Search This Blog

Monday, July 30, 2012

SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER AWARENESS PRACTICE QUESTIONS



1. What is e-commerce?
1) Buying and selling of international goods
2) Buying and selling of products and services over the internet
3) Buying and selling of products having to do with computers
4) Buying and selling of products and services not found in stores
5) Buying and selling of electronic goods

2. The term user Interface refers to :
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to the user commands
3) The means by which the user interacts with the peripheral devices on the  computer
4) All of these
5) None of these

3. Which of the following is not an input device?
1) Keyboard
2) Joystick
3) Monitor
4) Microphone

5) None of these

4. An error is also known as :
1) Debug
2) Bug
 3) Cursor
4) Icon
5) None of these

5. Archive is :
1) Back-up Storage
2) Forward Operation
3) Primary Storage
4) Name of famous processor
5) None of these

6. Which media has the ability to have data/information written on them by users more than once
1) CD-R disks
2) CD-RW disks
3) Zip disks
4) Opti disks
5) Both CD-RW and Zip disks

7. BCC in regard to emails, stands for :
1) Best Client Copy
2) Better Communication Copy
3) Best Computer Copy
4) Better Client Copy
5) None of these



8. A(n) .................. contains text as well as information about the text
1) browser language
2) machine language
3) protocol language
4) markup language
5) annotated language

9. A pictorial representation that uses predefined symbols to describe either the logic of the computer program or the data flow and processing steps of a system is referred as :
1) Flow chart
2) Algorithm
3) Program
4) Protocol
5) None of these

10. A ........ is the term used when a search engine returns a web page that matches the search criteria
1) Blog
2) Hit
3) Link
4) View
 5) None of these

11. URL stands for ........
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator
4) Uniform Research Locator
5) None of these

12. The most frequently used instructions of a computer program are likely to be fetched from:
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these

13. What is a backup?
1) Restoring the information backup
2) An exact copy of a system's information
3) The ability to get a system up and running in the event of a system crash or failure
4) All of these
5) None of these

14. Which of the following statements is FALSE concerning file names?
1) Files may share the same name or the same extension but not both
2) Every file in the same folder must have a unique name
3) File extension is another name for file type
4) The file extension comes before the dot (.) followed by the file name
5) None of these

15. Verification of a login name and password is known as:
1) authorization  
2) accessibility
3) authentication
4) logging in  
5) None


16. Every computer has a(n) ........; many also have .........
1) Operating System; a client system
2) Operating system; instruction sets
3) Application programs; an operating  system
4) Application programs; a client system
5) Operating system; application programs

17. Which term identifies a specific computer on the web and the main page of the entire site
1) URL
2) Website Address
3) Hyperlink
4) Domain name
5) None of these

18. The altering of data so that it is not usable unless the changes are undone is ......
1) Bio metrics
2) Compression
3) Encryption
4) Ergonomics
5) None of these

19. ......... means that the data contained in a database is accurate and reliable.
1) Data redundancy
2) Data Integrity
3) Data Reliability
4) Data consistency
5) None

20. Device that take a picture of an object and convert it into a computerized image :
1) Hard drive
2) Scanner
3) Printer
4) Modem
5) Cable

21. Which of the following is not a search engine?
1) Bing
2) Baidu  
 3) Yahoo
4)  Safari
5) Ask

22. Which of the following window allows  entering values and formulas in the Excel ?
1) Title bar
2) Menu Bar
3) Formula Bar
4) Standard Tool Bar
5) None of these

23. Which of the following helps to store information in the computer?
1) Disk Drive
 2) Keyboard
3) Monitor
4) Printer
5) None of these

24. A computer virus normally attaches itself to another computer program known as :
1) Target program
2) Host program
3) Bluetooth
4) Front door program      
5) Trojan horse

25. A DVD is an example of a(n)
1) Hard disk
2) Optical disk
3) Output device
4) Solid-state storage device
5) None of these

26. Computer programs are written in a highlevel programming language; however, the human readable version of a program is called........
1) cache
2) instruction set
3) source code
4) word size
5) None of these

27. The software tools that enable a user to interact with a computer for specific  purposes are known as

1) Hardware
2) Networked Software
3) Shareware        
4) Applications    
5) None of these

