Search This Blog

Wednesday, February 15, 2012

COMPUTER KNOWLEDGE PRACTICE MCQs

1.Which command devides the surface of the blank disk into sectors and assign a unique address to each one
1) Ver
2) Format
3) Fat
4) Chkdsk
5) None of these
2.If you need to duplicate the entire disk, which command will you use ?
1) Copy
2) Diskcopy
3) Chkdsk
4) Format
5) None of these
3.A
.............. sometimes called a boot sector virus, executes when a
computer boots up because it resides in the boot sector of a floppy disk
or the master boot record of a hard disk
1) system virus
2) Trojan horse virus
3) file virus
4) macro virus
5) None of these
4.A result of a computer virus can not lead to ......
1) Disk Crash
2) Mother Board Crash
3) Corruption o f program
4) Deletion of files
5) None of these
5.Every computer connected to an intranet or extranet must have a distinct .......
1) firewall
2) proxy server
3) IP address
4) domain name
5) None of these
6.Programming language built into user programs such as Word and Excel are known as ......
1) 4GLs 
2) Macro languages
3) object-oriented languages
4) visual programming languages
5) None of these
7.Firewalls are used to protect against .......
1) unauthorized Attacks
2) virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) None of these
8.Which of the following extensions suggest that the file is a backup copy
1) Bak
2) Bas
3) Com
4) Txt
5) None of these
9.Computer
programs are written in a high - level programming language; however,
the human readable version of a program is called .......
1) cache
2) instruction set
3) source code
4) word size
5) None of these
10.The software tools that enable a user to interact with a computer for specific purposes are known as .......
1) Hardware
2) Networked Software
3) Shareware
4) Applications
5) None of these
11...............
proessing is used when a large mail-order company accumulates orders
and processes them together in one large set
1) Batch
2) Online
3) Real-time
4) Group
5) None of these
12.When a file contains instructions that can be carried out by the computer, it is often called a(n) ...... file
1) data
2) information
3) executable
4) application
5) None of these
13.A complier translates a program written in a high - level language into ........
1) Machine language   
2) An algorithm
3) A debugged program
4) Java
5) None of these
14.A set of step - by - step procedures for accomplishing a task is known as a(n) .....
1) algorithm
2) hardware program
3) software bug
4) firmware program
5) None of these
15.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) ......
1) Workstation
2) CPU
3) Magnetic disk
4) Integrated circuit
5) None of these
16.A saved document is referred to as a .....
1) file
2) word
3) folder
4) project
5) None of these
17.What is output ?
1) What the processor takes from the user
2) What the user gives to the processor
3) What the processor gets from the user
4) What the processor gives to the user
5) None of these
18.When you turn on the computer, the boot routine will perform this test ........
1) RAM test
2) Disk drive test
3) Memory test
4) Power - on self-test
5) None of these
19.Which of the following storage media provides sequential access only ?
1) Floppy disk
2) Magnetic disk
3) Magnetic tape
4) Optical disk
5) None of these
20.In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ........
1) copy and paste
2) copy, cut and paste
3) cut, copy and paste
4) cut and paste
5) None of these
21. Hardware includes ..........
1) all devices used to input data into a computer
2) sets of instructions that  a computer runs or executes
3) the computer and all the devices connected to it that are used to input and output data
4) all devices involved in processing information including the central processing unit, memory and storage
5) None of these
22.The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ....... command
1) Replace
2) Find
3) Lookup
4) Search
5) None of these
23.The term 'user interface' refers to ............
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to user commands
3) the means by which the user interacts with the peripheral devices on the computer
4) the monitor that is available for the computer
5) None of these
24.For creating a document, you use ........ command at File Menu.
1) Open
2) Close
3) New
4) Save
5) None of these
25.The .............. becomes different shapes depending on the task you are performing
1) Active tab
2) Insertion point
3) Mouse pointer
4) Ribbon
5) None of these
26.Specilizd programs that asist users in locating information on the Web are called ....
1) Information engines
2) Search engines
3) Web browsers
4) Resource locators
5) None of these
27.The background of any Word document ......
1) Is always white colour
2) Is the colour you presect under the Options menu
3) Is always the same for the entire document
4) Can have any colour you choose
5) None of these
28.Correcting errors in a program is referred to as .........
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these
29.Any letter, number, or symbol found on the keyboard that you can type into the computer ..........
1) output
2) character
3) type
4) print
5) font
30.A symbol or question on the screen that prompts you to take action and tell the computer what to do next ........
1) scanner
2) questionnaire
3) prompt and dialog box
4) information seeker
5) None of these
31.Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs .....
1) menu bar
2) tool bar
3) user friendly
4) word processor
5) None of these
32.The primary device that a computer uses to store information ......
1) monitor
2) memory
3) disk
4) hard drive
5) None of these
33.A file extension is separated from the main file name with a(n) ......, but no spaces
1) questiion nark
2) exclamation mark
3) underscore
4) period
5) None of these
34.Application software is designed to accomplish .......
1) real -w orld tasks
2) computer-centric tasks
3) gaming tasks
4) operating system tasks
5) None of these
35.A ...... is a device that not only provdes surge protection, but also  furnishes your computer with battery backup power during a power outage
1) surge strip
2) USB
3) UPS
4) battery strip
5) None of these
36.The term ............. designates equipment that might be added to a computer system to enhance, its functionality
1) digitial device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
37........... this is the act of copying or downloading a program from a network and making multiple copies of it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
38.When installing ............., the user must copy and usually decompress  program files from a CDROM or other medium to the hard disk
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these
39.Which one of the following would be considered as a way that a computer virus can enter a computer system ?
1) Opening an application previously installed on the computer
2) Borrowed an illegal copy of software
3) Viewing a website without causing any additional transctions
4) Running antivirus programs
5) None of these
40.Programs such as Mozila Firefox that serve as navigable windows into the Web are called ..........
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these
41.What is the main difference between a mainframe and a super computer ?
1) Super computer is much larger than mainframe computers
2) Super computers are much smaller than mainframe computers
3) Supercomputers are focused to execute few programs as fast as possible
while mainframe uses its power to execute as many programs concurrently
4) Supercomputers are focused to execute as many programs as possible
while mainframe uses its power to execute few programs as fast as
possible
5) None of these
42.What is the function of Recycle Bin ?
1) Store deleted file
2) Store temporary file
3) Store corrupted file
4) Store Document file
5) None of these
43.Which is the latest version of MS Office ?
1) Office XP
2) Windows XP
3) Office 2007
4) Office 2010
5) None of these
44.Which device can not be shared in network ?
1) Floppy
2) Keyword
3) Computer
4) Printer
5) None of these
45.What is the purpose of query ?
1) Input data
2) Output data
3) Sort & filter
4) All of above
5) None of these
46.Which port doesn't exist in computer ?
1) USB
2) Parallel
3) Com1 / Com2
4) RAW
5) None of these
47.What is the name of exel files ?
1) Workbook
2) Worksheet
3) Spreadsheet
4) Spread book
5) None of these
48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
4) All of he above
5) None of these
49.Synonym can be reviewed with
1) Spelling and grammar
2) Thesaurus
3) Both
4) Synonym viewer
5) None of these
50.Which command allows you to reduce fragments of file and optimize the performance of disk ?
1) Scandisk
2) Diskcomp
3) Chkdsak
4) Defrag
5) None of these

