Search This Blog

Saturday, July 20, 2013

COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR BANK EXAMS

1. Which of the following is NOT a characteristic of E-mail?
1) Low cost
2) Record maintenance in database
3) High speed
4) Waste Reduction (writing paper)
5) None

2. What are dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information
3) A computer reserved for special task
4) Both (1) & (2)
5) None of these

3. What are non dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information only
3) A computer reserved for special task
4) Both (2) & (3)
5) None of these

4. G3 is a
1) Computer
2) Cable
3) Chip
4) Mother board
5) None of these

5. One of the oldest calculating device was?
1) Arithmometer
2) Ready reckoner
3) Abacus
4) Both (1) & (2)
5) None of these

6. The first-generation computers had?
1) Vacuum tubes and magnetic drum
2) Magnetic tape and transistors
3) Ics
4) Either (1) or (3)
5) All of these

7. Which of the following is false about change in computer from one generation to the next?
1) Computer size is decreased
2) Speed of processing increases
3) Memory / storage capacities decreases
4) Both (1) & (3) 5) None of these

8. Which of the following is NOT false about GUIs?
1) They make computers easier to use for laymen
2) Icons and menus can be selected with a mouse
3) were first introduced by MACs
4) All of these are true
5) None of these

9. To make a program safe we should take care of:
1) Strong authentication and access controls
2) Error checking controls
3) Do risk analysis
4) Either (1) or (2)
5) All of these

10. Which of them is a must for understanding the organisation's business risks associated with using router
1) Network Architecture
2) Network traffic management
3) Network security
4) Either (2) or (3)
5) All of these

11. We are shifting towards computerization because
1) Current technologies are available
2) Technologies help in meeting the business objectives
3) Hire the employees that are expert in the latest technologies are available
4) Both (1) & (2)
5) None of these

12. Who is responsible for developing the intranet strategy and monitoring its policies?
1) Intranet administrator 2) Webmaster
3) Editor 4) Both (2) & (3)
5) None of these

13. Network layers function is to
1) Select paths for data transfer
2) Break the Network in to subnet
3) Determine the IP
4) Either (2) or (3)
5) All of these

14. Which of the following makes a network insecure?
1) Encryption
2) Network Interface Card (NIC)
3) Static keys
4) Both (2) & (3)
5) None of these

15. If the network of the company is to be protected from remote access that may damage company's reputation due to misuse of information then security policy would/ should include
1) All employees
2) Only the employer
3) Contractors
4) Either (1) or (2)
5) All of these

16. Project management will be made a separate division on the basis of:
1) Interdependencies among departments
2) Sharing of resources
3) Size of the project
4) Either (2) or (3)
5) All of these

17. Various kinds of e-mail threats-mails containing racist, sexual content are example of .....
1) Spam
2) International leakage
3) International tampering
4) Offensive contents
5) None of these

18. Artificial Intelligence can be used in everysphere of life because of its....
1) Ability to work in hazardous places
2) Ability to think like human beings
3) Ability to work in artificial environments
4) All of the above
5) None of these

19. The Steering Committee is made for
1) Reviewing user requirements and ensuring that all controls are considered.
2) Strategic planning for computer installation
3) Evaluating specific project plans for systems
4) Both (1) and (2)
5) None of these

20. In an IT division specific measures were introduced to improve on quality. However effectiveness of these measures can't be ascertained by simply
1) Increased user satisfaction
2) An increase in the quality assurance budget
3) A reduction in the maintenance cost ofthe application
4) Either (1) or (2)
5) All of these

21. Efficient system requirement analysis is required for:
1) Reverse engineering
2) Joint Application Design (JAD)
3) Traditional System development life cycle
4) Either (1) or (3)
5) All of these

22. Which of the following statements is NOT correct for structured programming concepts and modularity?
1) Interaction between modules should be minimal
2) Modules should have only one entry and one exit point
3) Modularity means program segmentation
4) Both (1) and (2)
5) None of these

23. Software quality assurance is for
1) Error prevention
2) Error detection
3) Error correction 4) Either (1) or (3)
5) All of these

24. Which of the following methods is NOT required for telecommunication continuity?
1) Alternative routing
2) Diverse routing
3) Satellite routing
4) All of these
5) None of these

25. The client is called .... in 2 tier architecture.
1) Fat client
2) Thin client
3) Very thin client
4) Either (1) or (2)
5) Cannot say

ANSWERS:
1-2, 2-3, 3-1, 4-3, 5-3, 6-1, 7-3, 8-4, 9-5, 10-4
11-4, 12-2, 13-4, 14-1, 15-1, 16-5, 17-1, 18-4, 19-4, 20-3
21-5, 22-4, 23-5, 24-2, 25-1

No comments:

Post a Comment