Search This Blog

Thursday, July 4, 2013

COMPUTER AWARENESS PRACTICE MCQs

1. The ______ of a system includes the program or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these

2. In order to save a word document as a web page you need to?
1) Put the appropriate graphic and links on the document
2) Save the document in the simple text format
3) Use your web browser as an editor and save as URL
4) Save as HTML
5) None of these

3. Something which is easily understood instructions is said to be?
1) User friendly
2) Information
3) Word processing 
4) Icon
5) None of these

4. The copy command saves the data to which of the following?
1) The desktop
2) The clipboard
3) Microsoft word 
4) Paste
5) None of these

5. Arranging the data in a sequence is known as?
1) Classifying 
2) Searching
3) Sorting
4) Reproducing
5) None of these

6. Find the Mis-Matched pair ?
1) Chrome - Google
2) Opera - Opera Software
3) Internet Explorer - Microsoft
4) Safari - Net Scape Commu-nications
5) None of these

7. In order to save an existing document with a different name you need to?
1) Retype the document and give it a different name
2) Use the Save as command
3) Copy it to a new folder and then save
4) Use Windows Explorer to save
5) None of these

8. Which of the following is a graphics package?
1) Adobe page maker
2) Acrobat Reader
3) Microsoft word
4) Corel Draw
5) None of these

9. Plotter is very useful in applica-tions such as?
1) Computer aided design
2) Word processing
3) Financial accounting
4) Spell checking 
5) None

10. Data processing cycle consists of?
1) Input and output
2) Output and processing
3) Input, processing and output
4) Only input
5) None

11. 'MICR' technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition
2) Magnetic Intelligence Chara-cter Recognition
3) Magnetic Information Cable Recognition
4) Magnetic Cable Recognition
5) None of these

12. All the information collected during database development is stored in a?
1) Repository
2) Data warehouse 
3) RAD
4) CASE 
5) None of these

13. ___ is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit making it an efficient way to store data in memory.
1) DRAM
2) PRAM
3) NRAM
4) NORAM
5) None of these

14. What is the symbol for attachments in yahoo mail :
1) Envelope
2) Letter A
3) Paper Clip
4) Pen
5) None of these

15. To cover files from a backup you perform________ option
1) Scan 
2) Move
3) Copy 
4) Restore
5) None of these

16. The internet began with the development of?
1) Ethernet 
2) Internet
3) USENET
4) Extranet
5) ARPANET

17. Select the odd man out
1) Interpreter 
2) Programmer
3) Operating system
4) Assembler 
5) Utility 

18. The number of pixels displayed on a screen is known as the screen?
1) Resolution
2) Color depth
3) Refresh rate
4) Viewing size
5) None of these

19. Name the certifying authority of digital signatures in banking and financial sector?
1) The IDRBT Certifying Auth-ority
2) Individual Banks
3) Reserve Bank of India
4) Indian Bank's Association
5) None of these

20. Firewall in parlance of computer science is a method of?
1) Stopping unauthorized access
2) Making network more secure against banking attempts
3) Filtering the data that is going out of the network and coming in the network.
4) All the above 
5) None

21. Encryption is used in computers to?
1) Protect data from unauthor-ized access
2) Protect data from damaging
3) Prevent the computer from unauthorized users
4) All the above
5) None

Answers
1) 4; 2) 4; 3) 1; 4) 2; 5) 3; 6) 4; 7) 2; 8) 4; 9) 1; 10) 3;
11) 1; 12) 2; 13) 1; 14) 3; 15) 4; 16) 5; 17) 2; 18) 1; 19) 1; 20) 4; 21) 1.

