Search

Monday, October 31, 2011

BANK PO COMPUTER SET 1

1. Which of the following is a part of the Central Processing Unit?
a. Printer
b. Key boad
c. Mouse
d. Arithmetic & Logic unit
e. None of these

2. CAD stands for
a. Computer aided design
b. Computer algorithm for design
c. Computer application in design
d. All of the above
e. None of these

3. Which of the following printer cannot print graphics?
a. Ink-jet
b. Daisy Wheel
c. Laser
d. Dot-matrix
e. None of these

4. A program written in machine language is called?
a. Assembler
b. Object
c. Computer
d. Machine
e. None of these

5. The father of Modern Computer is
a. Charles Babbage
b. Von-nuumann
c. Danies Ritchel
d. Blaise Pascal
e. None of these

6. The Word FTP stands for
a. File Translate Protocol
b. File Transit Protocol
c. File Transfer protocol
d. file typing protocol
e. None of these

7. The lowest form of Computer language is called
a. BASIC
b. FORTRAN
c. Machine Language
d. COBOL
e. None of these

8. Best Quality graphics is produced by
a. Dot Matix
b. Laser Printer
c. Inkjet Printer
d. Plotter
e. None of these

9. Memory which forgets everything when you switch off the power is known as
a. Corrupted
b. Volatile
c. Non-Volatile
d. Non-Corrupted
e.None of these

10.The linking of computers with a communication system is called
a. Networking
b. Pairing
c. Interlocking
d. Assembling
e. Sharing

11. The 16 bit Microprocessor means that it has
a. 16 address lines
b. 16 Buses
c. 16 Data lines
d. 16 routes
e. None of these

12. Data going into the computer is called
a. Output
b. algorithm
c. Input
d. Calculations
e. flow chart

13. Which of the following refers to a small, single-site network?
a. LAN
b. DSL
c. RAM
d. USB
e. CPU

14. Microsoft Office is
a. Shareware
b. Public domain software
c. Open-source software
d. A vertical market application
e. An application suite

15. How many options do a BINARY choice offer?
a. None of these
b. One
c. Two
d. it depends on the amount of memory on the computer
e. It depends on the speed of the computer’s processor

16. A collection of program that controls how your computer system runs and processes information is called
a. Operating System
b. Computer
c. Office
d. Compiler
e. Interpreter

17. Computer connected to a LAN (Local Area Network) can
a. run faster
b. go on line
c. share information and /or share peripheral equipment
d. E-mail
e. None of these

18. Information travels between components on the mother board through
a. Flash memory
b. CMOS
c. Bays
d. Buses
e. Peripherals

19. How are data organized in a spreadsheet?
a. Lines & spaces
b. Layers & Planes
c. Height & Width
d. Rows & Columns
e. None

20. The blinking symbol on the computer screen is called the
a. mouse
b. logo
c. hand
d. palm
e. cursor

21. A fault in a computer program which prevents it from working correctly is known as
a. Boot
b. Bug
c. Biff
d. Strap
e. None of these

22. A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is _________
a. Bug
b. Vice
c. Lice
d. Worm
e. None of these

23. A _______ is a bi-stable electronic circuit that has two stable states.
a. Multivibrator
b. Flip-flop
c. Logic gates
d. laten
e. None of these

24. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as
a. Spam
b. Trash
c. Calibri
d. Courier
e. None of these

25.DOS stands for
a. Disk Operating System
b. Disk operating session
c. Digital Operating System
d. Digital Open system
e. None of these

26. Who is the chief of Microsoft
a. Babbage
b. Steve Ballmer replaced Bill Gates
c. Bill Clinton
d. Bush
e. None of these

27. Which of the following are input devices.
a. Keyboard
b. Mouse
c. Card reader
d. Scanner
e. All of these
28. Examples of output devices are
a. Screen
b. Printer
c. Speaker
d. All of these
e. None of these

29. Which of the following is also known as brain of computer
a. Control unit
b. Central Processing unit
c. Arithmatic and language unit
d. Monitor
e. None of these

30. IBM stands for
a. Internal Business Management
b. International Business Management
c. International Business Machines
d. Internal Business Machines
e. None of these

31.___________ translates and executes program at run time line by line
a. Compiler
b. Interpreter
c. Linker
d. Loader
e. None of these

32. ___________ is an OOP principle
a. Structured programming
b. Procedural programming
c. Inheritance
d. Linking
e. None of these

33. COBOL is widely used in _________ applications
a. Commercial
b. Scientific
c. Space
d. Mathematical
e. None of these

34. RAM stands for
a. Random origin money
b. Random only memory
c. Read only memory
d. Random access memory
e. None of these

35. 1 Byte = ?
a. 8 bits
b. 4 bits
c. 2 bits
d. 9 bits
e. None of these

36. SMPS stands for
a. Switched mode Power Supply
b. Start mode power supply
c. Store mode power supply
d. Single mode power supply
e. None of these

37. The device used to carry digital data on analog lines is called as
a. Modem
b. Multiplexer
c. Modulator
d. Demodulator
e. None of these

38. VDU is also called
a. Screen
b. Monitor
c. Both 1 & 2
d. printer
e. None of these

39. BIOS stands for
a. Basic Input Output system
b. Binary Input output system
c. Basic Input Off system
d. all the above
e. None of these

40. Father of ‘C’ programming language
a. Dennis Ritchie
b. Prof Jhon Kemeny
c. Thomas Kurtz
d. Bill Gates
e. None of these

Bank PO Computer Awareness Set 3
Q1) What type of port sends data one bit at a time?
A.) Serial
B.) Parallel
C.) USB
D.) FireWire

Q2) The power-saving mode that allows the computer to be restarted by simply pressing a key on the keyboard is called:
A.) standby.
B.) warm boot.
C.) power management.
D.) cold boot.

