Search This Blog

Saturday, July 20, 2013

COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR BANK EXAMS

1. Which of the following is NOT a characteristic of E-mail?
1) Low cost
2) Record maintenance in database
3) High speed
4) Waste Reduction (writing paper)
5) None

2. What are dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information
3) A computer reserved for special task
4) Both (1) & (2)
5) None of these

3. What are non dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information only
3) A computer reserved for special task
4) Both (2) & (3)
5) None of these

4. G3 is a
1) Computer
2) Cable
3) Chip
4) Mother board
5) None of these

5. One of the oldest calculating device was?
1) Arithmometer
2) Ready reckoner
3) Abacus
4) Both (1) & (2)
5) None of these

6. The first-generation computers had?
1) Vacuum tubes and magnetic drum
2) Magnetic tape and transistors
3) Ics
4) Either (1) or (3)
5) All of these

7. Which of the following is false about change in computer from one generation to the next?
1) Computer size is decreased
2) Speed of processing increases
3) Memory / storage capacities decreases
4) Both (1) & (3) 5) None of these

8. Which of the following is NOT false about GUIs?
1) They make computers easier to use for laymen
2) Icons and menus can be selected with a mouse
3) were first introduced by MACs
4) All of these are true
5) None of these

9. To make a program safe we should take care of:
1) Strong authentication and access controls
2) Error checking controls
3) Do risk analysis
4) Either (1) or (2)
5) All of these

10. Which of them is a must for understanding the organisation's business risks associated with using router
1) Network Architecture
2) Network traffic management
3) Network security
4) Either (2) or (3)
5) All of these

11. We are shifting towards computerization because
1) Current technologies are available
2) Technologies help in meeting the business objectives
3) Hire the employees that are expert in the latest technologies are available
4) Both (1) & (2)
5) None of these

12. Who is responsible for developing the intranet strategy and monitoring its policies?
1) Intranet administrator 2) Webmaster
3) Editor 4) Both (2) & (3)
5) None of these

13. Network layers function is to
1) Select paths for data transfer
2) Break the Network in to subnet
3) Determine the IP
4) Either (2) or (3)
5) All of these

14. Which of the following makes a network insecure?
1) Encryption
2) Network Interface Card (NIC)
3) Static keys
4) Both (2) & (3)
5) None of these

15. If the network of the company is to be protected from remote access that may damage company's reputation due to misuse of information then security policy would/ should include
1) All employees
2) Only the employer
3) Contractors
4) Either (1) or (2)
5) All of these

16. Project management will be made a separate division on the basis of:
1) Interdependencies among departments
2) Sharing of resources
3) Size of the project
4) Either (2) or (3)
5) All of these

17. Various kinds of e-mail threats-mails containing racist, sexual content are example of .....
1) Spam
2) International leakage
3) International tampering
4) Offensive contents
5) None of these

18. Artificial Intelligence can be used in everysphere of life because of its....
1) Ability to work in hazardous places
2) Ability to think like human beings
3) Ability to work in artificial environments
4) All of the above
5) None of these

19. The Steering Committee is made for
1) Reviewing user requirements and ensuring that all controls are considered.
2) Strategic planning for computer installation
3) Evaluating specific project plans for systems
4) Both (1) and (2)
5) None of these

20. In an IT division specific measures were introduced to improve on quality. However effectiveness of these measures can't be ascertained by simply
1) Increased user satisfaction
2) An increase in the quality assurance budget
3) A reduction in the maintenance cost ofthe application
4) Either (1) or (2)
5) All of these

21. Efficient system requirement analysis is required for:
1) Reverse engineering
2) Joint Application Design (JAD)
3) Traditional System development life cycle
4) Either (1) or (3)
5) All of these

22. Which of the following statements is NOT correct for structured programming concepts and modularity?
1) Interaction between modules should be minimal
2) Modules should have only one entry and one exit point
3) Modularity means program segmentation
4) Both (1) and (2)
5) None of these

23. Software quality assurance is for
1) Error prevention
2) Error detection
3) Error correction 4) Either (1) or (3)
5) All of these

24. Which of the following methods is NOT required for telecommunication continuity?
1) Alternative routing
2) Diverse routing
3) Satellite routing
4) All of these
5) None of these