Wednesday, July 3, 2013

COMPUTER KNOWLEDGE PRACTICE MCQs FOR RBI EXAM

1. Which computer has been designed to be as compact as possible?
1) Mini
2) Super computer
3) Micro computer
4) Mainframe
5) None of the above

2. The symbols used in an assembly language are
1) Codes
2) Mnemonics
3) Assembler
4) Literals
5) All of the above

3. Portrait and Landscape are
1) Page Orientation
2) Paper Size
3) Page Layout
4) Margin type
5) All of the above

4.Any storage device added to a computer beyond the immediately usable main storage is known as
1) Floppy disk
2) Hard disk
3) Backing store
4) Punched card
5) Magnetic Tape

5. Which output device is used for translating information from a computer into pictorial form on paper
1) Mouse
2) Plotter
3) Touch panel
4) Card punch
5) Keyboard

6.A computer assisted method for the recording and analyzing of existing or hypothetical systems is
1) Data transmission
2) Data flow
3) Data capture
4) Data processing
5) Data validation

7. Which access method is used for obtaining a record from a cassette tape?
1) Direct
2) Sequential
3) Random
4) ISAM
5) VSAM

8. Find the ODD one.
1) JAVA
2) Cobol
3) Fortran
4) Linux
5) ADA

9. The 2's compliment of a binary no. is obtained by adding.....to its 1's compliment.
1) 0
2) 1
3)10
4) 12
5) 13

10. With respect to a network interface card, the term 10/100 refers to
1) protocol speed
2) a fiber speed
3) megabits per seconds
4) minimum and maximum server speed
5) data capacity

11. The terms "red book", "yellow book", and "orange book" refer to:
1) SCSI
2) IDE
3) floppy drive technology
4) CD-ROM standards
5) SATA

12. In ROM BIOS, the acronym BIOS stands for:
1) Basic Intuitive Output Set
2) Basic Input Organizational System
3) Basic Input Output System
4) Basic Industry Operating System
5) Basic Input Output Set

13. Which DOS command will format a floppy disk and transfer the system files
1) SYS C: A:
2) SYS A:
3) FORMAT A: /S
4) FORMAT A: /T
5) SYS C:

14. Which command will be used to display file and directory names only, without size, date, and time information?
1) DIR/W
2) DIR A:
3) DIR/B
4) DIR/S
5) DIR

15. Which of the following is not a logical data-base structure?
1) tree
2) relational
3) network
4) chain
5) None of the above

16. Updating a database means
1) revising the file structure
2) reorganizing the database
3) modifying or adding record occurrences
4) Sorting
5) Indexing

17.Any and every command can be found on the
1) Drawing toolbar
2) Formatting toolbar
3) Standard toolbar
4) Menu bar
5) View toolbar

18. Which of the following should be used when you want to add a slide to an existing presentation?
1) File, add a new slide
2) Insert, new slide
3) File, open
4) File, new
5) None of the above

19. Which of the following items are examples of storage devices?
1) Floppy disks
2) CD-ROMs
3) Tape devices
4) Hard Disk
5) All of the above

20. The original ASCII code used .... bits of each byte, reserving that last bit for error checking
1) 5
2) 6
3) 7
4) 8
5) 16

21. Word length of a computer is measured in
1) Bytes
2) Millimeters
3) Meters
4) Bits
5) All the above

22. Which type of computers uses the 8-bit code called EBCDIC?
1) Minicomputers
2) Microcomputers
3) Mainframe computers
4) Super computer
5) Lap Tops

23. ATM terminals are example for
1) Smart Terminals
2) Intelligent terminals
3) Dumb terminals
4) Offline terminals
5) None of the above

24.A name or number used to identify a storage location is called
1) A byte
2) A record
3) An address
4) An instruction
5) All of above

25. The difference between memory and storage is that memory is .... and storage is .....
1) temporary, permanent
2) permanent, temporary
3) slow, fast
4) big, Small
5) None of the above

26. Offline device is
1) A device which is not  connected to CPU
2) A device which is connected to CPU
3) A direct access storage device
4) An I/O device
5) None of the above

27. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?
1) Memory address register
2) Memory data register
3) Instruction register
4) Program counter
5) Flag Register

28. Which American Computer Company is called Big Blue?
1) Microsoft
2) Compaq Corp
3) IBM
4) Tandy Stevenson
5) DELL

29.A term associated with the comparison of processing speeds of different computer system is:
1) EFTS
2) MPG
3) MIPS
4) CFPS
5) Bps

