9) d; 10) c;
11) b; 12) b; 13) a; 14) b; 15) e; 16) a; 17) d; 18) e; 19) a; 20) c;
21) e; 22) c; 23) b; 24) d; 25) c; 26) a; 27) c; 28) e; 29) a; 30) b;
31) a; 32) d; 33) c; 34) b; 35) d; 36) c; 37) a 38) b; 39) e; 40) a;
41) a; 42) b 43) c; 44) a; 45) c;
Subscribe to:
Posts (Atom)