Search This Blog

Wednesday, July 24, 2013

COMPUTER KNOWLEDGE PRACTICE MCQs FOR IBPS EXAM

1. Data or information used to run the computer is called?
a) Software
b) Hardware 
c) Peripheral
d) CPU 
e) None of the above 

2. To memories the e- mail address one should use?
a) Browser 
b) Search engine 
c) Birthday list 
d) Phone book 
e) Add book 

3. A Hardware device that converts data into meaningful information
a) Protector 
b) Output device 
c) Input device 
d) Program 
e) Processor 

4. What from the following refers to the people, related to computing process?
a) Hardware 
b) Human ware 
c) Software
 d) Firmware 
e) Peripherals 

5. Which of the following is not an example of storage device? 
a) CD 
b) Floppy 
c) Hard disk
d) RAM 
e) DVD 

6. Today, the common form of RAM is built from?
a) Transistors 
b) Vacuum tubes 
c) Semiconductors IC's 
d) Super conductor IC's 
e) None 

7. Benefit of DRAM is ___ 
a) It is cheaper than SRAM 
b) It can store more than SRAM 
c) It is faster than SRAM
d) Data in it can easily be erased than in SRAM 
e) None 


8. Following all are related to spread sheet except?
a) Work sheet 
b) Sell 
c) Formula 
d) Virus detection 
e) None of these 

9. Which element is appropriate for the set of instructions, by which computer performs more than one task?
a) Hardware 
b) Software 
c) Human ware 
d) Firmware 
e) None of these 

10. Which of the following is both output and input? 
a) Printer 
b) Speaker 
c) Modem 
d) monitor 
e) Scanner 

11. A Special software that is used to create a job queue is called_____ 
a) Drive 
b) Spooler 
c) Interpreter
d) Linkage editor 
e) None 

12. Which one of the items listed below is not one of the software engineering layers?
a) Process 
b) Manufacturing 
c) Method 
d) Tools 
e) None 

13. What is the first stage in program development? 
a) Specification and design 
b) System Analysis 
c) Testing 
d) None of the above 
e) All of these 

14. By means of a data flow diagram the analyst can detect ____ 
a) Task duplication 
b) Unnecessary delays 
c) Task overlapping 
d) All of the above 
e) None of the above 

15. Virtual memory is ___ 
a) Related to virtual reality 
b) A form of ROM 
c) A form of RAM 
d) None of the above 
e) All of these 

16. What does RAM stands for? 
a) Read Access Memory 
b) Read Anywhere Memory 
c) Random Anything Memory
d) Random Access Module 
e) Random Access Memory 

17. For transferring file and exchanging messages, which utility is used?
a) Web browser
 b) WWW 
c) e - mail 
d) Hyper text 
e) Search engine 

18. The three main parts of a processor are..? 
a) ALU, control unit and register 
b) ALU, control unit and RAM 
c) Case, control unit and register
d) Control unit, Register and RAM 
e) RAM, ROM and CD- ROM 

19. Which of the following is the second largest unit of RAM? 
a) Terabyte 
b) Megabyte 
c) Byte 
d) Giga byte 
e) None of these 

20. What is present in motherboard that connects CPU with other parts on motherboard?
a) Input unit 
b) System bus 
c) ALU 
d) Primary memory 
e) None of these 

21. ___ servers stores and manage files for network users 
a) Authentication 
b) Main 
c) Web 
d) File 
e) None of these 

22. The OSI model is divided into ____ process called layers 
a) five 
b) six 
c) seven 
d) eight 
e) None of these 

23. System software is a set of programs that enables your computer's hardware devices and ____ software to work together.
a) management
b) Processing 
c) utility 
d) application
e) None of these 

24. In a ring topology, the computer in possession of the ____can transmit data 
a) packet 
b) data 
c) access method 
d) token 
e) None of these 

25. ____ viruses are often transmitted by a floppy disk left in the floppy drive 
a) Trojan horse 
b) Boot sector 
c) Script 
d) logic bomb 
e) None of the above 

26. ____ controls the way in which a computer system functions and provides name by which users can interact with the computer 
a) The platform 
b) Application software 
c) operating software 
d) The Mother board 
e) None 

27. Servers are components that provide resources to other computers connected to a.. 
a) mainframe 
b) network 
c) super computer 
d) client 
e) None of these 

Answers:
1) a; 2) e; 3) e; 4) b; 5) d; 6) c; 7) a; 8) d; 9) b; 10) d; 
11) b; 12) b; 13) d; 14) d; 15) c; 16) e; 17) c; 18) a; 19) d; 20) b; 
21) d; 22) c; 23) d; 24) d; 25) b; 26) c; 27) b. 