Q3) Which keys are to be pressed to open “My Computer” window directly?
a) Start+Q
b) Start+W
c) Start+E (Windows Key + E)
d) Start+R

Q4) The process of ____________ involves automated study of consumer buying patterns in order to support marketing, inventory replenishment, and pricing decisions.
A.) transaction processing
B.) data mining
C.) simulation
D.) information processing

Q5.) The engineering discipline that involves construction of molecularly-sized computing devices is called:
A.) nanotechnology.
B.) molecular processing.
C.) silicon grafting.
D.) nanoscience.

Q6) The prefix that stands for “billionth” is:
A.) giga.
B.) tera.
C.) nano.
D.) peta.

Q7) A small biomedical device currently on the market that can be implanted underneath the skin for identification purposes is called the:
A.) Identitron.
B.) Verichip.
C.) Digicard.
D.) Nanoguard.

Q8) The four main functions of a computer are:
A.) input, processing, output, and storage.
B.) learning, thinking, intelligence, and virtuosity.
C.) data, information, bits, and bytes.
D.) hardware, software, modeling, and operations.

Q9) The primary purpose of a computer is to process _____________ and convert it into information.
A.) electricity
B.) data
C.) raw material
D.) a bit

Q10) Bit refers to a:
A.) computer language.
B.) CPU instruction.
C.) 0 or 1 value.
D.) digital representation of an alphabetic character.

Q11) There are ____________ bits in a byte.
A.) two
B.) four
C.) six
D.) eight

Q12) In computer language, each letter, number, and an array of special characters consists of:
A.) 8 kilobytes.
B.) 8 bytes.
C.) a bit.
D.) 8 bits.

Q13) Which of the following is the correct sequence of smallest to largest unit of storage size?
A.) megabyte < terabyte < gigabyte < kilobyte < petabyte
B.) kilobyte < megabyte < gigabyte < terabyte < petabyte
C.) kilobyte < megabyte < gigabyte < petabyte < terabyte
D.) kilobyte < megabyte < petabyte < terabyte < gigabyte

Q14) The prefix kilo refers to approximately:
A.) one thousand.
B.) one million.
C.) one hundred.
D.) one billion.

Q15) Computers work in:
A.) machine linguistics.
B.) binary language.
C.) HTML code.
D.) bit language.

Bank PO Computer Awareness Set 4
Q1) The metal or plastic case that houses the physical components of a computer together is called the:
A.) Central processing unit.
B.) Storage device.
C.) Motherboard.
D.) System unit.
Q2) The “brains” of the computer which executes the instructions, is called the:
A.) CPU.
B.) RAM.
C.) Motherboard.
D.) System unit.

Q3) Instructions and data that are about to be processed by the CPU are located in:
A.) A CD-ROM.
B.) RAM.
C.) The hard disk.
D.) The motherboard.

Q4) The circuitry that includes the CPU and memory chips is located on the:
A.) System unit.
B.) Operating system.
C.) Motherboard.
D.) Computer platform.

Q5) All of the following are considered to be storage devices EXCEPT a:
A.) Floppy disk.
B.) CPU.
C.) CD.
D.) Hard disk drive.

Q6) What is the correct association between a hardware component and a computer function?
A.) Monitor > input
B.) Mouse > input
C.) CPU > storage
D.) Hard disk > processing

Q7) The main difference between application and system software is that:
A.) Application software is composed of program instructions but system software is not.
B.) Application software is stored in memory whereas system software is only in the CPU.
C.) System software is unnecessary whereas application software must be present on the computer.
D.) System software manages hardware whereas application software performs user tasks.

Q8) A document created in a word processing program or a budget created in a spreadsheet are both examples of documents created in:
A.) Application software.
B.) System software.
C.) An operating system.
D.) A Windows platform.

Q9) Which of the following is an example of system software?
A.) Word processor
B.) Operating system
C.) Management information system
D.) Spreadsheet
Q10) The term that refers to computers that provide resources to other computers in a network is:
A.) Server.
B.) Mainframe.
C.) Platform.
D.) Resource provider.

Q11) If a large business is going to use a single computer to execute many programs for hundreds (possibly thousands) of users at the same time, performing relatively simple operations and transactions, the type of computer will probably be a(n):
A.) Supercomputer.
B.) PC.
C.) Mainframe.
D.) ISP.

Q12) A scientific institution performing intensive mathematical operations for a complex model that requires extremely powerful computing capabilities will most likely use a(n):
A.) Supercomputer.
B.) PC.
C.) Mainframe.
D.) ISP.

