Search This Blog

Wednesday, August 29, 2012

SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER AWARENESS MCQs


1. Which type of memory gets lost when you switch off?
1) ROM
2) RAM
3) CACHE
4) Dynamic
5) Static

2. Which type of network would use phone lines?
1) WAN
2) LAN
3) WWAN
4) Wireless
5) None of these

3. Speakers / Headphones are ____ devices.
1) Input
2) Input/ Output
3) Software
4) Storage
5) Output

4. A program for viewing web pages is called:
1) hardware
2) software
3) storage
4) browser
5) None of these

5. A computer cannot perform which of the following functions?
1) Addition
2) Subtraction
3) Bake a cake
4) Division
5) None of these

6. CD's or DVD's are ____ type of devices.
1) Input
2) Output
3) Software
4) Storage
5) Input/output

7. In the URL 'www.dbsdynamic.blogspot.in' what does the domain name extension '.in' represent?
1) International
2) internet
3) intra net
4) India
5) None of these

8. Free of cost repair of the software bug available in internet is called:
1) Version
2) Ad-on
3) Tutorial
4) FAR
5) Patch

9. Which of the following is READ only disc?
1) DVD-R
2) DVD-ROM
3) DVD-RW
4) CD-R
5) None of these

10. Which of the following is an/ are advantages of LAN?
1) Sharing peripherals
2) Backing up your data
3) Saving all your data
4) Accessing the web
5) Automatic printing of data




11. Four of the following are alike in a certain way and so form a group. Which is the one that does not belong to the group?
1) Applications
2) Peripherals
3) Programs
4) Software
5) Operating system

12. Digital camera is a ____device.
1) Input
2) Output
3) Software
4) Storage device
5) Input/ output

13. The example of standard file format is:
1) JPEG (.jpg)
2) Bitmap (.bmp)
3) Word (.doc)
4) Text (.txt)
5) Excel (.xls)

14. Which of the following is the fastest Memory?
1) Hard disk
2) DVD ROMs
3) Cache Memory
4) Static RAM
5) None of these

15. Which of the following is NOT a common feature of software application?
1) Menus
2) Windows
3) Help
4) Search
5) None of these

16. The ability of an Operating system to run more than one application at a time is called:
1) Multitasking
2) Multi user computing
3) Time sharing
4) Programming language
5) None of these

17. While filling up an application form which of the following keys is used to move the
cursor to the next box?
1) Esc
2) Shift
3) Control
4) Tab
5) Alt

18. The Softwares which are used in Banks generally are:
1) Character Driven
2) Folder Driven
3) Menu Driven
4) Touch screens
5) None of these

19. Which of the following is a measurement of speed of internet?
1) MB
2) Kbps
3) KB
4) TB
5) QPSI

20. When a computer is attacked by a virus it cannot lead to:
1) Disk Crash
2) Motherboard Crash
3) Corruption of a program
4) Deletion of files
5) None of these

21. In page preview mode-
1) You can see all pages of your document
2) You can only see the page you are currently working
3) You can only see pages that do not contain graphics
4) You can only see the title page of your document
5) None of these

22. What is the full form of EDI?
1) Electronic Data Information
2) Electronic Disk Information
3) Electric Data information
4) Electronic Data Interchange
5) None of these

23. How many different documents can be opened at one time?
1) Not more than Three
2) Only One
3) As many as your computer memory will hold
4) No more than your taskbar can display
5) None of these

24. Files are organized by storing them in:
1) Archives
2) Folders
3) Indexes
4) Lists
5) None of these

25. What kind of resource is most likely to be a shared common resource in a computer network?
1) Printers
2) Speakers
3) Floppy drives
4) Keyboards
5) None of these

26. Saving is a process to:
1) Copy the document from memory to storage medium
2) Bring change in the present status of the document
3) Change the face or entire form
4) Develop the document by recording the text with the use of keyboard
5) None of these

27. In word you can force a page break by:
1) Positioning your cursor at the appropriate place and pressing the F1 key
2) Using the Insert / section Break
3) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
4) By changing the font size of your document
5) None of these