ANSWERS:
    1) 2    2) 2    3) 5    4) 2    5) 2    6) 4        7) 1    8) 1    9) 3    10) 4
11) 1    12) 3    13) 1    14) 1    15) 4    16) 1    17) 4    18) 2        19) 2   20) 4
21) 4    22) 2    23) 1    24) 3        25) 3    26) 2    27) 4    28) 1    29) 2    30) 3   
31) 1    32) 4    33) 5    34) 4    35) 3    36) 4  37) 3    38) 1    39) 2    40) 4
41) 3    42) 1   43) 4    44) 2    45) 4    46) 4    47) 1    48) 1        49) 2    50) 4

Tuesday, February 7, 2012

BANK EXAMS COMPUTER KNOWLEDGE MODEL QUESTIONS

1. URL stands for
(a) Universal Research List
(b) Universal Resource List
(c) Uniform Resource Locator
(d) Uniform Research Locator
(e) None of the above

ANSWER: (c)
2. Which of the following is NOT a goal of Transaction processing system?
(a) Capture, process and store transactions
(b) Produce a variety of documents related to Routine business activities
(c) Reduce manual effort associated with Processing business transactions
(d) Produce standard reports used for Management decision making
(e) None of the above

ANSWER: (b)
3.When data changes in multiple lists and all lists are not updated, this causes
(a) Data redundancy
(b) Information overload
(c) Duplicate data
(d) Data inconsistency
(e) None of the above