28. A ......... is a set of rules.
1) resource locator
2) domain
3) hypertext
4) URL
5) protocol

29. The ......... file format is a method of encoding pictures on a computer.
1) HTML
2) JPEG
3) FTP
4) URL
5) DOC

30. The shortcut key for finding a word or a part of the word in MS word is :
1) Ctrl + M
2) Ctrl + S
3) Alt + M
4) Alt + K
5) Ctrl + F

31. Storage that retains its data after the power is turned off is referred to as
1) Volatile storage
2) Non-volatile storage
3) Sequential Storage
4) Direct storage
5) None of these

32. HTML stands for:
1) Hyper Text Mark-Up language
2) High Technology Mobile Language
3) Hyper Text Mobile Language
4) High Technology Mark-up Language
5) None of these

33. Which ports connect special types of  musical instruments to sound cards ?
1) BUS
2) CPU
3) USB
4) MIDI
5) MINI

34. Antivirus is an example of which of the  following?
1) An operating system
2) A business software
3) A security utility
4) An office suite
5) None


35. A computer checks the ......... of user names and passwords for a match before granting access.
1) Website
2) Network
3) Backup file
4) Database
5) None of these

36. Restarting a computer that is already on is referred to as:
1) shutting down
2) cold booting
3) warm booting
4) logging off
5) None of these

ANSWERS:


1-2; 2-1; 3-3; 4-2;  5-1;  6-2;  7-5;  8-4; 9-1;  10-2; 11-3;  12-2;  13-4;  14-4; 15-3;
16-5; 17-1; 18-3; 19-2;  20-2;  21-4;  22-3; 23-1;  24-5;  25-2;  26-3;  27-4;  28-5;  29-2;
30-5;  31-2;  32-1;  33-4;  34-3;  35-4;  36-3





Tuesday, July 17, 2012

COMPUTER AWARENESS PRACTICE QUESTIONS

1. Hackers ………………
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) break into other people's computers
Answer: break into other peoples computers

2. Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
Answer: software piracy

3. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
Answer: spam

4. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
Answer: Overhead Projections

5. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
Answer: A Sound Format

6. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
Answer: PCs

7. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
Answer: Microphone



8. The life-span of a CD-ROM is………………
(A) approximately one year
(B) approximately two years
(C) approximately five years
(D) approximately twenty-five years
Answer: approximately five years

9. The ……………… settings are automatic and standard.
(A) default
(B) CPU
(C) peripheral
(D) user frien9ly
Answer: default

10. What are the two parts of an E-mail address ?
(A) User name and street address
(B) Legal name and phone number
(C) User name and domain name
(D) Initials and password
Answer: User name and domain name

11. Participants can see and hear each other in a/an ………………
(A) electronic mail system
(B) message system
(C) tele-conference
(D) bulletin board
Answer: tele-conference

12. Magnetic tape is not practical for applications where data must be quickly recalled because tape is ………………
(A) a random-access medium
(B) expensive
(C) a read-only medium
(D) a sequential-access medium
Answer: a sequential-access medium

13. Why should you delete unknown e-mail attachments ?
(A) You could go to jail
(B) The person could track you down and hurt you
(C) It is bad manners
(D) It might contain a virus that could hurt your computer
Answer: It might contain a virus that could hurt your computer

14. How is it possible that both programs and data can be stored on the same floppy disk ?
(A) A floppy disk has two sides, one for data and one for programs
(B) A floppy disk has to be formatted for one or for the other
(C) Programs and data are both software, and both can be stored on any memory device
(D) Floppy disks can only store data, not programs
Answer: Programs and data are both software, and both can be stored on any memory device

15. What is an embedded system ?
(A) A program that comes wrapped in a box
(B) A program that is permanently part of a computer
(C) A computer that is part of a larger computer
(D) A computer and software system that controls a machine or appliance
Answer: A computer and software system that controls a machine or appliance

16. Which of the following will you require to hear music on your computer ?
(A) Video Card
(B) Tape Recorder
(C) Mouse
(D) Sound Card
Answer: Sound Card

