Published by Roma Rahul Gupta for Chhattisgarh Online
Please find below "IT OFFICER -COMPUTER KNOWLEDGE PREVIOUS OLD SOLVED EXAM PAPER FOR ALL BANKS like Union bank,IBPS,Central bank, Allahabad,Punjab national bank,UCO Bank ETC. "
IBPS CWE COMPUTER KNOWLEDGE MCQs
**********************************************************************************
1. Who amongst the following is called the father of modern computing?
(A) charles babbage
(B) hollerith
(C) gottfried von leibnitz
(D) joesph M. jacquard
(E) None of these
ANSWER: (A)
2. Which of the following is a circuit that issue signals at regular intervals...
(A) Circuit board
(B) Clock
(C) Circuit card
(D) Gates
(E) None of these
ANSWER: (B)
3.
________ controls the way in which the computer system functions and
provides a means by which users can interact with the
computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
ANSWER: (C)
4. Paper tape is an old-established method of storing data, which replaced.....in many application.
(B) Magnetic tape
(B) Punched card
(C) Cartridge tape
(D) Magnetic disk
(E) None of these
ANSWER: (B)
5. A set of related programms are...
(A) File
(B) Arrays
(C) Package
(D) Subscripts
(E) None of these
ANSWER: (C)
6.Which of the following is a list-processing high-level language...
(A) APL
(B) LISP
(C) PROLOG
(D) ADA
(E) None of these
ANSWER: (B)
7. The 0 and 1 in the binary numbering system are called binary digits or ....
(A) bytes
(B) kilobytes
(C) decimal bytes
(D) bits
(E) nibbles
ANSWER: (D)
8.
A monitor's ... is the distance between the holes in the mask behind
the screen. This helps determine how sharp the dots
appear.
(A) refresh rate
(B) dot pitch
(C) resolution
(D) colour depth
(E) None of these
ANSWER: (B)
9.All of the following are examples of real security and privacy risks Except _
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
ANSWER: (B)
10. A directly accessible appointment calendar is a feature of a ... resident package.
(A) CPU
(B) memory
(C) Buffer
(D) ALU
(E) None of these
ANSWER: (B)
11.Which of the following code used in present day computing was developed by IBM corporation?
(A) ASCII
(B) Hollerith Code
(C) Baudot Code
(D) EBCDIC Code
(E) None of these
ANSWER: (D)
12.The first generation computer system used...
(A) Vacuum tubes
(B) Transistors
(C) Registers
(D) Magnetic cores
(E) Silicon chip
ANSWER: (A)
13. A term associated with the comparision of processing speeds of different computer system is...
(A) EFTS
(B) MPG
(C) MIPS
(D) CFPS
(E) None of these
ANSWER: (C)
14. Accessing data on tapes is much ....... than that accessing data on disks.
(A) Slower
(B) Faster
(C) Same
(D) All of the above
(E) None of these
ANSWER: (A)
15.
A standard intended to connect relatively lowspeed devices such as
keyboards, mice, modems and printers is
(A) Access bus
(B) Access
time
(C) Connector
(D) Access story
(E) None of these
ANSWER: (A)
16.The hardware in which data may be stored for a computer system is called
(A) Registers
(B) Bus
(C) Control unit
(D) Memory
(E) Chip
ANSWER: (D)
17.A
byte consists of one group of 8 bits put together. What is the largest
decimal number which can be represented by a byte?
(A) 128
(B) 256
(C) 255
(D) 118
(E) None of these
ANSWER: (C)
18. The 7-bit ASCII code widely used
(A) For data communication work
(B) In IBM mainframe models
(C) For coding external memory
(D) In large machines produced by non-IBM vendors
(E) None of the above
ANSWER: (A)
19. Perforated paper used as input or output media is known as...
(A) Paper tape
(B) Magnetic tape
(C) Punched paper tape
(D) Card punch
(E) None of these
ANSWER: (A)
20. The ____ directory is mandatory for every disk.
(A) Root
(B) Base
(C) Sub
(D) Case
(E) None of these
ANSWER: (A)
21. The invention of the slide rule is attributed to..
(A) Babbage
(B) Oughtred
(C) Pascal
(D) Napier
(E) None of these
ANSWER: (B)
22.
Which of the following is not an advantage of magnetic disk storage.
(A) The access time of magnetic disk is much less than that of
magnetic tape
(B) Disk storage is longer lasting than magnetic tape
(C) Disk storage is less expensive than tape storage
(D) All of the above
(E) None of these
ANSWER: (E)
23. Zip disks are referred as....
(A) Primary memory
(B) Secondary memory
(C) Register
(D) All of the above
(E) None of these
ANSWER: (B)
24. Two write a data one uses...
(A) CD-ROM drive
(B) CD-R drive
(C) Record player
(D) All of the above
(E) None of these
ANSWER: (B)
25. The memory sizes in mainframe computers and advanced technology micro computer are expressed as
(A) Bytes
(B) Kilo-bytes
(C) Bits
(D) Megabytes
(E) None of these
ANSWER: (D)
26.A byte is comprised of
(A) One bit
(B) Four bits
(C) Eight bits
(D) Sixteen bits
(E) None of these
ANSWER: (C)
27.A hard copy would be prepared on a
(A) Line printer
(B) Dot matrix printer
(C) Type writer terminal
(D) Plotter
(E) All of the above
ANSWER: (E)
28.A prefix for billion which is equal to .... is called as billi.
(A) 100
(B) 10000
(C) 1000
(D) 10
(E) None of these
ANSWER: (D)
29. Which of the following animations cannot be done in PowerPoint ?
(A) bullet list, revealed one bullet point at a time
(B) clip art - Fly in from the bottom
(C) table, revealed row by row
(D) chart, revealed by series
(E) None of these
ANSWER: (C)
30. In MS-Excel, what displays the contents of the active cell ?
(A) Namebox
(B) RowHeadings
(C) Formulabar
(D) Taskpane
(E) None of these
ANSWER: (C)
31. Several views are available in MS Front Page. Which one of the following is NOT a valid view ?
(A) Design View
(B) Folders View
(C) Navigation View
(D) Web Server View
(E) None of these
ANSWER: (D)
32. An electronic device that is capable of accepting encoded data at its input and generating unencoded data at its output is
(A) Modem
(B) Joystick
(C) Decoder
(D) Plotter
(E) None of these
ANSWER: (C)
33.
A communication protocol that converts noisy data links into
communication channels free of transmission errors is known
as
(A) Data link protocol
(B) Data link
(C) Data medium
(D) Data model
(E) None of these
ANSWER: (A)
34.
One of the components of central processing unit (CPU) of the computer
that performs mathematical and logical operations is ...
(A) ALU (arithmetic logical unit)
(B) Address register
(C) Analog
(D) All of the above
(E) None of these
ANSWER: (A)
35. In Assembly language....
(A) Mnemonics are used to code operations
(B) Alphanumeric symbols are used for addresses
(C) Language lies between high-level language and machine language
(D) All of the above
(E) None of these
ANSWER: (D)
Please find below "IT OFFICER -COMPUTER KNOWLEDGE PREVIOUS OLD SOLVED EXAM PAPER FOR ALL BANKS like Union bank,IBPS,Central bank, Allahabad,Punjab national bank,UCO Bank ETC. "
IBPS CWE COMPUTER KNOWLEDGE MCQs
1.Which command devides the surface of the blank disk into sectors and assign a unique address to each one
1) Ver
2) Format
3) Fat
4) Chkdsk
5) None of these
2.If you need to duplicate the entire disk, which command will you use ?
1) Copy
2) Diskcopy
3) Chkdsk
4) Format
5) None of these
3.A
.............. sometimes called a boot sector virus, executes when a
computer boots up because it resides in the boot sector of a floppy disk
or the master boot record of a hard disk
1) system virus
2) Trojan horse virus
3) file virus
4) macro virus
5) None of these
4.A result of a computer virus can not lead to ......
1) Disk Crash
2) Mother Board Crash
3) Corruption o f program
4) Deletion of files
5) None of these
5.Every computer connected to an intranet or extranet must have a distinct .......
1) firewall
2) proxy server
3) IP address
4) domain name
5) None of these
6.Programming language built into user programs such as Word and Excel are known as ......
1) 4GLs
2) Macro languages
3) object-oriented languages
4) visual programming languages
5) None of these
7.Firewalls are used to protect against .......
1) unauthorized Attacks
2) virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) None of these
8.Which of the following extensions suggest that the file is a backup copy
1) Bak
2) Bas
3) Com
4) Txt
5) None of these
9.Computer
programs are written in a high - level programming language; however,
the human readable version of a program is called .......
1) cache
2) instruction set
3) source code
4) word size
5) None of these
10.The software tools that enable a user to interact with a computer for specific purposes are known as .......
1) Hardware
2) Networked Software
3) Shareware
4) Applications
5) None of these
11...............
proessing is used when a large mail-order company accumulates orders
and processes them together in one large set
1) Batch
2) Online
3) Real-time
4) Group
5) None of these
12.When a file contains instructions that can be carried out by the computer, it is often called a(n) ...... file
1) data
2) information
3) executable
4) application
5) None of these
13.A complier translates a program written in a high - level language into ........
1) Machine language
2) An algorithm
3) A debugged program
4) Java
5) None of these
14.A set of step - by - step procedures for accomplishing a task is known as a(n) .....
1) algorithm
2) hardware program
3) software bug
4) firmware program
5) None of these
15.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) ......
1) Workstation
2) CPU
3) Magnetic disk
4) Integrated circuit
5) None of these
16.A saved document is referred to as a .....
1) file
2) word
3) folder
4) project
5) None of these
17.What is output ?
1) What the processor takes from the user
2) What the user gives to the processor
3) What the processor gets from the user
4) What the processor gives to the user
5) None of these
18.When you turn on the computer, the boot routine will perform this test ........
1) RAM test
2) Disk drive test
3) Memory test
4) Power - on self-test
5) None of these
19.Which of the following storage media provides sequential access only ?
1) Floppy disk
2) Magnetic disk
3) Magnetic tape
4) Optical disk
5) None of these
20.In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ........
1) copy and paste
2) copy, cut and paste
3) cut, copy and paste
4) cut and paste
5) None of these
21. Hardware includes ..........
1) all devices used to input data into a computer
2) sets of instructions that a computer runs or executes
3) the computer and all the devices connected to it that are used to input and output data
4) all devices involved in processing information including the central processing unit, memory and storage
5) None of these
22.The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ....... command
1) Replace
2) Find
3) Lookup
4) Search
5) None of these
23.The term 'user interface' refers to ............
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to user commands
3) the means by which the user interacts with the peripheral devices on the computer
4) the monitor that is available for the computer
5) None of these
24.For creating a document, you use ........ command at File Menu.
1) Open
2) Close
3) New
4) Save
5) None of these
25.The .............. becomes different shapes depending on the task you are performing
1) Active tab
2) Insertion point
3) Mouse pointer
4) Ribbon
5) None of these
26.Specilizd programs that asist users in locating information on the Web are called ....
1) Information engines
2) Search engines
3) Web browsers
4) Resource locators
5) None of these
27.The background of any Word document ......
1) Is always white colour
2) Is the colour you presect under the Options menu
3) Is always the same for the entire document
4) Can have any colour you choose
5) None of these
28.Correcting errors in a program is referred to as .........
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these
29.Any letter, number, or symbol found on the keyboard that you can type into the computer ..........
1) output
2) character
3) type
4) print
5) font
30.A symbol or question on the screen that prompts you to take action and tell the computer what to do next ........
1) scanner
2) questionnaire
3) prompt and dialog box
4) information seeker
5) None of these
31.Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs .....
1) menu bar
2) tool bar
3) user friendly
4) word processor
5) None of these
32.The primary device that a computer uses to store information ......
1) monitor
2) memory
3) disk
4) hard drive
5) None of these
33.A file extension is separated from the main file name with a(n) ......, but no spaces
1) questiion nark
2) exclamation mark
3) underscore
4) period
5) None of these
34.Application software is designed to accomplish .......
1) real -w orld tasks
2) computer-centric tasks
3) gaming tasks
4) operating system tasks
5) None of these
35.A
...... is a device that not only provdes surge protection, but also
furnishes your computer with battery backup power during a power outage
1) surge strip
2) USB
3) UPS
4) battery strip
5) None of these
36.The term ............. designates equipment that might be added to a computer system to enhance, its functionality
1) digitial device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
37........... this is the act of copying or downloading a program from a network and making multiple copies of it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
38.When
installing ............., the user must copy and usually decompress
program files from a CDROM or other medium to the hard disk
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these
39.Which one of the following would be considered as a way that a computer virus can enter a computer system ?
1) Opening an application previously installed on the computer
2) Borrowed an illegal copy of software
3) Viewing a website without causing any additional transctions
4) Running antivirus programs
5) None of these
40.Programs such as Mozila Firefox that serve as navigable windows into the Web are called ..........
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these
41.What is the main difference between a mainframe and a super computer ?
1) Super computer is much larger than mainframe computers
2) Super computers are much smaller than mainframe computers
3)
Supercomputers are focused to execute few programs as fast as possible
while mainframe uses its power to execute as many programs concurrently
4)
Supercomputers are focused to execute as many programs as possible
while mainframe uses its power to execute few programs as fast as
possible
5) None of these
42.What is the function of Recycle Bin ?
1) Store deleted file
2) Store temporary file
3) Store corrupted file
4) Store Document file
5) None of these
43.Which is the latest version of MS Office ?
1) Office XP
2) Windows XP
3) Office 2007
4) Office 2010
5) None of these
44.Which device can not be shared in network ?
1) Floppy
2) Keyword
3) Computer
4) Printer
5) None of these
45.What is the purpose of query ?
1) Input data
2) Output data
3) Sort & filter
4) All of above
5) None of these
46.Which port doesn't exist in computer ?
1) USB
2) Parallel
3) Com1 / Com2
4) RAW
5) None of these
47.What is the name of exel files ?
1) Workbook
2) Worksheet
3) Spreadsheet
4) Spread book
5) None of these
48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
4) All of he above
5) None of these
49.Synonym can be reviewed with
1) Spelling and grammar
2) Thesaurus
3) Both
4) Synonym viewer
5) None of these
50.Which command allows you to reduce fragments of file and optimize the performance of disk ?
1) Scandisk
2) Diskcomp
3) Chkdsak
4) Defrag
5) None of these
ANSWERS:
1) 2 2) 2 3) 5 4) 2 5) 2 6) 4 7) 1 8) 1 9) 3 10) 4
11) 1 12) 3 13) 1 14) 1 15) 4 16) 1 17) 4 18) 2 19) 2 20) 4
21) 4 22) 2 23) 1 24) 3 25) 3 26) 2 27) 4 28) 1 29) 2 30) 3
31) 1 32) 4 33) 5 34) 4 35) 3 36) 4 37) 3 38) 1 39) 2 40) 4
41) 3 42) 1 43) 4 44) 2 45) 4 46) 4 47) 1 48) 1 49) 2 50) 4
1) Ver
2) Format
3) Fat
4) Chkdsk
5) None of these
2.If you need to duplicate the entire disk, which command will you use ?
1) Copy
2) Diskcopy
3) Chkdsk
4) Format
5) None of these
3.A
.............. sometimes called a boot sector virus, executes when a
computer boots up because it resides in the boot sector of a floppy disk
or the master boot record of a hard disk
1) system virus
2) Trojan horse virus
3) file virus
4) macro virus
5) None of these
4.A result of a computer virus can not lead to ......
1) Disk Crash
2) Mother Board Crash
3) Corruption o f program
4) Deletion of files
5) None of these
5.Every computer connected to an intranet or extranet must have a distinct .......
1) firewall
2) proxy server
3) IP address
4) domain name
5) None of these
6.Programming language built into user programs such as Word and Excel are known as ......
1) 4GLs
2) Macro languages
3) object-oriented languages
4) visual programming languages
5) None of these
7.Firewalls are used to protect against .......
1) unauthorized Attacks
2) virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) None of these
8.Which of the following extensions suggest that the file is a backup copy
1) Bak
2) Bas
3) Com
4) Txt
5) None of these
9.Computer
programs are written in a high - level programming language; however,
the human readable version of a program is called .......
1) cache
2) instruction set
3) source code
4) word size
5) None of these
10.The software tools that enable a user to interact with a computer for specific purposes are known as .......
1) Hardware
2) Networked Software
3) Shareware
4) Applications
5) None of these
11...............
proessing is used when a large mail-order company accumulates orders
and processes them together in one large set
1) Batch
2) Online
3) Real-time
4) Group
5) None of these
12.When a file contains instructions that can be carried out by the computer, it is often called a(n) ...... file
1) data
2) information
3) executable
4) application
5) None of these
13.A complier translates a program written in a high - level language into ........
1) Machine language
2) An algorithm
3) A debugged program
4) Java
5) None of these
14.A set of step - by - step procedures for accomplishing a task is known as a(n) .....
1) algorithm
2) hardware program
3) software bug
4) firmware program
5) None of these
15.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) ......
1) Workstation
2) CPU
3) Magnetic disk
4) Integrated circuit
5) None of these
16.A saved document is referred to as a .....
1) file
2) word
3) folder
4) project
5) None of these
17.What is output ?
1) What the processor takes from the user
2) What the user gives to the processor
3) What the processor gets from the user
4) What the processor gives to the user
5) None of these
18.When you turn on the computer, the boot routine will perform this test ........
1) RAM test
2) Disk drive test
3) Memory test
4) Power - on self-test
5) None of these
19.Which of the following storage media provides sequential access only ?
1) Floppy disk
2) Magnetic disk
3) Magnetic tape
4) Optical disk
5) None of these
20.In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ........
1) copy and paste
2) copy, cut and paste
3) cut, copy and paste
4) cut and paste
5) None of these
21. Hardware includes ..........
1) all devices used to input data into a computer
2) sets of instructions that a computer runs or executes
3) the computer and all the devices connected to it that are used to input and output data
4) all devices involved in processing information including the central processing unit, memory and storage
5) None of these
22.The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ....... command
1) Replace
2) Find
3) Lookup
4) Search
5) None of these
23.The term 'user interface' refers to ............
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to user commands
3) the means by which the user interacts with the peripheral devices on the computer
4) the monitor that is available for the computer
5) None of these
24.For creating a document, you use ........ command at File Menu.
1) Open
2) Close
3) New
4) Save
5) None of these
25.The .............. becomes different shapes depending on the task you are performing
1) Active tab
2) Insertion point
3) Mouse pointer
4) Ribbon
5) None of these
26.Specilizd programs that asist users in locating information on the Web are called ....
1) Information engines
2) Search engines
3) Web browsers
4) Resource locators
5) None of these
27.The background of any Word document ......
1) Is always white colour
2) Is the colour you presect under the Options menu
3) Is always the same for the entire document
4) Can have any colour you choose
5) None of these
28.Correcting errors in a program is referred to as .........
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these
29.Any letter, number, or symbol found on the keyboard that you can type into the computer ..........
1) output
2) character
3) type
4) print
5) font
30.A symbol or question on the screen that prompts you to take action and tell the computer what to do next ........
1) scanner
2) questionnaire
3) prompt and dialog box
4) information seeker
5) None of these
31.Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs .....
1) menu bar
2) tool bar
3) user friendly
4) word processor
5) None of these
32.The primary device that a computer uses to store information ......
1) monitor
2) memory
3) disk
4) hard drive
5) None of these
33.A file extension is separated from the main file name with a(n) ......, but no spaces
1) questiion nark
2) exclamation mark
3) underscore
4) period
5) None of these
34.Application software is designed to accomplish .......
1) real -w orld tasks
2) computer-centric tasks
3) gaming tasks
4) operating system tasks
5) None of these
35.A
...... is a device that not only provdes surge protection, but also
furnishes your computer with battery backup power during a power outage
1) surge strip
2) USB
3) UPS
4) battery strip
5) None of these
36.The term ............. designates equipment that might be added to a computer system to enhance, its functionality
1) digitial device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
37........... this is the act of copying or downloading a program from a network and making multiple copies of it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
38.When
installing ............., the user must copy and usually decompress
program files from a CDROM or other medium to the hard disk
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these
39.Which one of the following would be considered as a way that a computer virus can enter a computer system ?
1) Opening an application previously installed on the computer
2) Borrowed an illegal copy of software
3) Viewing a website without causing any additional transctions
4) Running antivirus programs
5) None of these
40.Programs such as Mozila Firefox that serve as navigable windows into the Web are called ..........
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these
41.What is the main difference between a mainframe and a super computer ?
1) Super computer is much larger than mainframe computers
2) Super computers are much smaller than mainframe computers
3)
Supercomputers are focused to execute few programs as fast as possible
while mainframe uses its power to execute as many programs concurrently
4)
Supercomputers are focused to execute as many programs as possible
while mainframe uses its power to execute few programs as fast as
possible
5) None of these
42.What is the function of Recycle Bin ?
1) Store deleted file
2) Store temporary file
3) Store corrupted file
4) Store Document file
5) None of these
43.Which is the latest version of MS Office ?
1) Office XP
2) Windows XP
3) Office 2007
4) Office 2010
5) None of these
44.Which device can not be shared in network ?
1) Floppy
2) Keyword
3) Computer
4) Printer
5) None of these
45.What is the purpose of query ?
1) Input data
2) Output data
3) Sort & filter
4) All of above
5) None of these
46.Which port doesn't exist in computer ?
1) USB
2) Parallel
3) Com1 / Com2
4) RAW
5) None of these
47.What is the name of exel files ?
1) Workbook
2) Worksheet
3) Spreadsheet
4) Spread book
5) None of these
48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
4) All of he above
5) None of these
49.Synonym can be reviewed with
1) Spelling and grammar
2) Thesaurus
3) Both
4) Synonym viewer
5) None of these
50.Which command allows you to reduce fragments of file and optimize the performance of disk ?
1) Scandisk
2) Diskcomp
3) Chkdsak
4) Defrag
5) None of these
ANSWERS:
1) 2 2) 2 3) 5 4) 2 5) 2 6) 4 7) 1 8) 1 9) 3 10) 4
11) 1 12) 3 13) 1 14) 1 15) 4 16) 1 17) 4 18) 2 19) 2 20) 4
21) 4 22) 2 23) 1 24) 3 25) 3 26) 2 27) 4 28) 1 29) 2 30) 3
31) 1 32) 4 33) 5 34) 4 35) 3 36) 4 37) 3 38) 1 39) 2 40) 4
41) 3 42) 1 43) 4 44) 2 45) 4 46) 4 47) 1 48) 1 49) 2 50) 4
1. Who amongst the following is called the father of modern computing?
(A) charles babbage
(B) hollerith
(C) gottfried von leibnitz
(D) joesph M. jacquard
(E) None of these
ANSWER: (A)
2. Which of the following is a circuit that issue signals at regular intervals...
(A) Circuit board
(B) Clock
(C) Circuit card
(D) Gates
(E) None of these
ANSWER: (B)
3.
________ controls the way in which the computer system functions and
provides a means by which users can interact with the
computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
ANSWER: (C)
4. Paper tape is an old-established method of storing data, which replaced.....in many application.
(B) Magnetic tape
(B) Punched card
(C) Cartridge tape
(D) Magnetic disk
(E) None of these
ANSWER: (B)
5. A set of related programms are...
(A) File
(B) Arrays
(C) Package
(D) Subscripts
(E) None of these
ANSWER: (C)
6.Which of the following is a list-processing high-level language...
(A) APL
(B) LISP
(C) PROLOG
(D) ADA
(E) None of these
ANSWER: (B)
7. The 0 and 1 in the binary numbering system are called binary digits or ....
(A) bytes
(B) kilobytes
(C) decimal bytes
(D) bits
(E) nibbles
ANSWER: (D)
8.
A monitor's ... is the distance between the holes in the mask behind
the screen. This helps determine how sharp the dots
appear.
(A) refresh rate
(B) dot pitch
(C) resolution
(D) colour depth
(E) None of these
ANSWER: (B)
9.All of the following are examples of real security and privacy risks Except _
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
ANSWER: (B)
10. A directly accessible appointment calendar is a feature of a ... resident package.
(A) CPU
(B) memory
(C) Buffer
(D) ALU
(E) None of these
ANSWER: (B)
11.Which of the following code used in present day computing was developed by IBM corporation?
(A) ASCII
(B) Hollerith Code
(C) Baudot Code
(D) EBCDIC Code
(E) None of these
ANSWER: (D)
12.The first generation computer system used...
(A) Vacuum tubes
(B) Transistors
(C) Registers
(D) Magnetic cores
(E) Silicon chip
ANSWER: (A)
13. A term associated with the comparision of processing speeds of different computer system is...
(A) EFTS
(B) MPG
(C) MIPS
(D) CFPS
(E) None of these
ANSWER: (C)
14. Accessing data on tapes is much ....... than that accessing data on disks.
(A) Slower
(B) Faster
(C) Same
(D) All of the above
(E) None of these
ANSWER: (A)
15.
A standard intended to connect relatively lowspeed devices such as
keyboards, mice, modems and printers is
(A) Access bus
(B) Access
time
(C) Connector
(D) Access story
(E) None of these
ANSWER: (A)
16.The hardware in which data may be stored for a computer system is called
(A) Registers
(B) Bus
(C) Control unit
(D) Memory
(E) Chip
ANSWER: (D)
17.A
byte consists of one group of 8 bits put together. What is the largest
decimal number which can be represented by a byte?
(A) 128
(B) 256
(C) 255
(D) 118
(E) None of these
ANSWER: (C)
18. The 7-bit ASCII code widely used
(A) For data communication work
(B) In IBM mainframe models
(C) For coding external memory
(D) In large machines produced by non-IBM vendors
(E) None of the above
ANSWER: (A)
19. Perforated paper used as input or output media is known as...
(A) Paper tape
(B) Magnetic tape
(C) Punched paper tape
(D) Card punch
(E) None of these
ANSWER: (A)
20. The ____ directory is mandatory for every disk.
(A) Root
(B) Base
(C) Sub
(D) Case
(E) None of these
ANSWER: (A)
21. The invention of the slide rule is attributed to..
(A) Babbage
(B) Oughtred
(C) Pascal
(D) Napier
(E) None of these
ANSWER: (B)
22.