Q13) The standard computer keyboard is configured using the ____________ layout.
A.) Dvorak
B.) QWERTY
C.) Control
D.) Dot-matrix

Q14) The most commonly used keys in the Dvorak keyboard layout are located in the:
A.) Far right area of the keyboard.
B.) Top row.
C.) Middle row.
D.) Function key area.

Q15) On computers using Microsoft Windows XP, holding the Windows key down and pressing the letter E will:
A.) Start Windows Explorer.
B.) Display the Start menu.
C.) Execute Microsoft Windows.
D.) Run Windows Help.

Bank PO Computer Awareness Set 5
Q1. The insert, caps lock, and num lock keys are all examples of ____________ keys.
A. control
B. function
C. toggle
D. shortcut

Q2. The copy, cut, and paste features use keyboard shortcuts with the ____________ key and a keyboard letter.
A. Shift
B. Windows
C. Alt
D. Ctrl

Q3. RF keyboards differ from infrared keyboards in that they:
A. must be closer to the computer.
B. are connected to the computer via the USB port.
C. do not need to be pointed at the computer.
D. are used primarily on laptops or PDAs.

Q4. The traditional mouse requires a mouse pad to provide friction for its:
A. touchpad.
B. tracker.
C. optical sensor.
D. roller ball.

Q5. The standard input device for a PDA is a:
A. stylus.
B. touch pad.
C. keyboard.
D. trackball mouse.

Q6. The flicker effect of a cathode ray tube is controlled by its:
A. resolution.
B. refresh rate.
C. dot pitch.
D. data transfer rate.

Q7. A monitor with high dot pitch will have:
A. a relatively large number of pixels.
B. a high number of possible colors in its display.
C. wide gaps between pixels.
D. relatively fast recharging of the pixels’ illumination.

Q8. The larger the number of pixels of a computer monitor, the higher its:
A. resolution.
B. refresh rate.
C. dot pitch.
D. data transfer rate.

Q9. The maximum complete electron scans of current CRT monitors is ____________ times per second.
A. 25
B. 50
C. 75
D. 100
Q10. Electron beam scanning is a characteristic of:
A. laser printers.
B. flat panel monitors.
C. cathode ray tubes.
D. liquid crystal display.

Q11. The type of output device that utilizes a fluorescent panel for generating light waves is a(n):
A. CRT monitor.
B. inkjet printer.
C. laser printer.
D. LCD monitor.

Q12. The main advantage of active matrix over passive matrix technology is that active matrix panels:
A. have higher screen resolution.
B. can selectively recharge individual pixels.
C. cost less than passive matrix panels.
D. require less power consumption than passive matrix panels.

Q13. The following are all advantages of LCD over CRT monitors EXCEPT:
A. wider viewing area relative to size of the monitor.
B. less likely to cause eyestrain.
C. more friendly to the environment.
D. wider viewing angle.

Q14. The fastest and quietest type of printer is a(n):
A. dot-matrix printer.
B. inkjet printer.
C. laser printer.
D. plotter.

Q15. The type of large printer that can most accurately produce images requiring precise, continuous lines is a(n):
A. plotter.
B. inkjet printer.
C. laser printer.
D. dot-matrix printer.

Bank PO Computer Awareness Set 6
Q1) MICR stands for?
a) Magnetic Ink Character Recognition
b) Magnetic Ink Code Reader
c) Magnetic Ink Cases Reader
d) None of the above

Q2) Who designed the first Electronics computer – ENIAC?
John Mauchly and J. Presper Eckert of the University of Pennsylvania

Q3) What is meant by a dedicated computer?
a) used by one person only
b) assigned one and only one task
c) uses one kind of software
d) meant for application software

Q4) A …………. is an electronic device that process data, converting it into information?
a) Processer
b) Computer
c) Case
d) Stylus

Q5) The CPU and memory are located on the?
a) Expansion Board
b) Mother Board
c) Storage device
d) Output device

Q6) The number of characters that can be stored in a given physical space is?
a) Word length
b) Byte
c) Data Density
d) Field

Q7) In computer term, an error in software and coding is called as?
a) Bug
b) Error
c) Blunder
d) Debug

Q8) The process of removing bug is called as?
a) Debugging
b) Error Handling
c) No-Bugging
d) None of the above

Q9) A blinking symbol on the computer screen is called?
a) Mouse
b) Hand
c) Light
d) Cursor

Q10) A typical Personal Computer used for business purposes would have …… RAM?
a) 4 KB
b) 16 K
c) 64 K
d) 256 K

Q11) Two kind of main memory are?
a) Primary & Secondary
b) Random & Sequential
c) RAM & ROM
d) None of the Above

Q12) Which of the following is the way to access secondary memory?
a) Random Access Memory
b) Action Method
c) Transfer Method
d) Density Method

Q13) Computers use the ………. language to process data?
a) Processing
b) Kilobyte
c) Representational
d) Binary

Q14) …………. is data that has been organized or presented in a meaningful fashion?
a) A Process
b) Software
c) Storage
d) Information

Q15) Each model of a computer has a unique?
a) Assembly of a computer
b) Machine Language
c) High Level Language
d) All of the Above

Bank PO Computer Awareness Set 7
Q1) Which of the following is the secondary memory device?
a) Keyboard
b) Disk
c) ALU
d) All of the above

