Sunday, 22 March 2015

IBPS Bank Clerk CWE Solved Paper -2012 (Exam Held on 14-12-2012)

1. If you wish to extend the length of the network without having the signal degrade, you would use a– 
(A) resonance (B) router (C) gateway (D) switch (E) repeater
Ans : (E)

2. A repair for a known software bug, usually available at no charge on the internet, is called a– 
(A) version (B) patch (C) tutorial (D) FAQ (E) rectifier
Ans : (B)

3. URL stands for– 
(A) Universal Research List (B) Universal Resource List 
(C) Uniform Research List (D) Uniform Research Locator
(E) Uniform Resource Locator
Ans : (D)

4. When data changes in multiple lists and all lists are not updated, this causes– 
(A) data redundancy (B) information overload (C) duplicate data (D) data inconsistency (E) data repetition
Ans : (D)

5. What is a backup?
(A) Restoring the information backup (B) An exact copy of a system’s information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these (E) None of these
Ans : (D)

6. The Internet is– 
(A) a large network of networks (B) an internal communication system for a business
(C) a communication system for the Indian government (D) a communication system for some states of India
(E) a communication system for some cities of Indian
Ans : (A)

7. Computers that are portable and convenient for users who travel are known as– 
(A) supercomputers (B) planners (C) minicomputers (D) file servers (E) laptops
Ans : (E)

8. What is the storage area for email messages called?
(A) A folder (B) A mailbox (C) A directory (D) The hard disk (E) None of these
Ans : (B)

9. One advantage of dial-up Internet access is– 
(A) it utilizes broadband technology (B) it is Indian
(C) it uses a router for security (D) modem speeds are very fast
(E) it utilizes existing telephone service
Ans : (E)

10. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) configuration (B) download (C) storage (D) upload (E) installation
Ans : (E)

11. Which process checks to ensure the components of the computer are operating and connected properly?
(A) Booting (B) Processing (C) Saving (D) Editing (E) Starting
Ans : (A)

12. A means of capturing an image (drawing or photo) so that it can be stored on a computer is– 
(A) Modem (B) Software (C) Scanner (D) Keyboard (E) Mouse
Ans : (C)

13. An error in a computer porgram–
(A) Crash (B) Power Failure (C) Bug (D) Virus (E) Fatal error
Ans : (C)

14. Access control based on a person’s fingerprints is an example of– 
(A) biometric identification (B) characteristic identification 
(C) characteristics security (D) fingerprint security
(E) logistics
Ans : (A)

15. The patterns of printed lines on most products are called– 
(A) prices (B) striping (C) scanners (D) OCR (E) barcodes
Ans : (E)

16. Most mail programs automatically complete the following two parts in an e-mail– 
(A) From : and Body (B) From : and Date (C) From : and To (D) From : and Subject (E) None of these
Ans : (B)

17. The computer’s capability of distinguishing spoken words is called–
(A) voice analysis (B) speech acknowledgment
(C) voice recognition (D) speech interpretation
(E) vocalization
Ans : (C)

18. Which of the following is an advantage of mounting an application on the Web?
(A) the possibility of 24 hours access for users (B) creating a system that can extend globally
(C) scandalizing the design of the interface (D) All of these
(E) None of these
Ans : (D)

19. The first page of a Web site is called the– 
(A) Homepage (B) Index (C) Java Script (D) Book mark (E) Intro Page
Ans : (A)

20. ERP is an acronym for– 
(A) Enterprise Retirement Planning (B) Enterprise Relationship Planning
(C) Enterprise Resource Planning (D) Enterprise Reorder Planning
(E) Enterprise Retention Planning
Ans : (C)

21. The software that allows users to surf the Internet is called a/an– 
(A) Search engine (B) Internet Service Provider (ISP)
(C) Multimedia application (D) Browser
(E) Internet Surfing Provider
Ans : (D)

22. The issues that deal with the collection and use of data about individuals is– 
(A) access (B) publicity (C) accuracy (D) property (E) privacy
Ans : (E)

23. Aterm relating to sending data to a satellite is– 
(A) downlink (B) modulate (C) demodulate (D) uplink (E) Interrelate
Ans : (D)

24. On-line documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with relation information are called– 
(A) hypermedia (B) hypertext (C) HTML (D) URL (E) FTP
Ans : (B)

25. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and—security is concerned with protecting software from unauthorized tampering or damage.
(A) data (B) cyber (C) Internet (D) metaphysical (E) publicity
Ans : (A)

26. Hackers– 
(A) all have the same motive (B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage (D) are people who are allergic to computers
(E) break into other people’s computers
Ans : (E)

27. Unauthorized copying of software to be used for personal gain instead of for personal backups is called– 
(A) program thievery (B) data snatching (C) software piracy (D) program looting (E) data looting
Ans : (C)

28. Junk e-mail is also called– 
(A) Spam (B) spoof (C) cookie crumb (D) sniffer script (E) Spill
Ans : (A)

29. What is usually used for displaying information at public places?
(A) Monitors (B) Overhead Projections (C) Monitors and Overhead Projections (D) Touch Screen Kiosks (E) Loud Speakers
Ans : (B)

30. What is MP3?
(A) A mouse (B) A Printer (C) A Sound format (D) A Scanner (E) A Mobile Phone
Ans : (C)

31. What is the most popular hardware for multimedia creations?
(A) PCs (B) Minicomputers (C) Mainframe Computers (D) WANs (E) Super Computers
Ans : (A)