Which of the following is not an advantage of magnetic disk storage.
(A) The access time of magnetic disk is much less than that of
magnetic tape
(B) Disk storage is longer lasting than magnetic tape
(C) Disk storage is less expensive than tape storage
(D) All of the above
(E) None of these
ANSWER: (E)
23. Zip disks are referred as....
(A) Primary memory
(B) Secondary memory
(C) Register
(D) All of the above
(E) None of these
ANSWER: (B)
24. Two write a data one uses...
(A) CD-ROM drive
(B) CD-R drive
(C) Record player
(D) All of the above
(E) None of these
ANSWER: (B)
25. The memory sizes in mainframe computers and advanced technology micro computer are expressed as
(A) Bytes
(B) Kilo-bytes
(C) Bits
(D) Megabytes
(E) None of these
ANSWER: (D)
26.A byte is comprised of
(A) One bit
(B) Four bits
(C) Eight bits
(D) Sixteen bits
(E) None of these
ANSWER: (C)
27.A hard copy would be prepared on a
(A) Line printer
(B) Dot matrix printer
(C) Type writer terminal
(D) Plotter
(E) All of the above
ANSWER: (E)
28.A prefix for billion which is equal to .... is called as billi.
(A) 100
(B) 10000
(C) 1000
(D) 10
(E) None of these
ANSWER: (D)
29. Which of the following animations cannot be done in PowerPoint ?
(A) bullet list, revealed one bullet point at a time
(B) clip art - Fly in from the bottom
(C) table, revealed row by row
(D) chart, revealed by series
(E) None of these
ANSWER: (C)
30. In MS-Excel, what displays the contents of the active cell ?
(A) Namebox
(B) RowHeadings
(C) Formulabar
(D) Taskpane
(E) None of these
ANSWER: (C)
31. Several views are available in MS Front Page. Which one of the following is NOT a valid view ?
(A) Design View
(B) Folders View
(C) Navigation View
(D) Web Server View
(E) None of these
ANSWER: (D)
32. An electronic device that is capable of accepting encoded data at its input and generating unencoded data at its output is
(A) Modem
(B) Joystick
(C) Decoder
(D) Plotter
(E) None of these
ANSWER: (C)
33.
A communication protocol that converts noisy data links into
communication channels free of transmission errors is known
as
(A) Data link protocol
(B) Data link
(C) Data medium
(D) Data model
(E) None of these
ANSWER: (A)
34.
One of the components of central processing unit (CPU) of the computer
that performs mathematical and logical operations is ...
(A) ALU (arithmetic logical unit)
(B) Address register
(C) Analog
(D) All of the above
(E) None of these
ANSWER: (A)
35. In Assembly language....
(A) Mnemonics are used to code operations
(B) Alphanumeric symbols are used for addresses
(C) Language lies between high-level language and machine language
(D) All of the above
(E) None of these
ANSWER: (D)
Sunday, November 20, 2011
IBPS CLERKS EXAM COMPUTER KNOWLEDGE PRACTICE MODEL PAPER
1. The instructions that tell a computer how to carry out the processing tasks are referred to as computer .........
1) programs
2) processors
3) input devices
4) memory modules
5) None of these
2. An area of a computer that temporarily holds data waiting to be processed is ..........
1) CPU
2) Memory
3) Storage
4) File
5) None of these
3. To select or unselect one word to the right
1) CTRL + SHIFT
2) CTRL + SHIFT + UP Arrow
3) CTRL + SHIFT + Down Arrow
4) CTRL + SHIFT + Right Arrow
5) None of these
4. To maximize or restore a selected window
1) CTRL + F7
2) CTRL + F10
3) CTRL + F8
4) CTRL + F9
5) None of these
5. To Copy a picture of the selected window to the clipboard
1) ALT + TAB
2) Ctrl + TAB
3) ALT + Print Screen
4) Both (1) and (2)
5) None of these
6. .......... is the key to close a selected drop - down list; cancel a comm-and and close a dialog box.
1) TAB
2) SHIFT
3) ESC
4) F10
5) None of these
7. ......... is the key we use to run the selected command.
1) SHIFT
2) TAB
3) ENTER
4) CTRL
5) None of these
8. ............ is the functional key to display save-as box.
1) F5
2) F6
3) F9
4) F12
5) None of these
9. ............ is the combination of keys to switch between the last four places that you have edited
1) ALT + CTRL + Z
2) ALT + CTRL + Y
3) ALT + TAB + Z
4) ALT + SHIFT + Z
5) None of these
10. ............ is the Keyboard shortcut key to insert auto sum
1) ALT
2) ALT=
3) ALT+
4) ALT–
5) ALT+CTRL
11. Data becomes ................ when it is presented in a format that people can understand and use
1) processed
2) graphs
3) information
4) presentation
5) None of these
12. The term ............. designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
13. A ............ is a microprocessor - based computing device.
1) personal computer
2) mainframe
3) workstation
4) server
5) None of these
14. RAM can be thought of as the ......... for the computer's processor
1) factory
2) operating room
3) waiting room
4) planning room
5) None of these
15. Which of the following are the functions of a operating system
1) Allocates resources
2) Monitors Activities
3) Manages disks and files
4) All of the above
5) Only 1 and 2
16. To move a copy of file from one computer to another over a communication channel is called ?
1) File transfer
2) File encryption
3) File modification
4) File copying
5) None of these
17. The primary function of the ............ is to set up the hardware and load and start an operating system
1) System Programs
2) BIOS
3) CP
4) Memory
5) None of these
18. What kind of memory is both static and non - volatile ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) 5) None of these
19. .......... is computer software designed to operate the computer hardware and to provide platform for running application software
1) Application software
2) System software
3) Software
4) Operating system
5) None of these
20. The ......... is the amount of data that a storage device can move from the storage medium to the Computer per second
1) data migration rate
2) data digitizing rate
3) data transfer rate
4) data access rate
5) None of these
21. A device, which is not connected to CPU, is called as .......
1) land-line device
2) On-line device
3) Off-line device
4) Device
5) None of the above
22. What is the other name for programmed chip?
1) RAM
2) ROM
3) LSIC
4) PROM
5) None of these
23. On-line real time systems become popular in ........... generation
1) First Generation
2) Second Generation
3) Third Generation
4) FOurth Generation
5) None of thes
24. You use a(n) ....., such as a keyboard or mouse, to input information
1) output device
2) input device
3) storage device
4) processing device
5) None of these
25. ............ is the ability of a device to "jump" directly to the requested data
1) Sequential access
2) Random access
3) Quick access
4) All of the above
5) None of these
26. ............ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously
1) Multitasking
2) Multithreading
3) Multiprocessing
4) Multicoputing
5) None of these
27. The task of performing operations like arithmetic and logical operations is called ......
1) Processing
2) Storing
3) Editing
4) Sorting
5) None of these
28. The ALU and Control Unit joinly known as
1) RAM
2) ROM
3) CPU
4) PC
5) None of these
29. RAM is an example of
1) Secondary memory
2) Primary memory
3) Main memory
4) Both (1) and (2)
5) None of these
30. Magnetic disk is an example of
1) Secondary memory
2) Primary meory
3) Main memory
4) Botha (1) and (2)
5) None of these
31. Which one of the following is NOT a computer language /
1) MS-Excel
2) BASIC
3) COBOL
4) C++
5) None of these
32. Each memory cell has a unique number, assigned to it is called as the ....... of the cell
1) Address
2) Register
3) Number
4) Path
5) None of these
33. RAm is also called as
1) Read / Write Memory
2) Long Memory
3) Permanent Memory
4) Primary Memory
5) None of these
34. ............ Store data or information temporarily and pass it on as directed by the control unit
1) Address
2) Register
3) Number
4) Memory
5) None of these
35. Select the Odd one
1) Operating system
2) Interpreter
3) Compiler
4) Assembler
5) None of these
36. A ............ is an additional set of commands that the computer displays after you make a selection from the main menu
1) dialog box
2) submenu
3) menu selection
4) All of the above
5) None of these
37. COBOL is an acronym for .............
1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these
38. All of the following are examples of real security and privacy risks EXCEPT
1) hackers
2) Spam
3) viruses
4) identity theft
5) None of these
39. Which of the following is NOT one of the four major data processing functions of a computer?
1) gathering data
2) processing data into information
3) analyzing the data or information
4) storing the data or information
5) None of these
40. All of the following are examples of storage devices EXCEPT :
1) hard disk drives
2) printers
3) floppy disk drives
4) CD drives
5) Pen drives
41. The CPU and memory are located on the :
1) expansion board
2) motherboard
3) storage device
4) output device
5) display board
42. .............. is the science that attempts to produce machines that display the same type of intelligence that humans do
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Aritificial intelligence (Al)
5) None of these
43. Servers are computers that provide resources to other computers connected to a :
1) networkd
2) mainframe
3) supercomputer
4) client
5) internet
44. When creating a computer program, the ......... designs the structure of the program
1) End user
2) System Analyst
3) Programmer
4) All of the above
5) None of these
45. A computer program that converts an entire program into machine language at one time is called a/ an
1) interpreter
2) simulator
3) characters
4) numbers
5) None of these
46. Computers process data into information by working exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these
47. The difference between people with access to computers and the Internet and those without this access is known as the :
1) digital divide
2) Internet divide
3) Web divide
4) broadband divide
5) None of these
48. Computers manipulate data in many ways, and this manipulation is calld ......
1) upgrading
2) processing
3) batching
4) utilizing
5) None of these
49. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:
1) robotics
2) simulation
3) computer forensics
4) animation
5) None of these
50. Where does most data go first with in a computer memory hierarchy ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) None of these
ANSWERS:
1) 1 2) 2 3) 4 4) 2 5) 3 6) 3 7) 3 8) 4 9) 1 10) 2
11) 3 12) 4 13) 1 14) 3 15) 4 16) 1 17) 2 18) 2 19) 2
20) 3 21) 3 22) 2 23) 3 24) 2 25) 2 26) 1 27) 1 28) 3 29) 2 30) 1
31) 1 32) 1 33) 1 34) 2 35) 1 36) 1 37) 1 38) 2 39) 3 40) 2
41) 2 42) 4 43) 2 44) 2 45) 3 46) 4 47) 1 48) 2 49) 3 50) 1
************************************************
punjab-and-sind-bank-clerk-exam-2011.html'>Punjab and Sind Bank Clerk Exam., 2011
Computer Knowledge
(Held on 30-1-2011)
1. The software tools that enable a user to interact with a computer for specific purposes are known as—
(A) Hardware
(B) Networked Software
(C) Shareware
(D) Applications
(E) None of these
Ans : (D)
2. A………shares hardware, software, and data among authorized users.
(A) network
(B) protocol
(C) hyperlink
(D) transmitter
(E) None of these
Ans : (A)
3.
Computer programs are written in a high-level programming language;
however, the humanreadable version of a program is called—
(A) cache
(B) instruction set
(C) source code
(D) word size
(E) None of these
Ans : (C)
4. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is—
(A) copy and paste
(B) copy, cut and paste
(C) cut, copy and paste
(D) cut and paste
(E) None of these
Ans : (D)
5. Which of the following is not a function of the control unit ?
(A) Read instructions
(B) Execute instructions
(C) Interpret instructions
(D) Direct operations
(E) None of these
Ans : (D)
6. Software for organizing storage and retrieval of information is a(n)—
(A) operating system
(B) database
(C) database program
(D) data warehouse
(E) None of these
Ans : (C)
7. A set of step-by-step procedures for accomplishing a task is known as a(n)—
(A) algorithm
(B) hardware program
(C) software bug
(D) firmware program
(E) None of these
Ans : (A)
8. Which of the following is not true about RAM ?
(A) RAM is a temporary storage area
(B) RAM is the same as hard disk storage
(C) RAM is volatile
(D) Information stored in RAM is gone when you turn the computer off
(E) None of these
Ans : (B)
9. The main directory of a disk is called the………directory.
(A) root
(B) sub
(C) folder
(D) network
(E) None of these
Ans : (A)
10. The physical arrangement of elements on a page is referred to as a document’s……
(A) features
(B) format
(C) pagination
(D) grid
(E) None of these
Ans : (B)
11. =SUM (B1 : B8) is an example of a—
(A) function
(B) formula
(C) cell address
(D) value
(E) None of these
Ans : (B)
12. Which of the following storage media provides sequential access only ?
(A) Floppy disk
(B) Magnetic disk
(C) Magnetic tape
(D) Optical disk
(E) None of these
Ans : (B)
13. Compilers and translators are one form of—
(A) ROM
(B) RAM
(C) Hard disk
(D) Software
(E) None of these
Ans : (D)
14. Data representation is based on the………number system, which uses two numbers to represent all data.
(A) binary
(B) biometric
(C) bicentennial
(D) byte
(E) None of these
Ans : (A)
15. The most common input devices include—
(A) Monitor and keyboard
(B) Monitor and mouse
(C) Mouse and keyboard
(D) Printer and mouse
(E) None of these
Ans : (C)
16. www means—
(A) world wide wonder
(B) world wide wizard
(C) world wide web
(D) wide world web
(E) None of these
Ans : (C)
17. ………processing is used when a large mail-order company accumulates orders and processes them together in one large set.
(A) Batch
(B) Online
(C) Real-time
(D) Group
(E) None of these
Ans : (A)
18. What is the difference between a CD-ROM and a CD-RW ?
(A) They are the same—just two different terms used by different manufacturers
(B) A CD-ROM can be written to and a CD-RW cannot
(C) A CD-RW can be written to, but a CD-ROM can only be read from
(D) A CD-ROM holds more information than a CD-RW
(E) None of these
Ans : (C)
19. Holding the mouse button down while moving an object or text is known as—
(A) Moving
(B) Dragging
(C) Dropping
(D) Highlighting
(E) None of these
Ans : (B)
20. A………is a collection of data that is stored electronically as a series of records in a table.
(A) spreadsheet
(B) presentation
(C) database
(D) web page
(E) None of these
Ans : (C)
21. The………primarily take(s) care of the behind-the-scenes details and manage(s) the hardware.
(A) operating system
(B) application software
(C) peripheral devices
(D) hard disk
(E) None of these
Ans : (A)
22. A……is a professionally designed ‘empty’ document that can be adapted to the user’s needs.
(A) file
(B) guide
(C) template
(D) user guide file
(E) None of these
Ans : (C)
23. A group of 8 bits is known as a—
(A) Byte
(B) Kilobyte
(C) Binary digit
(D) Megabit
(E) None of these
Ans : (A)
24. The hardware device commonly referred to as the ‘brain’ of the computer is the—
(A) RAM chip
(B) Data input
(C) CPU
(D) Secondary storage
(E) None of these
Ans : (C)
25. What is the intersection of a column and a row on a worksheet called ?
(A) Column
(B) Value
(C) Address
(D) Cell
(E) None of these
Ans : (D)
26. ………are often delivered to a PC through an e-mail attachment and are often designed to do harm.
(A) Viruses
(B) Spam
(C) Portals
(D) Email messages
(E) None of these
Ans : (A)
27. What is the storage area for e-mail messages called ?
(A) A folder
(B) A directory
(C) A mailbox
(D) The hard disk
(E) None of these
Ans : (C)
28. A desktop computer is also known as a—
(A) Palm Pilot
(B) PC
(C) Laptop
(D) Mainframe
(E) None of these
Ans : (B)
29. When a file contains instructions that can be carried out by the computer, it is often called a(n) ……file.
(A) data
(B) information
(C) executable
(D) application
(E) None of these
Ans : (C)
30. Documents converted to……can be published to the Web.
(A) a.doc file
(B) http
(C) machine language
(D) HTML
(E) None of these
Ans : (D)
31. If a user needs information instantly available to the CPU, it should be stored—
(A) on a CD
(B) in secondary storage
(C) in the CPU
(D) in RAM
(E) None of these
Ans : (B)
32. To what temporary area can you store text and other data, and later paste them to another location ?
(A) The clipboard
(B) ROM
(C) CD-ROM
(D) The hard disk
(E) None of these
Ans : (A)
33. In a spreadsheet, a………is a number you will use in a calculation.
(A) label
(B) cell
(C) field
(D) value
(E) None of these
Ans : (D)
34.
After slide-directed time, if you want to move ahead automatically,
click in……check box in transition of this slide group in tab of
animations—
(A) Transition timer
(B) Automatically opter
(C) Transition opter
(D) Automatic timer
(E) None of these
Ans : (B)
35. All are included in removable media except the following—
(A) CD-ROMs
(B) Diskette
(C) DVDs
(D) High disk drive
(E) None of these
Ans : (D)
36.
If you open some menu and then decide that you do not want to select
some option, then click the menu title again or press the…… key to
layout the menu.
(A) shift
(B) tab
(C) escape
(D) F1
(E) None of these
Ans : (C)
37. Using the……process, it is easy to change the name of the file.
(A) transforming
(B) crash
(C) renaming
(D) retagging
(E) None of these
Ans : (C)
38. ………view shows that how will content on printed page, alongwith footer and margin header, appear.
(A) Draft
(B) Full screen reading
(C) Outline
(D) Page layout
(E) None of these
Ans : (D)
39. Using………, the text can be entered and edited very efficiently.
(A) spreadsheet
(B) typewriter
(C) word processing programme
(D) desktop publishing programme
(E) None of these
Ans : (D)
40. Other folders, named subfolders, can remain in the folders while creating hierarchical structure—
(A) Mini folder
(B) Teard folder
(C) Subfolders
(D) Object
(E) None of these
Ans : (C)
41. By using slide………, the characteristics of the fonts of all the slides in presentation, can be changed.
(A) theme
(B) icon
(C) master
(D) style
(E) None of these
Ans : (B)
42. Though several programmers can be opened simultaneously yet only…………programmed can be active.
(A) four
(B) three
(C) two
(D) one
(E) None of these
Ans : (B)
43. Straight and Uniform margins on both the sides indicate that there is …………in the document.
(A) full justification
(B) full alignment
(C) left justification
(D) right justification
(E) None of these
Ans : (A)
44. Among the typical computer programming languages used today, the following is not included in—
(A) C++
(B) JAVA
(C)Visual Basic.NET
(D) Machine language
(E) None of these
Ans : (D)
45. In table in excel, there are typical labels alongwith……
(A) Letters
(B) Numbers
(C) Names
(D) Formulae
(E) None of these
Ans : (B)
46.
………….makes available the commands to righten the software. Instructions
are translated step-by-step and executed by the processor so that some
objective can be achieved or some problem can be solved.
(A) Software patch
(B) Al language
(C) Presentation language
(D) Programming language
(E) None of these
Ans : (C)
47. As you create documents, graphs and pictures your computer holds the data in—
(A) Restore file
(B) Backup drive
(C) Clip board
(D) Memory
(E) None of these
Ans : (D)
48. Which of the following terms is used for the form in which the word will appear on the page ?
(A) Text formatting
(B) Character formatting
(C) Point size
(D) Type face
(E) None of these
Ans : (A)
49. ……….helps to capture the raw data and enter into the computer system.
(A) CPU
(B) Integrated circuit
(C) Input device
(D) Motherboard
(E) None of these
Ans : (C)
50. The following are included in the world programme ………….Title Bar, Ribbon, Status Bar, Views, Document workspace.
(A) Window
(B) Browser
(C) Explorer
(D) Website
(E) None of these
Ans : (A)
**********************************************************************
IBPS CLERKS EXAM COMPUTER KNOWLEDGE MCQs
1.
Programs from the same developer , sold bundled together , that
provide better integration and share common features , toolbars and
menus are known as ....
(A) software suites
(B) integrated software packages
(C) software processing packages
(D) personal information managers
(E) none of these
ANS (A)
2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these
ANS (C)
3. ______________ servers store and manages files for network users.
(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these
ANS (D)
4. All of the following are examples of real security and privacy risks Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
ANS (B)
5. ___________ terminals (formerly known as cash registers) are often
connected to complex inventory and sales computer systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these
ANS (B)
6. The OSI model is divided into _______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(E) None of these
ANS (C)
7. System software is the set of programs that enables your computer's hardware devices and ______ software to work together.
(A) management
(B) processing
(C) utility
(D) application
(E) None of these
ANS (D)
8. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
(A) Servers
(B) Embedded computers
(C) Robotic computers
(D) Mainframes
(E) None of these
ANS (B)
9. The following are all computing devices , except.........
(A) notebook computers
(B) cellular telephones
(C) digital scanners
(D) personal digital assistants
(E) None of these
ANS (C)
10. in a ring topology , the the computer in possession of the ______ can trasmit data
(A) packet
(B) data
(C) access method
(D) token
(E) None of these
ANS (D)
11. This part of operating system manages the essential peripherals,
such as the keyboard, screen , disk drives, and parallel and serial
ports ____
(A) basic input/output system
(B) secondary input/output system
(C) peripheral input/output system
(D) marginal input/output system
(E) None of these
ANS (A)
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these
ANS (B)
13. ________ controls the way in which the computer system functions and
provides a means by which users can interact with the computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
ANS (C)
14. Servers are computers that provide resources to other computers connected to a ___________
(A) mainframe
(B) network
(C) supercomputer
(D) client
(E) None of these
ANS (B)
15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition
(B) To confirm that data exists
(C) To analyze data for expected relationships
(D) To create a new data warehouse
(E) None of these
ANS (A)
16. URL stands for ........
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(E) None of these
ANS (C)
17. A database management system (DBMS) is a ............
(A) hardware system used to create , maintain and provide controlled access to a database
(B) hardware system used to create, maintain, and provide uncontrolled access to a database.
(C) software system used to create, maintain, and provide uncontrolled access to a database.
(D) software system used to create, maintain, and provide controlled access to a database.
(E) None of these
ANS (D)
18. Which of the following is NOT a goal of transaction processing system ?
(A) Capture , process and store transactions
(B) Produce a variety of documents related to routine business activities
(C) Reduce manual effort associated with processing business transactions
(D) Produce standard reports used for management decision making
(E) None of these
ANS ()
19. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
ANS (B)
20. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) None of these
ANS (D)
21. _____________ are words that a programming language has set aside for its own use.
(A) Control worlds
(B) Reserved words
(C) Control structures
(D) Reserved keys
(E) None of these
ANS (B)
22. What is the primary difference between a virus and a worm?
(A) A worm has the ability to self-propagate from an infected user's computer to other computers
(B) A worm is usually written by a cracker: Script bunnies do not have the skills to develop a worm program
(C) A virus is very harmful to the computers it infects : a worm is not a serious a problem
(D) Anti-virus software is effective in fighting viruses but not worms
(E) None of these
ANS ()
23. ______ describe what is database fields.
(A) Structures
(B) Field markers
(C) Field definition
(D) Field names
(E) None of these
ANS (D)
24. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
(A) router
(B) modem
(C) node
(D) cable
(E) None of these
ANS (A)
25. A goal of normalization is to __________
(A) minimize the number of relationships
(B) minimize the number of entities
(C) minimize the number of tables
(D) minimize the number of redundancy
(E) None of these
ANS (D)
26. Granting an outside organization access to internet web pages is often implemented using a (n) ____
(A) extranet
(B) intranet
(C) internet
(D) hacker
(E) None of these
ANS (A)
27. Which term identifies a specific computer on the web and the main page of the entire site
(A) URL
(B) Web site address
(C) Hyperlink
(D) Domain name
(E) None of these
ANS (A)
28. The code that relational database management systems use to perform their database task is referred to as .....
(A) QBE
(B) SQL
(C) OLAP
(D) Sequel Server
(E) None of these
ANS (B)
29. Chip is a common nickname for a (n):
(A) transistor
(B) resistor
(C) integrated circuit
(D) semiconductor
(E) None of these
ANS (c)
30. The purpose of the primary key in a database is to:
(A) unlock the database
(B) provide a map of the data
(C) uniquely identify a record
(D) establish constraints on database operations.
(E) None of these
ANS (B)
31. A _________ contains specific rules and words that express the logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
ANS ()
32. The design of the network is called the network:
(A) architecture
(B) server
(C) transmission
(D) type
(E) None of these
ANS (A)
33. The most frequently used instructions of a computer program are likely to be fetched from:
(A) the hard disk
(B) cache memory
(C) RAM
(D) registers
(E) None of these
ANS (B)
34. The ____________ contains data descriptions and defines the name, data type, and length of each field in the database.
(A) data dictionary
(B) data table
(C) data record
(D) data field
(E) None of these
ANS (A)
35. Personal logs or journal entries posted on the Web are known as:
(A) listservs
(B) Webcasts
(C) blogs
(D) subject directories
(E) None of these
ANS (C)
36. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
(A) command - based user interface
(B) GUI
(C) system utility
(D) API
(E) None of these
ANS (B)
37. The _____ manual tells you how to use a software program.
(A) documentation
(B) programming
(C) technical
(D) user
(E) None of these
ANS ()
38. Which of the following is NOT a type of broadband Internet connection?
(A) Cable
(B) DSL
(C) Dial-up
(D) Satellite
(E) None of these
ANS (C)
39. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(A) spyware
(B) adware
(C) spam
(D) malware
(E) None of these
ANS (D)
40. Making a field ______ means that it cannot be left blank.
(A) numeric
(B) required
(C) calculated
(D) validated
(E) None of these
ANS (B)
41. _________ is the process of finding errors in software code.
(A) Debugging
(B) Compiling
(C) Testing
(D) Running
(E) None pf these
ANS ()
42. ____________ are viruses that are triggered by the passage of time or on a certain date.
(A) Boot-sector viruses
(B) Macro viruses
(C) Time bombs
(D) Worms
(E) None of these
Ans (C)
43. Linux is a (n) ____________ operating system.
(A) open-source
(B) Microsoft
(C) Windows
(D) Mac
(E) None of these
ANS (A)
44. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
(E) None of these
ANS (D)
45. Which of the following places the common data elements in order from smallest to largest
(A) character, file, record, field, database
(B) character, record, field, database, file
(C) character, field, record, file, database
(D) Bit, byte, character, record, field, file, database,
(E) None of these
ANS (C)
46. The internet is ......
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) All of these
(E) None of these
ANS (D)
47. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
(E) None of these
ANS (C)
48. Which of the following statements is FALSE concerning file names?
(A) Files may share the same name or the same extension but not both
(B) Every file in the same folder must have a unique name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.) followed by the file name
(E) None of these
ANS (D)
49. Verification of a login name and password is known as:
(A) configuration
(B) accessibility
(C) authentication
(D) logging in
(E) None of these
ANS (C)
50. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear.
