Search This Blog

Saturday, July 26, 2014

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. A hard disk is divided into tracks which is further subdivided into?
a) Clusters
b) Sectors
c) Vectors
d) Heads
e) None of these

2. What is the radix of Binary Number System?
a) 3
b) 1
c) 2
d) 4
e) 0

3. Which of the following holds the ROM, RAM, CPU?
a) Hard Disk
b) ALU
c) Mother Board
d) All of the above
e) None of the above

4. Portable program means:
a) Program with wheels
b) Independent from its authors
c) Independent of platform
d) All of the above
e) None of the above

5. 1 GB is equal to ____.
a) 230 bits
b) 230 bytes
c) 220 bits
d) 220 bytes
e) None of these

6. Which of the following are the 5 generic software engineering framework activities?
a) Communication, Planning, Modeling, Construction, Deployment
b) Communication, Risk management, Measurement, Production, Reviewing
c) Analysis, Designing, Programming, Debugging, Maintenance
d) Analysis, Planning, Designing, Programming, Testing
e) None of these

7. The principal electronic payment system for electronic commerce is ____.
a) Credit Card
b) Digital Wallet
c) Electronic Cheque
d) All of the above
e) None of these

8. The name of first super computer of India:
a) Saga 220
b) PARAM 8000
c) ENIAC
d) PARAM 6000
e) None of these

9. The machine readable form of a program is called as ___
a) Source code
b) Object code
c) Compiler
d) Executable File
e) All of the above

10. AVI format was developed by:
a) IBM
b) Apple
c) Microsoft
d) Macromedia
e) Sun Microsoft

11. Which of the following IP address class is a multicast address?
a) Class A
b) Class B
c) Class C
d) Class D
e) Class F

12. Each character on the keyboard of computer has an ASCII value which stands for:
a) African Standard Code for Information Interchange
b) American Standard Code for Information Interchange
c) American Stock Code for Information Interchange
d) American Standard Code for Information Interfere
e) None of these

13. Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?
a) Network layer
b) Data link layer
c) Transport layer
d) Application layer
e) Mac layer

14. What is the meaning of 'Hibernate' in Windows XP/ Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications
e) None of these

15. The basic unit of a worksheet into which you enter data in Excel is called a ___
a) Cell
b) Table
c) Box
d) Column
e) None of these

16. Which of the following is a correct format of e-mail address?
a) sales@website; info
b) sales@website.info
c) saleswebsite.info
d) sales.website.info
e) All of the above

17. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Ctrl + P
d) Ctrl+Shift+P
e) None of these

18. The operating system does all of the following EXCEPT:
a) Provide a way for the user to interact with the computer
b) Manage the Central Processing Unit (CPU)
c) Manage memory and storage
d) Enable users to perform a specific task such as document editing
e) All of the above

19. ____ is the ability of an operating system to control the activities of multiple programs at the
same time.
a) Streamlining
b) Multiuser
c) Multitasking
d) Simulating
e) None of these

20. Verification of a login name and password is known as:
a) Configuration
b) Accessibility
c) Authentication
d) Logging in
e) Logging off

21. All of the following statements concerning windows are true EXCEPT:
a) Windows are an example of a command-driven environment
b) Windows can be resized and repositioned on the desktop
c) More than one window can be open at a time
d) Toolbars and scrollbars are features of windows
e) None of these

22. All of the following statements concerning files are true EXCEPT:
a) A file is a collection of related pieces of information stored together for easy reference
b) Files can be generated from an application
c) Files are stored in RAM
d) Files should be organized in folders
e) None of these

23. What are the four things needed to connect to the Internet?
a) Monitor, Keyboard, Mouse and Modem
b) Telephone line, PDA, Modem and Computer
c) Telephone line, Modem, Computer and an ISP
d) Modem, Computer, PDA and ISP
e) None of the above