32. For sound recording what is necessary?
(A) Speaker (B) Microphone (C) Talker (D) Mouse (E) Telephone
Ans : (D)

33. The life-span of a CD-ROM is– 
(A) approximately one year (B) approximately two years (C) approximately five years 
(D) approximately twenty-five years (E) almost unlimited
Ans : (C)

34. The................settings are automatic and standard.
(A) default (B) CPU (C) peripheral (D) user friendly (E) defaulter
Ans : (A)

35. What are the two parts of an e-mail address?
(A) User name and street address (B) Legal name and phone number 
(C) User name and domain name (D) Initials and password
(E) User Name and Recipient Name
Ans : (C)

36. Participants can see and hear each other in a/ an– 
(A) electronic mail system (B) message system (C) teleconference (D) bulletin board (E) None of these
Ans : (C)

37. Magnetic tape is not practical for applications where data must be quickly recalled because tape is–
(A) A random-access medium (B) Expensive
(C) A read-only medium (D) Fragile and easily damaged
(E) A sequential-access medium
Ans : (E)

38. Why should you delete unknown e-mail attachments?
(A) You could go to jail (B) the person could track you down and hurt you
(C) it is bad manners (D) it might contain a virus that could hurt your computer
(E) None of these
Ans : (D)

39. Which of the following will you require to hear music on your computer?
(A) Video Card (B) Tape Recorder (C) Mouse (D) Joy Stick (E) Sound Card 
Ans : (E)

40. The signal that a computer is waiting for a command from the user– 
(A) prompt (B) event (C) time slice (D) interrupt (E) None of these
Ans : (A)

Sunday, 25 January 2015

COMPUTER AWARENESS PRACTICE MCQs FOR ALL BANK EXAMS

1. What is the responsibility of the logical unit in the CPU of a computer?
a) Producing result
b) Comparing numbers
c) Controlling flow of information
d) Performing mathematical operations
e) Controlling flow of data

2. Abacus was the first ___
a) Electronic computer
b) Mechanical computer
c) Electronic calculator
d) Mechanical calculator
e) Electronic chip

3. If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be ___
a) 216
b) 65,536
c) 64K
d) 128K
e) 135K

4. Instructions and memory address are represented by ___
a) Character code
b) Binary code
c) Binary word
d) Parity bit
e) Bite code

5. The terminal device that functions as a cash register, computer terminal and OCR reader is:
a) Data collection terminal
b) OCR register terminal
c) Video Display terminal
d) POS terminal
e) None of the above

6. A set of flip flops integrated together is called ____
a) Counter
b) Adder
c) Register
d) Flip flop
e) All of the above

7. People often call ______ as the brain of computer system.
a) Control Unit
b) Arithmetic Logic Unit
c) Central Processing Unit
d) Storage Unit
e) Store data

8. Which of the following is used for manufacturing chips?
a) Bus
b) Control unit
c) Semiconductors
d) a and b only
e) None of the above

9. The value of each bead in heaven is ___
a) 1
b) 3
c) 5
d) 7
e) 8

10. The first computer introduced in Nepal was ___
a) IBM 1400
b) IBM 1401
c) IBM 1402
d) IBM 1406
e) IBM 1405

11. Bluetooth is a type of radio wave information transmission system that is good for about:
a) 30 feet
b) 30 yards
c) 30 miles
d) 300 miles
e) 3000 miles

12. The telephone is an example of a(n)____ signal.
a) analog
b) digital
c) modulated
d) demodulated
e) compiler

13. Acredit card-sized expansion board that is inserted into portable computers that connects the modem
to the telephone wall jack is:
a) Internal modem
b) External modem
c) PC Card modem
d) Wireless modem
e) Wired modem

14. A modem that is contained within the system unit is called:
a) External
b) Internal
c) Wireless
d) Wi-Fi
e) Bluetooth

15. A modem that doesn't need to be connected to a telephone line is the ___ modem.
a) external
b) internal
c) wireless
d) DSL
e) NSL

16. Aspecial high-speed line used by large corporations to support digital communications is known as:
a) satellite/air connection service lines
b) cable modems
c) digital subscriber lines
d) T1, T2, T3 and T4 lines
e) None of the above

17. An affordable technology that uses existing telephone lines to provide high-speed connections
is called ________.
a) ISDN
b) microwave
c) cable modem
d) DSL
e) ALU

18. The capacity of a communication channel is measured in ___
a) Bandwidth
b) Bit capacity
c) Baud rate
d) Data flow
e) Store data

19. A relatively new technology that allows wireless connectivity:
a) Bluetooth
b) Black tooth
c) Blue band
d) Broadband
e) Wi- fi

20. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software product?
a) MS
b) DOS
c) MS DOS
d) 5.0
e) 4.2.0

21. A page fault:
a) Is an error in a specific page
b) Occurs when a program accesses a page of memory
c) Is an access to a page not currently in memory
d) None of the above
e) All of the above

22. The process of transferring data intended for a peripheral device into a disk or intermediate store so that it can be transferred to peripheral at a more convenient time or in bulk, is known as ___.
a) Multiprogramming
b) Spooling
c) Caching
d) Virtual programming
e) Code programming