Q2) DVD stands for?
a) Digital Versatile Disk
b) Digital Video Disk
c) Vigital Video Drop
d) None of these
DVD - Digital Video Disc or Digital Versatile Disc

Q3)Computer uses the …… number system to store data and perform calculations?
a) Decimal
b) Hexadecimal
c) Octal
d) Binary
Q4) Test the validity of the statements?
a) 1 KB = 1024 BYTES
b) 1 MB = 2048 BYTES
c) 1 MB = 1000 KILOBYTES
d) 1 KB = 1000 BYTES

Q5) Instruction in computer language consist of?
a) OPCODE
b) OPERAND
c) Both (a) and (b)
d) None of the Above

Q6) Machine language is?
a) Machine dependent
b) Difficuilt to program
c) Error Prone
d) All of the Above

Q7) Which of the following is not a computer language?
a) C
b) C++
c) Java
d) Microsoft

Q8) In DOS, which of the following command is used to delete all the files as well as all sub-directories of a directory?
a) Delete
b) Del
c) Deltree
d) Move

Q9) To move to the beginning of a line of text, we use …… key?
a) Home
b) a
c) Page up
d) Enter

Q10) The …… tells the computer how to use its components?
a) Utility
b) Network
c) Operating System
d) Application Program

Q11) DSL is an example of a ……… connection?
a) Network
b) Wireless
c) Slow
d) Broadband
Q12) What is the full form of USB in terms of computer?
a) Universal Security Block
b) Ultra Serial Bus
c) Universal Serial Bus
d) United Service Block

Q13) What is the combination used to PASTE text or other things in computer?
a) Ctrl + Enter
b) Shift + Enter
c) Ctrl + Ins
d) Shift + Ins

Q14) Sending an E-mail is similar to?
a) Writing a letter
b) Drawing a picture
c) Talking on phone
d) Sending a package

Q15) A commonly used graphic format used for web is?
a) .gif Graphics Interchange Format
b) .bmp
c) .tif
d) .imp

Bank PO Computer Awareness Set 8
Q1) A set of information that defines the status of resources allocated to a process is?
a) Process Control
b) Process Description
c) ALU
d) Register Unit

Q2) The word length of computer is measured in?
a) Bits
b) Bytes
c) Nibble
d) Metres

Q3) Properly arranged data is called?
a) Field
b) Words
c) Information
d) File

Q4) Which of the following is not a web browser?
a) Safari
b) Opera
c) Chrome
d) Gladiator
Q5) Which process checks to ensure the components of the computer are operating and connected properly?
a) Booting
b) Processing
c) Saving
d) Editing

Q6) The operating system is the most common type of …………. software?
a) Communication
b) Application
c) Systems
d) Word-Processing

Q7) PC can be connected together to form a …….?
a) Server
b) Super Computer
c) Network
d) All of the above

Q8) In Database field is a ……….?
a) Label
b) Table of Information
c) Group of Related Records
d) Category of information

Q9) A dumb terminal has?
a) An embedded microprocessor
b) Extensive memory
c) Independent processing
d) Keyboard & screen

Q10) Which key is used to rename a selected file or icon?
a) F1
b) F2
c) F3
d) F4

Q11) Which key is used to refresh contents of file?
a) F1
b) F3
c) F5
d) F7

Q12) Which of the following is an example of connectivity?
a) Floppy Disk
b) Monitor
c) Internet
d) Keyboard
Q13) What type of software is used for creating letters papers and other documents?
a) Database
b) Word-processor
c) Spread Sheet
d) Antivirus

Q14) What is the minimum number of rows and columns that a word table can have?
a) Zero column Zero row
b) 1 column 1 row
c) 2 column 2 row
d) 3 column 3 row

Q15) A memory that is capable of determining whether a given datum is contained in one of its address is?
a) ROM
b) PROM
c) CAM (Content-addressable memory)
d) RAM

Bank Exam Computer Set 9
Q1) ……. is the science that attempts to produce machines that display same type of intelligence as the humans.
a) Simulation
b) Artificial intelligence
c) Nanoscience
d) Hybridization

Q2) A hybrid Computer
a) Resembles digital computer
b) Resembles analog cmputer
c) Resembles both analog and digital computer
d) None of the above

Q3) What is back up?
a) Adding more components to your network
b) Protecting data from copying it from original source to different destination
c) Filtering old data from the new data
d) Accessing data on tape

Q4) Anurag is a supercomputer developed in?
a) China
b) USA
c) India
d) England

Q5) Which operation is not performed by computer?
a) Inputting
b) Processing
c) Controlling
d) Understanding

Q6) A ……… is approximately 1 billion bytes?
a) Kilobyte
b) Gigabyte
c) Megabyte
d) Terabyte

Q7) Which number system is used as shortcut notations for groups of four binary digits?
a) Binary
b) Decimal
c) Octal
d) Hexadecimal

Q8) The process of retrieving data from memory is called?
a) Read out
b) Read from
c) Read
d) All of the above

Q9) A computer program which converts an entire program into machine language is called an …….?
a) Interpreter
b) Simulator
c) Compiler
d) Changer