24. Which of the following is true about firewalls?
a) Follows a set of rules
b) Can be either a hardware or software device
c) Filters network traffic
d) All of the above
e) None of these

25. Data that are accumulated and processed in group called:
a) Group processing
b) Batch Processing
c) Time sharing
d) All of the above
e) None of the above

26. Allocation of resources in a time dependent manner to several program simultaneously called as:
a) Multi user
b) Multi tasking
c) Time sharing
d) All of the above
e) None of the above

27. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called:
a) Simulation
b) Animation
c) Robotics
d) Computer forensics
e) None of these

28. In the binary language each letter of the alphabet, each number and each special character is made up
of a unique combination of:
a) Eight bytes
b) Eight characters
c) Eight bits
d) Eight kilobytes
e) None of the above

29. Servers are computers that provide resources to other computers connected to a:
a) Mainframe
b) Supercomputer
c) Network
d) Client
e) User

30. The difference between people with access to computers and the Internet and those without this
access is known as the:
a) Digital divide
b) Internet divide
c) Web divide
d) Cyber way divide
e) All of the above


ANSWERS:
1) b; 2) c; 3) c; 4) c; 5) b; 6) a; 7) d; 8) b; 9) b; 10) c;
11) d; 12) b; 13) a; 14) d; 15) a; 16) b; 17) c; 18) d; 19) c; 20) c;
21) a; 22) c; 23) c; 24) d; 25) b; 26) c; 27) d; 28) c; 29) c; 30) a;

Monday, July 21, 2014

COMPUTER KNOWLEDGE PRACTICE MCQs FOR IBPS EXAMS

1. The number of pixels displayed on a screen is known as the _____ screen.
a) Viewing size
b) Color depth
c) Refresh rate
d) Resolutions
e) None of these

2. A proxy server is used for which of the following?
a) To process client requests for web pages
b) To process client requests for database access
c) To provide TCP/IP
d) To provide security against unauthorized users
e) None of these

3. A contains buttons and menus that provide quick access to commonly used commands?
a) Menu bar
b) Tool bar
c) Window
d) Action bar
e) None of these

4. Which among the following is not a security / privacy risk?
a) Hacking
b) Virus
c) Spam
d) Phishing
e) None of these

5. Which of the key is not on the number keypad?
a) Ctrl
b) Del
c) Enter
d) Num Lock
e) None of these

6. Which of the following refers to stand alone programs?
a) Executable programs
b) Source program
c) Object programs
d) All of the above
e) None of the above

7. What is the keyboard shortcut to move backward through the tabs?
a) SHIFT+TAB
b) CTRL+SHIFT+TAB
c) CTRL+TAB
d) ALT+TAB
e) None of these

8. What is the most common tool used to restrict access?
a) Access control software
b) Computer keys
c) User logins
d) Passwords
e) None of these

9. Which of the following is not an example of a document file?
a) Spreadsheet
b) Memo
c) Letter
d) Term paper
e) Thesis

10. What menu is selected to cut, copy, and paste?
a) File
b) Edit
c) Tools
d) Table
e) None of the above

11. A network geometric arrangement in which a single connection line is shared by a number of nodes is called?
a) Ring Topology
b) Bus Topology
c) Star topology
d) All of these
e) None of these

12. In Windows operating system the shortcut key CTRL+R is used to?
a) Open the print dialog box
b) Update the current web page
c) Close the current window
d) Close the current window
e) None of these

13. What is the other name for a LAN Card?
a) Network Connector
b) MODEM
c) Internet Card
d) Network Interface Card
e) None of these

14. MS Word allows creation of _____ type of documents by default?
a) .txt
b) .win
c) .dot
d) .doc
e) None of these

15. The process of a computer receiving information from a server on the Internet is known as?
a) Pulling
b) Pushing
c) Downloading
d) Transferring
e) None of these

16. Which of the following is the "Bubble Memory"?
a) Nonvolatile
b) Volatile
c) Permanent
d) Primary memory
e) None of these