23. An instruction in a programming language that is replaced by a sequence of instructions prior to assembly or compiling:
a) Procedure
b) Macro
c) Label
d) Literal
e) External

24. Banker's algorithm for resource allocation deals with:
a) Deadlock prevention
b) Deadlock avoidance
c) Deadlock recovery
d) Mutual exclusion
e) Data recovery

25. The state of a process after it encounters an I/O instruction is _____.
a) Ready
b) Blocked/ Waiting
c) Idle
d) Running
e) Compiling

26. The number of processes completed per unit time is known as__.
a) Output
b) Throughput
c) Efficiency
d) Capacity
e) Input

27. Which of the following file name extension suggests that the file is Backup copy of another file?
a) TXT
b) COM
c) BAS
d) BAK
e) BAT

ANSWERS:
1) b; 2) d; 3) b; 4) b; 5) d; 6) c; 7) c; 8) c; 9) c; 10) b
11) a; 12) a; 13) c; 14) b; 15) c; 16) d; 17) d; 18) a; 19) a; 20) d;
21) c; 22) b; 23) b; 24) b; 25) b; 26) b; 27) d.

Types of Computer

On the basis of working principle there are three types of computers.

a)Analog Computer
An analog computer (spelt analogue in British English) is a form of computer that uses continuous
physical phenomena such as electrical, mechanical or hydraulic quantities to model the problem being solved.
1. Thermometer
2. Speedometer
3. Petrol Pump Indicator
4. Multi meter

b) Digital Computer
Acomputer that performs calculations and logical operations with quantities represented as digits, usually in the binary number system.

c) Hybrid Computer (Analog + Digital)
A combination of computers those are capable of inputting and outputting in both digital and analog
signals. A hybrid computer system setup offers a cost effective method of performing complex simulations.

On the basis of Size..
a)Super Computer 
It is the fastest computer. Supercomputers are very expensive and are employed for specialized applications that require immense amounts of mathematical calculations.
For example, weather forecasting requires a supercomputer. Other uses of supercomputers
include animated graphics, fluid dynamic calculations and nuclear energy research and petroleum
exploration.
The major difference between a supercomputer and a mainframe is that a supercomputer channels
all its power into executing a few programs as fast as possible, whereas a mainframe uses itspower to execute many programs concurrently.

b)Mainframe Computer
A very large and expensive computer capable of supporting hundreds and even thousands of users
simultaneously. In the hierarchy that starts with a simple microprocessor (Eg: in watches) at the
bottom and moves to supercomputers at the top, mainframes are just below supercomputers. In
some ways, mainframes are more powerful than supercomputers because they support more simultaneous programs. But supercomputers can execute a single program
faster than a mainframe.

c) Mini Computer
In size and power, minicomputers lie between workstations and mainframes. In the past decade, the distinction between large minicomputers and small mainframes has blurred, however, as has the
distinction between small minicomputers and workstations. But in general, a minicomputer is a
multiprocessing system capable of supporting from 4 to about 200
users simultaneously.

d)Micro Computer
i. Desktop Computer: A personal or micro-mini computer sufficient to fit on a desk.
ii. Laptop Computer: A portable computer complete with an integrated screen and keyboard. It is
generally smaller in size than a desktop computer and larger than
a notebook computer.
iii. Palmtop Computer/ Digital Diary/ Notebook / PDAs:Ahandsized computer. Palmtops have no keyboard but the screen serves both as an input and output device.

e)Workstations
It is a terminal or desktop computer in a network. In this context, workstation is just a generic term
for a user's machine (client machine) in contrast to a "server" or "mainframe."

Major brands of the computer:
a) IBM/ IBM Compatible Computers
b) Apple/ Macintosh.

Monday, 22 December 2014

COMPUTER AWARENESS PRACTICE QUESTIONS

1. UNIVAC stands for?
A) Universal Automatic Computer
B) Universal Array Computer
C) Unique Automatic Computer
D) Unvalued Automatic Computer
E) None of these

2. The basic operation performed by a computer is ____
A) Arithmetic operation
B) Logical operation
C) Storage and relative
D) All the above
E) None of these

3. The two major types of computer chips are:
A) External memory chip
B) Primary memory chip
C) Microprocessor chip
D) Both b and c
E) Both a and b

4. Microprocessors as switching devices are for which generation computers?
A) First Generation
B) Second Generation
C) Third Generation
D) Fourth Generation
E) None of the above

5. What is the main difference between a mainframe and a super computer?
A) Super computer is much larger than mainframe computers
B) Super computers are much smaller than mainframe computers
C) Super computers are focused to execute few programs as fast as possible while mainframe
uses its power to execute as many programs concurrently
D) Super computers are focused to execute as many programs as possible while mainframe
uses its power to execute few programs as fast as possible
E) None of the above

6. ASCII and EBCDIC are the popular character coding systems. What does EBCDIC stand for?
A) Extended Binary Coded Decimal Interchange Code
B) Extended Bit Code Decimal Interchange Code
C) Extended Bit Case Decimal Interchange Code
D) Extended Binary Case Decimal Interchange Code
E) None of the above

7. The brain of any computer system is ___
A) ALU
B) Memory
C) CPU
D) Control unit
E) Keyboard

8. Storage capacity of magnetic disk depends on ___
A) tracks per inch of surface
B) bits per inch of tracks
C) disk pack in disk surface
D) All of the above
E) Only A and B