Q10) What kind of software would you most likely use to keep track of billing account?
a) Word Processing
b) Electronic Publishing
c) Spreadsheet
d) Web authoring

Q11) A set of instructions telling computer what to do is ?
a) Instructor
b) Compiler
c) Mentor
d) Program

Q12) Arranging of data in a logical sequence is known as?
a) Classifying
b) Searching
c) Sorting
d) Reproducing

Q13) Which of the following is not a DBMS software?
a) FOXPRO
b) ORACLE
c) Sybase
d) Database 2000

Q14) If you wish to extend the length of network without having the signal degrade, you would use a ?
a) Repeater
b) Router
c) Gateway
d) Switch

Q15) One advantage of dial up internet access is?
a) It utilizes broadband technology
b) It utilizes existing telephone service
c) It uses a router for security
d) Modem speed is very fast

Bank Exam Computer Set 10
Q1) Hard disk drives are considered as ……… storage?
a) Flash
b) Non Volatile
c) Temporary
d) Non Permanent

Q2) Microprocessers can be used to make ?
a) Computer
b) Digital Systems
c) Calculators
d) All of the Above

Q3) Which of the following is generally referred to as brain of computer?
a) ALU
b) CPU
c) Control Unit
d) Memory

Q4) All of the following are storage devices except?
a) Hard Disk drive
b) Printers
c) Floppy disk drive
d) CD drive

Q5) Which of the following is not an example of Intel processor
a) i3
b) i5
c) i7
d) i11

Q6) The difference between memory and storage is that memory is ……….. and storage is ……..?
a) Temporary , Permanent
b) Permanent , Temporary
c) Slow , Fast
d) None of the Above

Q7) Computer instructions written with use of English words instead of binary machine code is called as?
a) Mnemonics
b) Symbolic Code
c) Gray Codes
d) Opcode

Q8) An example of non numeric data is ?
a) Bank Balance
b) Examination marks
c) Real numbers
d) None of the above

Q9) Which of the following is the last key of the series F1, F2, F3 ……..?
a) F10
b) F11
c) F12
d) None of the above

Q10) A single application that combines the major features of several types of applications is called as ….?
a) integrated software
b) suite
c) combo package
d) high end

Q11) VB Script can perform
a) Calculation of data
b) Create 3-D animation effect
c) Presentation of fixed information
d) All of the above

Q12) which of the following topology is least effected by addition or removal of node?
a) Ring
b) Star
c) Bus
d) Mesh

Q13) Coaxial cables are good for ?
a) Digital transmission
b) Long distance transmission
c) Both a and b
d) None of the above

Q14) A device operating at the physical layer is ?
a) Bridge
b) Router
c) Repeater
d) All of the above

