Search This Blog

Sunday, September 7, 2014

COMPUTER KNOWLEDGE PRACTICE QUESTIONS FOR SBI P.O. EXAM

1. Which of the following condition is used to transmit two packets over a medium at the same time?
1) Contention
2) Collision
3) Synchronous
3) Asynchronous
5) None of the above

2. Which of the following is not an option of the spelling dialog box?
1) Ignore
2) Ignore all
3) Edit
4) Change
5) Select

3. Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
1) 4
2) 8
3) 16
4) 15
5) 32

4. A message with replies on a newsgroup is often called a _____
1) post
2) list
3) thread
4) comment
5) format

5. Which of the following network is used to connect a number of computers to each other by cables in a single location?
1) WAN
2) LAN
3) GAN
4) PAN
5) MAN

6. News servers utilize _____ to distribute documents to readers.
1) NNTP
2) NEWS
3) HTTP
4) FTP
5) HTML

7. The Software which contains rows and columns is called ___
1) Database
2) Drawing
3) Word processing
4) Spreadsheet
5) All the above

8. Addresses separate the user name from the ISP using the ____ symbol.
1) &
2) @
3) %
4) *
5) $

9. The ___ layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames
a) Data Link
b) Physical
c) Network
d) Session
e) MAC

10. The spelling tool is placed on ___ toolbar
1) Standard
2) Formatting
3) Drawing
4) Reviewing
5) Viewing

11. The maximum size of the window in a Sliding Window Protocol is _____
1) 2m + 1
2) 2m
3) 2(m-1)
4) 2m*1
5) 2m - 1

12. A name in the ____ name space is a sequence of characters without structure
1) address
2) oman
3) flat
4) Both a and b
5) location

13. Which of the following is not a valid Zoom percentage in Excel?
1) 10
2) 100
3) 300
4) 500
5) 750

14. Distance Vector Routing is a ____ routing algorithm; it consists of a data structure called a ____
1) Static, routing table
2) Dynamic, look-up table
3) Dynamic, routing table
4) Static, look-up table
5) dynamic, less table

15. What is the short cut key to replace a data with another in sheet?
1) Ctrl + R
2) Ctrl + Shift + R
3) Ctrl + H
4) Ctrl + F
5) Ctrl + V

16. The ___ protocol is based on end-toend delivery.
1) SCTP
2) TCP
3) SMTP
4) SCTP
5) HTTP

17. If you need to change the typeface of a document, which menu will you choose?
1) Edit
2) View
3) Tools
4) File
5) Format

18. What is the size of Network bits & Host bits of Class A of IP address?
1) Network bits 7, Host bits 24
2) Network bits 8, Host bits 24
3) Network bits 7, Host bits 23
4) Network bits 8, Host bits 23
5) Network bits 4, Host bits 25

19. ____ is a uniform naming scheme for locating resources on the web.
1) URI
2) HTTP
3) WEBNAME
4) RESOURCENAME
5) URL

20. The options like Relationship, SQL Server etc. are found in ___
1) External data tab
2) Database tools tab
3) Create tab
4) Home tab
5) Format tab

21. A Database Language Concerned with the Definition of the Whole Database Structure and Schema is ____
1) DCL
2) DML
3) DDL
4) DCO
5) DDI

22. A ____ Enables You To View Data From A Table Based On A Specific Criterion
1) Form
2) Query
3) Macro
4) Report
5) Bug

23. A____ normal form normalization will be needed where all attributes in relation tuple are not functionally dependent only on the key attribute.
1) First
2) Second
3) Third
4) Fourth
5) Fifth

24. An outstanding functionality of SQL is its support for automatic ____ to the target data.
1) programming
2) functioning
3) navigation
4) notification
5) none of these

25. The hardware component used to control the operation of a computer system is:
1) Ram
2) Processor
3) Keyboard
4) Hard disk
5) Monitor

26. Which output device is suited to presenting information that is likely to change very frequently?
1) Sound card
2) Monitor
3) Plotter
4) Printer
5) COM

27. Which is the most difficult environmentally to dispose of?
1) Floppy drives
2) Hard drives
3) Power supplies
4) CRTs
5) System boards

28. Which type of system hoard is the MOST likely candidate for processor upgrading if you want maximum performance and future compatibility?
1) ML
2) PCI
3) ISA
4) EISA
5) ISO

29. Which of the following is a type of preventative maintenance used on a hard drive?
1) Disk check diagnostics
2) Head alignment diagnostics
3) Initializing
4) Uninstalling programs
5) None of the above

30. How many IRQs does a chain of USB devices require?
1) 1
2) 2
3) 3
4) 4
5) 5

31. Which of the following addressing modes, facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears?
1) ascending
2) sorting
3) index
4) indirect
5) direct