Saturday, July 20, 2013

COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR BANK EXAMS

1. Which of the following is NOT a characteristic of E-mail?
1) Low cost
2) Record maintenance in database
3) High speed
4) Waste Reduction (writing paper)
5) None

2. What are dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information
3) A computer reserved for special task
4) Both (1) & (2)
5) None of these

3. What are non dedicated servers?
1) A workstation that can double up as server
2) A machine sharing information only
3) A computer reserved for special task
4) Both (2) & (3)
5) None of these

4. G3 is a
1) Computer
2) Cable
3) Chip
4) Mother board
5) None of these

5. One of the oldest calculating device was?
1) Arithmometer
2) Ready reckoner
3) Abacus
4) Both (1) & (2)
5) None of these

6. The first-generation computers had?
1) Vacuum tubes and magnetic drum
2) Magnetic tape and transistors
3) Ics
4) Either (1) or (3)
5) All of these

7. Which of the following is false about change in computer from one generation to the next?
1) Computer size is decreased
2) Speed of processing increases
3) Memory / storage capacities decreases
4) Both (1) & (3) 5) None of these

8. Which of the following is NOT false about GUIs?
1) They make computers easier to use for laymen
2) Icons and menus can be selected with a mouse
3) were first introduced by MACs
4) All of these are true
5) None of these

9. To make a program safe we should take care of:
1) Strong authentication and access controls
2) Error checking controls
3) Do risk analysis
4) Either (1) or (2)
5) All of these

10. Which of them is a must for understanding the organisation's business risks associated with using router
1) Network Architecture
2) Network traffic management
3) Network security
4) Either (2) or (3)
5) All of these

11. We are shifting towards computerization because
1) Current technologies are available
2) Technologies help in meeting the business objectives
3) Hire the employees that are expert in the latest technologies are available
4) Both (1) & (2)
5) None of these

12. Who is responsible for developing the intranet strategy and monitoring its policies?
1) Intranet administrator 2) Webmaster
3) Editor 4) Both (2) & (3)
5) None of these

13. Network layers function is to
1) Select paths for data transfer
2) Break the Network in to subnet
3) Determine the IP
4) Either (2) or (3)
5) All of these

14. Which of the following makes a network insecure?
1) Encryption
2) Network Interface Card (NIC)
3) Static keys
4) Both (2) & (3)
5) None of these

15. If the network of the company is to be protected from remote access that may damage company's reputation due to misuse of information then security policy would/ should include
1) All employees
2) Only the employer
3) Contractors
4) Either (1) or (2)
5) All of these

16. Project management will be made a separate division on the basis of:
1) Interdependencies among departments
2) Sharing of resources
3) Size of the project
4) Either (2) or (3)
5) All of these

17. Various kinds of e-mail threats-mails containing racist, sexual content are example of .....
1) Spam
2) International leakage
3) International tampering
4) Offensive contents
5) None of these

18. Artificial Intelligence can be used in everysphere of life because of its....
1) Ability to work in hazardous places
2) Ability to think like human beings
3) Ability to work in artificial environments
4) All of the above
5) None of these

19. The Steering Committee is made for
1) Reviewing user requirements and ensuring that all controls are considered.
2) Strategic planning for computer installation
3) Evaluating specific project plans for systems
4) Both (1) and (2)
5) None of these

20. In an IT division specific measures were introduced to improve on quality. However effectiveness of these measures can't be ascertained by simply
1) Increased user satisfaction
2) An increase in the quality assurance budget
3) A reduction in the maintenance cost ofthe application
4) Either (1) or (2)
5) All of these

21. Efficient system requirement analysis is required for:
1) Reverse engineering
2) Joint Application Design (JAD)
3) Traditional System development life cycle
4) Either (1) or (3)
5) All of these

22. Which of the following statements is NOT correct for structured programming concepts and modularity?
1) Interaction between modules should be minimal
2) Modules should have only one entry and one exit point
3) Modularity means program segmentation
4) Both (1) and (2)
5) None of these

23. Software quality assurance is for
1) Error prevention
2) Error detection
3) Error correction 4) Either (1) or (3)
5) All of these

24. Which of the following methods is NOT required for telecommunication continuity?
1) Alternative routing
2) Diverse routing
3) Satellite routing
4) All of these
5) None of these

25. The client is called .... in 2 tier architecture.
1) Fat client
2) Thin client
3) Very thin client
4) Either (1) or (2)
5) Cannot say

ANSWERS:
1-2, 2-3, 3-1, 4-3, 5-3, 6-1, 7-3, 8-4, 9-5, 10-4
11-4, 12-2, 13-4, 14-1, 15-1, 16-5, 17-1, 18-4, 19-4, 20-3
21-5, 22-4, 23-5, 24-2, 25-1