Q15) When a pointer is positioned on a ….. It is shaped like a hand?
a) Gramatical error
b) Hyperlink
c) Spelling error
d) screen tip
1. A file containing relatively permanent data is
a)Random file b)Master file c)Transaction file d)Sequential file e) None
2. One million bytes of information is abbreviated as
a) Bit b) KB c) MB d) GB e) None
3. Bing is also known as
a) MSN Search b) Live Search c) Windows Live Search d) All e) None
4. Microsoft’s latest operating system is
a)Vista b)Vista Advanced c)Windows XP d)Windows 7 e)None
5. AltaVista is a
a)Search engine b)Windows OS c)Browser d)Virus e)Vista Theme
6. What is other name of LAN Card
a)MODEM b)NIC c)Internet Card d)Network Connector e)None
7. Which is the latest type of printer interface?
a)Serial b)DVI c)Parallel d)USB e)none
8. In Windows XP, which shortcut is used you lock the computer?
a) Ctrl + L
b) Windows key + K
c) Ctrl + K
d) Scroll Lock key
e) Windows key + L
9. The maximum number of IDE devices that can be installed in an ATX computer is
a) 1 b) 2 c) 3 d) 4 e) 5
10. When using characters in Windows, what code does Windows use?
a)ASCII b)UNICODE c)MORSE d)IDBC e)WESTRN
11. Which protocol provides name resolution for host and domain names for a TCP/IP network?
a)HTTP b)TELNET c)SMTP d)DNS e)SNMP
12. How fast is Fast Ethernet?
a)10 Mbps b)100 Mbps c) 256 Kbps d)1 Gbps e)10 Gbps
13. YouTube service of streaming videos online is provided by
a)Google b)Microsoft c)IBM d)Apple e)Sony
14. Which one is not true?
a)Google is a search engine
b)Ubuntu is a system software
c)Windows XP launched in 2001
d)Buzz is an e-Commerce company
e) None
15. A Laptop or Notebook marked 802.11n in its feature, it means device support
a)Bluetooth b)WiMAX c)USB d)Wi-Fi LAN e)3G
16. In EXCEL, the default workbook opens with
a) One worksheets
b) Two worksheets
c) Three worksheets
d) Four worksheets
e) None
17. In Excel, this surrounds an active cell.
a) Cell border
b) Cell outline
c) Cell rim
d) Cell selector
e) None
18. In H2O the figure 2 is appeared lowered. Which effect has been applied?
a) Superscript
b) Lowered
c) Subscript
d) Laid down
e) None
19. What is the Thesaurus used for?
a) Grammar options
b) Spelling options
c) Opposite Words
d) Synonyms
d) None
20. What is the shortcut of Research command in MS-Word?
a) Alt + click b) F3 c) Ctrl + F d) F7 e) None
Computer Awareness Quiz 2010 - II
1. For the purposes of defining data needs, a responsibility area is
a) Marketing b) Personnel c) Administration d) Finance e) None
2. The problem statement should include all of the following except:
a) Input. b) Output. c) Processing d) Storage e) None
3. Hotmail, a free web-based email service operated by which company
a) Apple b) Rediff c) Microsoft d) Yahoo e) Google
4. A collection of 4 binary digits is known as
a) Half Bit b)1/2 KB c) Byte d) Nibble e) None
5. How many types of arithmetic operations does the ALU of all computers perform?
a) 2 b) 4 c) 6 d) 8 e) 5
6. Which of the following is not a part of the CPU?
a) Arithmetic and Logic Unit
b) Storage Unit
c) Program Unit
d) Control Unit
e) None
7. Which of the following is not a unit of measurement in computer systems?
a)DPI b)PPI c)API d)Bd e)MB
8. In Windows XP, which shortcut is used to cycle through opened items in taskbar?
a) Ctrl + Tab
b) Alt + Tab
c) Ctrl + Esc
d) Alt + Esc
e) None
9. A digital computer compute the value of expression 2 * 5 - 2 >2 inside
a) RAM b) CPU Chip c) Hard Disk d) Floppy Disk e) MS-Excel
10. To produce a high-quality graphics (hardcopy) in color, you would want to use a
a)Virtual Printer b)Laser Printer c)Ink-jet Printer d)Plotter e)RGB Monitor
11. Which of the following is fastest memory ?
a) DDR RAM b) DDR2 RAM c) DDR3 RAM d) Swap Memory e) Buffer Memory
12. Which protocol is used by operating system to generate error message like
‘Host Unreachable’ over a TCP/IP network?
a) HTTP/1.1 b) ICMP c) PPP d) ICGM e) TCP/IP
13. What does SNMP stands for?
a) Simple Network Mail Protocol
b) Single Network Mail Protocol
c) Single Network Message Protocol
d) Simple Network Management Protocol
e) None
14. On a school computer, Tina learned how to copy programs. A classmate asked her to copy a program for his home use. Her most ethical response would be which of the following?
a) I'll copy it, but you have to promise not to tell anyone.
b) I don't know how to copy disks.
c) I can't copy it because it will break copyright laws.
d) I'll copy it for you, but you can't copy it for anyone else.
e) None
15. Which of the following is not true?
a)LOGO stands for Live On Google’s Orkut
b)BIOS is a system software
c)GRUB is a Linux bootloader
d)Ruby is a web scripting language
e) LILO is a Linux bootloader
16. What is the function of Drop Cap?
a) It does not allow capital letters to be used in the documents.
b) It makes first letter of each word capital letter in the documents
c) It lets you begin a paragraph with a large dropped initial capital letter.
d) It automatically starts all paragraphs and sentences with capital letters.
e) None
17. What is Mail-Merge?
a) a web based e-mail service with no spam
b) a name of Yahoo! MINDSET search feature
c) a new virus-hoax which can delete data from mail-inbox
d) a feature of MS-Word used to create multiple documents like letters,
mailing labels, name tags etc.
e) None
18. In MS-Excel 2003, the default workbook sheet contain maximum………
a) 65535 Rows b) 65536 Rows e) 1048576 Rows e) 65537 Rows c) None
19. In MS-Word, a menu item in dim color (gray) indicate that the menu is ?
a) Toggle Menu
b) Unavailable for current context
c) Not much required menu
d) Over Used Menu
e) None
20. Hot-Key is a
a) FireWire port
b) Alternate Key
c) Keyboard Shortcut
d) Primary Key
e) None
Computer Awareness Quiz 2010 - III
1. After a program has shown that it runs and produces results, the next step is to…...?
a) Save b) Load c) Exit d) Test e) List
2. A computer that works with discrete quantities is
a) Hybrid . b) Optical. c) Digital d) Analog e) None
3. A 32 bit computer word consists of………?
a) 4 bytes b) 8 bytes c) 16 bytes d) 32 bytes e) None
4. The process of checking the validity of information held in a transaction file is
a) Verification b) Test data c) Validation d) Updating e) None
5. What is a ‘tuple’?
a) Another name for a table in an RDBMS.
b) Another name for the key linking different tables in a database.
c) Initial seed value of a field
d) A row or record in a database table.
e) An attribute attached to a record.
6. Which of the following is not a web scripting language?
a) ASP b) DSP c) JSP d) PHP e) HTML
7. Which one of the following work as both an input and output device?
a) Keyboard b) QWERTY Keyboard c) Mouse d) Scanner e) Modem
8. Which of the following companies is also known as ‘Big Blue’
a) Intel b) IBM c) Microsoft d) Adobe System e) Google
9. Which of the following is not an operating system for personal computers?
a) Windows XP b)Windows 7 c) Red Hat Linux d) Google’s Nexus One e)Unix
10. A network where all systems have equal status is called:
a) Peer-to-Peer.
b) A Star Network.
c) The Internet.
d) Client-Server.
e) None
11. What is the communications protocol that allows you to connect your computer
to the Internet using a standard telephone line ?
a) HTTP b) ISDN c) SLIP d) TCP/IP e) None
12. What is the name given to the standard or set of rules that two computers use
to communicate with each other ?
a) Access Control b) Domain c) Link d) Protocol e) TCP/IP
13. What does SMPS stands for?
a) Switched Mode Power Supply
b) Single Mode Power Supply
c) Simple Mode Power Supply
d) Synchronous Mode Power Supply
e) None
14. When a user turns on a Windows XP system, which program will activate first?
a) Exhaust fan of SMPS will start rotating
b) Windows XP logo screen appear with progress bar
c) Operating System start to load its file in RAM.