32. Which command will be used with vi editor to replace text from cursor to right?
1) r
2) R
3) s
4) S
5) Q

33. Which of the following is not a filter?
1) cat
2) grep
3) wc
4) sort
5) None of the above

34. Which of the following commands is used to view your file 24 lines at a time?
1) pg
2) cat
3) //p
4) /p
5) ///p

35. The rise time of a pulse waveform is the time required for the voltage to rise:
1) from zero to its rms value
2) from zero to its peak value
3) from 10% of the peak value to 70.7% of the peak value
4) from 10% of the peak value to 90% of the peak value
5) from 10% of the peak value to 80% of the peak value

36. Holes are the minority carriers in which type of semiconductor?
1) Extrinsic
2) Intrinsic
3) n-type
4) p-type
5) m-type

37. While working with MS-DOS, which command is used to restore files that were backed up using the BACKUP command?
1) COPY
2) DISKCOPY
3) RESTORE
4) STORE
5) DELETE

38. Which of the following commands will take you directly to the root directory no matter what subdirectory you are currently in?
1) CD \root
2) CD\
3) CD\..
4) CD..
5) CD\\..

39. Batch files contain a group of MSDOS commands that are run in successive order. What filename extension identifies batch files?
1) COM
2) BAT
3) EXE
4) SYS
5) DOC

40. The _____ command allows you to modify the default prompt to provide other information
1) prompt
2) windows
3) cursor
4) click
5) double click

ANSWERS:
1) 2; 2) 3; 3) 4; 4) 3; 5) 5; 6) 1; 7) 4; 8) 2; 9) 1; 10) 1 ;
11) 5; 12) 3; 13) 4; 14) 3; 15) 3; 16) 3; 17) 5; 18) 1; 19) 1: 20) 2;
21) 3; 22) 2; 23) 3; 24) 3; 25) 2; 26) 2; 27) 4; 28) 2; 29) 1; 30) 1;
31) 3; 32) 2; 33) 5; 34) 1; 35) 4; 36) 3; 37) 3; 38) 2; 39) 2; 40) 1;

Wednesday, September 3, 2014

COMPUTER AWARENESS PRACTICE MCQs FOR SBI P.O. EXAM 2014

1. Person, who design, program, operates and maintains computer equipment refers to:
a) Console-operator
b) Programmer
c) People ware
d) System Analyst
e) User

2. Who invented the high level language C?
a) Dennis M. Ritchie
b) Niklaus Writh
c) Seymour Papert
d) Donald Kunth
e) A.R John

3. Which of the following is the product of data processing?
a) Information
b) Data
c) Software program
d) System
e) Hardware program

4. How many units in a single bus structure will communicate at a time?
a) 1
b) 2
c) 3
d) 16
e) 32

5. A microcomputer consists of at least an input unit, an output unit, microprocessor unit and a ___
a) stabilizer
b) memory unit
c) printer
d) network
e) monitor

6. For each instructions of program in memory the CPU goes through a ___
a) decode - fetch - execute sequence
b) execute - store - decode sequence
c) fetch - decode - execute sequence
d) fetch - execute - decode sequence
e) None of these

7. The database environment has all of the following components except:
a) Users
b) Database
c) Database administrator
d) Database programmer
e) Separate files

8. Which of the following technique provides dedicated communication channel between two stations?
a) Circuit switching
b) Packet switching
c) Network switching
d) Switch network
e) Modem switching

9. End-to-end connectivity is provided from host-to-host in ___
a) Network layer
b) Session layer
c) Data link layer
d) Transport layer
e) Mac layer

10. A source program is the program written in ____ language.
a) English
b) symbolic
c) high level
d) object
e) French

11. Which of the following is a computer device that primarily used to provide hardcopy?
a) CRT
b) Line printer
c) Computer console
d) Card reader
e) Pen drive

12. In magnetic disks data is organized on the platter in a concentric sets or rings called ___
a) sector
b) track
c) head
d) block
e) bug

13. The memory which is programmed at the time it is manufactured is ___
a) ROM
b) RAM
c) PROM
d) EPROM
e) PRAM

14. In comparison to the internal (main) memory, tape or disk memory is ___
a) slower and more expensive
b) slower and less expensive
c) faster and more expensive
d) faster and less expensive
e) None of these

15. A distributed network configuration in which all data/ information pass through a central computer is ___
a) bus network
b) duplex
c) multiplex
d) multiple
e) star network

16. The process of copying data from a memory location is called ___
a) reading
b) writing
c) controlling
d) booting
e) calling

17. Which of the following is true about primary storage?
a) It is a part of the CPU
b) It allows very fast access to data
c) It is relatively more expensive
d) All of the above
e) None of these

18. 100110 - This binary representation is numerically equivalent to:
a) The decimal representation 46
b) The hexadecimal representation 46
c) The binary representation 26
d) The octal representation 26
e) The octal representation 46