9. The two kinds of main memory are:
A) Primary and Secondary
B) Random and Sequential
C) ROM and RAM
D) All of the above
E) None of these

10. A storage area used to store data to compensate for the difference in speed at which the different units can handle data is ___
A) Memory
B) Buffer
C) Accumulator
D) Address
E) None of these

11. Computer is free from tiresome and boardroom. We call it ___
A) accuracy
B) reliability
C) diligence
D) versatility
E) programmability

12. Integrated Circuits (ICs) are related to which generation of computers?
A) First generation
B) Second generation
C) Third generation
D) Fourth generation
E) Fifth generation

13. CD-ROM is a ___
A) Semiconductor memory
B) Memory register
C) Magnetic memory
D) All of the above
E) None of the above

14. A hybrid computer:
A) Resembles digital computer
B) Resembles analogue computer
C) Resembles both a digital and analogue computer
D) Converts digital to analog
E) None of the above

15. Which type of computers uses the 8-bit code called EBCDIC?
A) Mini computers
B) Micro computers
C) Mainframe computers
D) Super computer
E) None of these

16. The ALU of a computer responds to the commands coming from:
A) Primary memory
B) Control section
C) External memory
D) Cache memory
E) None of these

17. Chief component of first generation computer was ___
A) Transistors
B) Vacuum Tubes and Valves
C) Integrated Circuits
D) All of the above
E) None of the above

18. To produce high quality graphics (hardcopy) in color, you would want to use a/an ___
A) RGB monitors
B) Plotter
C) Ink-jet printer
D) Laser printer
E) None of these

19. What are the stages in the compilation process?
A) Feasibility study, system design and testing
B) Implementation and documentation
C) Lexical Analysis, syntax analysis, and code generation
D) Both A and B
E) None of the above

20. Which of the following IC was used in third generation of computers?
A) SSI
B) MSI
C) LSI
D) Both a and b
E) None of these

ANSWERS:
1) A 2) D 3) D 4) D 5) C 6) A 7) C 8) D 9) C 10) B
11) C 12) C 13) E 14) C 15) C 16) B 17) B 18) B 19) C 20) D

Friday, 5 December 2014

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. The right click option of mouse is NOT used in which of the following?
1) To copy selected text into the clipboard
2) To rename file
3) To cut the selected text
4) To access properties of an object
5) None of these

2. .......... is the process of dividing the disk into tracks and sectors.
1) Tracking
2) Formatting
3) Crashing
4) Allotting
5) None of these

3. A place in the computer system where data and programs are temporarily stored is called....
1) paste
2) open
3) memory
4) pocket
5) None of these

4. Correcting errors in a program is referred to as...
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these

5. Graphical diagrams are used to represent multiple perspectives of a system which include
1) use-case, class and state diagrams
2) state, interaction and derivative diagrams
3) interaction, relationship and class diagrams
4) deployment, relationship and use-case diagrams
5) None of these

6. Which is the best view for representing your thoughts as a presentation of a computer?
1) Outline view
2) Notes page view
3) Slide sorter view
4) Slide view
5) None of these

7. What does SMPS stand for?
1) Switched Mode Power Supply
2) Single Mode Power Supply
3) Simple Mode Power Supply
4) Synchronous Mode Power Supply
5) None of these

8. RSA is........
1) Symmetric Cryptosystem
2) Digital Signature
3) Asymmetric Cryptosystem
4) Block Cypher
5) None of these

9. ......... hardware technology was used to fifth-generation computers.
1) Transistors
2) Valves
3) ICS
4) ULSI
5) VLSI

10. For each instruction in program memory the CPU goes through a ........
1) decode - fetch - execute sequence
2) fetch - decode - execute sequence
3) fetch - execute - decode sequence
4) execute - store - decode sequence
5) fetch - store - decode sequence

11. A proxy server is used for which of the following?
1) To provide security against unauthorised users
2) To process client requests for web pages
3) To process client requests for database access
4) To provide TCP / IP
5) None of these

12. A repair for a known software bug, usually available at no charge on the Internet, is called a(n).....
1) Version
2) Patch
3) Tutorial
4) FAQ
5) None of these

13. A modem performs.....
1) Modulation
2) Demodulation
3) Data compression
4) All of these
5) None of these

14. Which access method is used for obtaining a record from a cassette tape?
1) Direct
2) Sequential
3) Random
4) All of the above
5) None of these

15. A failure that occurs in an Oracle program when there is a logical failure in handling of a statement is called.........
1) Instance failure
2) Media failure
3) Process failure
4) Statement failure
5) User error

16. Which of the following represents the size of a floppy?
1) 3.5 inches
2) 5.25 inches
3) 8.0 inches
4) All the above
5) None of these

17. To format a number in date format, press..
1) Ctrl + Shift + @
2) Ctrl + Shift + #
3) Ctrl + Shift + %
4) Ctrl + Shift + $
5) Ctrl + Shift + ∗

18. ........ uses an embossed steel band to form the letters printed on the paper.
1) Laser printer
2) Dot-matrix printer
3) Daisy wheel printer
4) Band printer
5) Ink-jet printer

19. OR, XOR and AND functions can be performed by .............. of a computer in the CPU.
1) Memory
2) CU
3) Register
4) ALU
5) Processor

20. Internet provides....
1) Online communication
2) Software sharing
3) Customer support service
4) Online journals and magazines
5) All of the above