17. The signal that a computer is waiting for a command from the user is ………………
(A) prompt
(B) event
(C) time slice
(D) interrupt
Answer: prompt

18. This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page ………………
(A) Web browser
(B) Web search engine
(C) Web homepage
(D) Web service
Answer: Web browser

19. For viewing video CDs, you would use………………
(A) CD Player
(B) Windows Media Player
(C) Windows Video Player
(D) Windows Movie Player
Answer: Windows Media Player

20. Executing more than one program concurrently by one user on one computer is known as ………………
(A) multi-programming
(B) multi-processing
(C) time-sharing
(D) multi-tasking
Answer: multi-tasking

21. Which of the following controls the manner of interaction between the user and the operating system ?
(A) language translator
(B) platform
(C) user interface
(D) icon
Answer: user interface

22. You can keep your personal flies / folders in ………………
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text
Answer: My Documents

23. Three types of compact disks include CD-ROM, CD-R, and ………………
(A) CD-W
(B) CD-RAM
(C) CD-DVD
(D) CD-RW
Answer: CD-RW

24. All computers must have ………………
(A) Word processing software
(B) An operating system
(C) A printer attached
(D) A virus checking program
Answer: An operating system

25. Collecting personal information and effectively posing as another individual is known as the crime of ………………
(A) spooling
(B) spoofing
(C) hacking
(D) identity theft
Answer: identity theft

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. If you wish to extend the length of the network without having the signal degrade, you would use a ………………
(A) resonance
(B) router
(C) gateway
(D) repeater
Answer: repeater

2. A repair for a known software bug, usually available at no charge on the Internet, is called a ………………
(A) version
(B) patch
(C) tutorial
(D) FAQ
Answer: patch

3. URL stands for ………………
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
Answer: Uniform Resource Locator

4. When data changes in multiple lists and all lists are not updated, this causes ………………
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
Answer: data inconsistency

5. What is a backup ?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
Answer: An exact copy of a systems information

6. The Internet is ………………
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) a communication system for some states of India
Answer: a large network of networks

7. Computers that are portable and convenient for users who travel are known as ………………
(A) supercomputers
(B) planners
(C) minicomputers
(D) laptops
Answer: laptops



8. What is the storage area for e-mail messages called ?
(A) A folder
(B) A mailbox
(C) A directory
(D) The hard disk
Answer: A mailbox

9. One advantage of dial-up Internet access is
(A) it utilises broadband technology
(B) it is Indian
(C) it uses a router for security
(D) it utilises existing telephone service
Answer: it utilises existing telephone service

10. What is the process of copying software programs from secondary storage media to the hard disk called ?
(A) configuration
(B) download
(C) storage
(D) installation
Answer: installation

11. Which process checks to ensure that the components of the computer are operating and connected properly ?
(A) Booting
(B) Processing
(C) Saving
(D) Editing
Answer: Booting

12. A means of capturing an image (drawing or photo) so that it can be stored on a computer is………………
(A) Modem
(B) Software
(C) Scanner
(D) Keyboard
Answer: Scanner

13. An error in a computer program………………
(A) Crash
(B) Power Failure
(C) Bug
(D) Virus
Answer: Bug

14. Access-control based on a person's fingerprints is .an example of………………
(A) biometric identification
(B) characteristic identification
(C) characteristic security
(D) fingerprint security
Answer: biometric identification

15. The patterns of printed lines on most products are called………………
(A) prices
(B) striping
(C) scanners
(D) barcodes
Answer: barcodes

16. Most mail programs automatically complete the following two parts in an e-mail ………………
(A) From: and Body :
(B) From: and Date :
(C) From: and To :
(D) From: and Subject :
Answer: From: and Date :

17. The computer's capability of distinguishing spoken words is called ………………
(A) voice analysis
(B) speech acknowledgement
(C) voice recognition
(D) speech interpretation
Answer: voice recognition

18. Which of the following is an advantage of mounting an application on the Web ?
(A) The possibility of 24-houraccess for users
(B) Creating a system that can extend globally
(C) Standardising the design of the interface
(D) All of these
Answer: All of these

19. The first page of a Website is called the ………………
(A) Homepage
(B) Index
(C) Java Script
(D) Bookmark
Answer: Homepage