28. A computer cannot 'boot' if it does not have:
1) Compiler
2) Loader
3) Operating System
4) Assembler
5) None of these

29. The among of vertical space between lines
of text in a document is called :
1) Double-space
2) Line spacing
3) Single space
4) Vertical spacing
5) None of these

30. Which of the following shortcut keys is used to underline a word / line in a word document
1) Ctrl + L
2) Ctrl + U
3) Ctrl + K
4) Alt + U
5) Tab + L

31. A software which has a capability of replicating itself and can be harmful to the computer is:
1) MS-Office
2) Win Zip
3) Virus
4) Windows Media Player
5) Notepad

32. What is the full form of Wi-Fi?
1) Wireless Front
2) Wired Front
3) Wireless Fidelity
4) Wired Fidelity
5) None of these

33. The process of transferring files from a computer on the Internet to your computer is called:
1) Downloading
2) Uploading
3) FTP
4) JPEG
5) Downsizing

34. What is the full form of EPROM?
1) Erasable Programmable Read-Only Memory
2) Electronic Programmable Read-Only Memory
3) Enterprise Programmable Read-Only Memory
4) Extended Programmable Read-Only Memory
5) Electrical Programmable Read-Only Memory

35. CISC the abbreviation of:
1) Complex Instruction Set Code
2) Communication Instruction Set Computing
3) Complex Instruction Signal Computing
4) Communication Instruction Signal Code
5) Complex Instruction Set Computing


ANSWERS:
1-2; 2-1; 3-5; 4-4; 5-3; 6-4; 7-4; 8-5; 9-2; 10-1;
11-2; 12-5; 13-4; 14-3; 15-2; 16-1;17-4; 18-3; 19-2; 20-2;
21-1; 22-4; 23-3; 24-2; 25-1; 26-1; 27-3; 28-3; 29-2; 30-2;
31-3; 32-3; 33-2; 34-1; 35-5

Monday, July 30, 2012

SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER AWARENESS PRACTICE QUESTIONS



1. What is e-commerce?
1) Buying and selling of international goods
2) Buying and selling of products and services over the internet
3) Buying and selling of products having to do with computers
4) Buying and selling of products and services not found in stores
5) Buying and selling of electronic goods

2. The term user Interface refers to :
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to the user commands
3) The means by which the user interacts with the peripheral devices on the  computer
4) All of these
5) None of these

3. Which of the following is not an input device?
1) Keyboard
2) Joystick
3) Monitor
4) Microphone

5) None of these

4. An error is also known as :
1) Debug
2) Bug
 3) Cursor
4) Icon
5) None of these

5. Archive is :
1) Back-up Storage
2) Forward Operation
3) Primary Storage
4) Name of famous processor
5) None of these

6. Which media has the ability to have data/information written on them by users more than once
1) CD-R disks
2) CD-RW disks
3) Zip disks
4) Opti disks
5) Both CD-RW and Zip disks

7. BCC in regard to emails, stands for :
1) Best Client Copy
2) Better Communication Copy
3) Best Computer Copy
4) Better Client Copy
5) None of these



8. A(n) .................. contains text as well as information about the text
1) browser language
2) machine language
3) protocol language
4) markup language
5) annotated language

9. A pictorial representation that uses predefined symbols to describe either the logic of the computer program or the data flow and processing steps of a system is referred as :
1) Flow chart
2) Algorithm
3) Program
4) Protocol
5) None of these

10. A ........ is the term used when a search engine returns a web page that matches the search criteria
1) Blog
2) Hit
3) Link
4) View
 5) None of these

11. URL stands for ........
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator
4) Uniform Research Locator
5) None of these

12. The most frequently used instructions of a computer program are likely to be fetched from:
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these

13. What is a backup?
1) Restoring the information backup
2) An exact copy of a system's information
3) The ability to get a system up and running in the event of a system crash or failure
4) All of these
5) None of these