21. System software is the set of programs that enables your computer's hardware devices and ................ software to work together.
1) Management
2) Processing
3) Utility
4) Application
5) None of these

22. ............................ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these

23. SMPT, FTP and DNS are applications of the ............. layer.
1) data link
2) network
3) transport
4) application
5) None of these

24. According to which of the following, in a database, should information be organised and accessed?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these

25. WORM stands for ....
1) Wanted One Read Memory
2) Write Once Read Many
3) Write Original Read Many
4) All the above
5) None of these

26. Which of the following is separate software layer that acts as 'glue' between the client and the server parts of an application and provides a programming abstraction?
1) Freeware
2) Firmware
3) Shareware
4) User-supported software
5) Middleware

27. Which of the following is a must for a computer?
1) Chip
2) Data
3) Mouse
4) Processor
5) None of these

28. Disk can be used to store.......
1) Random files
2) Sequential files
3) Both (1) and (2)
4) Horizontal files
5) None of these

29. A derived class may also be called as.....
1) sub-class
2) super class
3) parent class
4) deprived class
5) None of these

30. The capacity of program counter is.......
1) 8 bits
2) 14 bits
3) 16 bits
4) 12 bits
5) 32 bits

31. In ........... generation computer the speed was measured in nanoseconds.
1) first
2) second
3) third
4) fourth
5) fifth

32. The process of transferring of files from your computer to the computer on the internet is called .......
1) downloading
2) uploading
3) FTP
4) JPEG
5) downsizing

33. Timing and control unit is a part of a(n)....
1) ALU
2) Processor
3) Memory
4) CMOS
5) BIOS

34. Chip is the common name for a(n)....
1) transistor
2) resistor
3) integrated circuit
4) semiconductor
5) None of these

35. ................. is developed specifically for a distinct industry.
1) Personal productivity software
2) Application software
3) Decision support system
4) Vertical market software
5) System software

36. Which of the following services is not provided by Internet service provider?
1) Internet transit
2) Domain name registration
3) Hosting
4) Dial-up access
5) None

37. A source program is written in a ............. language.
1) high-level
2) low-level
3) binary
4) All the above
5) None of these

38. The transfer rate of a standard USB 2.0 Device is .....
1) 100 M bit/s
2) 250 M bit/s
3) 480 M bit/s
4) 500 M bit/s
5) 1 G bit/s

39. The control part of a disk is known as
1) surface
2) hub
3) cylinder
4) cluster
5) None of these

40. Which of the following languages is used for process control?
1) ADA
2) COBOL
3) BASIC
4) PASCAL
5) LISP

ANSWERS:
1-5, 2-2, 3-3, 4-1, 5-1, 6-1, 7-1, 8-2, 9-4, 10-2
11-1, 12-2, 13-4, 14-2, 15-4, 16-4, 17-2, 18-4, 19-4, 20-5
21-4, 22-2, 23-4, 24-2, 25-2, 26-5, 27-4, 28-3, 29-1, 30-3
31-3, 32-2, 33-2, 34-3, 35-4, 36-5, 37-1, 38-3, 39-2, 40-1.

Thursday, 20 November 2014

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. Auxiliary storage is—
(A) Secondary storage (B) Primary storage
(C) Processing device (D) None of these
Ans : (A)

2. Archive is?
(A) Backup storage (B) Forward operation
(C) Primary storage (D) None of these
Ans : (A)

3. A branch of computer science that deals with computers that possess reasoning, learning and thinking capabilities that resemble those of human beings is recognized as?
(A) Software engineering (B) Artificial intelligence
(C) Hardware engineering (D) None of these
Ans : (B)

4. ASCII is—
(A) A standard coding system for computers (B) Hardware device
(C) Software (D) None of these
Ans : (A)

5. Following is true for Bandwidth?
(A) The wider the bandwidth of a communications system the more data it can transmit in a given period of time.
(B) The narrow the bandwidth of a communications system the more data it can transmit in a given period of time.
(C) The wider the bandwidth of a communications system the less data it can transmit in a given period of time.
(D) None is true
Ans : (A)

6. An operation in which data is moved to a different location is referred as—
(A) Block move (B) Street move
(C) Delete (D) None of these
Ans : (A)

7. The following is responsible for number of logical records in a physical record—
(A) Blocking factor (B) Block
(C) Boolean algebra (D) None of these
Ans : (A)

8. Boolean variable assumes—
(A) Values that are true only (B) Values that are false only
(C) Values that are either true or false (D) None of these
Ans : (C)

9. Bubble Memory is—
(A) nonvolatile (B) volatile
(C) permanent (D) None of these
Ans : (A)

10. In Nonvolatile memory device—
(A) Data contained in them is not lost when the power turned off
(B) Data contained in them is lost when the power turned off.
(C) data contained in them is permanent and not be rewrite
(D) None of these
Ans : (A)

11. A fixed number of adjacent bits that represent a particular character or symbol are referred as—
(A) Byte (B) Octal
(C) Bubble (D) None of these
Ans : (A)

12. Cache memory is a—
(A) Small buffer storage (B) Permanent storage
(C) Main memory (D) None of these
Ans : (A)

13. The total number of digits (symbols) available to represent numbers in a positional number system is referred as—
(A) Number system (B) Base
(C) Power (D) None of these
Ans : (B)