25. The client is called .... in 2 tier architecture.
1) Fat client
2) Thin client
3) Very thin client
4) Either (1) or (2)
5) Cannot say

ANSWERS:
1-2, 2-3, 3-1, 4-3, 5-3, 6-1, 7-3, 8-4, 9-5, 10-4
11-4, 12-2, 13-4, 14-1, 15-1, 16-5, 17-1, 18-4, 19-4, 20-3
21-5, 22-4, 23-5, 24-2, 25-1

Friday, July 19, 2013

COMPUTER KNOWLEDGE PRACTICE MCQs

1. Computer network is a? 
a) A distributed data processing system 
b) Multiple computers are linked together for the purpose of data communication and reso-urce sharing 
c) Both (A) & (B) are false 
d) Both (A) & (B) are true 
e) None of these 

2. Which of the following will be used for checking spelling? 
a) Dictionary Disk 
b) Index disk 

c) Directory Disk 
d) None of these 
e) All the above 

3. Internet Banking is an example of? 
a) Electronic funds transfer (EFT) 
b) EDP (electronic data processing) 
c) EBCDIC 

d) ASCII 
e) None of these 

4. Anonymous FTP is? 
a) Internet file transfer protocol 
b) Protocol that requires password 
c) Not access to the files 
d) None

e) All of the above 

5. Archive is a? 
a) Backup storage 
b) Forward operation 
c) Primary storage 
d) None 

e) All the above

6. CPU performs read/write opera-tions at any point of time in? 
a) ROM b) PROM
c) EPROM d) RAM 
e) None of these

7. BIOS is an abbreviation for? 
a) Binary Input/Binary Output 
b) Binary synchronous 
c) Binary digit 
d) None of these 
e) All the above 

8. Most common channel used by networks today is?
a) Internet 

b) Telephone lines
c) Satellite 

d) Mail 
e) None of these 

9. What is the product of data processing? 
a) Data 

b) Information 
c) Software 

d) A computer 
e) None of these 

10. A source program is the program written in which language? 
a) English 

b) Symbolic 
c) High - level 

d) Machine 
e) None of these 

11. To be information, data must be? 
a) factual 

b) relevant 
c) news 

d) All the above 
e) None of these

12. Thick - film ICs use ____ technique?
a) Screen printing 
b) Cathode sputtering 
c) Monolithic 
d) Hybrid 

e) None 

13. A collection of Eight bits is called? 

a) byte 
b) word 
c) record
 d) file 
e) None of these 

14. What is a microprocessor? 
a) Same as a micro computer 
b) A small piece of equipment
c) A small device that controls other equipment 
d) A way of doing something fast 
e) None of these 

15. The microelectronics is the technology of?
a) microprocessor 
b) microcomputers 
c) Chips 
d) automatic processing 
e) None of these 

16. The processor of a computer system is called it's?
a) Nerve centre 
b) Eye 

c) Brain 
d) Ear 

e) None of these 

17. What are the two major types of computer chips? 
a) External memory 
b) Primary memory chip 
c) Microprocessor chip 
d) Both (B) and (C) 
e) None of these 

18. Who built the first computer mouse?
a) Doughlas Engelbart
b) William English 
c) Daniel Cougher 
d) Robert Zawacki 

e) None 

19. What is a Kimball tag? 
a) An address label 
b) A gift token 
c) A security key 
d) An input medium 
e) None 

20. Dot - matrix is a type of? 
a) tape 

b) printer 
c) Disk

d) Bus 
e) None of these 

21. What are the concentric circles on floppy disks know as? 
a) Tracks 

b) Cylinders 
c) Sectors 
d) Segments 
e) None of these 

22. What does the disk drive of a computers do? 
a) Rotate the disk 
b) Read the disk
c) Load a program from the disk into the memory 
d) Both (B) and (C) 
e) None of these 

23. A ___ is a computer connected to two networks? 
a) link

b) server 
c) gateway 

d) bridge way 
e) None of these 

Answers:

1) d; 2) a; 3) a; 4) a; 5) a; 6) c; 7) a; 8) b; 9) b; 10) c; 

11) b; 12) a; 13) a; 14) c; 15) c; 16) c; 17) d; 18) b; 19) d; 20) b; 21) a; 22) d; 23) b;