(B) The CD-ROM stops functioning.
(C) The Web browser opens to an unusual home page.
(D) Odd messages or images are displayed on the screen.
(E) None of these
ANS (B)
*********************************************
Allahabad Bank Probationary Officers Exam.
(Held on 17-4-2011)
1) programs
2) processors
3) input devices
4) memory modules
5) None of these
2. An area of a computer that temporarily holds data waiting to be processed is ..........
1) CPU
2) Memory
3) Storage
4) File
5) None of these
3. To select or unselect one word to the right
1) CTRL + SHIFT
2) CTRL + SHIFT + UP Arrow
3) CTRL + SHIFT + Down Arrow
4) CTRL + SHIFT + Right Arrow
5) None of these
4. To maximize or restore a selected window
1) CTRL + F7
2) CTRL + F10
3) CTRL + F8
4) CTRL + F9
5) None of these
5. To Copy a picture of the selected window to the clipboard
1) ALT + TAB
2) Ctrl + TAB
3) ALT + Print Screen
4) Both (1) and (2)
5) None of these
6. .......... is the key to close a selected drop - down list; cancel a comm-and and close a dialog box.
1) TAB
2) SHIFT
3) ESC
4) F10
5) None of these
7. ......... is the key we use to run the selected command.
1) SHIFT
2) TAB
3) ENTER
4) CTRL
5) None of these
8. ............ is the functional key to display save-as box.
1) F5
2) F6
3) F9
4) F12
5) None of these
9. ............ is the combination of keys to switch between the last four places that you have edited
1) ALT + CTRL + Z
2) ALT + CTRL + Y
3) ALT + TAB + Z
4) ALT + SHIFT + Z
5) None of these
10. ............ is the Keyboard shortcut key to insert auto sum
1) ALT
2) ALT=
3) ALT+
4) ALT–
5) ALT+CTRL
11. Data becomes ................ when it is presented in a format that people can understand and use
1) processed
2) graphs
3) information
4) presentation
5) None of these
12. The term ............. designates equipment that might be added to a computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
13. A ............ is a microprocessor - based computing device.
1) personal computer
2) mainframe
3) workstation
4) server
5) None of these
14. RAM can be thought of as the ......... for the computer's processor
1) factory
2) operating room
3) waiting room
4) planning room
5) None of these
15. Which of the following are the functions of a operating system
1) Allocates resources
2) Monitors Activities
3) Manages disks and files
4) All of the above
5) Only 1 and 2
16. To move a copy of file from one computer to another over a communication channel is called ?
1) File transfer
2) File encryption
3) File modification
4) File copying
5) None of these
17. The primary function of the ............ is to set up the hardware and load and start an operating system
1) System Programs
2) BIOS
3) CP
4) Memory
5) None of these
18. What kind of memory is both static and non - volatile ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) 5) None of these
19. .......... is computer software designed to operate the computer hardware and to provide platform for running application software
1) Application software
2) System software
3) Software
4) Operating system
5) None of these
20. The ......... is the amount of data that a storage device can move from the storage medium to the Computer per second
1) data migration rate
2) data digitizing rate
3) data transfer rate
4) data access rate
5) None of these
21. A device, which is not connected to CPU, is called as .......
1) land-line device
2) On-line device
3) Off-line device
4) Device
5) None of the above
22. What is the other name for programmed chip?
1) RAM
2) ROM
3) LSIC
4) PROM
5) None of these
23. On-line real time systems become popular in ........... generation
1) First Generation
2) Second Generation
3) Third Generation
4) FOurth Generation
5) None of thes
24. You use a(n) ....., such as a keyboard or mouse, to input information
1) output device
2) input device
3) storage device
4) processing device
5) None of these
25. ............ is the ability of a device to "jump" directly to the requested data
1) Sequential access
2) Random access
3) Quick access
4) All of the above
5) None of these
26. ............ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously
1) Multitasking
2) Multithreading
3) Multiprocessing
4) Multicoputing
5) None of these
27. The task of performing operations like arithmetic and logical operations is called ......
1) Processing
2) Storing
3) Editing
4) Sorting
5) None of these
28. The ALU and Control Unit joinly known as
1) RAM
2) ROM
3) CPU
4) PC
5) None of these
29. RAM is an example of
1) Secondary memory
2) Primary memory
3) Main memory
4) Both (1) and (2)
5) None of these
30. Magnetic disk is an example of
1) Secondary memory
2) Primary meory
3) Main memory
4) Botha (1) and (2)
5) None of these
31. Which one of the following is NOT a computer language /
1) MS-Excel
2) BASIC
3) COBOL
4) C++
5) None of these
32. Each memory cell has a unique number, assigned to it is called as the ....... of the cell
1) Address
2) Register
3) Number
4) Path
5) None of these
33. RAm is also called as
1) Read / Write Memory
2) Long Memory
3) Permanent Memory
4) Primary Memory
5) None of these
34. ............ Store data or information temporarily and pass it on as directed by the control unit
1) Address
2) Register
3) Number
4) Memory
5) None of these
35. Select the Odd one
1) Operating system
2) Interpreter
3) Compiler
4) Assembler
5) None of these
36. A ............ is an additional set of commands that the computer displays after you make a selection from the main menu
1) dialog box
2) submenu
3) menu selection
4) All of the above
5) None of these
37. COBOL is an acronym for .............
1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these
38. All of the following are examples of real security and privacy risks EXCEPT
1) hackers
2) Spam
3) viruses
4) identity theft
5) None of these
39. Which of the following is NOT one of the four major data processing functions of a computer?
1) gathering data
2) processing data into information
3) analyzing the data or information
4) storing the data or information
5) None of these
40. All of the following are examples of storage devices EXCEPT :
1) hard disk drives
2) printers
3) floppy disk drives
4) CD drives
5) Pen drives
41. The CPU and memory are located on the :
1) expansion board
2) motherboard
3) storage device
4) output device
5) display board
42. .............. is the science that attempts to produce machines that display the same type of intelligence that humans do
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Aritificial intelligence (Al)
5) None of these
43. Servers are computers that provide resources to other computers connected to a :
1) networkd
2) mainframe
3) supercomputer
4) client
5) internet
44. When creating a computer program, the ......... designs the structure of the program
1) End user
2) System Analyst
3) Programmer
4) All of the above
5) None of these
45. A computer program that converts an entire program into machine language at one time is called a/ an
1) interpreter
2) simulator
3) characters
4) numbers
5) None of these
46. Computers process data into information by working exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these
47. The difference between people with access to computers and the Internet and those without this access is known as the :
1) digital divide
2) Internet divide
3) Web divide
4) broadband divide
5) None of these
48. Computers manipulate data in many ways, and this manipulation is calld ......
1) upgrading
2) processing
3) batching
4) utilizing
5) None of these
49. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:
1) robotics
2) simulation
3) computer forensics
4) animation
5) None of these
50. Where does most data go first with in a computer memory hierarchy ?
1) RAM
2) ROM
3) BIOS
4) CACHE
5) None of these
ANSWERS:
1) 1 2) 2 3) 4 4) 2 5) 3 6) 3 7) 3 8) 4 9) 1 10) 2
11) 3 12) 4 13) 1 14) 3 15) 4 16) 1 17) 2 18) 2 19) 2
20) 3 21) 3 22) 2 23) 3 24) 2 25) 2 26) 1 27) 1 28) 3 29) 2 30) 1
31) 1 32) 1 33) 1 34) 2 35) 1 36) 1 37) 1 38) 2 39) 3 40) 2
41) 2 42) 4 43) 2 44) 2 45) 3 46) 4 47) 1 48) 2 49) 3 50) 1
************************************************
punjab-and-sind-bank-clerk-exam-2011.html'>Punjab and Sind Bank Clerk Exam., 2011
Computer Knowledge
(Held on 30-1-2011)
1. The software tools that enable a user to interact with a computer for specific purposes are known as—
(A) Hardware
(B) Networked Software
(C) Shareware
(D) Applications
(E) None of these
Ans : (D)
2. A………shares hardware, software, and data among authorized users.
(A) network
(B) protocol
(C) hyperlink
(D) transmitter
(E) None of these
Ans : (A)
3.
Computer programs are written in a high-level programming language;
however, the humanreadable version of a program is called—
(A) cache
(B) instruction set
(C) source code
(D) word size
(E) None of these
Ans : (C)
4. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is—
(A) copy and paste
(B) copy, cut and paste
(C) cut, copy and paste
(D) cut and paste
(E) None of these
Ans : (D)
5. Which of the following is not a function of the control unit ?
(A) Read instructions
(B) Execute instructions
(C) Interpret instructions
(D) Direct operations
(E) None of these
Ans : (D)
6. Software for organizing storage and retrieval of information is a(n)—
(A) operating system
(B) database
(C) database program
(D) data warehouse
(E) None of these
Ans : (C)
7. A set of step-by-step procedures for accomplishing a task is known as a(n)—
(A) algorithm
(B) hardware program
(C) software bug
(D) firmware program
(E) None of these
Ans : (A)
8. Which of the following is not true about RAM ?
(A) RAM is a temporary storage area
(B) RAM is the same as hard disk storage
(C) RAM is volatile
(D) Information stored in RAM is gone when you turn the computer off
(E) None of these
Ans : (B)
9. The main directory of a disk is called the………directory.
(A) root
(B) sub
(C) folder
(D) network
(E) None of these
Ans : (A)
10. The physical arrangement of elements on a page is referred to as a document’s……
(A) features
(B) format
(C) pagination
(D) grid
(E) None of these
Ans : (B)
11. =SUM (B1 : B8) is an example of a—
(A) function
(B) formula
(C) cell address
(D) value
(E) None of these
Ans : (B)
12. Which of the following storage media provides sequential access only ?
(A) Floppy disk
(B) Magnetic disk
(C) Magnetic tape
(D) Optical disk
(E) None of these
Ans : (B)
13. Compilers and translators are one form of—
(A) ROM
(B) RAM
(C) Hard disk
(D) Software
(E) None of these
Ans : (D)
14. Data representation is based on the………number system, which uses two numbers to represent all data.
(A) binary
(B) biometric
(C) bicentennial
(D) byte
(E) None of these
Ans : (A)
15. The most common input devices include—
(A) Monitor and keyboard
(B) Monitor and mouse
(C) Mouse and keyboard
(D) Printer and mouse
(E) None of these
Ans : (C)
16. www means—
(A) world wide wonder
(B) world wide wizard
(C) world wide web
(D) wide world web
(E) None of these
Ans : (C)
17. ………processing is used when a large mail-order company accumulates orders and processes them together in one large set.
(A) Batch
(B) Online
(C) Real-time
(D) Group
(E) None of these
Ans : (A)
18. What is the difference between a CD-ROM and a CD-RW ?
(A) They are the same—just two different terms used by different manufacturers
(B) A CD-ROM can be written to and a CD-RW cannot
(C) A CD-RW can be written to, but a CD-ROM can only be read from
(D) A CD-ROM holds more information than a CD-RW
(E) None of these
Ans : (C)
19. Holding the mouse button down while moving an object or text is known as—
(A) Moving
(B) Dragging
(C) Dropping
(D) Highlighting
(E) None of these
Ans : (B)
20. A………is a collection of data that is stored electronically as a series of records in a table.
(A) spreadsheet
(B) presentation
(C) database
(D) web page
(E) None of these
Ans : (C)
21. The………primarily take(s) care of the behind-the-scenes details and manage(s) the hardware.
(A) operating system
(B) application software
(C) peripheral devices
(D) hard disk
(E) None of these
Ans : (A)
22. A……is a professionally designed ‘empty’ document that can be adapted to the user’s needs.
(A) file
(B) guide
(C) template
(D) user guide file
(E) None of these
Ans : (C)
23. A group of 8 bits is known as a—
(A) Byte
(B) Kilobyte
(C) Binary digit
(D) Megabit
(E) None of these
Ans : (A)
24. The hardware device commonly referred to as the ‘brain’ of the computer is the—
(A) RAM chip
(B) Data input
(C) CPU
(D) Secondary storage
(E) None of these
Ans : (C)
25. What is the intersection of a column and a row on a worksheet called ?
(A) Column
(B) Value
(C) Address
(D) Cell
(E) None of these
Ans : (D)
26. ………are often delivered to a PC through an e-mail attachment and are often designed to do harm.
(A) Viruses
(B) Spam
(C) Portals
(D) Email messages
(E) None of these
Ans : (A)
27. What is the storage area for e-mail messages called ?
(A) A folder
(B) A directory
(C) A mailbox
(D) The hard disk
(E) None of these
Ans : (C)
28. A desktop computer is also known as a—
(A) Palm Pilot
(B) PC
(C) Laptop
(D) Mainframe
(E) None of these
Ans : (B)
29. When a file contains instructions that can be carried out by the computer, it is often called a(n) ……file.
(A) data
(B) information
(C) executable
(D) application
(E) None of these
Ans : (C)
30. Documents converted to……can be published to the Web.
(A) a.doc file
(B) http
(C) machine language
(D) HTML
(E) None of these
Ans : (D)
31. If a user needs information instantly available to the CPU, it should be stored—
(A) on a CD
(B) in secondary storage
(C) in the CPU
(D) in RAM
(E) None of these
Ans : (B)
32. To what temporary area can you store text and other data, and later paste them to another location ?
(A) The clipboard
(B) ROM
(C) CD-ROM
(D) The hard disk
(E) None of these
Ans : (A)
33. In a spreadsheet, a………is a number you will use in a calculation.
(A) label
(B) cell
(C) field
(D) value
(E) None of these
Ans : (D)
34.
After slide-directed time, if you want to move ahead automatically,
click in……check box in transition of this slide group in tab of
animations—
(A) Transition timer
(B) Automatically opter
(C) Transition opter
(D) Automatic timer
(E) None of these
Ans : (B)
35. All are included in removable media except the following—
(A) CD-ROMs
(B) Diskette
(C) DVDs
(D) High disk drive
(E) None of these
Ans : (D)
36.
If you open some menu and then decide that you do not want to select
some option, then click the menu title again or press the…… key to
layout the menu.
(A) shift
(B) tab
(C) escape
(D) F1
(E) None of these
Ans : (C)
37. Using the……process, it is easy to change the name of the file.
(A) transforming
(B) crash
(C) renaming
(D) retagging
(E) None of these
Ans : (C)
38. ………view shows that how will content on printed page, alongwith footer and margin header, appear.
(A) Draft
(B) Full screen reading
(C) Outline
(D) Page layout
(E) None of these
Ans : (D)
39. Using………, the text can be entered and edited very efficiently.
(A) spreadsheet
(B) typewriter
(C) word processing programme
(D) desktop publishing programme
(E) None of these
Ans : (D)
40. Other folders, named subfolders, can remain in the folders while creating hierarchical structure—
(A) Mini folder
(B) Teard folder
(C) Subfolders
(D) Object
(E) None of these
Ans : (C)
41. By using slide………, the characteristics of the fonts of all the slides in presentation, can be changed.
(A) theme
(B) icon
(C) master
(D) style
(E) None of these
Ans : (B)
42. Though several programmers can be opened simultaneously yet only…………programmed can be active.
(A) four
(B) three
(C) two
(D) one
(E) None of these
Ans : (B)
43. Straight and Uniform margins on both the sides indicate that there is …………in the document.
(A) full justification
(B) full alignment
(C) left justification
(D) right justification
(E) None of these
Ans : (A)
44. Among the typical computer programming languages used today, the following is not included in—
(A) C++
(B) JAVA
(C)Visual Basic.NET
(D) Machine language
(E) None of these
Ans : (D)
45. In table in excel, there are typical labels alongwith……
(A) Letters
(B) Numbers
(C) Names
(D) Formulae
(E) None of these
Ans : (B)
46.
………….makes available the commands to righten the software. Instructions
are translated step-by-step and executed by the processor so that some
objective can be achieved or some problem can be solved.
(A) Software patch
(B) Al language
(C) Presentation language
(D) Programming language
(E) None of these
Ans : (C)
47. As you create documents, graphs and pictures your computer holds the data in—
(A) Restore file
(B) Backup drive
(C) Clip board
(D) Memory
(E) None of these
Ans : (D)
48. Which of the following terms is used for the form in which the word will appear on the page ?
(A) Text formatting
(B) Character formatting
(C) Point size
(D) Type face
(E) None of these
Ans : (A)
49. ……….helps to capture the raw data and enter into the computer system.
(A) CPU
(B) Integrated circuit
(C) Input device
(D) Motherboard
(E) None of these
Ans : (C)
50. The following are included in the world programme ………….Title Bar, Ribbon, Status Bar, Views, Document workspace.
(A) Window
(B) Browser
(C) Explorer
(D) Website
(E) None of these
Ans : (A)
**********************************************************************
IBPS CLERKS EXAM COMPUTER KNOWLEDGE MCQs
1.
Programs from the same developer , sold bundled together , that
provide better integration and share common features , toolbars and
menus are known as ....
(A) software suites
(B) integrated software packages
(C) software processing packages
(D) personal information managers
(E) none of these
ANS (A)
2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these
ANS (C)
3. ______________ servers store and manages files for network users.
(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these
ANS (D)
4. All of the following are examples of real security and privacy risks Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
ANS (B)
5. ___________ terminals (formerly known as cash registers) are often
connected to complex inventory and sales computer systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these
ANS (B)
6. The OSI model is divided into _______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(E) None of these
ANS (C)
7. System software is the set of programs that enables your computer's hardware devices and ______ software to work together.
(A) management
(B) processing
(C) utility
(D) application
(E) None of these
ANS (D)
8. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
(A) Servers
(B) Embedded computers
(C) Robotic computers
(D) Mainframes
(E) None of these
ANS (B)
9. The following are all computing devices , except.........
(A) notebook computers
(B) cellular telephones
(C) digital scanners
(D) personal digital assistants
(E) None of these
ANS (C)
10. in a ring topology , the the computer in possession of the ______ can trasmit data
(A) packet
(B) data
(C) access method
(D) token
(E) None of these
ANS (D)
11. This part of operating system manages the essential peripherals,
such as the keyboard, screen , disk drives, and parallel and serial
ports ____
(A) basic input/output system
(B) secondary input/output system
(C) peripheral input/output system
(D) marginal input/output system
(E) None of these
ANS (A)
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these
ANS (B)
13. ________ controls the way in which the computer system functions and
provides a means by which users can interact with the computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
ANS (C)
14. Servers are computers that provide resources to other computers connected to a ___________
(A) mainframe
(B) network
(C) supercomputer
(D) client
(E) None of these
ANS (B)
15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition
(B) To confirm that data exists
(C) To analyze data for expected relationships
(D) To create a new data warehouse
(E) None of these
ANS (A)
16. URL stands for ........
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(E) None of these
ANS (C)
17. A database management system (DBMS) is a ............
(A) hardware system used to create , maintain and provide controlled access to a database
(B) hardware system used to create, maintain, and provide uncontrolled access to a database.
(C) software system used to create, maintain, and provide uncontrolled access to a database.
(D) software system used to create, maintain, and provide controlled access to a database.
(E) None of these
ANS (D)
18. Which of the following is NOT a goal of transaction processing system ?
(A) Capture , process and store transactions
(B) Produce a variety of documents related to routine business activities
(C) Reduce manual effort associated with processing business transactions
(D) Produce standard reports used for management decision making
(E) None of these
ANS ()
19. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
ANS (B)
20. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) None of these
ANS (D)
21. _____________ are words that a programming language has set aside for its own use.
(A) Control worlds
(B) Reserved words
(C) Control structures
(D) Reserved keys
(E) None of these
ANS (B)
22. What is the primary difference between a virus and a worm?
(A) A worm has the ability to self-propagate from an infected user's computer to other computers
(B) A worm is usually written by a cracker: Script bunnies do not have the skills to develop a worm program
(C) A virus is very harmful to the computers it infects : a worm is not a serious a problem
(D) Anti-virus software is effective in fighting viruses but not worms
(E) None of these
ANS ()
23. ______ describe what is database fields.
(A) Structures
(B) Field markers
(C) Field definition
(D) Field names
(E) None of these
ANS (D)
24. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
(A) router
(B) modem
(C) node
(D) cable
(E) None of these
ANS (A)
25. A goal of normalization is to __________
(A) minimize the number of relationships
(B) minimize the number of entities
(C) minimize the number of tables
(D) minimize the number of redundancy
(E) None of these
ANS (D)
26. Granting an outside organization access to internet web pages is often implemented using a (n) ____
(A) extranet
(B) intranet
(C) internet
(D) hacker
(E) None of these
ANS (A)
27. Which term identifies a specific computer on the web and the main page of the entire site
(A) URL
(B) Web site address
(C) Hyperlink
(D) Domain name
(E) None of these
ANS (A)
28. The code that relational database management systems use to perform their database task is referred to as .....
(A) QBE
(B) SQL
(C) OLAP
(D) Sequel Server
(E) None of these
ANS (B)
29. Chip is a common nickname for a (n):
(A) transistor
(B) resistor
(C) integrated circuit
(D) semiconductor
(E) None of these
ANS (c)
30. The purpose of the primary key in a database is to:
(A) unlock the database
(B) provide a map of the data
(C) uniquely identify a record
(D) establish constraints on database operations.
(E) None of these
ANS (B)
31. A _________ contains specific rules and words that express the logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
ANS ()
32. The design of the network is called the network:
(A) architecture
(B) server
(C) transmission
(D) type
(E) None of these
ANS (A)
33. The most frequently used instructions of a computer program are likely to be fetched from:
(A) the hard disk
(B) cache memory
(C) RAM
(D) registers
(E) None of these
ANS (B)
34. The ____________ contains data descriptions and defines the name, data type, and length of each field in the database.
(A) data dictionary
(B) data table
(C) data record
(D) data field
(E) None of these
ANS (A)
35. Personal logs or journal entries posted on the Web are known as:
(A) listservs
(B) Webcasts
(C) blogs
(D) subject directories
(E) None of these
ANS (C)
36. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
(A) command - based user interface
(B) GUI
(C) system utility
(D) API
(E) None of these
ANS (B)
37. The _____ manual tells you how to use a software program.
(A) documentation
(B) programming
(C) technical
(D) user
(E) None of these
ANS ()
38. Which of the following is NOT a type of broadband Internet connection?
(A) Cable
(B) DSL
(C) Dial-up
(D) Satellite
(E) None of these
ANS (C)
39. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(A) spyware
(B) adware
(C) spam
(D) malware
(E) None of these
ANS (D)
40. Making a field ______ means that it cannot be left blank.
(A) numeric
(B) required
(C) calculated
(D) validated
(E) None of these
ANS (B)
41. _________ is the process of finding errors in software code.
(A) Debugging
(B) Compiling
(C) Testing
(D) Running
(E) None pf these
ANS ()
42. ____________ are viruses that are triggered by the passage of time or on a certain date.
(A) Boot-sector viruses
(B) Macro viruses
(C) Time bombs
(D) Worms
(E) None of these
Ans (C)
43. Linux is a (n) ____________ operating system.
(A) open-source
(B) Microsoft
(C) Windows
(D) Mac
(E) None of these
ANS (A)
44. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
(E) None of these
ANS (D)
45. Which of the following places the common data elements in order from smallest to largest
(A) character, file, record, field, database
(B) character, record, field, database, file
(C) character, field, record, file, database
(D) Bit, byte, character, record, field, file, database,
(E) None of these
ANS (C)
46. The internet is ......
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) All of these
(E) None of these
ANS (D)
47. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
(E) None of these
ANS (C)
48. Which of the following statements is FALSE concerning file names?
(A) Files may share the same name or the same extension but not both
(B) Every file in the same folder must have a unique name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.) followed by the file name
(E) None of these
ANS (D)
49. Verification of a login name and password is known as:
(A) configuration
(B) accessibility
(C) authentication
(D) logging in
(E) None of these
ANS (C)
50. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear.
(B) The CD-ROM stops functioning.
(C) The Web browser opens to an unusual home page.
(D) Odd messages or images are displayed on the screen.
(E) None of these
ANS (B)
*********************************************
Allahabad Bank Probationary Officers Exam.
(Held on 17-4-2011)
1. Which of the following are advantages of CD-ROM as a storage media ?
(A) CD-ROM is an inexpensive way to store large amount of data and information
(B) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) All of these
(E) None of these
Ans : (D)
2. A ……… is the term used when a search engine returns a Web page that matches the search criteria.
(A) blog
(B) hit
(C) link
(D) view
(E) success
Ans : (C)
3. The ……… is the term used to describe the window that is currently being used.
(A) Web Window
(B) display area
(C) WordPad Window
(D) active window
(E) monitor
Ans : (D)
4. CPU is an abbreviation for—
(A) central programming unit
(B) central processing unit
(C) computer processing unit
(D) computer protocol unit
(E) central protocol unit
Ans : (B)
5. A microprocessor is the brain of the computer and is also called a(n)—
(A) microchip
(B) macrochip
(C) macroprocessor
(D) calculator
(E) software
Ans : (A)
6. Storage and memory differ with respect to which of the following characteristics ?
(A) Price
(B) Reliability
(C) Speed
(D) All of these
(E) None of these
Ans : (D)
7. What are two examples of freeware ?
(A) WinZip and Linux
(B) Shareware and file sharing
(C) Microsoft Word and the Google toolbar
(D) Instant messaging and the Google toolbar
(E) Microsoft Power Point and Microsoft Excel
Ans : (D)
8.