14. Cache memory is—
(A) Smaller and faster than main storage
(B) Bigger and slower then main storage
(C) Smaller but slower than main memory
(D) Bigger and faster than main memory
Ans : (A)

15. Cache memory—
(A) Is a Static RAM
(B) Increases the speed of processing by making current programs and data available to the CPU at a rapid rate
(C) Both A and B true
(D) Both A and B false
Ans : (C)

16. A sequential electronic circuit which can be placed in one out of two stable states where each state may be used to represent a binary digit is stated as—
(A) Integrated circuit (B) Firmware
(C) Flip-flop (D) None of these
Ans : (C)

17. A sequence of instruction (software) that is substituted for hardware and stored in readonly memory (ROM) is called—
(A) Integrated circuit (B) Firmware
(C) Flip-flop (D) None of these
Ans : (B)

18. Anonymous FTP is the—
(A) Internet file transfer protocol (B) Protocol that requires password
(C) None access files (D) None of these
Ans : (A)

19. EFF sites allows anonymous FTP that—
(A) Do not require a password or access (B) Requires password or access
(C) Is a none access file (D) None of these
Ans : (A)

20. ANSI is—
(A) American National Standards Institute
(B) A USA based national organization that establishes uniform standards in several fields of computers.
(C) A and B both true
(D) None is true
Ans : (C)

Thursday, 13 November 2014

Computer Abbreviations and Meanings

A
ACE – Access Control Entry
ACL – Access Control List
ADO – Active Data Objects
ADSL – Asymmetric Digital Subscriber Line
AGP – Accelerated Graphics Port
AI – Artificial Intelligence
ALGOL – Algorithmic Language
ALU – Arithmetic Logic Unit
ANSI – American National Standards Institute
AOL – America Online
API – Application Program Interface
APIPA – Automatic Private Internet Protocol Addressing
APT – Automatically Programmed Tooling
ARP – Address Resolution Protocol
ARPANET – Advanced Research Projects Agency Network
ASCII – American Standard Code for Information Interchange
ASF – Advanced Streaming Format
ASM – Association for Systems Management
ASP – Active Server Pages
ATAPI – Advanced Technology Attachment Packet Interface
ATM – Asynchronous Transfer Mode
AUI – Attachment Unit Interface
AVI – Audio Video Interleave

B
B2B – Business to Business
B2C – Business to Commerce
BASIC – Beginner's All Purpose Symbolic Instruction Code
BCD – Binary Coded Decimal
BDPS – Business Data Processing Systems
BHTML – Broadcast Hyper Text Markup Language
BIOS – Basic Input Output System
BIU – Bus Interface Unit
BMP – Bitmap
BPS – Bytes Per Seconds

C
CAD – Computer Aided Design
CADD – Computer Added Drafting and Design
CAI – Computer Aided Instructuion
CAM – Computer Aided Manufacturing
CAR – Control Address Register
CASE – Computer Aided Software Engineering
CCIS – Common Channel Interoffice Signaling
CCNA – Cisco Certified Network Associate
CD–WORM – Compact Disc – Write Once Read Many
CD RW – Compact Disc ReWritable
CD – Compact Disc
C-DAC – Centre for Development of Advanced Computing
CDMA – Code Division Multiple Access
CDONTS – Collabaration on Data Objects for Windows NT Server
CDROM – Compact Disc Read Only Memory
CFG – Control Flow Graph
CGI – Common Gateway Interface
CGM – Computer Graphics Metafile
CIDR – Classless Inter–Domain Routing 
CIM– Computer Integrated Manufacture
CISC – Complex Instruction Set Computers
CIX – Commercial Internet Exchange
CLR – Common Language Runtime
CMOS – Complementary Metal Oxide Semiconductor
CMS – Content Management System
CMYK – Cyan, Magenta, Yellow, Key (black)
COBOL – Common Business Oriented Language
COM – Component Object Model
CORBA – Common Object Request Broker Architecture
CPI – Clock Cycle Per Instruction
CPU – Central Processing Unit
CRC – Cyclic Redundancy Check
CRM – Customer Relationship Management
CROM – Control Read Only Memory
CRT – Cathode Ray Tube
CUI – Character User Interface

D
DAC – Digital to Analog Converter
DAO – Data Access Objects
DARPANET – Defense Advanced Research Projects Agency Network
DAT – Digital Audio Tape
DBA – Data Base Administrator
DBMS – Data Base Management System
DCA – Defence Communication Agency
DCL – Data Control Language
DCOM – Distributed Component Object Model
DCP – Data Communication Processor
DDL – Data Definition Language
DDOS – Distributed Denial of Service
DDP – Distributed Data Processing
DFD – Data Flow Diagram
DFS – Distributed File System
DHCP – Domain Host Configuration Protocol
DHTML – Dynamics Hyper Text Markup Language
DLC – Data Link Control
DLL– Dynamic Link Library
DMA – Direct Memory Access
DML – Data Manipulation Language
DMTF – Distributed Management Test Force
DNA – Distributed Internet Architecture
DNS – Domain Name System
DOM – Document Object Model
DOS – Disk Operating System, Denial Of Service
DPI – Dots Per Inch
DRAM – Dynamic Random Access Memory
DSL – Digital Subscriber Line
DSN – Digital Subscriber Network
DTD – Document Type Definition
DVD – Digital Versatile Disc

