Search This Blog

Tuesday, February 7, 2012

BANK EXAMS COMPUTER KNOWLEDGE PRACTICE MCQs

1. Which of the following is not an advantage of magnetic disk storage ?
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) None of the above
ANSWER: (d)
2. A prefix for billion which is equal to _____is called as billi.
(a) 100
(b) 10000
(c) 1000
(d) 10
 ANSWER: (a)
3. One kilobyte -byte
(a) 1250
(b) 2088
(c) 1024
(d) 1000

ANSWER: (c)
4. To move the cursor to the end of the document
press
(a) Ctrl + Esc
(b) Ctrl + End
(c) Ctrl + B
(d) Ctrl + c

ANSWER: (B)
5. The shortcut key to print documents is
(a) Ctrl + A
(b) Ctrl + B
(c) Ctrl + P
(d) Ctrl + C

ANSWER: (c)
6. In MICR, C stands for
(a) Code
(b) Colour
(c) Computer
(d) Character
(e) None of these

ANSWER: (d)
7. The simultaneous processing of two or more
Programs by multiple processors is
(a) Multiprogramming
(b) Multitasking
(c) Time-sharing
(d) Multiprocessing
(e) None of these

ANSWER: (d)
8. First layer in the OSI reference model is
(a) Data link
(b) Network
(c) Physical
(d) Application

ANSWER: (c)
9. Viruses, Trojan horses and worms are
(a) Able to harm computer system
(b) Unable to detect if affected on computer
(c) User-friendly applications
(d) Harmless applications resident on computer

ANSWER: (a)
10. Failure of passwords security due to exposure can result from
(a) Electronic monitoring
(b) Visual
(c) Both ‘a’ and ‘b’
(d) Light

ANSWER: (c)
11. Data security threats include
(a) Hardware failure
(b) Privacy invasion
(c) Fraudulent manipulation of data
(d) All of the above

ANSWER (b)
12. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar
(b) Windows
(c) Desktop
(d) Icons

ANSWER (d)
13. Accessing records from a file directly without
searching from the beginning of the file is
(a) Time sharing
(b) Random
(c) Direct access
(d) Access time

ANSWER (c)
14. Database redesign is not terribly difficult if the
(a) Database is structured
(b) Database is well-designed
(c) Database has no data
(d) Database is relatively small

ANSWER (c)
15. Which of the following SQL statements are helpful in database redesign ?
(a) Correlated sub queries only
(b) EXISTS/ NOT EXISTS expressions only
(c) Both of the above are helpful
(d) Creating the database are helpful

ANSWER (c)
16. The EXISTS keyword will be true if
(a) Any row in the sub query meets the condition only
(b) All rows in the sub query fail the condition only
(c) Both of these two conditions are met
(d) Neither of these two conditions is met

ANSWER (a)
17. How can you find rows that do not match some specified condition ?
(a) EXISTS
(b) Double use of NOT EXISTS
(C) NOT EXISTS
(d) ROWS EXIT

ANSWER (c)
18. The process of reading a database schema and producing a data model from that schema is known
as
(a) Data modeling
(b) Database design
(c) Reverse engineering
(d) Inverse engineering

ANSWER (c)
19. Which SQL-92 standard SQL command can be used to change a table name ?
(a) RENAME TABLE
(b) CHANGE TABLE
(c) ALTER TABLE
(d) None of the above is correct

ANSWER (a)
20. What SQL command can be used to delete
columns from a table ?
(a) MODIFY TABLE Table Name DROP COLUMN Column Name
(b) MODIFY TABLE Table Name DROP Column Name Column Name
(d) ALTER TABLE Table Name DROP Column Name

ANSWER (c)
21. Which of the following modifications may not succeed?
(a) Changing a column data type from char to date
(b) Changing a column data type from numeric to char
(c) Both of the above actions should succeed
(d) Neither of the above actions will succeed

ANSWER (a)
22. Changing cardinalities in a database is
(a) A common database design task
(b) A rare database design task, but does occur
(c) A database design task that never occurs
(d) Is impossible to do, so a new database must be constructed and the data moved into it

ANSWER (a)
23. A regular sub query can be processed
(a) From the top down
(b) From the bottom up
(c) By nesting
(d) From the right up

ANSWER (b)
24. How many copies of the database schema are typically used in the redesign process ?
(a) One
(b) Two
(c) Three
(d) Four

ANSWER (c)

BANK EXAMS COMPUTER KNOWLEDGE PRACTICE MCQs

1. Which of the following is not as language for computer programming ?
(a) WINDOWS
(b) PASCAL
(c) BASIC
(d) COBOL
(e) All of these
 