If a disk drive fails but the computer application running and using it
can continue processing, this application is said to have been designed
with this feature—
(A) 100 per cent uptime
(B) fault tolerance
(C) high reliability
(D) All of these
(E) None of these
Ans : (B)
9. What is e-commerce ?
(A) Buying and selling international goods
(B) Buying and selling products and services over the Internet
(C) Buying and selling products and services not found in stores
(D) Buying and selling products having to do with computers
(E) Buying and selling of electronic goods
Ans : (B)
10. What are the four things needed to connect to the Internet ?
(A) Telephone line, modem, computer, and an ISP
(B) Modem, computer, PDA and ISP
(C) Telephone line, PDA, modem and computer
(D) Computer, ISP, modem and communication software
(E) Monitor, keyboard, mouse, modem
Ans : (A)
11. Which of the following functions are not performed by servers ?
(A) Email processing
(B) Database sharing
(C) Processing Web sites
(D) Storage
(E) Word processing
Ans : (E)
12. Which media have the ability to have data/information stored (written) on them by users more than once ?
(A) CD-R disks
(B) CD-RW disks
(C) Zip disks
(D) OptiDisks
(E) Both CD-RW disks and Zip disks
Ans : (A)
13. The process of transferring files from a computer on the Internet to your computer is called—
(A) downloading
(B) uploading
(C) FTP
(D) JPEG
(E) downsizing
Ans : (C)
14. The………controls a client computer’s resources.
(A) application program
(B) instruction set
(C) operating system
(D) server application
(E) compiler
Ans : (D)
15. To reload a Web page, press the ……… button.
(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh
Ans : (E)
16. Which of the following could be digital input devices for computers ?
(A) Digital camcorder
(B) Microphone
(C) Scanner
(D) All of the above
(E) None of these
Ans : (D)
17. The………enables you to simultaneously keep multiple Web pages open in one browser window.
(A) tab box
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key
Ans : (A)
18. You can use the………bar to type a URL and display a Web page, or type a keyword to display a list of related Web pages.
(A) menu
(B) Title
(C) Search
(D) Web
(E) Address
Ans : (E)
19. Storage media such as a CD read and write information using—
(A) a laser beam of red light
(B) magnetic dots
(C) magnetic strips
(D) All of these
(E) None of these
Ans : (D)
20. Vendor-created program modifications are called—
(A) patches
(B) antiviruses
(C) holes
(D) fixes
(E) overlaps
Ans : (D)
21. Cache and main memory will lose their contents when the power is off. They are—
(A) dynamic
(B) static
(C) volatile
(D) non-volatile
(E) faulty
Ans : (C)
22. The collection of links throughout the Internet creates an interconnected network called the—
(A) WWW
(B) Web
(C) World Wide Web
(D) All of the above
(E) Wide Area Web
Ans : (D)
23. Every computer has a(n) ………;
many also have.
(A) operating system, a client system
(B) operating system; instruction sets
(C) application programs; an operating system
(D) application programs; a client system
(E) operating system; application programs
Ans : (E)
24. Main memory works in conjunction with—
(A) special function cards
(B) RAM
(C) CPU
(D) Intel
(E) All of these
Ans : (C)
25. A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using—
(A) input automation
(B) item data automation
(C) scanning automation
(D) source data automation
(E) None of these
Ans : (C)
26. A(n)……is composed of several computers connected together to share resources and data.
(A) Internet
(B) network
(C) backbone
(D) hyperlink
(E) protocol
Ans : (B)
27. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information—
(A) floppy diskette
(B) hard disk
(C) permanent disk
(D) optical disk
(E) None of these
Ans : (B)
28. Microsoft Office is an example of a—
(A) closed-source software
(B) open-source software
(C) horizontal-market software
(D) vertical-market software
(E) compiler
Ans : (A)
29. A popular way to learn about computers without ever going to a classroom is called—
(A) i-learning
(B) isolated learning
(C) e-learning
(D) close learning
(E) Distance Learning
Ans : (C)
30.
A person who used his or her expertise to gain access to other people’s
computers to get information illegally or do damage is a—
(A) spammer
(B) hacker
(C) instant messenger
(D) programmer
(E) analyst
Ans : (B)
31. Which of the following is an example of storage devices ?
(A) Magnetic disks
(B) Tapes
(C) DVDs
(D) All of these
(E) None of these
Ans : (D)
32. The………folder retains copies of messages that you have started but are not yet ready to send.
(A) Inbox
(B) Outbox
(C) Drafts
(D) Sent Items
(E) Address Book
Ans : (C)
33. Which of the following is an example of an optical disk ?
(A) Digital versatile disks
(B) Magnetic disks
(C) Memory disks
(D) Data bus disks
(E) None of these
Ans : (A)
34. The main job of a CPU is to—
(A) carry out program instructions
(B) store data/information for future use
(C) process data and information
(D) Both (A) and (C)
(E) None of these
Ans : (D)
35. ……are attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing trips
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) Phishing scams
Ans : (E)
36. An example of a processing device would be—
(A) a magnetic ink reader
(B) a tablet PC
(C) special function cards
(D) scanners
(E) keyboards
Ans : (B)
37. Which of the following is not a type of computer software which can be bought ?
(A) Off-the-shelf
(B) Tailor-made
(C) Custom-developed
(D) Off-the-shelf with alterations
(E) All of these can be purchased
Ans : (D)
38. You can use………to copy selected text, and ……… to paste it in a document.
(A) CTRL + C, CTRL + V
(B) CTRL + C, CTRL + P
(C) CTRL + S, CTRL + S
(D) SHIFT + C, ALT + P
(E) CTRL + D, CTRL + A
Ans : (A)
39. Video processors consist of ……… and ……, which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) VGA and VGI
Ans : (C)
40. The main memory of a computer can also be called—
(A) primary storage
(B) internal memory
(C) primary memory
(D) All of these
(E) None of these
Ans : (C)
41. Computer software can be defined as—
(A) the computer and its associated equipment
(B) the instructions that tell the computer what to do
(C) computer components that act to accomplish a goal
(D) an interface between the computer and the network
(E) the interaction between the computer and its database
Ans : (B)
42. When speaking of computer input and output, input refers to—
(A) any data processing that occurs from new data input into the computer
(B) retrieval of data or information that has been input into the computer
(C) data or information that has been entered into the computer
(D) the transmission of data that has been input into the computer
(E) Both (C) and (D) above
Ans : (E)
43. A ……… is a set of rules.
(A) resource locator
(B) domain
(C) hypertext
(D) URL
(E) protocol
Ans : (E)
44. The connection between your computer at home and your local ISP is called—
(A) the last mile
(B) the home stretch
(C) the home page
(D) the backbone
(E) the vital mile
Ans : (C)
45. All of the logic and mathematical calculations done by the computer happen in/on the—
(A) system board
(B) central control unit
(C) central processing unit
(D) mother board
(E) memory
Ans : (C)
46. There are several primary categories of procedures. Which of the following is not a primary category of procedures ?
(A) Testing
(B) Backup and recovery
(C) Firewall development
(D) Design
(E) None of these
Ans : (C)
47. The operating system called UNIX is typically used for—
(A) desktop computers
(B) laptop computers
(C) supercomputers
(D) Web servers
(E) All of these
Ans : (E)
48. The………file format is a method of encoding pictures on a computer.
(A) HTML
(B) JPEG
(C) FTP
(D) URL
(E) DOC
Ans : (B)
49. Press………to move the insertion point to the Address box, or to highlight the URL in the Address box.
(A) ALT + D
(B) ALT + A
(C) SHIFT + TAB
(D) TAB + CTRL
(E) CTRL + S
Ans : (A)
50. Computer systems are comprised of—
(A) hardware, programs, information, people and networks
(B) hardware, software, procedures, networks and people
(C) hardware, programs, information, people and procedures
(D) hardware, programs, processors, procedures, networks and people
(E) hardware, programs, processors, procedures and people
Ans : (A)
*****************************************************
BANK EXAMS COMPUTER KNOWLEDGE QUESTIONS
1. Compiler is the
(a) name given to the computer operator
(b) part of the digital machine to store the information
(c) translator of source program to object
(d) part of arithmetic logic unit
(e) operator of Boolean Algebra
Ans (c)
2. Main memory is
(a) Random Access Memory
(b) Read only Memory
(c) Serial Access Memory
(d) None of these
Ans (a)
3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer
(b) Quantum Computer
(c) Param-10,000
(d) IBM chips
Ans (b)
4. A compact disc (CD) is a data storage of the type
(a) Magnetic
(b) Optical
(c) Electrical
(d) Electromechanical
Ans (a)
5. Which of the following is not as language for computer programming?
(a) WINDOWS
(b) PASCAL
(c) BASIC
(d) COBOL
Ans (a)
6. What are the two basic types of memory that your computer uses?
a) RAM
(b) RW/RAM
(c) ROM
(d) ERAM
Ans (a)
7. The term gigabyte refers to
(a) 1024 bytes
(b) 1024 kilobytes
(c) 1024 megabytes
(d) 1024 gigabytes
Ans (c)
8. A computer with CPU speed around 100 million instructions per second & with the word length of around 64 bits is known as
(a) Super computer
(b) Mini computer
(c) Micro computer
(d) Micro computer
Ans (a)
9. What digits are representative of all binary numbers?
(a) 0
(b) 1
(c) Both (a ) and (b)
(d) 3
Ans (c)
10. To locate a data items for storage is
(a) Field
(b) Feed
(c) Database
(d) Fetch
Ans (d)
11. Off-line operation is the operation of devices without the control of
(a) Memory
(b) CPU
(c) ALU
(d) Control unit
Ans (b)
12. A type of line printer that uses an embossed steel band to form the letters printed on the paper is
(a) Golf ball printer
(b) Dot-matrix printer
(c) Laser printer
(d) Band printer
Ans (d)
13. A software used to convert source program instructions to object instruction is known as
(a) Compiler
(b) Assembler
(c) Interpreter
(d) Language processor
14. The 'IC' chip, used in computers, is made of
(a) Chromium
(b) Iron oxide
(c) Silica
(d) Silicon
Ans (d)
15. Name the first general purpose electronic computer
Ans : UNIVAC
16. The size of commonly used Floppy disk is
(a) 4.5”
(b) 3.5”
(c) 3.25”
(d) 5.5”
Ans (b)
17. Which of the following statement is wrong
(a) Windows XP is an operating system
(b) Linux is owned and sold by Microsoft
(c) Photoshop is a graphical design tool by Adobe
(d) Linux is free and open source software
Ans (b)
18. Operating system of a computer
(a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references
(c) Provides a layer, user friendly interface
(d) None of the above
Ans (c)
19. The term ‘Operating System’ means
(a) A set of programs which control computer working
(b) The way a user operates the computer system
(c) Conversion of high level language to machine language
(d) The way computer operator works
Ans (a)
20. Wild card operators specifies
(a) can be used when writing into multiple files
(b) allows several files to be read simultaneously
(c) Provide an easy way of groups of related files
(d) Are only used when printing the contents of a file
Ans (c)
21.Which one of the following is not a broadband communication medium
(a) Microwave
(b) Fibre optic cable
(c) Twisted pair
(d) Coaxial cable
Ans (c)
22.Which of the following performs modulation and demodulation
(a) Coaxial cable
(b) Satellite
(c) Modem
(d) Optical fibre
Ans (c)
23. Which one of the following is not an application software package
(a) Redhat Linux
(b) Microsoft Office
(c) Adobe PageMaker
(d) Open Office
Ans (a)
24. Who is the father of computer
Ans : Charles Babbage
25.The function of key F4 is
Ans : To repeat the last action
26.The function of key F4 is
Ans : To repeat the last action
27. The 0 and 1 in the binary numbering system are called binary digits or .......
(a) bytes
(b) kilobytes
(c) decimal bytes
(d) bits
Ans (D)
28. A monitor's ...... is the distance between the holes in the mask
behind the screen. This helps determine how sharp the dots appear.
(a) refresh rate
(b) dot pitch
(c) resolution
(d) colour depth
Ans (B)
29. A directly accessible appointment calendar is a feature of a ....... resident package.
(a) CPU
(b) memory
(c) Buffer
(d) ALU
Ans (B)
30. Perforated paper used as input or output media is known as
(a) Paper tape
(b) Magnetic tape
(c) Punched paper tape
(d) Card punch
Ans (A)
31. The invention of the slide rule is attributed to
(a) Babbage
(b) Oughtred
(c) Pascal
(d) Napier
Ans (B)
32. Which of the following is not an advantage of magnetic disk storage.
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) All of the above
Ans (e)
33. The memory sizes in mainframe computers and advanced technology micro computer are expressed as
(a) Bytes
(b) Kilo-bytes
(c) Bits
(d) Megabytes
Ans (d)
34. A prefix for billion which is equal to .... is called as billi.
(a) 100
(b) 10000
(c) 1000
(d) 10
Ans (d)
35. Each model of a computer has a unique
(a) Assembly language
(b) Machine language
(c) High level language
(d) All of the above
Ans (b)
36. One kilobyte = ____ byte.
(a) 1250
(b) 2088
(c) 1024
(d) 1000
Ans (c)
37. Which of the following circuit is used as a 'Memory device' in computers?
(a) Rectifier
(b) Flip-Flop
(c) Comparator
(d) Attenuator
Ans (b)
38. To move the cursor to the end of the document press
Ans : Ctrl + End
39. In Word Processing the red underline indicates
Ans : Spelling mistakes
40. The shortcut key to print documents is
Ans : Ctrl + P
41. First layer in the OSI reference model is
(a) Data link
(b) Network
(c) Physical
(d) Application
Ans (c)
42. Viruses, Trojan horses and Worms are
(a) able to harm computer system
(b) unable to detect if affected on computer
(c) user-friendly applications
(d) harmless applications resident on computer
Ans (a)
43. Program threats are
(a) Trap doors
(b) Trojan horse
(c) Both (a) & (b)
(d) All of the above
Ans (b)
44. Failure of passwords security due to exposure can result from
(a) Electronic monitoring
(b) Visual
(c) Both (a) & (b)
(d) All of the above
Ans (c)
45. Data security threats include
(a) Hardware failure
(b) Privacy invasion
(c) Fraudulent manipulation of data
(d) All of the above
Ans (b)
46. The bar which displays information about the current page number is
Ans : Status bar
47. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar
(b) Windows
(c) Desktop
(d) Icons
Ans (d)
48. Who invented the super-computer?
(a) P.T Farnsworth
(b) J.R Whinfield
(c) J.H. Van Tassell
(d) Charles Ginsberg
Ans (c)
49. Accessing records from a file directly without searching from the beginning of the file is
(a) Time sharing
(b) Random
(c) Direct access
(d) Access time
(e) None of the above
Ans (c)
50. Time during which a job is processed by the computer is
(a) Delay time
(b) Real time
(c) Execution time
(d) Down time
Ans (c)
**************************************************************
Bank IT Officer/Specialist Exam Question Paper
1. The _____ states that a foreign key must either match a primary key
value in another relation or it must be null.
(a) entity integrity rule
(b) referential integrity constraint
(c) action assertion
(d) composite attribute
(e) None of these
2. An applet __________
(a) is an interpreted program that runs on the client
(b) tracks the number of visitors to a Website
(c) is a compiled program that usually runs on the client
(d) collects data from visitors to a Website
(e) None of these
3. A _____ sometimes called a boot sector virus, executes when a
computer boots up because it resides in the boot sector of a floppy disk or
the master boot record of a hard disk.
(a) system virus
(b) Trojan horse virus
(c) file virus
(d) macro virus
(e) None of these
4. Which error detection method uses one's complement arithmetic?
(a) Simply parity check
(b) Checksum
(c) Two-dimensional parity check
(d) CRC
(e) None of these
5. A result of a computer virus can not lead to ___.
(a) Disk Crash
(b) Mother Board Crash
(c) Corruption of program
(d) Deletion of files
(e) None of these
6. The network interface card of LAN is related to following layer of
OSI Model-
(a) Transport
(b) Network
(c) Data Link
(d) Physical
(e) All of these
7. Which of the following does not describe a data warehouse?
(a) Subject-oriented
(b) Integrated
(c) Time-variant
(d) Updateable
(e) None of these
8. Which of the following is true ?
(a) Logical design is software-dependent
(b) In a distributed database, database is stored in one physical location
(c) Conceptual design translates the logical design into internal model
(d) Logical design is software independent
(e) None of these
9. A range check _____
(a) ensures that only the correct data type is entered into a field
(b) verifies that all required data is present
(c) determines whether a number is within a specified limit
(d) tests if the data in two or more associated fields is logical
(e) None of these
10. The total set of interlinked hypertext documents worldwide is-
(a) HTTP
(b) Browser
(c) WWW
(d) B2B
(e) None of these
11. With the object-oriented (OO) approach, an object encapsulates,
or_____.a programmer.
(a) carries out, the details of an object for
(b) hides, the details of an object from
(c) reveals, the details of an object to
(d) extends, the details of an object beyond
(e) None of these
12. Every computer connected to an intranet or extranet must have a
distinct_____
(a) firewall
(b) proxy server
(c) IP address
(d) domain name
(e) None of these
13. A table of bits in which each row represents the distinct values
of a key?
(a) Join index
(b) Bitmap index
(c) B + Tree
(d) Hierarchical index
(e) None of these
14. The degree of detail that should be incorporated into a database
depends on what?
(a) Data integrity
(b) The type of database
(c) The user's perspective
(d) The business practices and policies
(e) None of these
15. The ___.converts digital signals to analog signals for the purpose
of transmitting data over telephone lines.
(a) Modem
(b) Router
(c) Gateway
(d) Bridge
(e) All of these
16. Before a package can be used in a java program it must be___.
(a) executed
(b) referenced
(c) imported
(d) declared
(e) None of these
17. Choose the correct way to indicate that a line in a C++ program is
a comment line, that is, a line the will not be executed as an
instruction___.
(a) begin the line with a # sign
(b) begin the line with double slashes (/ /)
(c) begin and end the line with double hyphens (-_-)
(d) indent the line
(e) None of these
18. Programming language built into user programs such as Word and
Excel are known as____
(a) 4GLs
(b) macro languages
(c) object-oriented languages
(d) visual programming languages
(e) None of these
19. Firewalls are used to protect against___.
(a) Unauthorized Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) All of these
20. This is a standard way for a Web server to pass a Web user's
request to an application program and to receive data back to forward to the
user-
(a) Interrupt request
(b) Forward DNS lookup
(c) Data-Link layer
(d) File Transfer Protocol
(e) Common gateway interface
21. Three SQL, DDL, CREATE commands are__.
(a) Schema, Base and Table
(b) Base, Table and Schema
(c) Key, Base and Table
(d) Schema, Table and View
(e) None of these
22. Data are ________ in client/server computing.
(a) never sent to the client machine
(b) sent in very large sections to save processing time
(c) sent only upon the client's request
(d) sent in complete copies for the client to filter and sort
(e) sent from the client to the server for processing
23. Which of the following will not eliminates the ambiguities of a
null value?
(a) Define the attribute as required
(b) Define subtypes
(c) Define each attribute as having an initial value that is recognized as
blank
(d) Define supertypes
(e) None of these
24. The____directory is mandatory for every disk.
(a) Root
(b) Base
(c) Sub
(d) Case
(e) None of these
25. This is a group of servers that share work and may be able to back
each other up if one server fails.
(a) Channel bank
(b) Cluster
(c) Tiger team
(d) Serverless backup
(e) Logical unit
SBI ASSOCIATE BANKS CLERKS EXAM 2011
Marketing Aptitude and Computer Knowledge
Q. 1. An email account includes a storage area, often called a(n) __
(1) attachment
(2) hyperlink
(3) mailbox
(4) IP address
(5) None of these
Q. 2. Data becomes __ when it is presented in a format that people can understand and use.
(1) processed
(2) graphs
(3) information
(4) presentation
(5) None of these
Q.3. A set of computer programs that helps a computer monitor itself and function more efficiently isajan __
(1) Windows
(2) System Software
(3) DBMS
(4) Application Software
(5) None of these
Q. 4. An area of a computer that temporarily holds data waiting to be processed is __
(1) CPU
(2) Memory
(3) Storage
(4) File
(5) None of these
Q.5. A __ is a microprocessor-based computing device.
(1) personal computer
(2) mainframe
(3) workstation
(4) server
(5) None of these
Q. 6. You use a(n) __ , such as a keyboard or mouse, to input information.
(1) output device
(2) input device
(3) storage device
(4) processing device
(5) None of these
Q.7. The term __ designates equipment that might be added to a computer system to enhance its functionality.
(1) digital device
(2) system add-on
(3) disk pack
(4) peripheral device
(5) None of these
Q. 8. The instructions that tell a computer how to carry out the processing tasks are referred to as computer __
(1) programs
(2) processors
(3) input devices
(4) memory modules
(5) None of these
Q. 9. RAM can be thought of as the __ for the computer's processor.
(1) factory
(2) operating room
(3) waiting room
(4) planning room
(5) None of these
Q. 10. C, BASIC, COBOL, and Java are examples of __ languages.
(1) low-level
(2) computer
(3) system programming
(4) high-level
(5) None of these
Q.11. __ is the ability of a device to "jump" directly to the requested data.
(1) Sequential access
(2) Random access
(3) Quick access
(4) All of the above
(5) None of these
Q.12. The __ is the amount of data that a storage device can move from the storage medium to the Computer per second.
(1) data migration rate
(2) data digitizing rate
(3) data transfer rate
(4) data access rate
(5) None of these
Q.13. A __ converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file.
(1) converter
(2) compiler
(3) interpreter
(4) instruction
(5) None of these
Q.14. One thousand bytes is a __
(1) kilobyte
(2) megabyte
(3) gigabyte
(4) terabyte
(5) None of these
Q.15. 'Benchmark' means __
(1) Benches for customers to sit
(2) Benches for salesmen to sit
(3) Products displayed on a bench
(4) Set standards
(5) All of the above
Q. 16 A Call Centre is __
(1) a meeting place for DSAs
(2) a Training Centre for DSAs
(3) a meeting place for customers
(4) Data Centre
(5) a back office set up where customer queries are answered
Q .17. The sequence of a sales process is __
(1) Lead generation, Call, Presentation & Sale
(2) Sale, Presentation, Lead generation & Call
(3) Presentation, Lead generation, Sale & Call
(4) Lead Generation, Call, Sale & Presentation
(5) There is no sequence required
Q.18. Home loans are granted to -
(1) Individuals
(2) Institutions
(3) Builders
(4) All of these
(5) None of these
Q.19. To 'Close a Call' means __
(1) 'fo end the conversation
(2) To put the phone down
(3) To close the doors
(4) To clinch the sale
(5) To close the business
Q.20. A __ is an additional set of commands that the computer displays after you make a selection from the main menu.
(1) dialog box
(2) submenu
(3) menu selection
(4) All of the above
(5) None of these
Q.21. Information kept about a file includes ----
(1) print settings
(2) deletion date
(3) (1) & (2) only
(4) size
(5) None of these
Q.22. __ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.
(1) Multitasking
(2) Multithreading
(3) Multiprocessing
(4) Multicomputing
(5) None of these
Q.23. The ALU performs __ operations.
