Search This Blog

Friday, May 25, 2012

Computer Terms

Application Files- Program files environment where you can create and edit the kind of document that application makes

Bug- a fault in a computer program which prevents it from working correctly

Central Processor Unit (CPU) - This is where the entire computer's data processing is handled - all the data manipulation, calculations and formatting data for output.

Click- To select an object by pressing the mouse button when the cursor is pointing to the required menu option, icon or hypertext link

Close - To close a window that has been opened for viewing and / or editing

Computer- A general-purpose machine that processes data according to a set of instructions that are stored internally either temporarily or permanently

Cookie- A packet of information that travels between a browser and the web server

CPU- An acronym for Central Processing Unit and is often used to refer to a computer system, such as "That beige box sitting next to my 24" flat screen monitor is my new CPU

Crash- Your computer or application no longer works correctly and so you "loose" all the work you've done since the last time you saved

Creating A File- Storing data as a file with an assigned file name that is unique within the directory it resides in

Delete- To remove an item of data from a file or to remove a file from the disk

Desktop- An on-screen representation of a desktop such as used in the Macintosh and Windows operating systems

Dialog Boxes- Takes over your screen and allows you to ‘dialog' with the computer

Directory (AKA Folder, sub-directory)- Allows you to organize files and other folders

Disk Space- This is the place where your files live. The greater the disk space the more files you can keep. More disk space is always better than less. You can never have much disk space.

Document Files- Files we care about (memos, letters, pictures, etc.

Documents- Files you create and edit

Double Click- To press the mouse button twice in rapid succession without moving the mouse between clicks

Drag- To move an object on screen in which its complete movement is visible from starting location to destination

Edit- To make a change to existing data

File Cabinet- Metaphorically, the hard drive (and other kinds of storage media like floppy disks) which store files and folders

Folder Icons- Collections of documents and other folders

Google­- search engine on the web

Hotmail- free email service, now part of MSN

Icon View- Allows you to see icons of folders and files primarily as icons with little information

Icons- In a graphical user interface (GUI), a small, pictorial, on screen representation of an object, such as a document, program, folder or disk drive.

Keyboard- This if the primary text input device. It also contains certain standard function keys, such as the Escape key, tab, and arrow keys, shift and control keys, and sometimes other manufacturer-customized keys.

Macintosh- Macintosh, Mac - a personal computer from Apple Computer

Mouse- Pointing device that allows you to tell the computer what to do

Mozilla- a web browser and successor to Netscape Communicator

Operating System (OS) - System software that allows your computer to work

Pentium- Microprocessor from Intel

Random Access Memory (RAM) - This stands for Random Access Memory. You can think of this as the "space" where you computer does its processing. The more space you have the more processes you can run at the same time. More RAM is always better than less. You can never have much RAM.

Recycle Bin- Place where you put files and folders that you may later want to delete or get rid of. Compare Trash

Resize Box- Allows you to change the size and shape of a window

Right click- To press the right button on the mouse. (This is Windows specific. On a Mac running System 8 or higher, you hold down the Control key and then click to get the same effect.)

Save As­­- Give the file a name and/or store the file in a certain place

Save- Tell the computer to create a file on disk that has the information you've put into the document (usually typing)

Scroll bar- Allows you to move around through your document

Shut down- To quit all applications and turn off the computer

Software- Instructions that tell the computer what to do

Spam- unwanted repetitious messages, such as unsolicited bulk e-mail

System files- Allows our computer to work

Tags: computer terms for PO exam 2012, computer terms for bank exams, probationary exam computer terms 2012

Trash- Place where you put files and folders that you want to delete or get rid of

Trojan Horse- a malicious program that is disguised as legitimate software. The term is derived from the classical myth of the Trojan Horse. Analogously, a Trojan horse appears innocuous (or even to be a gift), but in fact is a vehicle for bypassing security

Unix- an operating system

Virus- a piece of program code that spreads by making copies of itself

Volume Icons- Devices that hold files and folders

Wiki or WikiWiki- a hypertext document collection or the collaborative software used to create it

Thursday, May 17, 2012

COMPUTER KNOWLEDGE MODEL PRACTICE QUESTIONS


1. Which of the following is NOT a computer programming language?
(1) C
(2) C++
(3) Java
(4) COBOL
(5) Microsoft

2. A computer virus normally attaches itself to another computer program known as-
(1) Trojan horse 
(3) Host program
(3) Boot program
(4) Spyware
(5) Malware

3. A terminal that cannot process any information is called-
(1) Direct access terminal
(2) Intelligent terminal
(3) Dumb terminal 
(4) Smart terminal
(5) Blind terminal

4. ____ is a high speed memory that can be used in between CPU and main memory.
(1) CPU
(2) Buffer
(3) Spooling
(4) Cache 
(5) None of these

5. A ____ port is primarily used to connect printers to a computer.
(1) Serial port
(2) USB port
(3) Parallel port 
(4) Address bus
(5) None of these

6. ____ is responsible for overall control and co-ordination of instruction execution.
(1) CPU
(2) ALU
(3) RAM 
(4) Control Unit
(5) None of these