20. ERP is an acronym for ………………
(A) Enterprise Retirement Planning
(B) Enterprise Relationship Planning
(C) Enterprise Resource' Planning
(D) Enterprise Reorder Planning
Answer: Enterprise Resource Planning

21. The software that allows users to surf the Internet is called a/an ………………
(A) Search Engine
(B) Internet Service Provider (ISP)
(C) Multimedia Application
(D) Browser
Answer: Browser

22. The issues that deal with the collection and use of data about individuals is ………………
(A) access
(B) publicity
(C) accuracy
(D) privacy
Answer: privacy

23. A term related to sending data to a satellite is ………………
(A) downlink
(B) modulate
(C) demodulate
(D) uplink
Answer: uplink

24. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with related information is called ………………
(A) hypermedia
(B) hypertext
(C) HTML
(D) URL
Answer: hypertext

25. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and ………………security is concerned with protecting software from unauthorized tampering or damage.
(A) data
(B) cyber
(C) Internet
(D) metaphysical
Answer: data

Monday, July 16, 2012

COMPUTER KNOWLEDGE PRACTICE MCQs

1.What is the ultimate purpose of Defragmentation ?
1) Make the PC faster
2) Create More Free Space
3) Delete temporary files
4) Reduce Power consumption
5) All of the above

2.Computers process data into information by working exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these

3.You must install a (n) ......... on a network if you want to share a broadband Internet connection
1) router
2) modem
3) node
4) cable
5) None of these

4.The purpose of the primary key in a database is to :
1) unlock the database
2) provide a map of the data
3) uniquely identify a record
4) establish constraints on database operations
5) None of these

5.The design of the network is called the network
1) architecture
2) server
3) transmission
4) type
5) None of these

6.The most frequently used instructions of a computer program are likely to be fetched from:
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these

7.Personal logs or journal entries posted on the Web are known as :
1) listservs
2) Webcasts
3) blogs
4) subject directories
5) None of these


8.Which of the following is NOT a type of broad band internet connection ?
1) Cable
2) DSLspan>
3) Dial-up
4) Satellite
5) None of these

9.Linux is a(n) ........ operating system
1) open-source
2) Microsoft
3) Windows
4) Mac
5) None of these

10.Which of the following places the common data elements in order from smallest to largest
1) character, file, record, field, database
2) character, record, field, database, file
3) character, field, record, file, database
4) Bit, byte, character, record, field, file, database
5) None of these
 11. ………are often delivered to a PC through an e-mail attachment and are often designed to do harm.
(A) Viruses
(B) Spam
(C) Portals
(D) Email messages
(E) None of these

12. What is the storage area for e-mail messages called ?
(A) A folder
(B) A directory
(C) A mailbox
(D) The hard disk
(E) None of these

13. A desktop computer is also known as a—
(A) Palm Pilot
(B) PC
(C) Laptop
(D) Mainframe
(E) None of these

14. When a file contains instructions that can be carried out by the computer, it is often called a(n) ……file.
(A) data
(B) information
(C) executable
(D) application
(E) None of these

15. Documents converted to……can be published to the Web.
(A) a.doc file
(B) http
(C) machine language
(D) HTML
(E) None of these

16. If a user needs information instantly available to the CPU, it should be stored—
(A) on a CD
(B) in secondary storage
(C) in the CPU
(D) in RAM
(E) None of these

17. To what temporary area can you store text and other data, and later paste them to another location ?
(A) The clipboard
(B) ROM
(C) CD-ROM
(D) The hard disk
(E) None of these

18. In a spreadsheet, a………is a number you will use in a calculation.
(A) label
(B) cell
(C) field
(D) value
(E) None of these

19. After slide-directed time, if you want to move ahead automatically, click in……check box in transition of this slide group in tab of animations—
(A) Transition timer
(B) Automatically opter
(C) Transition opter
(D) Automatic timer
(E) None of these

20. All are included in removable media except the following—
(A) CD-ROMs
(B) Diskette
(C) DVDs
(D) High disk drive
(E) None of these

21. If you open some menu and then decide that you do not want to select some option, then click the menu title again or press the…… key to layout the menu.
(A) shift
(B) tab
(C) escape
(D) F1
(E) None of these