(1) arithmetic
(2) ASCII
(3) algorithm-based
(4) logarithm-based
(5) None of these
Q. 24. A (n) __ is software that helps a computer control itself to operate efficiently and keep track of data.
(1) application system
(2) hardware system
(3) software system
(4) oprating system
(5) None of these
Q.25. 'Customisation' means __
(1) Tailor-made products for each customer
(2) Customers selling goods
(3) Tailor-made products for each staff
4) A selling process
(5) None of these
Q.26. A 'Call' in Marketing language means __
(1) Calling On a salesperson
(2) Calling on a customer
(3) Making a phone-call
(4) Telemarketing
(5) None of these
Q.27. Computers manipulate data in many ways, and this manipulation is called __
(1) upgrading
(2) processing
(3) batching
(4) utilizing
(5) None of these
Q.28. A Marketing Survey is required for __
(1) deciding marketing strategies
(2) deciding Product strategies
(3) deciding pricing strategies
(4) All of these
(5) None of these
Q.29. The Target Group for Education Loans is ----
(1) all colleges
(2) all parents
(3) research scholars
(4) meritorious students seeking higher education
(5) all of these
Q.30. Cross-selling means __
(1) Selling with a cross face
(2) Cross country marketing
(3) Selling other products to existing customers
(4) Selling to friends
(5) Selling to employees
Q.31. Market Segmentation is useful for---
(1) Preferential marketing
(2) Targeting existing clients
(3) Identifying prospects
(4) Knowing customers' tastes
(5) All of the above
Q.32. The Target Group for Savings Deposit Accounts is __
(1) Newborn babies
(2) students
(3) parents
(4) businessman
(5) all of the above
Q. 33. Market Segmentation can be resorted to by means of __
(1) segmenting by age
(2) segmenting by income
(3) segmenting geographically
(4) all of these
(5) none of these
Q.34. The Target Group for a Car Loan is ---
(1) all auto drivers
(2) all auto dealers
(3) all car owners
(4) any individual needing a car
(5) all of these
Q.35. Market information means ---
(1) knowledge of industries
(2) knowledge of households
(3) knowledge of peers
(4) knowledge of customers' tastes
(5) All of these
Q.36. Credit cards are used for -
(1) Cash withdrawals
(2) Purchase of air tickets
(3) Purchase of consumable items from retail outlets
(4) All of these
(5) None of these
Q.37. TheTarget Group for Agricultural Loans is __
(1) any farmer
(2) farm labourers
(3) any individual dealing in agricultural or related activity
(4) farmers'societies
(5) all of these
Q.38. The Target Group for Credit Cards is ----
(1) existing cardholders
(2) all graduates
(3) all minors
(4) individuals with taxable income
(5) all of these
Q.39. Market Segmentation means __
(1) segmenting the salesmen
(2) segmenting the employees
(3) segmenting the customers as per their Heeds
(4) segmenting the products
(5) All of these
Q. 40. A 'Target Group' means---
(1) a group of sellers
(2) a group of buyers
(3) a group of products
(4) a group of persons to whom sales should be focused
(5) all of these
Answer :
(1) 3 (2) 3 (3) 2 (4) 2 (5) 1 (6) 2 (7) 4 (8) 1 (9) 3 (10) 4 (11) 2 (12) 3 (13) 2 (14) 1 (15) 4 (16) 5 (17) 1 (18) 1 (19) 4 (20) 1 (21) 3 (22) 1 (23) 1 (24) 4 (25) 1 (26) 2 (27) 2 (28) 4 (29) 4 (30) 3 (31) 5 (32) 5 (33) 4 (34) 4 (35) 5 (36) 4 (37) 3 (38) 4 (39) 3 (40) 5
**************************************************
Union Bank of India Probationary Officers Exam. 2011 Solved Paper
div style="color: blue;">(Exam Held on 9-1-2011)
1. You can keep your personal files/folders in—
(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Ans : (B)
2. The primary purpose of software is to turn data into—
(A) Web sites
(B) Information
(C) Programs
(D) Objects
(E) None of these
Ans : (B)
3. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)
4. A compiler translates a program written in a high-level language into—
(A) Machine language
(B) An algorithm
(C) A debugged program
(D) Java
(E) None of these
Ans : (A)
5. When you turn on the computer, the boot routine will perform this test—
(A) RAM test
(B) Disk drive test
(C) Memory test
(D) Power-on self-test
(E) None of these
Ans : (B)
6. A ……is a unique name that you give to a file of information.
(A) device letter
(B) folder
(C) filename
(D) filename extension
(E) None of these
Ans : (D)
7. Hardware includes—
(A) all devices used to input data into a computer
(B) sets of instructions that a computer runs or executes
(C) the computer and all the devices connected to it that are used to input and output data
(D) all devices involved in processing information including the central processing unit, memory and storage
(E) None of these
Ans : (D)
8. A ……… contains specific rules and words that express the logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
Ans : (A)
9. All the deleted files go to—
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)
10. The simultaneous processing of two or more programs by multiple processors is—
(A) Multiprogramming
(B) Multitasking
(C) Time-sharing
(D) Multiprocessing
(E) None of these
Ans : (D)
11. The secret code that restricts entry to some programs—
(A) Password
(B) Passport
(C) Entry-code
(D) Access-code
(E) None of these
Ans : (A)
12. Computers use the ……… number system to store data and perform calculations.
(A) binary
(B) octal
(C) decimal
(D) hexadecimal
(E) None of these
Ans : (A)
13. The main function of the ALU is to—
(A) Perform arithmetic and logical operations
(B) Store data and information for future use
(C) Control computer output, such as printing
(D) Monitor all computer activities
(E) None of these
Ans : (A)
14. ……is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)
15. Softcopy is the intangible output, so then what is hardcopy ?
(A) The physical parts of the computer
(B) The printed parts of the computer
(C) The printed output
(D) The physical output devices
(E) None of these
Ans : (C)
16. A(n) ……… is a program that makes the computer easier to use.
(A) utility
(B) application
(C) operating system
(D) network
(E) None of these
Ans : (A)
17. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)—
(A) Workstation
(B) CPU
(C) Magnetic disk
(D) Integrated circuit
(E) None of these
Ans : (D)
18. Computer systems are comprised of—
(A) Hardware, programs, processors, procedures and people
(B) Hardware, programs, information, people and procedures
(C) Hardware, programs, information, people and networks
(D) Hardware, software, procedures, networks and people
(E) None of these
Ans : (D)
19. An error in a computer program—
(A) Crash
(B) Power Failure
(C) Bug
(D) Virus
(E) None of these
Ans : (C)
20. What is output ?
(A) What the processor takes from the user
(B) What the user gives to the processor
(C) What the processor gets from the user
(D) What the processor gives to the user
(E) None of these
Ans : (D)
21. The person who writes and tests computer programs is called a—
(A) programmer
(B) computer scientist
(C) software engineer
(D) project developer
(E) None of these
Ans : (A)
22. A set of instructions telling the computer what to do is called—
(A) mentor
(B) instructor
(C) compiler
(D) program
(E) None of these
Ans : (D)
23. What menu is selected to print ?
(A) Edit
(B) Special
(C) File
(D) Tools
(E) None of these
Ans : (C)
24. What is backup ?
(A) Adding more components to your network
(B) Protecting data by copying it from the original source to a different destination
(C) Filtering old data from the new data
(D) Accessing data on tape
(E) None of these
Ans : (B)
25. The term bit is short for—
(A) Megabyte
(B) Binary language
(C) Binary digit
(D) Binary number
(E) None of these
Ans : (C)
26. A saved document is referred to as a—
(A) file
(B) word
(C) folder
(D) project
(E) None of these
Ans : (A)
27. Specialized programs that assist users in locating information on the Web are called—
(A) Information engines
(B) Search engines
(C) Web browsers
(D) Resource locators
(E) None of these
Ans : (B)
28. An application program has which one of the following functions ?
(A) It specifies the informationprocessing procedures required by a particular informationprocessing job
(B) It controls the input/output and storage functions of the computer system
(C) It provides various support services for the computer system
(D) It supervises the operations of the CPU
(E) None of these
Ans : (A)
29. In page preview mode—
(A) You can see all pages of your document
(B) You can only see the page you are currently working
(C) You can only see pages that do not contain graphics
(D) You can only see the title page of your document
(E) None of these
Ans : (A)
30. An operating system that can do multitasking means that—
(A) The operating system can divide up work between several CPUs
(B) Several programs can be operated concurrently
(C) Multiple people can use the computer concurrently
(D) All of the above
(E) None of these
Ans : (B)
31. The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ……… command.
(A) Replace
(B) Find
(C) Lookup
(D) Search
(E) None of these
Ans : (B)
32. What is the default file extension for all Word documents ?
(A) WRD
(B) TXT
(C) DOC
(D) FIL
(E) None of these
Ans : (C)
33. With a CD you can—
(A) Read
(B) Write
(C) Read and Write
(D) Either Read or Write
(E) None of these
Ans : (C)
34. A collection of interrelated records is called a—
(A) Utility file
(B) Management information system
(C) Database
(D) Spreadsheet
(E) None of these
Ans : (C)
35. To move to the beginning of a line of text, press the ……… key.
(A) PageUp
(B) A
(C) Home
(D) Enter
(E) None of these
Ans : (C)
36. The term ‘user interface’ refers to—
(A) What the user sees on the screen and how they can interact with it
(B) How the operating system responds to user commands
(C) the means by which the user interacts with the peripheral devices on the computer
(D) The monitor that is available for the computer
(E) None of these
Ans : (A)
37. The background of any Word document—
(A) Is always white colour
(B) Is the colour you preset under the Options menu
(C) Is always the same for the entire document
(D) Can have any colour you choose
(E) None of these
Ans : (D)
38. Reusable optical storage will typically have the acronym—
(A) CD
(B) DVD
(C) ROM
(D) RW
(E) None of these
Ans : (D)
39. For creating a document, you use ……… command at File Menu.
(A) Open
(B) Close
(C) New
(D) Save
(E) None of these
Ans : (C)
40. The contents of ……… are lost when the computer turns off.
(A) storage
(B) input
(C) output
(D) memory
(E) None of these
Ans : (D)
41. Grouping and processing all of a firm’s transactions at one time is called—
(A) A database management system
(B) Batch processing
(C) A real-time system
(D) An on-line system
(E) None of these
Ans : (C)
42. A printer is this kind of device—
(A) Input
(B) Word processing
(C) Processing
(D) Output
(E) None of these
Ans : (D)
43. Text in a column is generally aligned—
(A) Justified
(B) Right
(C) Center
(D) Left
(E) None of these
Ans : (D)
44. What type of device is a computer mouse ?
(A) Input
(B) Output
(C) Software
(D) Storage
(E) None of these
Ans : (A)
45. In Excel, Charts are created using which option ?
(A) Chart Wizard
(B) Pivot Table
(C) Pie Chart
(D) Bar Chart
(E) None of these
Ans : (A)
46. What is the permanent memory built into your computer called ?
(A) RAM
(B) ROM
(C) CPU
(D) CD-ROM
(E) None of these
Ans : (B)
47. If text was highlighted and ‘Edit’ ‘Copy’ was clicked, what would happen ?
(A) Text would be copied from the document and placed in the clipboard
(B) Text would be removed from the document and placed in the clipboard
(C) Text from the clipboard would be placed in the document at the place where the cursor is blinking
(D) (B) and (C) above
(E) None of these
Ans : (A)
48. You can start Microsoft Word by using ……… button.
(A) New
(B) Start
(C) Program
(D) Control Panel
(E) None of these
Ans : (C)
49. You click at B to make the text—
(A) Italics
(B) Underlined
(C) Italics and Underlined
(D) Bold
(E) None of these
Ans : (D)
50. The……becomes different shapes depending on the task you are performing.
(A) Active tab
(B) Insertion point
(C) Mouse pointer
(D) Ribbon
(E) None of these
Ans : (C
****************
Punjab National Bank PNB Clerk Exam 2010 Paper
Marketing and Computer Knowledge
(Exam Held on: 4-4-2010)
1. Four of the following five are alike in a certain way and so form a group.
Which is the one that does not belong to the group ?
1. Marketing function includes—
(A) Designing new products
(B) Advertisements
(C) Publicity
(D) After sales service
(E) All of these
Ans : (E)
2. Lead generation can be resorted to
by browsing—
(A) Telephone directories
(B) Yellow pages
(C) Internet sites
(D) List of existing customers
(E) All of these
Ans : (E)
3. Effective selling skills depend on—
(A) Effective lead generation
(B) Sales Call Planning
(C) Territory Allocation
(D) Effective communication skills
(E) All of these
Ans : (E)
4. Market Information means—
(A) Knowledge level of marketing staff
(B) Information about marketing staff
(C) Information regarding Share market
(D) Knowledge of related markets
(E) All of these
Ans : (D)
5. Marketing channels mean—
(A) Delivery period
(B) Delivery time
(C) Delivery outlets
(D) Delivery place
(E) All of these
Ans : (E)
6. ‘Buyer Resistance’ means—
(A) Buyer’s interest in the product being sold
(B) Buyer fighting with the seller
(C) Buyer’s hesitation in buying the product
(D) Buyer becoming a seller
(E) Buyer buying the product
Ans : (C)
7. Marketing is the function of—
(A) Sales persons
(B) Production Department
(C) Planning Department
(D) Team leaders
(E) A collective function of all staff
Ans : (E)
8. A DSA means—
(A) Direct Service Agency
(B) Direct Selling Agent
(C) Double Selling Agent
(D) Distribution Agency
(E) None of these
Ans : (B)
9. Service Marketing is resorted to in—
(A) All manufacturing companies
(B) All production houses
(C) Export units
(D) Insurance companies and banks
(E) All of these
Ans : (D)
10. Marketing is—
(A) A skilled person’s job
(B) A one day function
(C) A one time act
(D) Required only when a new product is launched
(E) None of these
Ans : (A)
11. Market share refers to—
(A) Share market prices
(B) Price fluctuation in the market
(C) Share issue floated by the company
(D) Share of wallet
(E) Share of business of the company
as compared to peers
Ans : (E)
12. Service Marketing is the same as—
(A) Internet marketing
(B) Telemarketing
(C) Internal Marketing
(D) Relationship Marketing
(E) All of these
Ans : (D)
13. Current Accounts can be freely opened by ………… Find the incorrect answer.
(A) All NRIs
(B) All businessmen
(C) Government departments
(D) Firms and Companies
(E) HUFs
Ans : (E)
14. Buyer Resistance can be overcome by—
(A) Cordial relation between buyer and
seller
(B) Good negotiation
(C) Persuasive communication
(D) Good after sales service
(E) All of these
Ans : (A)
15. Cross-selling is useful for canvassing—
(A) Current Accounts
(B) Fixed Deposit Accounts
(C) Student loans
(D) Car loans
(E) All of these
Ans : (E)
16. Market segmentation helps to
determine—
(A) Target groups
(B) Sale price
(C) Profit levels
(D) Product life cycle
(E) All of these
Ans : (A)
17. The target group for Car loans is—
(A) Auto manufacturing companies
(B) Car dealers
(C) Taxi drivers
(D) Car purchasers
(E) All of these
Ans : (E)
18. The best promotional tool in any marketing is—
(A) e-promotion
(B) Public Relations
(C) Viral marketing
(D) Word of mouth publicity
(E) Advertisements
Ans : (E)
19. Customisation results in—
(A) Customer exodus
(B) Customer retention
(C) Customer complaints
(D) All of these
(E) None of these
Ans : (B)
20. The target group for Education Loans is—
(A) All parents
(B) All Professors
(C) All Research Scholars
(D) All Tutorial Colleges
(E) All College Students
Ans : (E)
21. Find the correct sentence.
(A) Higher the price, higher are the sales
(B) More sales persons lead to more sales
(C) Mission statement is part of a Market Plan
(D) Better sales incentives means better performance
(E) All customers are profitable customers
Ans : (C)
22. Good marketing strategy envisages good and proper—
(A) Product development
(B) Promotion and Distribution
(C) Pricing
(D) Relationship management
(E) All of these
Ans : (E)
23. Savings Accounts can be opened by—
(A) All individuals fulfilling KYC norms
(B) All individuals earning more than Rs. 1,00,000 per annum
(C) All individuals above the age of 18
(D) All salaried persons only
(E) All students below the age of 18
Ans : (C)
24. Situation Analysis is useful for—
(A) SWOT Analysis
(B) Analysis of Sales person’s performances
(C) Analysis of capital markets
(D) All of these
(E) None of these
Ans : (A)
25. Information that comes from an external source and fed into computer software is called—
(A) Input
(B) Output
(C) Throughput
(D) Reports
(E) None of these
Ans : (A)
26. With a CD you can—
(A) Read
(B) Write
(C) Neither Read nor Write
(D) Both Read and Write
(E) None of these
Ans : (D)
27. Errors in a computer program are referred to as—
(A) bugs
(B) mistakes
(C) item overlooked
(D) blunders
(E) None of these
Ans : (A)
28. Which of the following are computers that can be carried around easily ?
(A) Laptops
(B) Supercomputers
(C) PCs
(D) Minicomputers
(E) None of these
Ans : (A)
29. What menu is selected to change font and style ?
(A) Tools
(B) File
(C) Format
(D) Edit
(E) None of these
Ans : (C)
30. Where is the disk put in a computer?
(A) In the hard drive
(B) In the disk drive
(C) Into the CPU
(D) In the modem
(E) None of these
Ans : (B)
31. A computer’s hard disk is—
(A) an arithmetic and logical unit
(B) computer software
(C) operating system
(D) computer hardware
(E) None of these
Ans : (D)
32. A compiler is used to translate a program written in—
(A) a low level language
(B) a high level language
(C) assembly language
(D) machine language
(E) None of these
Ans : (B)
33. In programming, you use the following keys—
(A) Arrow keys
(B) Function keys
(C) Alpha keys
(D) page up and Page Down keys
(E) None of these
Ans : (A)
34. Which keys enable the input of numbers quickly ?
(A) Function keys
(B) The numeric keypad
(C) Ctrl, shift and alt
(D) Arrow keys
(E) None of these
Ans : (B)
35. Files are organized by storing them in—
(A) tables
(B) databases
(C) folders
(D) graphs
(E) None of these
Ans : (C)
36. The secret code that restricts entry to some programs—
(A) entry-code
(B) passport
(C) password
(D) access-code
(E) None of these
Ans : (C)
37. Advertisements are not required in—
(A) Public Sector banks
(B) Private Sector banks
(C) Government concerns
(D) Profit making companies
(E) None of these
Ans : (C)
38. The most common method of entering text and numerical data into a computer system is through the use of a—
(A) plotter
(B) scanner
(C) printer
(D) keyboard
(E) None of these
Ans : (D)
39. Computer programs are also known as—
(A) operating systems
(B) documents
(C) peripherals
(D) applications
(E) None of these
Ans : (D)
40. A collection of unprocessed items is ………
(A) information
(B) data
(C) memory
(D) reports
(E) None of these
Ans : (B)
41. ……… is when the more powerhungry components, such as the monitor and the hard drive, are put in
idle.
(A) Hibernation
(B) Power down
(C) Standby mode
(D) The shutdown procedure
(E) None of these
Ans : (C)
42. ……… is the process of dividing the disk into tracks and sectors.
(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
(E) None of these
Ans : (B)
43. A saved document is referred to as a ………
(A) file
(B) word
(C) folder
(D) project
(E) None of these
Ans : (A)
44. Which of the following is the largest unit of storage ?
(A) GB
(B) KB
(C) MB
(D) TB
(E) None of these
Ans : (D)
45. The operating system is the most common type of ……… software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (B)
46. A ……… is approximately one billion bytes.
(A) kilobyte
(B) bit
(C) gigabyte
(D) megabyte
(E) None of these
Ans : (C)
47. A scanner scans—
(A) Pictures
(B) Text
(C) Both Pictures and Text
(D) Neither Pictures nor Text
(E) None of these
Ans : (C)
48. Dumb terminals have terminals and—
(A) Mouse
(B) Speakers
(C) Keyboard
(D) Mouse or Speakers
(E) None of these
Ans : (C)
49. The portion of the CPU that coordinates the activities of all the other computer components is the—
(A) motherboard
(B) coordination board
(C) control unit
(D) arithmetic logic unit
(E) None of these
Ans : (C)
50. A repair for a known software bug, usually available at no charge on the Internet, is called a(n)—
(A) version
(B) patch
(C) tutorial
(D) FAQ
(E) None of these
Ans : (B)
***********************************************(Exam Held on: 4-4-2010)
1. Four of the following five are alike in a certain way and so form a group.
Which is the one that does not belong to the group ?
1. Marketing function includes—
(A) Designing new products
(B) Advertisements
(C) Publicity
(D) After sales service
(E) All of these
Ans : (E)
2. Lead generation can be resorted to
by browsing—
(A) Telephone directories
(B) Yellow pages
(C) Internet sites
(D) List of existing customers
(E) All of these
Ans : (E)
3. Effective selling skills depend on—
(A) Effective lead generation
(B) Sales Call Planning
(C) Territory Allocation
(D) Effective communication skills
(E) All of these
Ans : (E)
4. Market Information means—
(A) Knowledge level of marketing staff
(B) Information about marketing staff
(C) Information regarding Share market
(D) Knowledge of related markets
(E) All of these
Ans : (D)
5. Marketing channels mean—
(A) Delivery period
(B) Delivery time
(C) Delivery outlets
(D) Delivery place
(E) All of these
Ans : (E)
6. ‘Buyer Resistance’ means—
(A) Buyer’s interest in the product being sold
(B) Buyer fighting with the seller
(C) Buyer’s hesitation in buying the product
(D) Buyer becoming a seller
(E) Buyer buying the product
Ans : (C)
7. Marketing is the function of—
(A) Sales persons
(B) Production Department
(C) Planning Department
(D) Team leaders
(E) A collective function of all staff
Ans : (E)
8. A DSA means—
(A) Direct Service Agency
(B) Direct Selling Agent
(C) Double Selling Agent
(D) Distribution Agency
(E) None of these
Ans : (B)
9. Service Marketing is resorted to in—
(A) All manufacturing companies
(B) All production houses
(C) Export units
(D) Insurance companies and banks
(E) All of these
Ans : (D)
10. Marketing is—
(A) A skilled person’s job
(B) A one day function
(C) A one time act
(D) Required only when a new product is launched
(E) None of these
Ans : (A)
11. Market share refers to—
(A) Share market prices
(B) Price fluctuation in the market
(C) Share issue floated by the company
(D) Share of wallet
(E) Share of business of the company
as compared to peers
Ans : (E)
12. Service Marketing is the same as—
(A) Internet marketing
(B) Telemarketing
(C) Internal Marketing
(D) Relationship Marketing
(E) All of these
Ans : (D)
13. Current Accounts can be freely opened by ………… Find the incorrect answer.
(A) All NRIs
(B) All businessmen
(C) Government departments
(D) Firms and Companies
(E) HUFs
Ans : (E)
14. Buyer Resistance can be overcome by—
(A) Cordial relation between buyer and
seller
(B) Good negotiation
(C) Persuasive communication
(D) Good after sales service
(E) All of these
Ans : (A)
15. Cross-selling is useful for canvassing—
(A) Current Accounts
(B) Fixed Deposit Accounts
(C) Student loans
(D) Car loans
(E) All of these
Ans : (E)
16. Market segmentation helps to
determine—
(A) Target groups
(B) Sale price
(C) Profit levels
(D) Product life cycle
(E) All of these
Ans : (A)
17. The target group for Car loans is—
(A) Auto manufacturing companies
(B) Car dealers
(C) Taxi drivers
(D) Car purchasers
(E) All of these
Ans : (E)
18. The best promotional tool in any marketing is—
(A) e-promotion
(B) Public Relations
(C) Viral marketing
(D) Word of mouth publicity
(E) Advertisements
Ans : (E)
19. Customisation results in—
(A) Customer exodus
(B) Customer retention
(C) Customer complaints
(D) All of these
(E) None of these
Ans : (B)
20. The target group for Education Loans is—
(A) All parents
(B) All Professors
(C) All Research Scholars
(D) All Tutorial Colleges
(E) All College Students
Ans : (E)
21. Find the correct sentence.
(A) Higher the price, higher are the sales
(B) More sales persons lead to more sales
(C) Mission statement is part of a Market Plan
(D) Better sales incentives means better performance
(E) All customers are profitable customers
Ans : (C)
22. Good marketing strategy envisages good and proper—
(A) Product development
(B) Promotion and Distribution
(C) Pricing
(D) Relationship management
(E) All of these
Ans : (E)
23. Savings Accounts can be opened by—
(A) All individuals fulfilling KYC norms
(B) All individuals earning more than Rs. 1,00,000 per annum
(C) All individuals above the age of 18
(D) All salaried persons only
(E) All students below the age of 18
Ans : (C)
24. Situation Analysis is useful for—
(A) SWOT Analysis
(B) Analysis of Sales person’s performances
(C) Analysis of capital markets
(D) All of these
(E) None of these
Ans : (A)
25. Information that comes from an external source and fed into computer software is called—
(A) Input
(B) Output
(C) Throughput
(D) Reports
(E) None of these
Ans : (A)
26. With a CD you can—
(A) Read
(B) Write
(C) Neither Read nor Write
(D) Both Read and Write
(E) None of these
Ans : (D)
27. Errors in a computer program are referred to as—
(A) bugs
(B) mistakes
(C) item overlooked
(D) blunders
(E) None of these
Ans : (A)
28. Which of the following are computers that can be carried around easily ?
(A) Laptops
(B) Supercomputers
(C) PCs
(D) Minicomputers
(E) None of these
Ans : (A)
29. What menu is selected to change font and style ?
(A) Tools
(B) File
(C) Format
(D) Edit
(E) None of these
Ans : (C)
30. Where is the disk put in a computer?
(A) In the hard drive
(B) In the disk drive
(C) Into the CPU
(D) In the modem
(E) None of these
Ans : (B)
31. A computer’s hard disk is—
(A) an arithmetic and logical unit
(B) computer software
(C) operating system
(D) computer hardware
(E) None of these
Ans : (D)
32. A compiler is used to translate a program written in—
(A) a low level language
(B) a high level language
(C) assembly language
(D) machine language
(E) None of these
Ans : (B)
33. In programming, you use the following keys—
(A) Arrow keys
(B) Function keys
(C) Alpha keys
(D) page up and Page Down keys
(E) None of these
Ans : (A)
34. Which keys enable the input of numbers quickly ?
(A) Function keys
(B) The numeric keypad
(C) Ctrl, shift and alt
(D) Arrow keys
(E) None of these
Ans : (B)
35. Files are organized by storing them in—
(A) tables
(B) databases
(C) folders
(D) graphs
(E) None of these
Ans : (C)
36. The secret code that restricts entry to some programs—
(A) entry-code
(B) passport
(C) password
(D) access-code
(E) None of these
Ans : (C)
37. Advertisements are not required in—
(A) Public Sector banks
(B) Private Sector banks
(C) Government concerns
(D) Profit making companies
(E) None of these
Ans : (C)
38. The most common method of entering text and numerical data into a computer system is through the use of a—
(A) plotter
(B) scanner
(C) printer
(D) keyboard
(E) None of these
Ans : (D)
39. Computer programs are also known as—
(A) operating systems
(B) documents
(C) peripherals
(D) applications
(E) None of these
Ans : (D)
40. A collection of unprocessed items is ………
(A) information
(B) data
(C) memory
(D) reports
(E) None of these
Ans : (B)
41. ……… is when the more powerhungry components, such as the monitor and the hard drive, are put in
idle.
(A) Hibernation
(B) Power down
(C) Standby mode
(D) The shutdown procedure
(E) None of these
Ans : (C)
42. ……… is the process of dividing the disk into tracks and sectors.
(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
(E) None of these
Ans : (B)
43. A saved document is referred to as a ………
(A) file
(B) word
(C) folder
(D) project
(E) None of these
Ans : (A)
44. Which of the following is the largest unit of storage ?
(A) GB
(B) KB
(C) MB
(D) TB
(E) None of these
Ans : (D)
45. The operating system is the most common type of ……… software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (B)
46. A ……… is approximately one billion bytes.
(A) kilobyte
(B) bit
(C) gigabyte
(D) megabyte
(E) None of these
Ans : (C)
47. A scanner scans—
(A) Pictures
(B) Text
(C) Both Pictures and Text
(D) Neither Pictures nor Text
(E) None of these
Ans : (C)
48. Dumb terminals have terminals and—
(A) Mouse
(B) Speakers
(C) Keyboard
(D) Mouse or Speakers
(E) None of these
Ans : (C)
49. The portion of the CPU that coordinates the activities of all the other computer components is the—
(A) motherboard
(B) coordination board
(C) control unit
(D) arithmetic logic unit
(E) None of these
Ans : (C)
50. A repair for a known software bug, usually available at no charge on the Internet, is called a(n)—
(A) version
(B) patch
(C) tutorial
(D) FAQ
(E) None of these
Ans : (B)
SBI ASSOCIATE BANKS CLERKS EXAM 2011 SOLVED PAPER
(EXAM HELD ON : 16-01-2011)
Q. 1. An email account includes a storage area, often called a(n) __
(1) attachment
(2) hyperlink
(3) mailbox
(4) IP address
(5) None of these
Q. 2. Data becomes __ when it is presented in a format that people can understand and use.
(1) processed
(2) graphs
(3) information
(4) presentation
(5) None of these
Q.3. A set of computer programs that helps a computer monitor itself and function more efficiently isajan __
(1) Windows
(2) System Software
(3) DBMS
(4) Application Software
(5) None of these
Q. 4. An area of a computer that temporarily holds data waiting to be processed is __
(1) CPU
(2) Memory
(3) Storage
(4) File
(5) None of these
Q.5. A __ is a microprocessor-based computing device.