7. When you start your computer from the off position then it is known as-
(1) Hard booting 
(2) Processing
(3) Storage
(4) Soft booting
(5) None of these

8. The component is required to process data into information and consists of integrated circuit.
(1) RAM
(2) Control Unit
(3) Processor 
(4) Motherboard
(5) None of these

9. ____ is known as network virus.
(1) Trojan horse
(2) Brain Virus
(3) Worm 
(4) All of these
(5) None of these

10. ____ is a technique of temporarily removing inactive programs from the memory of computer system.
(1) Swapping
(2) Spooling 
(3) Semaphore
(4) Scheduler
(5) None of these

11. A computer program that translates one program instructions at a time into machine language is called-
(1) Interpreter 
(2) CPU
(3) Compiler
(4) Simulator
(5) None of these

12. ____ are device used to transmit data over telecommunication lines.
(1) Drives
(2) Drive bays
(3) Modems 
(4) Platforms
(5) None of these

13. Who introduced Internet E-mail?
(1) Jerry Yang
(2) David Filo
(3) Ray Tomlinson
(4) Sergey Brinn
(5) None of these

14. Granting an outside organization access to internet web pages is often implemented using a(n)-
(1) extranet 
(2) intranet
(3) internet
(4) hacker
(5) None of these

15. BCC stands for-
(1) Bold Carbon Copy
(2) Blue Carbon Copy
(3) Bandwidth Carbon Copy
(4) Blind Carbon Copy 
(5) None of these

16. Which of the following contains information about a single ‘entity’ in the database like a person, place, event or thing?
(1) Query
(2) Field
(3) record 
(4) table
(5) None of these

17. Outlook Express is known as-
(1) E-mal client 
(2) Word processor
(3) Spreadsheet
(4) Database
(5) None of these

18. Which is not closed source software package?
(1) VLC
(2) LINUX
(3) Open Office
(4) MS Word 
(5) None of these

19. Minimum Zoom percentage supported by MS Word is-
(1) 10% 
(2) 15%
(3) 25%
(4) 4%
(5) None of these

20. HTML was introduced by-
(1) Vinton Cerf
(2) Bob Willies
(3) Steve Jobs
(4) Tim Burner Lee 
(5) None of these

21. A message with replies on a newsgroup is often, called a-
(1) post
(2) list
(3) thread 
(4) comment
(5) None of these

22. To send e-mail to a large group at one time, a ____ can be used.
(1) group
(2) alias
(3) mail server
(4) list serv 
(5) None of these

23. The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as-
(1) Business to business
(2) Consumer to business 
(3) Client to business
(4) Business to consumer
(5) None of these

24. A repair for a known software bug, usually available at no change on the internet is called-
(1) Version
(2) Patch 
(3) Tutorial
(4) FAQ
(5) None of these

25. When sending the e-mail, the ____ line describes the contents of the message.
(1) CC
(2) Contents
(3) To
(4) Subject 
(5) BCC

26. A port is a connector located on the –
(1) RAM
(2) CPU
(3) ROM
(4) Memory
 (5) Motherboard

27. Format command is used to create-
(1) Sector
(2) memory
(3) tracks
(4) tracks & sectors 
(5) None of these

28. Disk access time is-
(1) seek time
(2) Latency time
(3) Seek time + Latency time 
(4) Disk time
(5) None of these

29. ____ technology is used by banks for faster processing of large volume of cheques.
(1) OCR
(2) IFSC Code
(3) OMR
(4) MICR 
(5) Bar Code

30. The Operating System is also called the ____ between the user and the computer.
(1) server
(2) interface 
(3) network
(4) intermediate
(5) None of these

31. A human being who writes programs, operate and maintain computer is known as-
(1) Liveware 
(2) Freeware
(3) Spyware
(4) Shareware
(5) None of these

32. A Public Switched-Telephone Network (PSTN) uses ____ switching technique.
(1) Packet
(2) Message
(3) Circuit 
(4) Transport
(5) None of these

33. The PC and the Apple Macintosh are example of two different –
(1) applications
(2) programs
(3) platforms 
(4) storage device
(5) Operating system

34. PROM is a ____ memory that store information even if power is switched off.
(1) Volatile
(2) Buffer
(3) spooling
(4) non-volatile 
(5) None of these

35. When installing a peripheral device you also need to install a –
(1) port
(2) server
(3) driver 
(4) connection
(5) utility software

36. The ____ specifies the operation to be performed and the operands provide the data on which the operation is to be performed.
(1) source code
(2) op code 
(3) object code
(4) program code
(5) None of these

37. Which of the following can hold maximum amount of data?
(1) Optical disk
(2) Floppy disk
(3) Magnetic disk inside computer
(4) Magnetic tape 
(5) None of these

38. A ____ is not a form of Biometrics.
(1) fingerprint
(2) password 
(3) retina scan
(4) breath scan
(5) None of these

39. Full form of OSI is-
(1) Open System Interconnection 
(2) Open Software for Internet
(3) Operational System for Interconnect
(4) Operational Software for Internet
(5) None of these

40. A pixel is-
(1) a computer program that draws picture
(2) a picture stored in the secondary memory
(3) the smallest resolvable part of a picture 
(4) a virus
(5) None of these