d) Desktop screen appear with mouse pointer
e) BIOS the in-charge of system start executing
15. In Windows Explorer, when a user press Alt key and Double-click a file/folder
simultaneously, what will happen?
a) Selected file/folder will open in new window
b) Selected file/folder will open in same window
c) Selected file/folder will move to recycle bin
d) Properties dialog box of Selected file/folder will open
e) None
16. Which of the following is not true?
a) TCP is a connection-oriented protocol
b) 48 is an Octal Number
c) FTP stands for File Transfer Protocol
d) A file having extension PNG is a graphic file
e) C++ is a computer programming language
17. In MS-Excel, what is the keyboard shortcut to complete a cell entry and move up in the selection?
a) Ctrl + TAB
b) Shift + TAB
c) Alt + ENTER
d) Shift + ENTER
e) None
18. What is the file extension used for Microsoft Word document templates?
a) .dot b) .wdt c) .txt d) .exe e) .doc
19. Which Access component is best for data presentation?
a) Table b) Form c) Report d) Query e) None
20. What would you see while spell checking the phrase “My father was write”?
a) The word “write” is misspelled.
b) A red line appears under “write”
c) A green line appears under “write”
d) The word “father” is misspelled.
e) No errors.
Computer Aptitude Quiz 2010 - IV
1. A set of related records in a database is known as a______?
a) File b) Tuples c) Field d) Record-group e) None
2. One piece or item of information in a database is known as a/an ____?
a) Record b) Entry c) File d) Field e) None
3. Locking was introduced into databases so that _____?
a) Consistency can be enforced
b) Keys can be provided to maintain security
c) All simultaneous transactions are prevented
d) Passwords can be provided to maintain security
e) None
4. The four parts of a database listed in ascending order are?
a) File, record, field, entry
b) Entry, field, record, file
c) Field, entry, record, file
d) Record, field, entry, file
e) None
5. Which input device is used to read characters directly from an ordinary piece of paper?
a) OMR b) OCR c) TSR d) PCR e) None
6. Which of the following operating system is launched by IBM for personal computers?
a) IBM-DOS b) MS-DOS c) OS/2 d) PC-DOS e) None
7. Which generation of computer use Artificial Intelligence?
a) Third b) Fourth c) Fifth d) Sixth e) None
8. Which of the following is not a name of network topology?
a) Bus b) NetWare c) Tree d) Ring e) Mesh
9. A _______ server store and manages files for network user?
a) Main b) Web c) File d) Authentication e) None
10. A medium for transferring data between two locations is called ____?
a) Network b) Modem c) Sharing d) Communication Channel e) Data Bus
11. Personal logs or journal entries posted on the Web are known as_______?
a) Twitter b) Blogs c) Web casts d) User-Forum e) None
12. Before a hard disk can be used to store data, it must be _________ firstly?
a) Partitioned b) Labeled c) Formatted d) Addressed e) None
13. What is Rover in Windows XP?
a) An animated character
b) A mouse hover event
c) Busy hourglass mouse cursor
d) A routing and remote access service
e) None
14. A computer-hoax is?
a) A Trojan threat
b) A computer hacker
c) A program that blows up every time you use it
d) A program intended to scare users into thinking they have a virus
e) None
15. Which of the following is not a Microsoft operating system?
a) Windows XP
b) Windows ME
c) Windows CE
d) Windows MX
e) All the above
16. What does SATA stands for?
a) Super Advanced Technology Attachment
b) Serial Advanced Technology Attachment
c) Serial Access Technology Attachment
d) Small Access Technology Attachment
e) None
17. Which one of the following is not true?
a) Front panel of computer case is also called Bezel
b) Python is a computer programming language
c) XP stands for eXPerience in Windows XP
d) DPI (dots per inch) is a measurement of printer resolution
e) All are true
18. The type of line spacing that leaves a blank line between each line keyed is known as?
a) Single spacing
b) Double spacing
c) Triple spacing
d) Quadruple spacing
e) None
19. The page margins of a document refer to the?
a) Header on each page
b) Page orientation
c) White space left for binding
d) White space surrounding the page
e) None
20. In order to delete the word “RAM” using the backspace key, the cursor must be
Positioned?
a) Before the letter M.
b) After the letter A
c) Before the letter R
d) After the letter M
e) Can not delete
Computer Awareness Quiz 2010 - V
1. A group of attribute/field in a database is known as a______.
a) Record b) File c) Database d) Entry e) None
2. A ______ describe a category of information in a table of database.
a) Record b) File c) Entry d) Field e) None
3. A goal of data mining includes which of the following?
a) To confirm that data exists
b) To create a new data warehouse
c) To analyze data for expected relationships
d) To explain some observed event or condition
e) None of the above
4. The correct hierarchical order, smallest to largest, for the following database terms is:
a) File, Field, Record, Database
b) File, Record, Field, Database
c) Record, Field, File, Database
d) Field, Record, File, Database
e) None of the above
5. In RDBMS , DBA is responsible for:
a) Physical database design
b) Defining conceptual models and schema
c) Defining security and integrity rules
d) Defining backup and recovery mechanisms
e) All the above
6. When data changes in multiple lists and all lists are not updated, this causes _______.
a) Duplicate data
b) Data redundancy
c) Data inconsistency
d) Information overload
e) None
7. Which of the following programming method is used to minimize data errors when data
is transferred over a network?
a) Checksum b) Checkbit c) Cryptography d) Encryption e) None
8. Which device act as a traffic cop over a network?
a) Modem b) Hub c) Switch d) Router e) None
9. How many layers are present in Open System Interconnection (OSI) model of network
architecture?
a) Five b) Six c) Seven d) Eight e) None of these
10. Which layer of OSI model, firstly make use of unit of data called “Packet”?
a) Datalink Layer
b) Transport Layer
c) Network Layer
d) Presentation Layer
e) None
11. Communication between computers is established, maintained and terminated by _____ .
a) Network Layer
b) Session Layer
c) Application Layer
d) Presentation Layer
e) None
12. Which term identifies a specific computer on the web and the main page of the entire
site?
a) URL b) Hyperlink c) Web site address d) Domain name e) None of these
13. The place where data or information is stored for a short time is
a) Memory b) Control Unit c) Buffer d) ALU e) None
14. The section of CPU which selects, interprets and sees to the execution of program
instructions?
a) ALU b) Control Unit c) Register Unit d) Processing Unit e) None
15. Which program is used to convert assembly language to machine language?
a) Compiler b) Interpreter c) Linker d) Assembler e) None
16. The process of finding errors in software’s source code
a) Debugging b) Compiling c) Testing d) Running e) None
17. A computer programmer
a) can draw only flowchart
b) can enter data quickly
c) does all the thinking for a computer
d) can operate all type of computer equipment
e) None
18. Primary Memory of a personal computer consists of
a) RAM only
b) ROM only
c) Hard Disk only
d) Both (a) and (b)
e) All (a), (b), and (c)
19. A Trojan horse is
a) An ad ware program
b) A virus disguised as a useful program.
c) A program that blows up every time you use it
d) A spy ware which steal information over internet
e) None
20. Which one of the following is not true?
a) HTTP Protocol is used to view a web page in a browser
b) Android is Google's operating system for mobile devices
c) GHz is the measurement used to determine the speed of processor
d) WAN requires the same technology as LAN
e) All are true