(1) personal computer
(2) mainframe
(3) workstation
(4) server
(5) None of these
Q. 6. You use a(n) __ , such as a keyboard or mouse, to input information.
(1) output device
(2) input device
(3) storage device
(4) processing device
(5) None of these
Q.7. The term __ designates equipment that might be added to a computer system to enhance its functionality.
(1) digital device
(2) system add-on
(3) disk pack
(4) peripheral device
(5) None of these
Q. 8. The instructions that tell a computer how to carry out the processing tasks are referred to as computer __
(1) programs
(2) processors
(3) input devices
(4) memory modules
(5) None of these
Q. 9. RAM can be thought of as the __ for the computer's processor.
(1) factory
(2) operating room
(3) waiting room
(4) planning room
(5) None of these
Q. 10. C, BASIC, COBOL, and Java are examples of __ languages.
(1) low-level
(2) computer
(3) system programming
(4) high-level
(5) None of these
Q.11. __ is the ability of a device to "jump" directly to the requested data.
(1) Sequential access
(2) Random access
(3) Quick access
(4) All of the above
(5) None of these
Q.12. The __ is the amount of data that a storage device can move from the storage medium to the Computer per second.
(1) data migration rate
(2) data digitizing rate
(3) data transfer rate
(4) data access rate
(5) None of these
Q.13. A __ converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file.
(1) converter
(2) compiler
(3) interpreter
(4) instruction
(5) None of these
Q.14. One thousand bytes is a __
(1) kilobyte
(2) megabyte
(3) gigabyte
(4) terabyte
(5) None of these
Q.15. 'Benchmark' means __
(1) Benches for customers to sit
(2) Benches for salesmen to sit
(3) Products displayed on a bench
(4) Set standards
(5) All of the above
Q. 16 A Call Centre is __
(1) a meeting place for DSAs
(2) a Training Centre for DSAs
(3) a meeting place for customers
(4) Data Centre
(5) a back office set up where customer queries are answered
Q .17. The sequence of a sales process is __
(1) Lead generation, Call, Presentation & Sale
(2) Sale, Presentation, Lead generation & Call
(3) Presentation, Lead generation, Sale & Call
(4) Lead Generation, Call, Sale & Presentation
(5) There is no sequence required
Q.18. Home loans are granted to -
(1) Individuals
(2) Institutions
(3) Builders
(4) All of these
(5) None of these
Q.19. To 'Close a Call' means __
(1) 'fo end the conversation
(2) To put the phone down
(3) To close the doors
(4) To clinch the sale
(5) To close the business
Q.20. A __ is an additional set of commands that the computer displays after you make a selection from the main menu.
(1) dialog box
(2) submenu
(3) menu selection
(4) All of the above
(5) None of these
Q.21. Information kept about a file includes ----
(1) print settings
(2) deletion date
(3) (1) & (2) only
(4) size
(5) None of these
Q.22. __ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.
(1) Multitasking
(2) Multithreading
(3) Multiprocessing
(4) Multicomputing
(5) None of these
Q.23. The ALU performs __ operations.
(1) arithmetic
(2) ASCII
(3) algorithm-based
(4) logarithm-based
(5) None of these
Q. 24. A (n) __ is software that helps a computer control itself to operate efficiently and keep track of data.
(1) application system
(2) hardware system
(3) software system
(4) oprating system
(5) None of these
Q.25. 'Customisation' means __
(1) Tailor-made products for each customer
(2) Customers selling goods
(3) Tailor-made products for each staff
4) A selling process
(5) None of these
Q.26. A 'Call' in Marketing language means __
(1) Calling On a salesperson
(2) Calling on a customer
(3) Making a phone-call
(4) Telemarketing
(5) None of these
Q.27. Computers manipulate data in many ways, and this manipulation is called __
(1) upgrading
(2) processing
(3) batching
(4) utilizing
(5) None of these
Q.28. A Marketing Survey is required for __
(1) deciding marketing strategies
(2) deciding Product strategies
(3) deciding pricing strategies
(4) All of these
(5) None of these
Q.29. The Target Group for Education Loans is ----
(1) all colleges
(2) all parents
(3) research scholars
(4) meritorious students seeking higher education
(5) all of these
Q.30. Cross-selling means __
(1) Selling with a cross face
(2) Cross country marketing
(3) Selling other products to existing customers
(4) Selling to friends
(5) Selling to employees
Q.31. Market Segmentation is useful for---
(1) Preferential marketing
(2) Targeting existing clients
(3) Identifying prospects
(4) Knowing customers' tastes
(5) All of the above
Q.32. The Target Group for Savings Deposit Accounts is __
(1) Newborn babies
(2) students
(3) parents
(4) businessman
(5) all of the above
Q. 33. Market Segmentation can be resorted to by means of __
(1) segmenting by age
(2) segmenting by income
(3) segmenting geographically
(4) all of these
(5) none of these
Q.34. The Target Group for a Car Loan is ---
(1) all auto drivers
(2) all auto dealers
(3) all car owners
(4) any individual needing a car
(5) all of these
Q.35. Market information means ---
(1) knowledge of industries
(2) knowledge of households
(3) knowledge of peers
(4) knowledge of customers' tastes
(5) All of these
Q.36. Credit cards are used for -
(1) Cash withdrawals
(2) Purchase of air tickets
(3) Purchase of consumable items from retail outlets
(4) All of these
(5) None of these
Q.37. TheTarget Group for Agricultural Loans is __
(1) any farmer
(2) farm labourers
(3) any individual dealing in agricultural or related activity
(4) farmers'societies
(5) all of these
Q.38. The Target Group for Credit Cards is ----
(1) existing cardholders
(2) all graduates
(3) all minors
(4) individuals with taxable income
(5) all of these
Q.39. Market Segmentation means __
(1) segmenting the salesmen
(2) segmenting the employees
(3) segmenting the customers as per their Heeds
(4) segmenting the products
(5) All of these
Q. 40. A 'Target Group' means---
(1) a group of sellers
(2) a group of buyers
(3) a group of products
(4) a group of persons to whom sales should be focused
(5) all of these
Answer :
(1) 3 (2) 3 (3) 2 (4) 2 (5) 1 (6) 2 (7) 4 (8) 1 (9) 3 (10) 4 (11) 2 (12) 3 (13) 2 (14) 1 (15) 4 (16) 5 (17) 1 (18) 1 (19) 4 (20) 1 (21) 3 (22) 1 (23) 1 (24) 4 (25) 1 (26) 2 (27) 2 (28) 4 (29) 4 (30) 3 (31) 5 (32) 5 (33) 4 (34) 4 (35) 5 (36) 4 (37) 3 (38) 4 (39) 3 (40) 5
****************************************
Central Bank of India PO Exam Paper 2010
Computer Knowledge
(Exam Held on 25-07-2010)
1. If a word is typed that is not in Word’s dictionary, a____________wavy underline
appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)
2. The____________button on the quick access Toolbar allows you to cancel your recent
commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)
3. In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans : (B)
4. ____________Software allows users to perform calculations on rows and columns of
data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these
Ans : (C)
5. A ____________represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (C)
6. ____________cells involves creating a single cell by combining two or more selected
cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)
7. The operating system is the most common type of____________software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (C)
8. When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans : (C)
9. The horizontal and vertical lines on a worksheet are called—
(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
Ans : (D)
10. To delete an incorrect character in a document, ____________ to erase to the right of
the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans : (D)
11. The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing.
Ans : (D)
12. During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
Ans : (B)
13. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
Ans : (C)
14. ____________ is the ability of an operating system to control the activities of multiple
programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
Ans : (A)
15. The unique signal, generated by a device, that tells the operating system that it is in
need of immediate attention is called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Ans : (C)
16. The operating system controls access to the processor by assigning a(n) ____________
to each task requiring the processor’s attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
Ans : (B)
17. The blocks of code, included in the operating system, that software applications
interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.
Ans : (A)
18. MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
Ans : (C)
19. An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device.
(C) utility program.
(D) special numeric code that indicates the priority of a request.
Ans : (D)
20. A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.
Ans : (C)
21. Virtual memory is typically located:
(A) on a floppy disk.
(B) in the CPU.
(C) in a flash card.
(D) on the hard drive.
Ans : (D)
22. The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously.
Ans : (B)
23. The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
Ans : (A)
24. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
Ans : (B)
25. Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C) authentication.
(D) logging in.
Ans : (C)
26. The combination of the operating system and the processor is referred to as the
computer’s:
(A) CPU.
(B) platform.
(C) BIOS.
(D) CMOS.
Ans : (B)
27. The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
Ans : (A)
28. Which of the following is the correct sequence of actions that takes place during the
boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
Ans : (B)
29. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
Ans : (D)
30. The ____________, stored on a ROM chip, is responsible for loading the operating
system from its permanent location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor program
Ans : (A)
31. The basic Input/output system (BIOS) is stored in:
(A) RAM.
(B) ROM.
(C) the CPU.
(D) the hard drive.
Ans : (B)
32. Ensuring that the essential peripheral devices are attached and operational is the
____________ process.
(A) configuration
(B) CMOS
(C) POST
(D) ROM
Ans : (C)
33. The memory resident portion of the operating system is called the—
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
Ans : (D)
34. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
Ans : (A)
35. All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be
manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
Ans : (A)
36. The operating system allows users to organize the computer’s contents in a
hierarchical structure of directories that include all of the following EXCEPT:
(A) files.
(B) folders.
(D) drives.
(D) systems.
Ans : (D)
37. All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
Ans : (A)
38. All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
Ans : (C)
39. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
Ans : (B)
40. In Windows XP, if you want to see the file size and modified dates of all files in a
folder, the best viewing option is the __________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon
Ans : (C)
***********************************
Central Bank of India P.O. Exam., 2010
1. If a word is typed that is not in Word’s dictionary, a____________wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)
2. The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)
3. In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans : (B)
4. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
P a g e | 61
(E) None of these
Ans : (C)
5. A ____________represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (C)
6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)
7. The operating system is the most common type of____________software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (C)
8. When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans : (C)
9. The horizontal and vertical lines on a worksheet are called—
(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
Ans : (D)
10. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans : (D)
11. The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing.
Ans : (D)
12. During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
Ans : (B)
13. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
Ans : (C)
14. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
Ans : (A)
15. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Ans : (C)
16. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
Ans : (B)
17. The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.
Ans : (A)
18. MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
Ans : (C)
19. An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device.
(C) utility program.
(D) special numeric code that indicates the priority of a request.
Ans : (D)
20. A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.
Ans : (C)
21. Virtual memory is typically located:
(A) on a floppy disk.
(B) in the CPU.
(C) in a flash card.
(D) on the hard drive.
Ans : (D)
22. The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously.
Ans : (B)
23. The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
Ans : (A)
24. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
Ans : (B)
25. Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C) authentication.
(D) logging in.
Ans : (C)
26. The combination of the operating system and the processor is referred to as the computer’s:
(A) CPU.
(B) platform.
(C) BIOS.
(D) CMOS.
Ans : (B)
27. The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
Ans : (A)
28. Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
Ans : (B)
29. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
Ans : (D)
30. The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor program
Ans : (A)
31. The basic input/output system (BIOS) is stored in:
(A) RAM.
(B) ROM.
(C) the CPU.
(D) the hard drive.
Ans : (B)
32. Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
(A) configuration
(B) CMOS
(C) POST
(D) ROM
Ans : (C)
33. The memory resident portion of the operating system is called the—
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
Ans : (D)
34. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
Ans : (A)
35. All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
Ans : (A)
36. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:
(A) files.
(B) folders.
(D) drives.
(D) systems.
Ans : (D)
37. All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
Ans : (A)
38. All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
Ans : (C)
39. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
Ans : (B)
40. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon
Ans : (C)
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)
2. The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)
3. In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans : (B)
4. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
P a g e | 61
(E) None of these
Ans : (C)
5. A ____________represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (C)
6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)
7. The operating system is the most common type of____________software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (C)
8. When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans : (C)
9. The horizontal and vertical lines on a worksheet are called—
(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
Ans : (D)
10. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans : (D)
11. The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing.
Ans : (D)
12. During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
Ans : (B)
13. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
Ans : (C)
14. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
Ans : (A)
15. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Ans : (C)
16. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
Ans : (B)
17. The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.
Ans : (A)
18. MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
Ans : (C)
19. An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device.
(C) utility program.
(D) special numeric code that indicates the priority of a request.
Ans : (D)
20. A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.
Ans : (C)
21. Virtual memory is typically located:
(A) on a floppy disk.
(B) in the CPU.
(C) in a flash card.
(D) on the hard drive.
Ans : (D)
22. The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously.
Ans : (B)
23. The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
Ans : (A)
24. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
Ans : (B)
25. Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C) authentication.
(D) logging in.
Ans : (C)
26. The combination of the operating system and the processor is referred to as the computer’s:
(A) CPU.
(B) platform.
(C) BIOS.
(D) CMOS.
Ans : (B)
27. The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
Ans : (A)
28. Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
Ans : (B)
29. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
Ans : (D)
30. The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor program
Ans : (A)
31. The basic input/output system (BIOS) is stored in:
(A) RAM.
(B) ROM.
(C) the CPU.
(D) the hard drive.
Ans : (B)
32. Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
(A) configuration
(B) CMOS
(C) POST
(D) ROM
Ans : (C)
33. The memory resident portion of the operating system is called the—
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
Ans : (D)
34. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
Ans : (A)
35. All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
Ans : (A)
36. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:
(A) files.
(B) folders.
(D) drives.
(D) systems.
Ans : (D)
37. All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
Ans : (A)
38. All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
Ans : (C)
39. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
Ans : (B)
40. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon
Ans : (C)
*******************************************
Punjab and Sind Bank Clerk Exam., 2010 Solved Paper
Computer Knowledge(Held on 23-5-2010)
1. Memory, also called random access memory, or RAM……….
(A) contains the electronic circuits that cause processing to occur
(B) makes the information resulting from processing available for use
(C) allows data, programs, commands, and user responses to be entered into a computer
(D) consists of electronic components that store data
(E) None of these
Ans : (D)
2. Correcting errors in a program is referred to as………
(A) debugging
(B) bugging
(C) rectifying
(D) modifying
(E) None of these
Ans : (A)
3. An assembler is used to translate a program written in………
(A) a low level language
(B) machine language
(C) a high level language
(D) assembly language
(E) None of these
Ans : (D)
4. The capability of the operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is………
(A) Multiprocessing
(B) Multitasking
(C) Multiprogramming
(D) Multiexecution
(E) None of these
Ans : (B)
5. The basic goal of computer process is to convert data into……
(A) information
(B) tables
(C) files
(D) graphs
(E) None of these
Ans : (A)
6. A hard copy of a document is …
(A) stored in the hard disk
(B) stored on a floppy
(C) stored on a CD
(D) printed on the printer
(E) None of these
Ans : (D)
7. Which of the following is not an output device ?
(A) Plotter
(B) Printer
(C) Scanner
(D) Monitor
(E) None of these
Ans : (C)
8. Which keys can be used together with other keys for special tasks ?
(A) Insert, Delete
(B) Ctrl, Shift
(C) Left Arrow, Right Arrow
(D) Page up, Page Down
(E) None of these
Ans : (B)
9. Which is the part of a computer that one can touch and feel ?
(A) Programs
(B) Software
(C) Hardware
(D) Output
(E) None of these
Ans : (C)
10. Computers gather data, which means they allow users to…… data.
(A) present
(B) store
(C) output
(D) input
(E) None of these
Ans : (D)
11. CPU stands for……
(A) CD-run on memory
(B) central processing unit
(C) call powers up
(D) create programs user
(E) None of these
Ans : (B)
12. Moves the cursor one space to the right to puts spaces in between words……
(A) control key
(B) space bar
(C) printer
(D) mouse
(E) None of these
Ans : (B)
13. Use this when you want to make all letters capital without having to use the shift key for each character………
(A) shifter
(B) upper case
(C) caps lock key
(D) icon
(E) None of these
Ans : (C)
14. A device that reads the information contained on a disk and transfers it to the computer’s memory……
(A) monitor
(B) screen
(C) keyboard
(D) disk drive
(E) None of these
Ans : (D)
15. Which of the following is not the major function of a computer ?
(A) Processing data into information
(B) Storing data or information
(C) Gathering data
(D) Analysing data or information
(E) None of these
Ans : (D)
16. A disk on which you store information………
(A) plate
(B) data disk
(C) paper disk
(D) TV disk
(E) None of these
Ans : (B)
17. Allows you to print……
(A) ribbon
(B) monitor
(C) go now
(D) Control-P
(E) None of these
Ans : (D)
18. Easy to use……
(A) user friendly
(B) select
(C) helpful
(D) ever-ready
(E) None of these
Ans : (A)
19. When your computer stops working suddenly, it is referred to as a……
(A) crash
(B) die
(C) death
(D) penalty
(E) None of these
Ans : (E)
20. The smallest item of useful information a computer can handle…
(A) bite
(B) byte
(C) bit
(D) bait
(E) None of these
Ans : (C)
21. Devices that let the computer communicate with you……
(A) input
(B) output
(C) type
(D) print
(E) None of these
Ans : (B)
22. Devices that allow you to put information into the computer ……
(A) input
(B) output
(C) type
(D) print
(E) None of these
Ans : (A)
23. Eight bits of data……
(A) octabit
(B) word
(C) sentence
(D) byte
(E) None of these
Ans : (D)
24. The secret code that gives you access to some programs……
(A) clue
(B) cue
(C) password
(D) help
(E) None of these
Ans : (C)
25. The different styles of lettering in a word processing program……
(A) font
(B) calligraphy
(C) writing
(D) manuscript
(E) None of these
Ans : (A)
26. Any letter, number, or symbol found on the keyboard that you can type into the computer……
(A) output
(B) character
(C) type
(D) print
(E) None of these
Ans : (B)
27. A symbol or question on the screen that prompts you to take action and tell the computer what to do next……
(A) scanner
(B) questionnaire
(C) prompt and dialog box
(D) information seeker
(E) None of these
Ans : (C)
28. Choices are referred to as……
(A) options
(B) exit
(C) boot
(D) folder
(E) None of these
Ans : (A)
29. Anything written on the screen ……
(A) cursor
(B) text
(C) folder
(D) boot
(E) None of these
Ans : (B)
30. Lets you leave a screen or program……
(A) boot
(B) programs
(C) exit
(D) text
(E) None of these
Ans : (C)
31. Instructions that tell the computer what to do. Another name for software……
(A) programs
(B) CPU
(C) options
(D) folder
(E) None of these
Ans : (A)
32. A program which helps create written documents and lets you go back and make corrections as necessary……
(A) spreadsheet
(B) personal writer
(C) word printer
(D) word processor
(E) None of these
Ans : (D)
33. A place that a user can create to store files……
(A) cursor
(B) text
(C) folder
(D) boot
(E) None of these
Ans : (C)
34. Start or restart the computer……
(A) exit
(B) kick
(C) boot
(D) kick-start
(E) None of these
Ans : (C)
35. A blinking indicator that shows you where your next action will happen……
(A) CPU
(B) cursor
(C) tool bar
(D) boot
(E) None of these
Ans : (B)
36. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs……
(A) menu bar
(B) tool bar
(C) user friendly
(D) word processor
(E) None of these
Ans : (A)
37. CD-ROM stands for……
(A) central processing unit
(B) CD-remote open mouse
(C) CD-resize or minimize
(D) CD-read only memory
(E) None of these
Ans : (D)
38. To change written work already done……
(A) file
(B) edit
(C) cut
(D) close
(E) None of these
Ans : (B)
39. A place in the computer system where data and programs are temporarily stored……
(A) paste
(B) open
(C) memory
(D) pocket
(E) None of these
Ans : (C)
40. A key that will erase information from the computerÕs memory and characters on the screen……
(A) edit
(B) delete key
(C) dummy out
(D) trust key
(E) None of these
Ans : (B)
41. To insert a copy of the clipboard contents, whatever was last cut or copied at the insertion point……
(A) paste
(B) stick in
(C) fit in
(D) push in
(E) None of these
Ans : (A)
42. The command used to remove text or graphics from a document. The information is then stored on a clipboard so you can paste it.
(A) chop
(B) cut
(C) clip
(D) cart away
(E) None of these
Ans : (B)
43. To exit the program without leaving the application……
(A) file
(B) edit
(C) copy
(D) close
(E) None of these
Ans : (D)
44. A removable magnetic disc that holds information……
(A) floppy disk
(B) hard drive
(C) monitor
(D) portable
(E) None of these
Ans : (B)
45. A command that saves what you are working on into the hard drive, or onto a disk……
(A) view
(B) hold
(C) save
(D) go
(E) None of these
Ans : (E)
46. A command to get a file you worked on from the memory where it was stored……
(A) close
(B) delete
(C) open
(D) get it
(E) None of these
Ans : (C)
47. To move down a page in a document……
(A) jump
(B) fly
(C) wriggle
(D) scroll
(E) None of these
Ans : (D)
48. The primary device that a computer uses to store information……
(A) TV
(B) storehouse
(C) desk
(D) hard drive
(E) None of these
Ans : (D)
49. Screen that comes on when you turn on your computer that shows all the icons……
(A) desktop
(B) face to face
(C) viewer
(D) view space
(E) None of these
Ans : (A)
50. A program that works like a calculator for keeping track of money and making budgets……
(A) calculator
(B) spreadsheet
(C) budgeter
(D) financier
(E) None of these
Ans : (B)
*******************************************
Allahabad Bank Probationary Officers Exam, 2010
Computer Knowledge
(Held on 21-2-2010)
1. A………typically connects personal computers within a very limited geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)
2. Computers manipulate data in many ways, and this manipulation is called—
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)
3. An e-mail address typically consists of a user ID followed by the ……… sign and the name of the e-mail server that manages the user’s electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)
4. Software applies……, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)
5. A file extension is separated from the main file name with a(n) ……, but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)
6. An ad hoc query is a—
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)
7. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)
8. A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Ans : (B)
9. The desktop contains small graphics called—
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Ans : (C)
10. C, BASIC, COBOL, and Java are examples of ……… languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)
11. A(n)………camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Ans : (A)
12. ……makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) E-commerce
(C) E-spend
(D) E-business
(E) None of these
Ans : (D)
13. Networks are monitored by security personnel and supervised by ………who set(s) up accounts and passwords for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Ans : (C)
14. Application software is designed to accomplish—
(A) real-world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Ans : (D)
15. A telephone number, a birth date, and a customer name are all examples of—
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Ans : (D)
16. The human-readable version of a program is called—
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Ans : (D)
17. A ……… computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
Ans : (A)
18. ……… is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Ans : (C)
19. Programs such as Internet Explorer that serve as navigable windows into the Web are called—
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Ans : (D)
20. A ……… is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Ans : (C)
21. When you save to ………, your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
Ans : (C)
22. The motherboard is the—
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Ans : (D)
23. A computer-intensive problemruns on a—
(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these
Ans : (C)
24. A(n)……converts and executesone statement at a time.
(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these
Ans : (B)
25. The term ……… designates equipment that might be added to a computer system to enhance its functionality.
(A) digital device
(B) system add-on
(C) disk pack
(D) peripheral device
(E) None of these
Ans : (D)
26. Approximately how many bytes make one megabyte ?
(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these
Ans : (D)
27. What is MP3 ?
(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these
Ans : (C)
28. All the deleted files go to—
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)
29. ……… this is the act of copying or downloading a program from a network and making multiple copies of it.
(A) Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site-license piracy
(E) None of these
Ans : (C)
30. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)
31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
Ans : (B)
32. In MICR, C stands for ……….
(A) Code
(B) Colour
(C) Computer
(D) Character
(E) None of these
Ans : (D)
33. Fax machines and imaging systems are examples of—
(A) bar-code readers
(B) imaging systems
(C) scanning devices
(D) pen-based systems
(E) None of these
Ans : (B)
34. When writing a document, you can use the ……… feature to find an appropriate word or an alternative word if you find yourself stuck for the right word.