22. Using the……process, it is easy to change the name of the file.
(A) transforming
(B) crash
(C) renaming
(D) retagging
(E) None of these

23. ………view shows that how will content on printed page, alongwith footer and margin header, appear.
(A) Draft
(B) Full screen reading
(C) Outline
(D) Page layout
(E) None of these

24. Using………, the text can be entered and edited very efficiently.
(A) Spreadsheet
(B) Typewriter
(C) Word processing programme
(D) Desktop publishing programme
(E) None of these


ANSWERS: 
     1. 2      2. 4      3. 1       4. 2      5. 1       6. 2       7. 3       8. 3       9. 1       10. 3
11.A       1 2.C      13.B       14.C       15.D       16.B       17.A       18.D       1 9.B       20.D     21.C         22.C         23.D    24.D  

COMPUTER KNOWLEDGR PRACTICE QUESTIONS FOR BANK EXAMS

1. Compiler is the
(a) name given to the computer operator
(b) part of the digital machine to store the information
(c) translator of source program to object
(d) part of arithmetic logic unit
(e) operator of Boolean Algebra
Ans (c)


2. Main memory is
(a) Random Access Memory (b) Read only Memory
(c) Serial Access Memory (d) None of these
Ans (a) 


3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer (b) Quantum Computer
(c) Param-10,000 (d) IBM chips
Ans (b) 


4. A compact disc (CD) is a data storage of the type
(a) Magnetic (b) Optical (c) Electrical (d) Electromechanical
Ans (a) 


5. Which of the following is not as language for computer programming?
(a) WINDOWS (b) PASCAL (c) BASIC
(d) COBOL (e) All of these
Ans (a) 


6. What are the two basic types of memory that your computer uses?

(a) RAM (b) RW/RAM (c) ROM (d) ERAM (e) POST
Ans (a)


7. The term gigabyte refers to(a) 1024 bytes (b) 1024 kilobytes (c) 1024 megabytes
(d) 1024 gigabytes (e) None of the above
Ans (c) 



8. A computer with CPU speed around 100 million instructions per second & with the word length of around 64 bits is known as

(a) Super computer (b) Mini computer (c) Micro computer
(d) Micro computer (e) None of the above
Ans (a) 


9. What digits are representative of all binary numbers?
(a) 0 (b) 1 (c) Both (a ) and (b) (d) 3 (e) None of the above
Ans (c) 


10. To locate a data items for storage is
(a) Field (b) Feed (c) Database
(d) Fetch (e) None of the above
Ans (d) 


11. Off-line operation is the operation of devices without the control of
(a) Memory (b) CPU (c) ALU
(d) Control unit (e) None of the above
Ans (b)


12. A type of line printer that uses an embossed steel band to form the letters printed on the paper is
(a) Golf ball printer (b) Dot-matrix printer
(c) Laser printer (d) Band printer (e) None of the above
Ans (d) 


13. A software used to convert source program instructions to object instruction is known as
(a) Compiler (b) Assembler (c) Interpreter
(d) Language processor (e) None of the above


14. The 'IC' chip, used in computers, is made of
(a) Chromium (b) Iron oxide (c) Silica (d) Silicon
Ans (d) 


15. Name the first general purpose electronic computer
Ans : UNIVAC 


16. The size of commonly used Floppy disk is
(a) 4.5” (b) 3.5” (c) 3.25” (d) 5.5”
Ans (b) 


17. Which of the following statement is wrong
(a) Windows XP is an operating system
(b) Linux is owned and sold by Microsoft
(c) Photoshop is a graphical design tool by Adobe
(d) Linux is free and open source software
Ans (b)


18. Operating system of a computer
(a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references
(c) Provides a layer, user friendly interface
(d) None of the above
Ans (c) 


19. The term ‘Operating System’ means
(a) A set of programs which control computer working
(b) The way a user operates the computer system
(c) Conversion of high level language to machine language
(d) The way computer operator works
Ans (a) 


20. Wild card operators specifies
(a) can be used when writing into multiple files
(b) allows several files to be read simultaneously
(c) Provide an easy way of groups of related files
(d) Are only used when printing the contents of a file
Ans (c) 