14. Which of the following statements is FALSE concerning file names?
1) Files may share the same name or the same extension but not both
2) Every file in the same folder must have a unique name
3) File extension is another name for file type
4) The file extension comes before the dot (.) followed by the file name
5) None of these

15. Verification of a login name and password is known as:
1) authorization  
2) accessibility
3) authentication
4) logging in  
5) None


16. Every computer has a(n) ........; many also have .........
1) Operating System; a client system
2) Operating system; instruction sets
3) Application programs; an operating  system
4) Application programs; a client system
5) Operating system; application programs

17. Which term identifies a specific computer on the web and the main page of the entire site
1) URL
2) Website Address
3) Hyperlink
4) Domain name
5) None of these

18. The altering of data so that it is not usable unless the changes are undone is ......
1) Bio metrics
2) Compression
3) Encryption
4) Ergonomics
5) None of these

19. ......... means that the data contained in a database is accurate and reliable.
1) Data redundancy
2) Data Integrity
3) Data Reliability
4) Data consistency
5) None

20. Device that take a picture of an object and convert it into a computerized image :
1) Hard drive
2) Scanner
3) Printer
4) Modem
5) Cable

21. Which of the following is not a search engine?
1) Bing
2) Baidu  
 3) Yahoo
4)  Safari
5) Ask

22. Which of the following window allows  entering values and formulas in the Excel ?
1) Title bar
2) Menu Bar
3) Formula Bar
4) Standard Tool Bar
5) None of these

23. Which of the following helps to store information in the computer?
1) Disk Drive
 2) Keyboard
3) Monitor
4) Printer
5) None of these

24. A computer virus normally attaches itself to another computer program known as :
1) Target program
2) Host program
3) Bluetooth
4) Front door program      
5) Trojan horse

25. A DVD is an example of a(n)
1) Hard disk
2) Optical disk
3) Output device
4) Solid-state storage device
5) None of these

26. Computer programs are written in a highlevel programming language; however, the human readable version of a program is called........
1) cache
2) instruction set
3) source code
4) word size
5) None of these

27. The software tools that enable a user to interact with a computer for specific  purposes are known as

1) Hardware
2) Networked Software
3) Shareware        
4) Applications    
5) None of these

28. A ......... is a set of rules.
1) resource locator
2) domain
3) hypertext
4) URL
5) protocol

29. The ......... file format is a method of encoding pictures on a computer.
1) HTML
2) JPEG
3) FTP
4) URL
5) DOC

30. The shortcut key for finding a word or a part of the word in MS word is :
1) Ctrl + M
2) Ctrl + S
3) Alt + M
4) Alt + K
5) Ctrl + F

31. Storage that retains its data after the power is turned off is referred to as
1) Volatile storage
2) Non-volatile storage
3) Sequential Storage
4) Direct storage
5) None of these

32. HTML stands for:
1) Hyper Text Mark-Up language
2) High Technology Mobile Language
3) Hyper Text Mobile Language
4) High Technology Mark-up Language
5) None of these

33. Which ports connect special types of  musical instruments to sound cards ?
1) BUS
2) CPU
3) USB
4) MIDI
5) MINI

34. Antivirus is an example of which of the  following?
1) An operating system
2) A business software
3) A security utility
4) An office suite
5) None


35. A computer checks the ......... of user names and passwords for a match before granting access.
1) Website
2) Network
3) Backup file
4) Database
5) None of these

36. Restarting a computer that is already on is referred to as:
1) shutting down
2) cold booting
3) warm booting
4) logging off
5) None of these

ANSWERS:


1-2; 2-1; 3-3; 4-2;  5-1;  6-2;  7-5;  8-4; 9-1;  10-2; 11-3;  12-2;  13-4;  14-4; 15-3;
16-5; 17-1; 18-3; 19-2;  20-2;  21-4;  22-3; 23-1;  24-5;  25-2;  26-3;  27-4;  28-5;  29-2;
30-5;  31-2;  32-1;  33-4;  34-3;  35-4;  36-3