(A) dictionary
(B) word finder
(C) encyclopedia
(D) thesaurus
(E) None of these
Ans : (A)
35. Which key is used in combination with another key to perform a specific task ?
(A) Function
(B) Control
(C) Arrow
(D) Space bar
(E) None of these
Ans : (B)
36. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—
(A) read-only
(B) memory-only
(C) run-only
(D) write-only
(E) None of these
Ans : (A)
37. In an information system, alphanumeric data normally takes the form of—
(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these
Ans : (B)
38. A Website’s main page is called its—
(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these
Ans : (A)
39. When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these
Ans : (A)
40. A collection of interrelated files in a computer is a—
(A) file manager
(B) field
(C) record
(D) database
(E) None of these
Ans : (D)
41. A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these
Ans : (B)
42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as—
(A) a roller ball which moves the cursor
(B) a pen-shaped device which allows data to be entered through the CRT screen
(C) a figure which resembles a familiar office device
(D) an outdated input device
(E) None of these
Ans : (A)
43. Various applications and documents are represented on the Windows desktop by—
(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these
Ans : (D)
44. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these
Ans : (D)
45. The real business and competitive value of information technology lies in—
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
(D) The capabilities of the hardware and the speed at which it processes information
(E) None of these
Ans : (B)
46. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
(A) Open source vendors
(B) Alliances
(C) Application service providers
(D) All of the above
(E) None of these
Ans : (C)
47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(A) Opening an application previously installed on the computer
(B) Borrowed copies of software
(C) Viewing a website without causing any additional transactions
(D) Running antivirus programs
(E) None of these
Ans : (B)
48. Collecting personal information and effectively posing as another individual is known as the crime of—
(A) spooling
(B) dentity theft
(C) spoofing
(D) hacking
(E) None of these
Ans : (B)
49. The first step in the transaction processing cycle is—
(A) database operations
(B) audit
(C) data entry
(D) user inquiry
(E) None of these
Ans : (C)
50. In the information systems concept, the output function involves—
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation process to their ultimate destination
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
(E) None of these
Ans : (A)
*********************************
Computer Awareness for Bank Exams
1. Who is called as "Father of Computers''?
(A) Charles Babage
(B) Blaise Pascal
(C) Hollirth
(D) All of these
(E) None of these
2. The first Digital Computer introduced, was named as :
(A) Univac
(B) Mark-I
(C) Eniac
(D) All of these
(E) None of these
3. How many generations, computer can be classified?
(A) 4
(B) 5
(C) 3
(D) 6
(E) None of these
4. First Generation Computers contain :
(A) Transistors
(B) Vacume Tubes
(C) LSI
(D) VLSI
(E) None of these
5. II Generation Computers are made of :
(A) Vaccume Tubes
(B) Transistors
(C) LSI
(D) VLSI
(E) None of these
6. IV Generation Computers contain :
(A) LSI
(B) Vaccume Tubes
(C) All Technology
(D) Transistors
(E) None of these
7. Vth Generation Computers are based on:
(A) Artificial Intelligence
(B) Programming Intelligence
(C) System Knowledge
(D) All of these
(E) None of these
8. Computers, combine both measuring and counting, are called :
(A) Analog
(B) Digital
(C) Hybrid
(D) All of these
(E) None of these
9. In world today, most of the computers are :
(A) Digital
(B) Hybrid
(C) Analog
(D) Complex
(E) None of these
10. In any computer installation, how many elements consists?
(A) 2
(B) 4
(C) 3
(D) 1
(E) None of these
11. Physical structure of computer is called :
(A) Software
(B) Hardware
(C) Humanware
(D) All of these
(E) None of these
12. A computer can perform, which of the following tasks?
(A) Computation
(B) Communication
(C) Processing
(D) All of these
(E) None of these
13. CPU stands for :
(A) Computer Processing Unit
(B) Central Processing Unit
(C) Both (A) & (B)
(D) Communication Processing Unit
(E) None of these
14. In which type of computer, data are represented as discrete signals?
(A) Analog computer
(B) Digital computer
(C) both
(D) Digilog Computer
(E) None of these
15. Which of the following is available in the form of a PC now?
(A) Mainframe
(B) Microcomputer
(C) Minicomputer
(D) Both (B) & (C)
(E) None of these
16. PARAM is an example of :
(A) Super computer
(B) PC
(C) Laptop
(D) PDA
(E) None of these
17. Who developed the `analytical engine'?
(A) Jacquard loom
(B) Charles Babbage
(C) Shannon
(D) IBM
(E) None of these
18. ENIAC stands for :
(A) Electrical Numerical Integrator and Calculator
(B) Electronic Numerical Integrator and Computer
(C) Electronic Numerical Integrator and Calculator
(D) Electronic Number Integrator and Calculator
(E) None of these
19. First Generation of computer was based on which technology?
(A) Transistor
(B) Vacuum Tube
(C) LSI
(D) VLSI
(E) None of these
20. Microprocessor was introduced in which generation of computer?
(A) Second Generation
(B) Fourth Generation
(C) Both (A) & (B)
(D) Third Generation
(E) All of the above
21. GUI stands for :
(A) Graphical User Interface
(B) Graph Use Interface
(C) Graphical Universal Interface
(D) None of these
22. The time taken by CPU to retrieve and interpret the instruction to be executed is called as :
(A) Instruction cycle
(B) Fetch cycle
(C) Both (A) & (B)
(D) All of these
(E) None of these
23. Which of the following is responsible for all types of calculations?
(A) ALU
(B) Control Unit
(C) Registers
(D) BUS
(E) None of these
24. Internal memory in a CPU is nothing but :
(A) A set of registers
(B) A set of ALU
(C) Microprocessor
(D) BUS
(E) None of these
25. Which of the following is permanent memory?
(A) SRAM
(B) DRAM
(C) ROM
(D) All of these
(E) None of these
(A) Charles Babage
(B) Blaise Pascal
(C) Hollirth
(D) All of these
(E) None of these
2. The first Digital Computer introduced, was named as :
(A) Univac
(B) Mark-I
(C) Eniac
(D) All of these
(E) None of these
3. How many generations, computer can be classified?
(A) 4
(B) 5
(C) 3
(D) 6
(E) None of these
4. First Generation Computers contain :
(A) Transistors
(B) Vacume Tubes
(C) LSI
(D) VLSI
(E) None of these
5. II Generation Computers are made of :
(A) Vaccume Tubes
(B) Transistors
(C) LSI
(D) VLSI
(E) None of these
6. IV Generation Computers contain :
(A) LSI
(B) Vaccume Tubes
(C) All Technology
(D) Transistors
(E) None of these
7. Vth Generation Computers are based on:
(A) Artificial Intelligence
(B) Programming Intelligence
(C) System Knowledge
(D) All of these
(E) None of these
8. Computers, combine both measuring and counting, are called :
(A) Analog
(B) Digital
(C) Hybrid
(D) All of these
(E) None of these
9. In world today, most of the computers are :
(A) Digital
(B) Hybrid
(C) Analog
(D) Complex
(E) None of these
10. In any computer installation, how many elements consists?
(A) 2
(B) 4
(C) 3
(D) 1
(E) None of these
11. Physical structure of computer is called :
(A) Software
(B) Hardware
(C) Humanware
(D) All of these
(E) None of these
12. A computer can perform, which of the following tasks?
(A) Computation
(B) Communication
(C) Processing
(D) All of these
(E) None of these
13. CPU stands for :
(A) Computer Processing Unit
(B) Central Processing Unit
(C) Both (A) & (B)
(D) Communication Processing Unit
(E) None of these
14. In which type of computer, data are represented as discrete signals?
(A) Analog computer
(B) Digital computer
(C) both
(D) Digilog Computer
(E) None of these
15. Which of the following is available in the form of a PC now?
(A) Mainframe
(B) Microcomputer
(C) Minicomputer
(D) Both (B) & (C)
(E) None of these
16. PARAM is an example of :
(A) Super computer
(B) PC
(C) Laptop
(D) PDA
(E) None of these
17. Who developed the `analytical engine'?
(A) Jacquard loom
(B) Charles Babbage
(C) Shannon
(D) IBM
(E) None of these
18. ENIAC stands for :
(A) Electrical Numerical Integrator and Calculator
(B) Electronic Numerical Integrator and Computer
(C) Electronic Numerical Integrator and Calculator
(D) Electronic Number Integrator and Calculator
(E) None of these
19. First Generation of computer was based on which technology?
(A) Transistor
(B) Vacuum Tube
(C) LSI
(D) VLSI
(E) None of these
20. Microprocessor was introduced in which generation of computer?
(A) Second Generation
(B) Fourth Generation
(C) Both (A) & (B)
(D) Third Generation
(E) All of the above
21. GUI stands for :
(A) Graphical User Interface
(B) Graph Use Interface
(C) Graphical Universal Interface
(D) None of these
22. The time taken by CPU to retrieve and interpret the instruction to be executed is called as :
(A) Instruction cycle
(B) Fetch cycle
(C) Both (A) & (B)
(D) All of these
(E) None of these
23. Which of the following is responsible for all types of calculations?
(A) ALU
(B) Control Unit
(C) Registers
(D) BUS
(E) None of these
24. Internal memory in a CPU is nothing but :
(A) A set of registers
(B) A set of ALU
(C) Microprocessor
(D) BUS
(E) None of these
25. Which of the following is permanent memory?
(A) SRAM
(B) DRAM
(C) ROM
(D) All of these
(E) None of these
Answers :
1. (A) 2. (B) 3. (B) 4. (B) 5. (B) 6. (A) 7. (A) 8. (C) 9. (A) 10. (C)
11. (B) 12. (D) 13. (B) 14. (B) 15. (B) 16. (A) 17. (B) 18. (B) 19. (B) 20. (B)
21. (A) 22. (A) 23. (A) 24. (A) 25. (C)
SBI Clerical Cadre Recruitment Exam., 2009
Marketing Aptitude/Computer Knowledge
1. A keyboard is this kind of device—
(A) black
(B) input
(C) output
(D) word Processing
(E) None of these
Ans : (B)
2. IT stands for—
(A) information Technology
(B) integrated Technology
(C) intelligent Technology
(D) interesting Technology
(E) None of these
Ans : (A)
3. Which of the following refers to the fastest, biggest and most expensive computers ?
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
Ans : (B)
4. A collection of related information sorted and dealt with as a unit is a—
(A) disk
(B) data
(C) file
(D) floppy
(E) None of these
Ans : (C)
5. The process of a computer receiving information from a server on the Internet is known as—
(A) pulling
(B) pushing
(C) downloading
(D) transferring
(E) None of these
Ans : (C)
6. Which part of the computer helps to store information ?
(A) Disk drive
(B) Keyboard
(C) Monitor
(D) Printer
(E) None of these
Ans : (A)
7. ………………is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)
8. The role of a………generally is to determine a buyer’s needs and match it to the correct hardware and software.
(A) computer Scientist
(B) computer sales representative
(C) computer consultant
(D) corporate trainer
(E) None of these
Ans : (B)
9. Which of the following groups consist of only output devices ?
(A) Scanner, Printer, Monitor
(B) Keyboard, Printer, Monitor
(C) Mouse, Printer, Monitor
(D) Plotter, Printer, Monitor
(E) None of these
Ans : (D)
10. The rectangular area of the screen that displays a program, data, and/or information is a—
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)
11. A(n)………contains commands that can be selected.
(A) pointer
(B) menu
(C) icon
(D) button
(E) None of these
Ans : (B)
12. An error is also known as—
(A) bug
(B) debug
(C) cursor
(D) icon
(E) None of these
Ans : (A)
13. Arithmetic Operations—
(A) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item
(B) sort data items according to standard, predefined criteria in ascending order or descending order
(C) use conditions with operators such as AND, OR and NOT
(D) include addition, subtraction, multiplication and division
(E) None of these
Ans : (D)
14. Sending an e-mail is similar to—
(A) picturing an event
(B) narrating a story
(C) writing a letter
(D) creating a drawing
(E) None of these
Ans : (C)
15. Promotion in Marketing means—
(A) passing an examination
(B) elevation from one grade to another
(C) selling the products through various means
(D) selling the product in specific areas
(E) None of these
Ans : (C)
16. Microsoft Word is an example of—
(A) an operating system
(B) a processing device
(C) application software
(D) an input device
(E) None of these
Ans : (B)
17. Sources of Sales Leads are—
(A) Data Mining
(B) Market Research
(C) Media Outlets
(D) Promotional Programs
(E) All of these
Ans : (E)
18. Any data or instruction entered into the memory of a computer is considered as—
(A) storage
(B) output
(C) input
(D) information
(E) None of these
Ans : (A)
19. Which part of the computer displays the work done ?
(A) RAM
(B) printer
(C) monitor
(D) ROM
(E) None of these
Ans : (C)
20. One of the methods for Market Monitoring is—
(A) to watch TV serials
(B) to discuss with other sales persons
(C) to monitor media outlets
(D) All of these
(E) None of these
Ans : (C)
21. Market Expansion means—
(A) hiring more staff
(B) firing more staff
(C) buying more products
(D) buying more companies
(E) None of these
Ans : (E)
22. A series of instructions that tells a computer what to do and how to do it is called a—
(A) program
(B) command
(C) user response
(D) processor
(E) None of these
Ans : (A)
23. Effective marketing helps in—
(A) developing new products
(B) creating a competitive environment
(C) building demand for products
(D) All of these
(E) None of these
Ans : (D)
24. Which is the part of a computer that one can touch and feel ?
(A) Hardware
(B) Software
(C) Programs
(D) Output
(E) None of these
Ans : (A)
25. A Call in Marketing means—
(A) to phone the customers
(B) to visit the customers
(C) to visit the marketing site
(D) to call on prospective customers
(E) None of these
Ans : (D)
26. Delivery Channel means—
(A) maternity wards
(B) handing over the products to the buyers
(C) places where products are made available to the buyers
(D) All of these
(E) None of these
Ans : (C)
27. Processing involves—
(A) inputting data into a computer system
(B) transforming input into output
(C) displaying output in a useful manner
(D) providing relevant answers
(E) None of these
Ans : (B)
28. One of the following is a target group for the marketing of Internet Banking.
(A) All the customers
(B) All the educated customers
(C) All the computer educated customers
(D) Only creditors
(E) All of these
Ans : (C)
29. Innovation mean—
(A) Product Designing
(B) New ideas
(C) Impulse
(D) Both (A) and (B)
(E) None of these
Ans : (D)
30. One of the following is a target group for the marketing of educational loan.
(A) All the customers
(B) Students
(C) Only poor students
(D) Students having promising educational track record
(E) All of these
Ans : (B)
31. Service after sale is not the function of—
(A) Marketing staff
(B) Seller
(C) Director of the company
(D) Employees of the company
(E) All of the above are wrong
Ans : (A)
32. If done through………the rural marketing would be more effective.
(A) fairs
(B) village fairs
(C) door to door campaign
(D) All of these
(E) None of these
Ans : (B)
33. Market Survey means—
(A) Market Research
(B) Market Planning
(C) Marketing Strategies
(D) Market Monitering
(E) All of these
Ans : (A)
34. ………can be done through digital Banking ?
(A) Mobile phone
(B) Internet
(C) Telephone
(D) All of these
(E) None of these
Ans : (A)
35. A good seller should have the following quality/qualities ?
(A) Devotion to the work
(B) Submissive
(C) Sympathy
(D) All of these
(E) None of these
Ans : (D)
36. The rural marketing is not required because—
(A) rural people do not understand marketing
(B) its not practical from the cost point of view
(C) it is sheer wastage of time
(D) All are wrong
(E) All are correct
Ans : (D)
37. Planned-cost service means—
(A) Costly products
(B) Extra profit on the same cost
(C) Extra work by seller
(D) All of these
(E) None of these
Ans : (B)
38. Internet marketing means—
(A) Self-marketing
(B) Core Groups monitering
(C) Employees marketing
(D) All of these
(E) None of these
Ans : (E)
39. The aim of successful marketing is—
(A) to increase the sale
(B) to increase the profit
(C) to increase the output of sellers
(D) All of these
(E) None of these
Ans : (D)
40. The networking becomes……through networking.
(A) very difficult
(B) dull
(C) easy
(D) has no role in marketing
(E) None of these
Ans : (C)
(A) black
(B) input
(C) output
(D) word Processing
(E) None of these
Ans : (B)
2. IT stands for—
(A) information Technology
(B) integrated Technology
(C) intelligent Technology
(D) interesting Technology
(E) None of these
Ans : (A)
3. Which of the following refers to the fastest, biggest and most expensive computers ?
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
Ans : (B)
4. A collection of related information sorted and dealt with as a unit is a—
(A) disk
(B) data
(C) file
(D) floppy
(E) None of these
Ans : (C)
5. The process of a computer receiving information from a server on the Internet is known as—
(A) pulling
(B) pushing
(C) downloading
(D) transferring
(E) None of these
Ans : (C)
6. Which part of the computer helps to store information ?
(A) Disk drive
(B) Keyboard
(C) Monitor
(D) Printer
(E) None of these
Ans : (A)
7. ………………is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)
8. The role of a………generally is to determine a buyer’s needs and match it to the correct hardware and software.
(A) computer Scientist
(B) computer sales representative
(C) computer consultant
(D) corporate trainer
(E) None of these
Ans : (B)
9. Which of the following groups consist of only output devices ?
(A) Scanner, Printer, Monitor
(B) Keyboard, Printer, Monitor
(C) Mouse, Printer, Monitor
(D) Plotter, Printer, Monitor
(E) None of these
Ans : (D)
10. The rectangular area of the screen that displays a program, data, and/or information is a—
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)
11. A(n)………contains commands that can be selected.
(A) pointer
(B) menu
(C) icon
(D) button
(E) None of these
Ans : (B)
12. An error is also known as—
(A) bug
(B) debug
(C) cursor
(D) icon
(E) None of these
Ans : (A)
13. Arithmetic Operations—
(A) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item
(B) sort data items according to standard, predefined criteria in ascending order or descending order
(C) use conditions with operators such as AND, OR and NOT
(D) include addition, subtraction, multiplication and division
(E) None of these
Ans : (D)
14. Sending an e-mail is similar to—
(A) picturing an event
(B) narrating a story
(C) writing a letter
(D) creating a drawing
(E) None of these
Ans : (C)
15. Promotion in Marketing means—
(A) passing an examination
(B) elevation from one grade to another
(C) selling the products through various means
(D) selling the product in specific areas
(E) None of these
Ans : (C)
16. Microsoft Word is an example of—
(A) an operating system
(B) a processing device
(C) application software
(D) an input device
(E) None of these
Ans : (B)
17. Sources of Sales Leads are—
(A) Data Mining
(B) Market Research
(C) Media Outlets
(D) Promotional Programs
(E) All of these
Ans : (E)
18. Any data or instruction entered into the memory of a computer is considered as—
(A) storage
(B) output
(C) input
(D) information
(E) None of these
Ans : (A)
19. Which part of the computer displays the work done ?
(A) RAM
(B) printer
(C) monitor
(D) ROM
(E) None of these
Ans : (C)
20. One of the methods for Market Monitoring is—
(A) to watch TV serials
(B) to discuss with other sales persons
(C) to monitor media outlets
(D) All of these
(E) None of these
Ans : (C)
21. Market Expansion means—
(A) hiring more staff
(B) firing more staff
(C) buying more products
(D) buying more companies
(E) None of these
Ans : (E)
22. A series of instructions that tells a computer what to do and how to do it is called a—
(A) program
(B) command
(C) user response
(D) processor
(E) None of these
Ans : (A)
23. Effective marketing helps in—
(A) developing new products
(B) creating a competitive environment
(C) building demand for products
(D) All of these
(E) None of these
Ans : (D)
24. Which is the part of a computer that one can touch and feel ?
(A) Hardware
(B) Software
(C) Programs
(D) Output
(E) None of these
Ans : (A)
25. A Call in Marketing means—
(A) to phone the customers
(B) to visit the customers
(C) to visit the marketing site
(D) to call on prospective customers
(E) None of these
Ans : (D)
26. Delivery Channel means—
(A) maternity wards
(B) handing over the products to the buyers
(C) places where products are made available to the buyers
(D) All of these
(E) None of these
Ans : (C)
27. Processing involves—
(A) inputting data into a computer system
(B) transforming input into output
(C) displaying output in a useful manner
(D) providing relevant answers
(E) None of these
Ans : (B)
28. One of the following is a target group for the marketing of Internet Banking.
(A) All the customers
(B) All the educated customers
(C) All the computer educated customers
(D) Only creditors
(E) All of these
Ans : (C)
29. Innovation mean—
(A) Product Designing
(B) New ideas
(C) Impulse
(D) Both (A) and (B)
(E) None of these
Ans : (D)
30. One of the following is a target group for the marketing of educational loan.
(A) All the customers
(B) Students
(C) Only poor students
(D) Students having promising educational track record
(E) All of these
Ans : (B)
31. Service after sale is not the function of—
(A) Marketing staff
(B) Seller
(C) Director of the company
(D) Employees of the company
(E) All of the above are wrong
Ans : (A)
32. If done through………the rural marketing would be more effective.
(A) fairs
(B) village fairs
(C) door to door campaign
(D) All of these
(E) None of these
Ans : (B)
33. Market Survey means—
(A) Market Research
(B) Market Planning
(C) Marketing Strategies
(D) Market Monitering
(E) All of these
Ans : (A)
34. ………can be done through digital Banking ?
(A) Mobile phone
(B) Internet
(C) Telephone
(D) All of these
(E) None of these
Ans : (A)
35. A good seller should have the following quality/qualities ?
(A) Devotion to the work
(B) Submissive
(C) Sympathy
(D) All of these
(E) None of these
Ans : (D)
36. The rural marketing is not required because—
(A) rural people do not understand marketing
(B) its not practical from the cost point of view
(C) it is sheer wastage of time
(D) All are wrong
(E) All are correct
Ans : (D)
37. Planned-cost service means—
(A) Costly products
(B) Extra profit on the same cost
(C) Extra work by seller
(D) All of these
(E) None of these
Ans : (B)
38. Internet marketing means—
(A) Self-marketing
(B) Core Groups monitering
(C) Employees marketing
(D) All of these
(E) None of these
Ans : (E)
39. The aim of successful marketing is—
(A) to increase the sale
(B) to increase the profit
(C) to increase the output of sellers
(D) All of these
(E) None of these
Ans : (D)
40. The networking becomes……through networking.
(A) very difficult
(B) dull
(C) easy
(D) has no role in marketing
(E) None of these
Ans : (C)
Allahabad Bank Clerk Exam., 2008
Computer General Knowledge
(Held on 30-08-2008)
(Held on 30-08-2008)
1. If a word is typed that is not in Word’s dictionary, a____________wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)
2. The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)
3. In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans : (B)
4. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these
Ans : (C)
5. A ____________represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (C)
6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)
7. The operating system is the most common type of____________software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (C)
8. When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans : (C)
9. The horizontal and vertical lines on a worksheet are called—
(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
Ans : (D)
10. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans : (D)
11. The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing.
Ans : (D)
12. During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
Ans : (B)
13. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
Ans : (C)
14. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
Ans : (A)
15. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Ans : (C)
16. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
Ans : (B)
17. The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.
Ans : (A)
18. MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
Ans : (C)
19. An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device.
(C) utility program.
(D) special numeric code that indicates the priority of a request.
Ans : (D)
20. A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.
Ans : (C)
21. Virtual memory is typically located:
(A) on a floppy disk.
(B) in the CPU.
(C) in a flash card.
(D) on the hard drive.
Ans : (D)
22. The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously.
Ans : (B)
23. The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
Ans : (A)
24. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
Ans : (B)
25. Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C) authentication.
(D) logging in.
Ans : (C)
26. The combination of the operating system and the processor is referred to as the computer’s:
(A) CPU.
(B) platform.
(C) BIOS.
(D) CMOS.
Ans : (B)
27. The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
Ans : (A)
28. Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
Ans : (B)
29. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
Ans : (D)
30. The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor program
Ans : (A)
31. The basic input/output system (BIOS) is stored in:
(A) RAM.
(B) ROM.
(C) the CPU.
(D) the hard drive.
Ans : (B)
32. Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
(A) configuration
(B) CMOS
(C) POST
(D) ROM
Ans : (C)
33. The memory resident portion of the operating system is called the—
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
Ans : (D)
34. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
Ans : (A)
35. All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
Ans : (A)
36. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:
(A) files.
(B) folders.
(D) drives.
(D) systems.
Ans : (D)
37. All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
Ans : (A)
38. All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
Ans : (C)
39. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
Ans : (B)
40. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon
Ans : (C)
**********************************************************************
1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Ans : B
2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Ans : A
3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Ans : B
4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Ans : A
5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Ans : C
6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Ans : C
7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Ans : B
8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Ans : A
9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Ans : A
10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Ans : A
11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Ans : D
12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Ans : D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Ans : B
14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Ans : B
15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Ans : B
16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Ans : C
17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Ans : D
18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Ans : D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Ans : C
20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Ans : B
21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Ans : C
22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Ans : C
23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Ans : A
24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Ans : C
25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Ans : D
26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Ans : A
27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Ans : B
28. The ____________, also called the “brains” of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Ans : D
29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Ans : B
30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Ans : A
31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Ans : B
32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Ans : D
33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Ans : A
34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Ans : C
35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Ans : A
36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Ans : D
37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Ans : B
38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Ans : D
39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Ans : A
40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Ans : A
41. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Ans : D
42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Ans : A
43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Ans : B
44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Ans : C
45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Ans : B
46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Ans : C
47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Ans : B
48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Ans : A
49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Ans : D
50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Ans : A
SBI PO EXAM 2008
General Awareness & Computer Knowledge
1. Which of the following statement(s) reflects India's stand on new World Trade Organization's proposal on the issue of the subsidy to agro products ?
(1) India would protect the interest of its poor farmers who can not bear the burden of the cost of the products if they have to sell them on cheaper rate.
(2) Indian industry needs more flexibility as compared to the industry in developed countries.
(3) WTO has set up a new committee under the chairmanship of Putin of Russia to look into the issue of subsidy and find out a solution to the problem acceptable to all the parties.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Both 1 & 2
(E) None of these
Ans : (A)
2. Which of the following statement(s) is / are true about the 11th five year plan of India ?
(1) The highest priority is given to exports ,education and development of steel sector.
(2) The plan aims at achieving the growth at 10 % level by the end of the plan.
(3) The Rashtriya Krishi Vikas Yojana is revived in such a way so that it can be achieve a growth nof 4 % for agriculture sector.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Both 1 & 2
(E) None of these
Ans : (D)
3. As per the figures released recently the Stock markets in emerging economies made handsome returns last year (2007-08). Which of the following stock markets amongst the BRIC nations registered highest increased (97 %) compared to its performance in 2006-07 ?
(A) China
(B) Brazil
(C) Russia
(D) India
(E) None of these
Ans : (A)
4. Bayana which was in news recently is a place in—
(A) Uttar Pradseh
(B) Madhya Pradseh
(C) Bihar
(D) Haryana
(E) Rajasthan
Ans : (E)
5. Which of the following statement (s) is / are correct about the Indo-Russia Bilateral Defence Ties ?
(1) Both the countries have decided to produce a fifth generation fighter aircraft and a multi role cargo plane.
(2) India has agreed to launch Russian missiles from its base at Chandipur incase some other nation attacks on Russia
(3) India and Russia were able to sort out differences over the utilization of Rupee debt fund which is of Rs. 8000 crore at present.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Both 1 & 3 only
(E) None of these
Ans : (A)
6. India has recently decided to put a wire fence on the 76 km. long border in Dhudri district in Assam. The fence will separate India from—
(A) Nepal
(B) China
(C) Bangladesh
(D) Myanmar
(E) Pakistan
Ans : (C)
7. As we all know the Govt. of India is very keen about providing banking service to the people in rural and remote areas . However , banks feel that the cost of providing services in these areas for financial inclusion is quite high if services are offered through the "traditional branch channel ". What is / are the other alternative cost effective channel(s) to fulfill this aim of the Govt. of India ?