21.Which one of the following is not a broadband communication medium
(a) Microwave (b) Fibre optic cable
(c) Twisted pair (d) Coaxial cable
Ans (c)


22.Which of the following performs modulation and demodulation
(a) Coaxial cable (b) Satellite (c) Modem (d) Optical fibre
Ans (c) 


23. Which one of the following is not an application software package
(a) Redhat Linux (b) Microsoft Office
(c) Adobe PageMaker (d) Open Office
Ans (a)


24. Who is the father of computer
Ans : Charles Babbage 


25.The function of key F4 is
Ans : To repeat the last action 


26.The function of key F4 is
Ans : To repeat the last action 


27. The 0 and 1 in the binary numbering system are called binary digits or .......
(a) bytes (b) kilobytes (c) decimal bytes (d) bits (e) nibbles
Ans (D) 


28. A monitor's ...... is the distance between the holes in the mask behind the screen. This helps determine how sharp the dots appear.
(a) refresh rate (b) dot pitch (c) resolution
(d) colour depth (e) None of the above
Ans (B) 


29. A directly accessible appointment calendar is a feature of a ....... resident package.
(a) CPU (b) memory (c) Buffer (d) ALU (e) None of the above
Ans (B)


30. Perforated paper used as input or output media is known as
(a) Paper tape (b) Magnetic tape (c) Punched paper tape
(d) Card punch (e) None of the above
Ans (A) 


31. The invention of the slide rule is attributed to
(a) Babbage (b) Oughtred (c) Pascal
(d) Napier (e) None of the above
Ans (B) 


32. Which of the following is not an advantage of magnetic disk storage.
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) All of the above
(e) None of the above
Ans (e) 


33. The memory sizes in mainframe computers and advanced technology micro computer are expressed as
(a) Bytes (b) Kilo-bytes (c) Bits
(d) Megabytes (e) None of the above
Ans (d)


34. A prefix for billion which is equal to .... is called as billi.
(a) 100 (b) 10000 (c) 1000 (d) 10 (e) None of the above
Ans (d) 


35. Each model of a computer has a unique
(a) Assembly language (b) Machine language
(c) High level language (d) All of the above
(e) None of the above
Ans (b) 


36. One kilobyte = ____ byte.
(a) 1250 (b) 2088 (c) 1024 (d) 1000
Ans (c) 


37. Which of the following circuit is used as a 'Memory device' in computers?
(a) Rectifier (b) Flip-Flop (c) Comparator (d) Attenuator
Ans (b) 


38. To move the cursor to the end of the document press
Ans : Ctrl + End 


39. In Word Processing the red underline indicates
Ans : Spelling mistakes 


40. The shortcut key to print documents is
Ans : Ctrl + P 


41. First layer in the OSI reference model is
(a) Data link (b) Network (c) Physical (d) Application
Ans (c) 


42. Viruses, Trojan horses and Worms are
(a) able to harm computer system
(b) unable to detect if affected on computer
(c) user-friendly applications
(d) harmless applications resident on computer
Ans (a) 


43. Program threats are
(a) Trap doors (b) Trojan horse (c) Both (a) & (b
Ans (b) 


44. Failure of passwords security due to exposure can result from
(a) Electronic monitoring (b) Visual (c) Both (a) & (b)
Ans (c) 


45. Data security threats include
(a) Hardware failure (b) Privacy invasion
(c) Fraudulent manipulation of data (d) All of the above
Ans (b) 


46. The bar which displays information about the current page number is
Ans : Status bar 


47. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar (b) Windows (c) Desktop (d) Icons
Ans (d)


48. Who invented the super-computer?
(a) P.T Farnsworth (b) J.R Whinfield
(c) J.H. Van Tassell (d) Charles Ginsberg
Ans (c) 


49. Accessing records from a file directly without searching from the beginning of the file is
(a) Time sharing (b) Random
(c) Direct access (d) Access time (e) None of the above
Ans (c) 


50. Time during which a job is processed by the computer is
(a) Delay time (b) Real time (c) Execution time
(d) Down time (e) None of the above
Ans (c)