30. Daisy wheel printer is a type of
1) Matrix printer
2) Impact printer
3) Laser printer
4) Manual printer
5) Non impact printer

31. Serial access memories are useful in applications where
1) Data consists of numbers
2) Short access time is required
3) Each stored word is processed differently
4) Data naturally needs to flow in and out in a serial form
5) Data naturally needs to flow in
and out in a Random form

32. One of the main feature that distinguish microprocessors from micro-computers is
1) Words are usually larger in microprocessors
2) Words are shorter in microprocessors
3) Microprocessor does not contain I/O devices
4) Exactly the same as the machine cycle time
5) None of the above

33. Example of non-numeric data is..
1) Employee Name
2) Test score
3) Bank Account No.
4) Phone No
5) All the above

34. Numbers in table columns are usually...
1) right-aligned
2) left-aligned
3) justified
4) centered
5) None of the above

35. Most Web sites have a main page known as ........, which acts as a doorway to the rest of the Website pages.
1) search engine
2) home page
3) browser
4) URL
5) Domain

36.A software program that extends the capabilities of your browser in a specific way is known as
1) Plugin
2) Browser software
3) Cookies
4) Applets
5) None of the above

37. Internet is example of
1) LAN
2) MAN
3) WAN
4) SAN
5) CAN

38. ......... refers to maintaining and assuring the accuracy and consistency of data
1) Data redundancy
2) Data inconsistency
3) Data integrity
4) Data independence
5) All the above

39. ........... is a data model for describing a database in an abstract way
1) Data Flow Diagram
2) Flow chart
3) ER-Diagram
4) System chart
5) Network chart

40. Mechanism to protect private network from outside attack is
1) Firewall
2) Antivirus
3) Digital Signature
4) Formatting
5) Tunneling

41. The concept of electronic cash is execute payment by
1) Credit card
2) ATM card
3) Using computers over Network
4) Cheque
5) Debit card

42.Amazon.com comes under the following model
1) B2B
2) B2C
3) C2C
4) C2B
5) None of the above

43. A device that forwards data packets from one network to another is called a
1) Bridge
2) Router
3) Gateway
4) Switch
5) Repeaters

44. Tool that is used to transfer data/ files among computers on the internet
1) FTP
2) TCP
3) Archie
4) Gopher
5) POP

45. ........... is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication
1) Spoofing
2) Hacking
3) Phishing
4) Whaling
5) None of the above

46.A huge collection of information arranged for quick retrieval by computer is known as a
1) Deep web
2) Search Engine
3) Data base
4) URL
5) All the above

47. When using Internet sources, asking whether the site is inwardfocused or outward - focused helps to determine
1) Expertise
2) Objectivity
3) Accuracy
4) Purpose
5) Functionality

48. Network Interface card address is known as
1) IP address
2) MAC address
3) FTP address
4) LAN address
5) System address

49. In keyboard modifier keys are
1) Alt, Shift, Ctrl
2) PgUP, Alt, Ctrl
3) Home, Alt, Ctrl
4) Del, End, Alt
5) Tab, End, Alt

50. ASCII value of ‘D’ is
1) 66
2) 68
3) 74
4) 65
5) 64

51. In SD memory cards SD stands for
1) Standard Digital
2) Secure Digital
3) Secondary
4) Standard Data
5) Secure Data

52. What is the short cut key to open the Open dialog box?
1) F12
2) Shift F12
3) Alt + F12
4) Ctrl + F12
5) F11


ANSWERS:

1-3, 2-2, 3-1, 4-3, 5-2, 6-2, 7-2, 8-4, 9-2, 10-3
11-4, 12-3, 13-3, 14-3, 15-4, 16-3, 17-4, 18-2, 19-5, 20-3
21-4, 22-3, 23-1, 24-3, 25-1, 26-1, 27-4, 28-3, 29-3, 30-2
31-4, 32-3, 33-1, 34-1, 35-2, 36-1, 37-3, 38-3, 39-3, 40-1
41-3, 42-2, 43-2, 44-1, 45-3, 46-3, 47-3,  48-2, 49-1 50-2, 51-2, 52-4.