(1) Putting biometric ATMs.
(2) Introduce mobile banking.
(3) Issue credit or debit cards
(A) Only 1
(B) Only 2
(C) Only 3
(D) All 1, 2 & 3
(E) None of these
Ans : (B)
8. The Govt. of India recently issued a notification altering constituencies in 24 States and Union territories. This is done as per the provision of which of the following Acts?
(A) Delimitation Act
(B) Census Act
(C) Parliament Act
(D) State Reorganization Act
(E) None of these
Ans : (A)
9. As we read very frequently in the newspaper fraudulent activities in financial world is still continuing despite various efforts made by various countries to prevent them. As an estimate by IMF, what is the probable amount derived from such illegal activities which is laundered through the world's formal financial systems every year? About -
(A) US$ 500 billion
(B) US$ 800 billion
(C) US$ 1000 billion
(D) US$ 1250 billion
(E) US$ 1500 billion
Ans : (A)
10. Indian Prime Minister during his visit the Arunachal Pradseh a few months back asserted that the State is India's Land of Rising Sun. Which of the following countries did not like his statement and had raised some objection over his visit to Arunachal Pradseh which is very much a part of India?
(A) Myanmar
(B) China
(C) Bangladseh
(D) Bhutan
(E) Nepal
Ans : (B)
11. Which of the following is the amount of insurance cover provided to the workers of the unorganized sector under Rashtriya Swasthya Bima Yojana?
(A) Rs. 10,000/-
(B) Rs. 20,000/-
(C) Rs. 30,000/-
(D) Rs. 40,000/-
(E) Rs. 50,000/-
Ans : (C)
12. Which of the following is NOT one of the highlights Economic Survey presented in the Lok Sabha for the year 2007-08?
(A) Economy has "moved to higher growth phase"
(B) A trend of acceleration in domestic investment and saving rate is recorded.
(C) Buoyant growth in Govt. revenue.
(D) Indian Economy at market rate of exchange crossed 1 trillion US$ in current fiscal.
(E) Net Foreign direct Investment increased by 350% .
Ans : (E)
13. Which of the following is / are correct about sub prime crisis which was in news recently?
(1) It has reduced the flow of capital coming of Indian Stock Markets.
(2) The sub prime crisis is the major financial crisis whose origin is in the Russia and Brazil.It has adversely affected the economy of Europe and USA.
(3) The crisis started when some people started trading with false Share certificates of major blue chip US companies in the stock markets.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Both 1 & 2
(E) None of these
Ans : (D)
14. The Prime Minister Gram Sadak Yojana (PMGSY) has a target to connect all habitations of which of the following levels with all weather roads by 2008-09?
(A) 1000+
(B) 2000+
(C) 3000+
(D) 4000+
(E) None of these
Ans : (A)
15. As we all know the value of the Indian rupee has appreciated in the recent past . The value of the Rupee is direct dependent on which of the following?
(A) Availability of commodities in the market.
(B) VAT introduced by the Govt. on various commodities.
(C) Size of total Forex Reserve of India currently.
(D) Capital flow in the market during a given period of time.
(E) None of these
Ans : (A)
16. Which of the following banks has taken over the Centurion Bank of Punjab?
(A) ICICI Bank
(B) IDBI Bank
(C) HDFC Bank
(D) AXIS Bank
(E) None of these
Ans : (B)
17. As per provision made in Bharat Nirman Programme the pace of creation of irrigation facilities is required to be raised from present level of 1.42 million hectare per year in such a way so that it can achieve the target level fixed for the same?
(A) 1.50 million hectares / year
(B) 1.75 million hectares / year
(C) 2.00 million hectares / year
(D) 2.25 million hectares / year
(E) 2.50 million hectares / year
Ans : (D)
18. Inflation has become major area of concern in India these days. What measures do the Govt. of India / RBI normally take to control the same?
(1) Fixation of Maximum Price of the Commodities
(2) System of Dual prices.
(3) Increased in supply of food grains.
(4) Control on credit and liquidity in market.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Only 2, 3 & 4
(E) All 1, 2, 3 & 4
Ans : (D)
19. How much Education Cess is being levied on all the taxes to support elementary education for the children of age group of 6-14 years under Sarva Shiksha Abhiyan (SSA)?
(A) 0.50%
(B) 0.75%
(C) 1.00%
(D) 1.50%
(E) 2.00%
Ans : (E)
20. Which of the following is / are correct about various concessions given in the Union Budget for 2008-09?
(1) Five years tax holidays for setting up hospitals in Tier II & Tier III regions for providing health care in rural areas.
(2) Commodities tax transaction to be introduced.
(3) Banking cash transaction tax withdrawn.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Only 2 & 3
(E) All 1, 2 & 3
Ans : (E)
21. Which of the following statements reflects the aim(s) Jawaharlal Nehru National Urban Renewal Mission (JNNURM)?
(1) Give focused attention to integrated development of infrastructure in selected cities.
(2) Provide basic services to the urban poors
(3) Scale up civic amenities and provision of utilities in urban areas.
(A) Only 1
(B) Only 2
(C) Only 3
(D) All 1, 2 & 3
(E) None of these
Ans : (D)
22. The Press Freedom Day is observed on which of the following days?
(A) 1st May
(B) 1st June
(C) 3rd May
(D) 3rd June
(E) 10th June
Ans : (C)
23. As per the decision taken by the Govt. of India now the National Rural Employment Guarantee Act is extended to all the districts of India. This means : it will now be applicable to about—
(A) 200 districts
(B) 300 districts
(C) 400 districts
(D) 500 districts
(E) 600 districts
Ans : (E)
24. As per the reports published by the Ministry of Finance recently the overseas borrowings by the Corporates and currency fluctuation has gone up by which of the following percentage points? About—
(A) 1%
(B) 2%
(C) 3%
(D) 4%
(E) 5%
Ans : (C)
25. The Govt. of India and Reserve Bank of India is planning to set up an autonomous "ATM corporation of India" in which various banks can get together for common ATM operations. If this happens how will we all be benefited by the same?
(1) It will be a cost effective measure as each bank can share its operational cost with others.
(2) Clients can withdrawn money from any ATM from any location. They are not required to go to their banks' ATM only.
(3) It will indirectly help the IT business also as India has a large pool of IT skilled manpower waiting for suitable placement.
(A) Only 1
(B) Only 2
(C) Both 1 & 2
(D) All 1, 2 & 3
(E) None of these
Ans : (C)
26. As per the news published in various newspapers the Govt. of India has decided to create a Strategic Reserve of—
(A) Oil & Petroleum
(B) Rasoi Gas
(C) Food grains
(D) Cement & Steel
(E) None of these
Ans : (C)
27. The Govt. of India had constituted a high level committee on financial sector reforms with Raghuram G.Rajan as its Chairman. Which of the following is / are the recommendations of the committee?
(1) Liberalize the interest rate that banks/institution can charge to ensure credit for poors.
(2) Create an office of the Ombudsman exclusively for financial sector.
(3) Do not allow foreign investors in domestic stock markets.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Both 1 & 2
(E) None of these
Ans : (E)
28. Yves Leterme has taken over as the prime minister of—
(A) Newzealand
(B) Belgium
(C) Croatia
(D) Portugal
(E) None of these
Ans : (B)
29. The State Bank of India recently opened its 10000th branch in Puduvayal (Tamil Nadu). Only a bank in China has more branches than State Bank of India in the world. What is the name of that Chinese bank?
(A) Shanghai Commercial Bank
(B) Bank of China
(C) China Banking Corporation
(D) Industrial and Commercial Bank of China
(E) None of these
Ans : (D)
30. Many a times we read about 'Globalization' and its impact on business practice in India. Which of the following is NOT one of the important parameters of 'Globalization'?
(1) Reduction of trade barriers to permit free flow of goods and services amongst various nations.
(2) Developing an environment in which free flow of capital can take place.
(3) Promoting local industry to cater to the needs of the consumers in Tier II and Tier III cities. The production from metros should be reserved only for exports.
(A) Only 1
(B) Only 2
(C) Only 3
(D) All 1,2 & 3
(E) Both 2 & 3
Ans : (D)
31. Many times we read a term CBS used in banking operation. What is the full form of the letter 'C' in the term 'CBS'?
(A) Core
(B) Credit
(C) Continuous
(D) Complete
(E) None of these
Ans : (A)
32. As per news published in newspapers the Oil & Natural Gas Commission (ONGC) has purchased some oil assets in Latin American Countries along with one other major company of India . What is the name of that company?
(A) Hindustan Petroleum Corporation
(B) Indian Oil Corporation
(C) Reliance Industries Ltd.
(D) National Mineral Development Corporation of India
(E) None of these
Ans : (E)
33. India's First centre to monitor climate change was opened recently at—
(A) New Delhi
(B) Chennai
(C) Jaipur
(D) Bangalore
(E) Kolkata
Ans : (B)
34. Which of the following Acts was framed specially to deal more effectively with the problem of Non-Performing Assets in banking system?
(A) SARFAESI ACT.
(B) Banking Regulation Act.
(C) Foreign Exchange Management Act.
(D) Industrial Dispute Act.
(E) None of these
Ans : (A)
35. The————shows all the websites and pages that you have visited over a period of time.
(A) status bar
(B) task bar
(C) history list
(D) tool bar
(E) None of these
Ans : (C)
36. A proxy server is used for the which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
Ans : (A)
37. A repair for a known software bug,usually available at no charge on the internet, is called a(n)—
(A) version
(B) Patch
(C) Tutorial
(D) FAQ
(E) None of these
Ans : (B)
38. In the URL http://www.prenhall.com, the portion lebelled http is the—
(A) host
(B) domain name
(C) protocol
(D) top-level domain
(E) None of these
Ans : (C)
39. Which of the following organizations has recently given a US$ 600 million loan to Power Grid Corporation of India,a Govt. run organization?
(A) Asian Development Bank
(B) World Bank
(C) International Monetary Fund
(D) Bank of America
(E) None of these
Ans : (B)
40. The ability to easily add additional users meAns : that a network is—
(A) Scalable
(B) dedicated
(C) Decentralized
(D) Secure
(E) None of these
Ans : (A)
41. In a database, a field is a—
(A) lable
(B) table of information
(C) group of related records
(D) category of information
(E) None of these
Ans : (C)
42. The number of pixels displayed on a screen is known as the screen—
(A) resolution
(B) colour depth
(C) refresh rate
(D) viewing size
(E) None of these
Ans : (A)
43. Wor processing , spreadsheet , and phoyo-editing are example of—
(A) application software
(B) system software
(C) operating system software
(D) platform software
(E) None of these
Ans : (A)
44. If you wish to extend the length of the network without having the signal degrade, you would use a—
(A) repeater
(B) router
(C) gateway
(D) switch
(E) None of these
Ans : (A)
45. A————is approximately a million bytes.
(A) gigabyte
(B) kilobyte
(C) megabyte
(D) terabyte
(E) None of these
Ans : (C)
46. The time it takes a device to locate data and instructions and make them available to CPU is known as—
(A) clock speed
(B) a processing cycle
(C) CPU speed
(D) access time
(E) None of these
Ans : (D)
47. ——————controls the way in which the computer system functions and provides a means : by which users are interact with the computer.
(A) The platform
(B) The operating system
(C) Application software
(D) The motherboard
(E) None of these
Ans : (B)
48. ——————meAns : that the data contained in a database is accurate and reliable.
(A) Data redundancy
(B) Data integrity
(C) Data reliability
(D) Data consistency
(E) None of these
Ans : (B)
49. A(n) —————— is aprivate corporate network,used exclusively by company employees.
(A) Internet
(B) local area network
(C) peer-to-peer
(D) intranet
(E) None of these
Ans : (B)
50. A characteristic of a file server is which of the following?
(A) Manages file operations and is shared on a network
(B) Manages file operations and is limited to one PC
(C) Acts as fat client and is shared on a network
(D) Acts as fat client and is limited to one PC
(E) None of these
Ans : (A)
(Held on 27-07-2008)
1. Which of the following statement(s) reflects India's stand on new World Trade Organization's proposal on the issue of the subsidy to agro products ?
(1) India would protect the interest of its poor farmers who can not bear the burden of the cost of the products if they have to sell them on cheaper rate.
(2) Indian industry needs more flexibility as compared to the industry in developed countries.
(3) WTO has set up a new committee under the chairmanship of Putin of Russia to look into the issue of subsidy and find out a solution to the problem acceptable to all the parties.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Both 1 & 2
(E) None of these
Ans : (A)
2. Which of the following statement(s) is / are true about the 11th five year plan of India ?
(1) The highest priority is given to exports ,education and development of steel sector.
(2) The plan aims at achieving the growth at 10 % level by the end of the plan.
(3) The Rashtriya Krishi Vikas Yojana is revived in such a way so that it can be achieve a growth nof 4 % for agriculture sector.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Both 1 & 2
(E) None of these
Ans : (D)
3. As per the figures released recently the Stock markets in emerging economies made handsome returns last year (2007-08). Which of the following stock markets amongst the BRIC nations registered highest increased (97 %) compared to its performance in 2006-07 ?
(A) China
(B) Brazil
(C) Russia
(D) India
(E) None of these
Ans : (A)
4. Bayana which was in news recently is a place in—
(A) Uttar Pradseh
(B) Madhya Pradseh
(C) Bihar
(D) Haryana
(E) Rajasthan
Ans : (E)
5. Which of the following statement (s) is / are correct about the Indo-Russia Bilateral Defence Ties ?
(1) Both the countries have decided to produce a fifth generation fighter aircraft and a multi role cargo plane.
(2) India has agreed to launch Russian missiles from its base at Chandipur incase some other nation attacks on Russia
(3) India and Russia were able to sort out differences over the utilization of Rupee debt fund which is of Rs. 8000 crore at present.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Both 1 & 3 only
(E) None of these
Ans : (A)
6. India has recently decided to put a wire fence on the 76 km. long border in Dhudri district in Assam. The fence will separate India from—
(A) Nepal
(B) China
(C) Bangladesh
(D) Myanmar
(E) Pakistan
Ans : (C)
7. As we all know the Govt. of India is very keen about providing banking service to the people in rural and remote areas . However , banks feel that the cost of providing services in these areas for financial inclusion is quite high if services are offered through the "traditional branch channel ". What is / are the other alternative cost effective channel(s) to fulfill this aim of the Govt. of India ?
(1) Putting biometric ATMs.
(2) Introduce mobile banking.
(3) Issue credit or debit cards
(A) Only 1
(B) Only 2
(C) Only 3
(D) All 1, 2 & 3
(E) None of these
Ans : (B)
8. The Govt. of India recently issued a notification altering constituencies in 24 States and Union territories. This is done as per the provision of which of the following Acts?
(A) Delimitation Act
(B) Census Act
(C) Parliament Act
(D) State Reorganization Act
(E) None of these
Ans : (A)
9. As we read very frequently in the newspaper fraudulent activities in financial world is still continuing despite various efforts made by various countries to prevent them. As an estimate by IMF, what is the probable amount derived from such illegal activities which is laundered through the world's formal financial systems every year? About -
(A) US$ 500 billion
(B) US$ 800 billion
(C) US$ 1000 billion
(D) US$ 1250 billion
(E) US$ 1500 billion
Ans : (A)
10. Indian Prime Minister during his visit the Arunachal Pradseh a few months back asserted that the State is India's Land of Rising Sun. Which of the following countries did not like his statement and had raised some objection over his visit to Arunachal Pradseh which is very much a part of India?
(A) Myanmar
(B) China
(C) Bangladseh
(D) Bhutan
(E) Nepal
Ans : (B)
11. Which of the following is the amount of insurance cover provided to the workers of the unorganized sector under Rashtriya Swasthya Bima Yojana?
(A) Rs. 10,000/-
(B) Rs. 20,000/-
(C) Rs. 30,000/-
(D) Rs. 40,000/-
(E) Rs. 50,000/-
Ans : (C)
12. Which of the following is NOT one of the highlights Economic Survey presented in the Lok Sabha for the year 2007-08?
(A) Economy has "moved to higher growth phase"
(B) A trend of acceleration in domestic investment and saving rate is recorded.
(C) Buoyant growth in Govt. revenue.
(D) Indian Economy at market rate of exchange crossed 1 trillion US$ in current fiscal.
(E) Net Foreign direct Investment increased by 350% .
Ans : (E)
13. Which of the following is / are correct about sub prime crisis which was in news recently?
(1) It has reduced the flow of capital coming of Indian Stock Markets.
(2) The sub prime crisis is the major financial crisis whose origin is in the Russia and Brazil.It has adversely affected the economy of Europe and USA.
(3) The crisis started when some people started trading with false Share certificates of major blue chip US companies in the stock markets.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Both 1 & 2
(E) None of these
Ans : (D)
14. The Prime Minister Gram Sadak Yojana (PMGSY) has a target to connect all habitations of which of the following levels with all weather roads by 2008-09?
(A) 1000+
(B) 2000+
(C) 3000+
(D) 4000+
(E) None of these
Ans : (A)
15. As we all know the value of the Indian rupee has appreciated in the recent past . The value of the Rupee is direct dependent on which of the following?
(A) Availability of commodities in the market.
(B) VAT introduced by the Govt. on various commodities.
(C) Size of total Forex Reserve of India currently.
(D) Capital flow in the market during a given period of time.
(E) None of these
Ans : (A)
16. Which of the following banks has taken over the Centurion Bank of Punjab?
(A) ICICI Bank
(B) IDBI Bank
(C) HDFC Bank
(D) AXIS Bank
(E) None of these
Ans : (B)
17. As per provision made in Bharat Nirman Programme the pace of creation of irrigation facilities is required to be raised from present level of 1.42 million hectare per year in such a way so that it can achieve the target level fixed for the same?
(A) 1.50 million hectares / year
(B) 1.75 million hectares / year
(C) 2.00 million hectares / year
(D) 2.25 million hectares / year
(E) 2.50 million hectares / year
Ans : (D)
18. Inflation has become major area of concern in India these days. What measures do the Govt. of India / RBI normally take to control the same?
(1) Fixation of Maximum Price of the Commodities
(2) System of Dual prices.
(3) Increased in supply of food grains.
(4) Control on credit and liquidity in market.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Only 2, 3 & 4
(E) All 1, 2, 3 & 4
Ans : (D)
19. How much Education Cess is being levied on all the taxes to support elementary education for the children of age group of 6-14 years under Sarva Shiksha Abhiyan (SSA)?
(A) 0.50%
(B) 0.75%
(C) 1.00%
(D) 1.50%
(E) 2.00%
Ans : (E)
20. Which of the following is / are correct about various concessions given in the Union Budget for 2008-09?
(1) Five years tax holidays for setting up hospitals in Tier II & Tier III regions for providing health care in rural areas.
(2) Commodities tax transaction to be introduced.
(3) Banking cash transaction tax withdrawn.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Only 2 & 3
(E) All 1, 2 & 3
Ans : (E)
21. Which of the following statements reflects the aim(s) Jawaharlal Nehru National Urban Renewal Mission (JNNURM)?
(1) Give focused attention to integrated development of infrastructure in selected cities.
(2) Provide basic services to the urban poors
(3) Scale up civic amenities and provision of utilities in urban areas.
(A) Only 1
(B) Only 2
(C) Only 3
(D) All 1, 2 & 3
(E) None of these
Ans : (D)
22. The Press Freedom Day is observed on which of the following days?
(A) 1st May
(B) 1st June
(C) 3rd May
(D) 3rd June
(E) 10th June
Ans : (C)
23. As per the decision taken by the Govt. of India now the National Rural Employment Guarantee Act is extended to all the districts of India. This means : it will now be applicable to about—
(A) 200 districts
(B) 300 districts
(C) 400 districts
(D) 500 districts
(E) 600 districts
Ans : (E)
24. As per the reports published by the Ministry of Finance recently the overseas borrowings by the Corporates and currency fluctuation has gone up by which of the following percentage points? About—
(A) 1%
(B) 2%
(C) 3%
(D) 4%
(E) 5%
Ans : (C)
25. The Govt. of India and Reserve Bank of India is planning to set up an autonomous "ATM corporation of India" in which various banks can get together for common ATM operations. If this happens how will we all be benefited by the same?
(1) It will be a cost effective measure as each bank can share its operational cost with others.
(2) Clients can withdrawn money from any ATM from any location. They are not required to go to their banks' ATM only.
(3) It will indirectly help the IT business also as India has a large pool of IT skilled manpower waiting for suitable placement.
(A) Only 1
(B) Only 2
(C) Both 1 & 2
(D) All 1, 2 & 3
(E) None of these
Ans : (C)
26. As per the news published in various newspapers the Govt. of India has decided to create a Strategic Reserve of—
(A) Oil & Petroleum
(B) Rasoi Gas
(C) Food grains
(D) Cement & Steel
(E) None of these
Ans : (C)
27. The Govt. of India had constituted a high level committee on financial sector reforms with Raghuram G.Rajan as its Chairman. Which of the following is / are the recommendations of the committee?
(1) Liberalize the interest rate that banks/institution can charge to ensure credit for poors.
(2) Create an office of the Ombudsman exclusively for financial sector.
(3) Do not allow foreign investors in domestic stock markets.
(A) Only 1
(B) Only 2
(C) Only 3
(D) Both 1 & 2
(E) None of these
Ans : (E)
28. Yves Leterme has taken over as the prime minister of—
(A) Newzealand
(B) Belgium
(C) Croatia
(D) Portugal
(E) None of these
Ans : (B)
29. The State Bank of India recently opened its 10000th branch in Puduvayal (Tamil Nadu). Only a bank in China has more branches than State Bank of India in the world. What is the name of that Chinese bank?
(A) Shanghai Commercial Bank
(B) Bank of China
(C) China Banking Corporation
(D) Industrial and Commercial Bank of China
(E) None of these
Ans : (D)
30. Many a times we read about 'Globalization' and its impact on business practice in India. Which of the following is NOT one of the important parameters of 'Globalization'?
(1) Reduction of trade barriers to permit free flow of goods and services amongst various nations.
(2) Developing an environment in which free flow of capital can take place.
(3) Promoting local industry to cater to the needs of the consumers in Tier II and Tier III cities. The production from metros should be reserved only for exports.
(A) Only 1
(B) Only 2
(C) Only 3
(D) All 1,2 & 3
(E) Both 2 & 3
Ans : (D)
31. Many times we read a term CBS used in banking operation. What is the full form of the letter 'C' in the term 'CBS'?
(A) Core
(B) Credit
(C) Continuous
(D) Complete
(E) None of these
Ans : (A)
32. As per news published in newspapers the Oil & Natural Gas Commission (ONGC) has purchased some oil assets in Latin American Countries along with one other major company of India . What is the name of that company?
(A) Hindustan Petroleum Corporation
(B) Indian Oil Corporation
(C) Reliance Industries Ltd.
(D) National Mineral Development Corporation of India
(E) None of these
Ans : (E)
33. India's First centre to monitor climate change was opened recently at—
(A) New Delhi
(B) Chennai
(C) Jaipur
(D) Bangalore
(E) Kolkata
Ans : (B)
34. Which of the following Acts was framed specially to deal more effectively with the problem of Non-Performing Assets in banking system?
(A) SARFAESI ACT.
(B) Banking Regulation Act.
(C) Foreign Exchange Management Act.
(D) Industrial Dispute Act.
(E) None of these
Ans : (A)
35. The————shows all the websites and pages that you have visited over a period of time.
(A) status bar
(B) task bar
(C) history list
(D) tool bar
(E) None of these
Ans : (C)
36. A proxy server is used for the which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
Ans : (A)
37. A repair for a known software bug,usually available at no charge on the internet, is called a(n)—
(A) version
(B) Patch
(C) Tutorial
(D) FAQ
(E) None of these
Ans : (B)
38. In the URL http://www.prenhall.com, the portion lebelled http is the—
(A) host
(B) domain name
(C) protocol
(D) top-level domain
(E) None of these
Ans : (C)
39. Which of the following organizations has recently given a US$ 600 million loan to Power Grid Corporation of India,a Govt. run organization?
(A) Asian Development Bank
(B) World Bank
(C) International Monetary Fund
(D) Bank of America
(E) None of these
Ans : (B)
40. The ability to easily add additional users meAns : that a network is—
(A) Scalable
(B) dedicated
(C) Decentralized
(D) Secure
(E) None of these
Ans : (A)
41. In a database, a field is a—
(A) lable
(B) table of information
(C) group of related records
(D) category of information
(E) None of these
Ans : (C)
42. The number of pixels displayed on a screen is known as the screen—
(A) resolution
(B) colour depth
(C) refresh rate
(D) viewing size
(E) None of these
Ans : (A)
43. Wor processing , spreadsheet , and phoyo-editing are example of—
(A) application software
(B) system software
(C) operating system software
(D) platform software
(E) None of these
Ans : (A)
44. If you wish to extend the length of the network without having the signal degrade, you would use a—
(A) repeater
(B) router
(C) gateway
(D) switch
(E) None of these
Ans : (A)
45. A————is approximately a million bytes.
(A) gigabyte
(B) kilobyte
(C) megabyte
(D) terabyte
(E) None of these
Ans : (C)
46. The time it takes a device to locate data and instructions and make them available to CPU is known as—
(A) clock speed
(B) a processing cycle
(C) CPU speed
(D) access time
(E) None of these
Ans : (D)
47. ——————controls the way in which the computer system functions and provides a means : by which users are interact with the computer.
(A) The platform
(B) The operating system
(C) Application software
(D) The motherboard
(E) None of these
Ans : (B)
48. ——————meAns : that the data contained in a database is accurate and reliable.
(A) Data redundancy
(B) Data integrity
(C) Data reliability
(D) Data consistency
(E) None of these
Ans : (B)
49. A(n) —————— is aprivate corporate network,used exclusively by company employees.
(A) Internet
(B) local area network
(C) peer-to-peer
(D) intranet
(E) None of these
Ans : (B)
50. A characteristic of a file server is which of the following?
(A) Manages file operations and is shared on a network
(B) Manages file operations and is limited to one PC
(C) Acts as fat client and is shared on a network
(D) Acts as fat client and is limited to one PC
(E) None of these
Ans : (A)
***********************************************
0 comments:
Post a Comment