E
E – Electronic
EAROM – Electrically Alterable Read Only Memory
EBCDIC – Extended Binary Coded Decimal Interchange Code
EDC – Electronic Digital Computer
EDCDIC – Extended Binary Coded Decimal Interchange Code
EEPROM – Electrically Erasable Programmable Read Only Memory
EFS – Encrypted File System
EJB – Enterprise Java Beans
ENIAC – Electronics Numerical Integrator and Calculator
EPROM – Erasable Programmable Read Only Memory
EROM – Erasable Read Only Memory
ERP – Enterprise Resource Planning
EULA – End User License Agreement

F
FAT – File Allocation Table
FDD – Floppy Disk Drive
FDDI – Fiber Distributed Data Interface
FDMA – Frequency Division Multiple Access
FIFO – First In First Out
FLOPS – Floating Point Operations Per Second
FO – Fiber Optics
FORTRAN – Formula Translation
FPS – Frames Per Second
FRAM – Ferro–electric Random Access Memory
FTP – File Transfer Protocol

G
GB – Giga Bytes
GIF – Graphic Interchange Format
GIGO – Garbage In Garbage Out
GML – General Markup Language
GNU – GNU's Not Unix
GPL – General Public License
GUI – Graphical User Interface

H
HDD – Hard Disk Drive
HFS – Hierarchical File System
HP – Hewlett Packard
HPC – High Performance Computing
HPFS – High Performance File System
HSR – Horizontal Scan Rate
HTML – Hyper Text Markup Language
HTTP – Hyper Text Transfer Protocol

I
IBM – International Business Machines
IC – Integrated Circuit
ICMP – Internet Control Message Protocol
ICS – Reduce Instruction Set Computer
ICT – Information and Communication Technology
IDE – Integrated Development Environment
IE – Internet Explorer
IGMP – Internet Group Management Protocol
IIS – Internet Information Server
IL – Intermediate Language
IO – Input Output
IOP – Input Output Processor
IP – Internet Protocol
IPX – Internetworked Packet Exchange
IRAM – Integration Ram
IRC – Internet Relay Chat
IrDA – Infrared Data Association
IRQ – Interrupt Request
ISAPI – Internet Server Application Program Interface
ISDN – Integrated Services Digital Network
ISO – International Standard Organization
ISP – Internet Service Provider
ISR – Interrupt Service Routine
IT – Information Technology
ITPL – Information Technology Park Limited (India)

J
JCL – Job Control Language
JDBC – Java Data Base Connectivity
JHTML – Java within Hyper Text Markup Language
JPEG – Joint Photographic Experts Group
JSP – Java Server Pages

K
KB – Kilo Bytes
KBPS – Kilo Bytes Per Second

L 
L2TP – Layer Two Tunneling Protocol
LAN – Local Area Network
LCD – Liquid Crystal Display
LDAP – Light Weight Directory Access Control
LIFO – Last In First Out
LIPS – Logical Interfaces Per Second
LOC – Lines Of Code
LSI – Large Scale Integration
LSP – Layered Service Provider

M
MAC
 – Media Access Control
MAN – Metropolitan Area Network 
MAU – Multi–station Access Unit
MB – Mega Bytes
MBONE – Multicast Backbone
MBPS – Mega Bytes Per Second
MBR – Master Boot Record
MCP – Microsoft Certified Professional
MCS – Multicast Server
MCSA – Microsoft® Certified Systems Administrator
MCSD – Microsoft® Certified Solution Developer 
MCSE – Microsoft® Certified System Engineer
MDI – Multiple Document Interface
MDS– Microcomputer Development System
MFC – Microsoft Foundation Classes
MFT – Master File Table
MG – Mega Bytes
MICR – MagneticInk Characters Reader
MIDI – Musical Instrument Digital Interface
MIMD – Multiple Instruction Multiple Data
MIME – Multipurpose Internet Mail Extensions
MIPS – Millions of Instructions Per Second
MISD – Multiple Instruction Single Data
MODEM – Modulator and Demodulator
MP3 – Motion Pictures Experts Group Layer – 3
MPEG – Motion Pictures Experts Group
MS – MicroSoft
MSDN – MicroSoft Developer Network
MSIIS – Microsoft Internet Information Server
MSIL – Microsoft Intermediate Language
MSMQ – Microsoft Message Queue
MSN – MicroSoft Network
MSRAP – Microsoft Remote Administration Protocol
MSRPC – Microsoft Remote Procedure Call
MTS – Microsoft Transaction Server
MTU – Maximum Transmission Unit
MUDS – MultiUser Dungeons

N
NAS – Network Attached Storage
NASSCOM – National Association of Software and Service Companies
NCP – Network Control Protocol
NDIS – Network Driver Interface Specification
NDRO – Nondestructive Read Out
NetBEUI – NetBIOS Enhanced User Interface
NIC – National Informatics Centre, 
NIIT – National Institute of Information Technology
NNTP – Network News Transfer Protocol
NOW – Network Of Workstations
NSFNET – National Science Foundation Network
NT (Windows) – New Technology
NTFS – New Technology File System
NTP – Network Time Protocol

O
OCP – Oracle Certified Professional
OCR – Optical Character Readers
ODBC – Open Data Base Connectivity
OLE – Object Linking and Embedding
OMR – Optical Mark Reader
ONE – Open Network Architecture
OOA – Object Orient Analysis
OOAD – Object Oriented Analysis and Design
OOP – Object Oriented Programming
OOPS – Object Oriented Programming System
OPEN GL – Open Graphics Library
OS – Operating System
OSI – Open System Interconnection