ANSWER: (a)
2. What digits are representative of all binary Numbers?
(H) 0
(b) 1
(c) Both ‘a’ and ‘b’
(d) 3
(e) None of these

ANSWER: (c)
3. The term gigabyte refers to
(a) 1024 bytes
(b) 1024 kilobytes
(c) 1024 megabytes
(d) 1024 gigabytes
(e) None of these

ANSWER: (c)
4. Off-line operation is the operation of devices without the control of
(a) Memory
(b) CPU
(C) ALU
(d) Control unit
(e) None of these

ANSWER: (b)
5. Name the first general purpose electronic computer
(a) ADVAC
(b) ADSAC
(c) UNIVAC
(d) EDVAC
(e) None of these

ANSWER: (c)
6. Which of the following statement is wrong?
(a) Windows XP is an operating system
(b) Linux is owned and sold by Microsoft
(c) Photoshop is a graphical design tool by Adobe
(d) Linux is free and open source software
(e) None of the above

ANSWER: (b)
7. A software used to convert source program instructions to object instruction is known as
(a) Compiler
(b) Assembler
(c) Interpreter
(d) Language processor
(e) None of these

ANSWER: (d)
8. The term ‘Operating System’ means
(a) A set of programs which control computer working
(b) The way a user operates the computer system
(c) Conversion of high level language to machine language
(d) The way computer operator works
(e) None of the above

ANSWER: (a)
9. Input, output and processing devices grouped together represent a(n) ……
(a) Mobile device
(b) Information processing cycle
(c) Circuit boards
(d) Computer system
(e) None of the above

ANSWER: (d)
10. The …… is the box that houses the most Important parts of a computer system.
(a) Software
(b) Hardware
(c) Input device
(d) System unit
(e) None of these

ANSWER: (d)
11. The physical arrangement of elements on a page is referred to as a document’s ……
(a) Features
(b) Format
(c) Pagination
(d) Grid
(d) None of these

ANSWER: (b)
12. All of the following are examples of real security and privacy risks EXCEPT
(a) Hackers
(b) Spam
(c) Viruses
(d) Identity theft
(e) None of these

ANSWER: (b)
13. The ability to recover and read deleted or damaged files from a Criminals computer is an example of a law enforcement specialty called
(a) Robotics
(b) Simulation
(C) Computer forensics
(d) Animation
(e) None of these

ANSWER: (c)
14. This tags, when placed on an animal, can be used to record and track in a database all of the
Animal’s movements
(a) POS C
(b) RFID
(C) PPS
(d) GPS
(e) None of these

ANSWER: (b)
15. These terminals (formerly known as cash Registers) are often connected to complex inventory and sales computer systems
(a) Data
(b) Point-of-sale (POS)
(c) Sales
(d) Query
(e) None of the above

ANSWER: (b)
16. Technology no longer protected by copyright,available to everyone, is considered to be
(a) proprietary.
(b) Open
(c) Experimental
(d) In the public domain
(e) None of the above

ANSWER: (a)
17. It is the science that attempts to produce machines that display the same type of Intelligence that humans do
(a) Nano science
(b) Nanotechnology
(c) Simulation
(d) Artificial intelligence (AI)
(e) None of the above

ANSWER: (d)
18. The name for the way that computers manipulate data into information is Called
(a) Programming
(b) Processing
(C) Storing
(d) Organizing
(e) None of these

ANSWER: (b)
19.Computers gather data, which means that they allow users to
(a) Present data
(B) input data
(C) Output data
(d) Store data
(e) None of these

ANSWER: (b)
20. Which type of data has been organized or presented in a meaningful fashion ?
(a) A process
(b) Software
(C) Storage
(d) Information
(e) None of these

ANSWER: (d)
21. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered -
(a) Data
(b) Output
(c) Input
(d) The process
(e) None of these

ANSWER: (b)
22. Computers process data into information by working exclusively with
(a) Multimedia
(b) Words
(c) Characters
(d) Numbers
(e) None of these

ANSWER: (d)
23. The term bit is short for
(a) Megabyte
(b) Binary language
(C) Binary digit
(d) Binary number
(e) None of these

ANSWER: (c)
24. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of
(a) eight bytes
(b) eight kilobytes
(C) Eight characters
(d) eight bits
(e) None of these

ANSWER: (d)
25. Computers use which language to process data?
(a) Processing
(b) Kilobyte
(C) binary
(d) Representational
(e) None of these

ANSWER: (c)