17. Which of the following is not a standard MS Office Edition?
a) Standard
b) Professional
c) Normal
d) Advanced
e) None of these

18. Windows Explorer is a __________?
a) Drive
b) Browser
c) Network
d) Data Base
e) File Manager

19. Which type of protocol is used for accessing internet/ web on mobile phones?
a) HTTP
b) PPP
c) FTP
d) WAP
e) SMPT

20. When sending an e-mail, the _____ line describes the contents
of the message?
a) Subject
b) to
c) Contents
d) cc
e) None of these

21. Uniform resource locator is another name of________?
a) Title bar
b) Web address
c) Title bar
d) Address bar
e) Formula bar

22. What is the default font size of cell content in EXCEL?
a) 8
b) 9
c) 10
d) 11
e) 12

23. Basic Input Output System (BIOS) is necessary for?
a) Boot-up
b) Mouse and keyboard only
c) Revolutions
d) Audio and video system
e) None of these

24. Which of the following cables can transmit data at high speeds?
a) Coaxial Cable
b) Optic Fiber Cable
c) UTP Cable
d) Twisted pair Cable
e) None of these

25. The software that allows users to surf the Internet is called an?
a) Search engine
b) Internet Service Provider (ISP)
c) Multimedia application
d) Browser
e) None of these

26. Shimmer Sparkle Text, Blinking Background, etc are known as?
a) Front style
b) Word Art
c) Font effects
d) Text Layout
e) Text effect

27. The Output Quality of a printer is measured by?
a) Dots per sq inch
b) Dots per inch
c) Dots printed per unit
d) Dots printed per line
e) None of these

28. Which of the following is not an Internet connection?
a) Broadband
b) WWAN
c) DSL
d) WLAN
e) Dial-up

29. Unsolicited commercial email is commonly known as?
a) Junk
b) Spam
c) Hoaxes
d) Hypertext
e) None of these

30. Which of the following is not an output device?
a) Plotter
b) Printer
c) Monitor
d) Touch Screen
e) None of these

31. Which process checks to ensure that the components of the computer are operating and connected properly?
a) Processing
b) Saving
c) Editing
d) Booting
e) None of these

32. ________ file format is used for data compression and archiving?
a) .exe
b) .in
c) .com
d) .zip
e) .win

33. ________ is a combination of software and hardware?
a) Firmware
b) Shareware
c) Freeware
d) Netware
e) Software

34. To move to the beginning of a line of text, press the _______ key?
a) Alt
b) Page up
c) Enter
d) Home
e) None of these

35. 'DOS' floppy disk does not have?
a) A Boot Record
b) A File Allocation Table
c) A Root Directory
d) Virtual Memory
e) BIOS

36. ISDN is an Acronym?
a) Integrated Standard Digital Network
b) Intelligent Services Digital Network
c) Integrated Services Digital Network
d) Integrated Services Data Network
e) None of these

37. Which of the following is not a term pertaining to the internet?
a) Link
b) Touch Pad
c) Browser
d) Search engine
e) All of these

38. To insert a new slide in the current presentation, we can choose?
a) CTRL + N
b) CTRL + O
c) CTRL + F
d) CTRL + M
e) None of these

39. Multiple calculations can be made in a single formula using?
a) Standard Formula
b) Array Formula
c) Complex Formula
d) Smart Formula
e) None of these

40. Which of the following is used to identify a user who returns to a Website?
a) ASPs
b) Scripts
c) Plug-ins
d) Cookies
e) None of these

ANSWERS:
1) d 2) d 3) b 4) c 5) a 6) a 7) b 8) d 9) a 10) b
11) b 12) b 13) d 14) d 15) c 16) a 17) d 18) e 19) d 20) a
21) b 22) d 23) a 24) b 25) d 26) e 27) a 28) b 29) b 30) d
31) d 32) d 33) b 34) d 35) d 36) c 37) b 38) d 39) b 40) d