Thursday, June 27, 2013

Computer Knowledge sample questions for Bank Exams 2


Computer Knowledge

1.A_____ typically connects personal computers within a very limited geographical area, usually within a single building.
1) LAN 2) BAN 3) TAN
4) NAN 5) None of these
2. Computers manipulate data in many ways, and this manipulation is called___
1) utilizing  2) batching
3) upgrading  4) processing
5) None of these
3.An e-mail address typically consists of a user ID followed by the ____sign and the name of
the e-mail server that manages the user's electronic post office box
1) @ 2) # 3) & 4) * 5) None of these
4. Software applies ________also called algorithms, to process data
1) arithmetic 2) procedures
3) objects 4) rules 5) None of these
5.A file extension is separated from the mainfile name with a(n)______ but no spaces
1) question mark 2) exclamation mark
3) underscore 4) period 5) None of these
6. An ad hoc query is a _____
1) pre-planned question
2) pre-scheduled question
3) spur-of-the moment question
4) question that will not return any results
5) None of these
7.A web _____ consists of one or more web pages located on a web server
1) hub 2) site 3) story
4) template 5) None of these
8.A computer ______is a set of program instruction that can be attach itself to a file, reproduce itself, and spread to other files
1) worm 2) virus
3) Trojan horse 4) phishing scam
5) None of these
9. The desktop contains small graphic called_______
1) windows 2) logos 3) icons
4) pictures 5) None of these
10. C, BASIC, COBOL and JAVA are examples of _________ languages
1) low-level 2) computer
3) system programming 4) high-level
5) None of these
11.A(n)_____camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphic software
1) digital 2) analog 3) classic
4) film 5) None of these
12. ____ makes it possible for shoppers to make purchase using their computers
1) E-world 2) E-commerce
3) E-spend 4) E-business
5) None of these
13. Networks are monitored by security personal and supervised by __who set(s) up accounts and password for authorized network users.
1) IT managers 2) the government
3) network administrators
4) password administrators
5) None of these
14.Application software is designed to accomplish___
1) real-world task 2) computer-centric tasks
3) gaming tasks 4) operating system tasks
5) None of these
15.A telephone number, a birth date and a customer name are all examples of__
1) a record 2) data 3) a file
4) a database 5) None of these
16. The human-readable version of a program is called___
1) source code 2) program code
3) human code 4) system code
5) None of these
17.A_____ computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage and processing components into a single portable unit.
1) notebook 2) journal 3) diary
4) input 5) None of these
18. ______ is the result produced by a computer
1) Data 2) memory 3) output
4) input 5) None of these
19. Programs such as Internet Explorer that server as navigation windows into the web are called_________
1) Hyper text 2) networks
3) internet 4) web browser
5) None of these
20.A____is a device that not only provides surge protection, but also furnishes your computer
with battery backup power during a power outage
1) surge strip 2) USB 3) UPS
4) battery strip 5) None of these
21. When you save to_____ your data will remain intact even when the computer is turned off
1) RAM 2) motherboard
3) secondary storage device
4) primary storage device 5) None of these
22. The motherboard is the____
1) circuit board that houses peripherals devices
2) same as the CPU chip
3) the first chip that is accessed when the computer is turned on
4) circuit board that contains a CPU and other chips
5) None of these
23. A computer intensive problem runs on a __
1) server 2) mainframe
3) super computer 4) super PC
5) None of these
24.A(n)____ convert and executes one statement at a time
1) compiler 2) interpreter
3) converter 4) instruction 5) None of these
25. The term__ designates equipment that might be added to a computer system to enhance its functionality
1) digital device 2) system add-on
3) disk pack 4) peripherals
5) None of these
26. Approximately how many bytes make one megabyte?
1) One thousand 2) Ten thousand
3) One hundred 4) One million
5) None of these
27. What is MP3 ?
1) A mouse  2) A Printer
3) A sound format  4) A Scanner
5) None of these
28. All the deleted files goes to
1) Recycle Bin  2) Task Bar
3) Tool Bar  4) My Computer
5) None of these
29. ______this is the act of copying or downloading a program from a network and marking multiple copies of it
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-licence piracy
5) None of these
30.A directory within a directory is called______
1) Mini directory  2) Junior directory
3) Part directory  4) sub directory
5) None of these
31. Which is the best definition of a software package?
1) An add-on for your computer such as additional memory
2) A set of computer program used for a certain function such as word processing
3) a protection you can buy for a computer
4) The box, manual and licence agreement
5) None of these
32. In MICR, C stands for _______
1) code 2) colour
3) computer 4) character
5) None of these
33. Fax machines and imaging system are examples of _____
1) bar-code readers
2) imaging system
3) scanning devices
4) pen-based system
5) None of these
34. When writing a document, you can use the ______ feature to find an appropriate word or an alternative word if you find yourself stuck for the right word
1) dictionary 2) word finder
3) encyclopaedia 4) thesaurus
5) None of these
35. Which key is used in combination with another key to perform a specific task?
1) Function 2) Control 3) Arrow
4) Space bar 5) None of these
36.A disk's content that is recorded at the time of manufacture and that cannot be changed
or erased by the user is____
1) read-only 2) memory-only
3) run-only 4) write-only 5) None of these
37. In an information system, alphanumeric data normally takes the form of___
1) Sentence and paragraphs
2) Numbers and alphabetical
3) Graphic shapes and figures
4) Human voice and other sounds
5) None of these
38. A website's main page is called its______
1) home page 2) browser page
3) search place 4) bookmark
5) None of these
39.A collection of interrelated files in a computer is a _____
1) file manager 2) field 3) record
4) database 5) None of these
40. Which of the following is not the part of standard office suite?
1) Word Processor 2) Database
3) Image Editor 4) File manager
5) None of these
41. Which of the following is not a practical data-processing approach?
1) batch-sequential 2) batch-direct
3) immediate-sequential
4) immediate-direct 5) All of the above
42.A screen element of MS Word that is usually located below the title bar that provides
categorized options is  
1) Menu mar 2) Tool Bar 3) Status Bar
4) All of the above 5) None of the above
43. The processes of starting or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called  
1) Duping 2) Booting 3) Padding
4) All of above 5) None of the above
44. Which one of the following input device is user-programmable?
1) Dumb terminal 2) Smart terminal
3) VDT 4) Intelligent terminal
5) None of the above
45. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called:
1) robotics 2) simulation
3) computer forensics 4) animation
5) None of the above
46. Binary equivalent of 10 is
1) 1110 2) 1010 3) 1011
4) 0111 5) None of the above
47. The easiest way of broadcasting news in internet is known as
1) Blog 2) RSS feed 3) Portal
4) CBS Feed 5) None of the above
48.A 32 bit microprocessor has the word length equal to?
1) 2 bytes  2) 32 bytes  3) 4 bytes
4) 8 bytes  5) None of the above
49. Radio, TV broadcasting comes under __________ transmission mode
1) Simplex 2) Half Duplex 3) Full Duplex
4) Duplex 5) None of the above
50.What is the name of the temporary data storage area between a peripheral deviceand the CPU which compensates for the difference between their speeds?
1) Backing storage  2) Buffer
3) Main storage  4) Temporary storage
5) None of the above

No comments:

Post a Comment