P
PC – Personal Computer
PCI – Peripheral Component Interconnect
PCMCIA – Personal Computer Memory Card International Association
PDA – Personal Digital Assistant
PDF – Portable Document Format
PDL – Page Description Language
PDU – Protocol Data Unit
PHP – PHP Hypertext Processor
PIC – Programming Interrupt Control
PILOT – Programmed Inquiry Learning Or Teaching
PLA – Programmable Logic Array
PLC – Programmable Logic Controller
PNG – Portable Network Graphics
PNP – Plug And Play
POP – Post Office Protocol
POST – Power On Self Test
PPP – Peer to Peer Protocol
PPTP – Point To Point Tunneling Protocol
PROM – Programmable Read Only Memory
PS – Post Script
PSN – Processor Serial Number

Q 
QoS – Quality of Service

R
RADSL – RateAdaptive Digital Subscribes Line
RAID – Redundant Array of Independent Disks
RAM – Random Access Memory
RAMDAC – Random Access Memory Digital to Analog Converter
RAS – Remote Access Network
RD RAM – Rambus Dynamic Random Access Memory
R-DAT – Rotating Digital Audio Tape
RDBMS – Relational Data Base Management System
RDO – Remote Data Objects
RDP – Remote Desktop Protocol
RFC – Request for Comments
RGB – Red Green Blue
RICS – Reduced Instruction Set Computer
RIP – Raster Image Processor
RISC – Reduced Instruction Set Computer
ROM – Read Only Memory
RPC – Remote Procedure Call
RTC – Real Time Clock
RTF – Rich Text Format
RTOS – Real Time Operating System


S-DAT – Stationary Digital Audio Tape
SACK – Selective Acknowledgements
SAM – Security Access Manager
SAP – Service Access Point, Systems Applications Products
SCMP – Software Configuration Management Plan
SCSI – Small Computers Systems Interface
SD RAM – Synchronous Dynamic Random Access Memory
SDD – Software Design Description
SDK – Software Development Kit
SDL – Storage Definition Language
SDN – Integrated Service Digital Network
SDRAM – Static Dynamic Random Access Memory
SDSL – Symmetric Digital Subscribes Line
SG RAM – Synchronous Graphics Random Access Memory
SGML – Standard Generalized Markup Language
SIM – Subscriber Identification Module
SIMD – Single Instruction Multiple Data
SISD – Single Instruction Single Data
SIU – Serial Interface Unit
SMP – Symmetric Multi Process
SMS – Short Message Service
SMTP – Simple Mail Transfer Protocol
SNA – System Network Architecture
SNAP – Sub Network Access Protocol
SNMP – Simple Network Management Protocol
SNOBOL – String Oriented Symbolic Language
SOAP – Simple Object Access Protocol
SPX – Sequenced Packet Exchange
SQA – Statistical Quality Assurance
SQL – Structured Query Language
SRAM – Static Random Access Memory
SRS – Software Requirements Specification
STP – Shielded Twisted Pair
SVVP – Software Verification and Validation Plan
SW – Software

T
TAPI – Telephony Application Program Interface
TB – Tera Bytes
TCP – Transmission Control Protocol
TCP/IP – Transmission Control Protocol / Internet Protocol
TDI – Transport Data Interface
TDMA – Time Division Multiple Access
TPM – Transactions Processing Monitor
TSR – Terminate and Stay Residents

U
UDD – User Datagram Protocol
UDP – User Datagram Protocol
UI – User Interface
UML – Unified Modelling Language
UNC – Universal Naming Convention
UNIX – Uniplexed Information and Computer Systems
URL – Universal Resource Locator
USB – Universal Serial Bus
USRT– Universal Synchronous Receiver Transmitted
UTP – Unshielded Twisted Pair

V
VAN – Virtual Area Network
VAST– Very Small Aperture Terminal
VB – Visual Basic
VC++ – Visual C++
VCD – Video Compact Disc
VDL – View Definition Language
VGA – Video Graphics Array
VHS – Video Home System
VLIW – Very Long Instruction Words
VLSI – Very Large Scale Integrated Circuits
VPN – Virtual Private Network
VRAM – Video Random Access Memory
VRML – Virtual Reality Modelling Language
VS – Visual Studio
VSNL – Videsh Sanchar Nigam Limited
VVR – Software Validation and Validation Report
VXD – Virtual Device Driver

W
W3C – World Wide Web Consortium
WAIS – Wide Area Information Servers
WAN – Wide Area Network
WAP – Wireless Application Protocol
WBEM – Web Base Enterprise Management
WDM – Wave Division Multiplexing
WHQL – Windows Hardware Quality Lab
Windows ME – Windows Millennium Edition
Windows NT – Windows New Technology
Windows XP – Windows eXPerienced
WINS – Windows Internet Name Services
WMI – Windows Management Instrumentation
WML – Wireless Markup Language
WORM – Write Once Read Many
WSH – Windows Script Host
WWW – World Wide Web
WYSIWYG – What You See Is What You Get


XHTML – eXtensible Hyper Text Markup Language
XML – eXtensible Markup Language
XSL – eXtensible Style Sheet language

Y
Y2K – Year 2000

Z

ZIF – Zero Insertion Force