19. Administrative supervision of database activities is the responsibility of ___
a) Data base administrator
b) DP Manager
c) DB Manager
d) VP-DP administrator
e) DO Manager

20. Transmission of computerised data from one location to another is called ___
a) data transfer
b) data flow
c) data communication
d) data management
e) Any of the above

21. Which of the following case does not exist in complexity theory?
a) Best case
b) Worst case
c) Average case
d) a, b and c
e) Null case

22. The indirect change of the values of a variable in one module by another module is called ___
a) Internal change
b) Inter-module change
c) Side effect
d) Side-module update
e) Top-module update

23. By default, your documents print in ____ mode.
a) landscape
b) portrait
c) page setup
d) print view
e) page layout

24. Which of the following is not available on the Ruler of MS Word screen?
a) Tab stop box
b) Left Indent
c) Right Indent
d) Canter Indent
e) All of them are available on ruler

25. Which American Computer Company is called big blue?
a) Microsoft
b) Compaq Corp
c) IBM
d) Tandy Stevenson
e) Samsung

26. Which of the following is a computer package for preparing/ typing letters/ documents?
a) Word
b) Excel
c) Power Point
d) Windows
e) Adobe Reader

27. Which of the following is true regarding Referential Integrity?
a) Every primary-key value must match a primary-key value in an associated table
b) Every primary-key value must match a foreign-key value in an associated table
c) Every foreign-key value must match a primary-key value in an associated table
d) Every foreign-key value must match a foreign-key value in an associated table
e) None of these

28. If every non-key attribute is functionally dependent on the primary key, the relation will be in ___
a) First Normal Form
b) Second Normal Form
c) Second Formal Form
d) First Formal Form
e) Third Normal Form

29. A desktop computer is also known as a ___
a) PC
b) Laptop
c) Palmtop
d) Mainframe
e) System

30. What does the DOCTYPE declaration defines in HTML?
a) It defines the document Property
b) It defines the document Type
c) It defines the document Size
d) It defines the document Style
e) It defines the document colour

31. In which mode Windows starts with only the core drivers and services?
a) Safe Mode
b) Quick Mode
c) Normal Mode
d) Repair Mode
e) Continue Mode

32. To "Debug" the System means:
a) Find the Correct Software
b) Find the Correct Hardware
c) Find and Install correct System
d) Find and Correct Errors on System
e) Find and fix the Errors on System

33. In Computer Architecture a Bus is ____
a) A collection of various software
b) A collection of various computers
c) A collection of shared communication wires
d) A collection of chairs where the user sits
e) All the above

34. While starting Window XP/7 extra booting options can be shown by pressing
a) F1
b) F8
c) F9
d) F12
e) F11

35. Which of the following is used to add comments in PHP?
a) //
b) /* … */
c) & … &
d) Only a & b
e) All the above

36. How PHP files can be accessed?
a) Through Web Browser
b) Through HTML files
c) Through Web Server
d) Through Internet Server
e) Through .Net Server

37. The first network that planted the seeds of network was?
a) ARPANET
b) NSF net
c) I net
d) V net
e) N net

38. The small size animated pictures moving on WebPages are called?
a) Media
b) Flash
c) Podcast
d) Kris
e) Drag

39. Which of the following is a domain name?
a) .NET
b) .ORG
c) .GOV
d) .IN
e) All the above

40. Firewall is used to prevent unauthorized access from both the sides as software and ___
a) Hardware
b) Malware
c) Spyware
d) Freeware
e) Menswear

41. The unsolicited and bulk mails in e-Mail is called?
a) Spam
b) Scan
c) Storm
d) Virus
e) Trash

42. Graphical pictures that represent an object file, folder, ... are called ___
a) Desktop
b) Icons
c) Windows
d) Taskbar
e) Menus

43. Which of the following keys create symbol copyright as ©?
a) Alt + ctrl + d
b) Alt + Shift + c
c) Ctrl + alt + c
d) Alt +del+ c
e) Alt+ break +c

44. To move to the beginning of a line of text, press the ___ key.
a) Home
b) A
c) Page up
d) Enter
e) Page down

45. Who is responsible for "traffic directing" on Internet?
a) Hub
b) Repeater
c) Router
d) Switch
e) Gateway

ANSWERS:
1) c; 2) a; 3) a; 4) b; 5) b; 6) c; 7) e; 8) a; 9) d; 10) c;
11) b; 12) b; 13) a; 14) b; 15) e; 16) a; 17) d; 18) e; 19) a; 20) c;
21) e; 22) c; 23) b; 24) d; 25) c; 26) a; 27) c; 28) e; 29) a; 30) b;
31) a; 32) d; 33) c; 34) b; 35) d; 36) c; 37) a 38) b; 39) e; 40) a;
41) a; 42) b 43) c; 44) a; 45) c;