ANSWER: (d)
4. Data becomes _ when it is presented in a format that people can understand and use.
(1) Processed
(2) Graphs
(3) Information
(4) Presentation
(5) None of these

ANSWER (3)
5. The term _ designates equipment that might be added to a computer system to enhance its functionality.
(1) Digital device
(2) System add-on
(3) Disk pack
(4) Peripheral device
(5) None of these

ANSWER (4)
6. What is the primary difference between viruses and a worm?
(a) A worm has the ability to self-propagate From an infected user’s computer to other Computers
(b) A worm is usually written by a cracker: Script bunnies do not have the skills to Develop a worm program
(c) A virus is very harmful to the computers it Infects: a worm is not a serious, a problem
(d) Anti-virus software is effective in fighting Viruses but not worms
(e) None of the above

ANSWER: (c)
7. You must install this on a network if you want to Share a broadband Internet connection.
(a) router
(b) Modem
(c) Node
(d) Cable
(e) None of these

ANSWER: (a)
8. ______________ is the ability of a device to ‘jump” directly to the requested data.
(1) Sequential access
(2) Random access
(3) Quick access
(4) All of these
(5) None of these

ANSWER (1)
9. Granting an outside organisation access to Internet web pages is often implemented using a (an)
(a) Extranet
(b) Intranet
(c) Internet
(d) Hacker
(e) None of these

ANSWER: (a)
10. The code that relational database management Systems use to perform their database task is Referred to as
(a) QBE
(b) SQL
(c) OLAP
(d) Sequel Server
(e) None of these

ANSWER: (b)
11. The purpose of the primary key in a database is to
(a) Unlock the database
(b) Provide a map of the data
(c) Uniquely identify a record
(d) Establish constraints on database operations
(e) None of the above

ANSWER: (c)
12. The instructions that tell a computer how to carry out the processing tasks are referred to as computer
(1) Programs
(2) Processors
(3) Input devices
(4) Memory modules
(5) None of these

ANSWER (1)
13. The ________________ is the amount of data that a storage device can move from the storage medium to the
computer per second.
(1) Data migration rate
(2) Data digitizing rate
(3) Data transfer rate
(4) Data access rate
(5) None of these

ANSWER (3)
14. C, BASIC, COBOL and Java examples of _languages.
(1) Low-level
(2) Computer
(3) System programming
(4) High-level
(5) None of the above

ANSWER (2)
15. A______________ is a microprocessor-based computing device.
(1) Personal computer
(2) Mainframe
(3) Workstation
(4) Server
(5) None of these

ANSWER (1)
16. The design of the network is called the network
(a) Architecture
(b) Server
(c) Transmission
(d) Type
(e) None of these

ANSWER: (a)
17. A _____________ converts all the statements in a program in a single batch and the resulting collection of Instructions is placed in a new file.
(1) Converter
(2) Compiler
(3) Interpreter
(4) Instruction
(5) None of these

ANSWER (2)
18. It uses pictures (called icons) and menus Displayed on the screen to send commands to the Computer system
(a) command-based user interface
(b) GUI
(c) System utility
(d) API
(e) None of the above

ANSWER: (b)
19. It contains data descriptions and defines the Name, data type, and length of each field in the Database
(a) Data dictionary
(b) Data table
(C) Data record
(d) Data field
(e) None of these

ANSWER: (a)
20. A is an additional set of commands that the computer displays after you make a selection from the main menu.
(1) Dialog box
(2) Submenu
(3) Menu selection
(4) All of these
(5) None of these

ANSWER (2)
21. Which of the following is NOT a type of Broadband internet connection?
(a) Cable
(b) DSL
(c) Dial-up
(d) Satellite
(e) None of these

ANSWER: (c)
22. in making a field this property show that it Cannot be left blank
(a) Numeric
(b) Required
(c) Calculated
(d) Validated
(e) None of these

ANSWER: (b)
23. There are viruses that are triggered by the Passage of time or on a certain date
(a) Boot-sector viruses
(b) Macro viruses
(c) Time bombs
(d) Worms
(e) None of these

ANSWER: (c)
24. What is a backup?
(a) Restoring the information backup
(b) An exact copy of a system’s information
(c) The ability to get a system up and running In the event of a system crash or failure
(d) All of the above
(e) None of the above

ANSWER: (d)
25. The internet is
(a) A large network of networks
(b) An internal communication system for a Business
(c) A communication system for the Indian Government
(d) All of the above
(e) None of the above

ANSWER: (d)