M.C.A. COMPUTER SCIENCE - II
1. A terabyte comprises
(a) 1024 gigabyte (b) 1024 kilobyte
(c) 1024 megabyte (d) 1024 byte

2. The access time refers to
(a) Time required to locate and retrieve stored data
(b) Time required to locate the lost data
(c) Time required to delete specific data on a certain memory location
(d) None of the above

3. Select the smallest memory size.
(a) Terabyte (b) Gigabyte
(c) Kilobyte (d) Megabyte

4. The type of RAM that works by staying on the row containing the requested bit and moves faster
through the columns reading each bit as it goes is
(a) DDR SDRAM (b) SDRAM
(c) FPM DRAM (d) RDRAM

5. The ROM chip which can be rewritten several times and requires the action of ultraviolet radiations to
erase its contents is
(a) Flash memory (b) PROM
(c) EEPROM (d) EPROM

6. The type of memory that uses in-circuit wiring to erase the content by applying electric field is
(a) PROM (b) Flash memory
(c) EAROM (d) EEPROM

7. Dynamic memory is also called as
(a) Internal processor memory (b) Primary memory
(c) External storage memory (d) Non-volatile memory

8. The memory which is utmost accessible to the processor is
(a) Cache memory (b) RAM
(c) Hard disk (d) Flash memory

9. The storage device that has high cost per bit of storage is
(a) SDRAM (b) Cache memory
(c) Read only Memory (d) Hard disk

10. The dual-port version of DRAM formerly used in graphics adaptors is
(a) FPM DRAM (b) EDO DRAM
(c) VRAM (d) DDR SDRAM

11. The secondary storage device that follows the sequential mode of access is
(a) Optical Disk (b) Magnetic Disk
(c) Magnetic Tape (d) None of these

12. FPI stands for
(a) Faults per inch (b) Frames per inch
(c) Figure per inch (d) Film per inch

13. The most common type of floppy size is
(a) 3½-inch (b) 5¼-inch
(c) 4¾-inch (d) None of these

14. A spiral shape track formatting is present in
(a) Floppy Disk (b) Optical Disk
(c) Hard Disk (d) Half-inch Tape Cartridge

15. A floppy can be write protected by
(a) Breaking the slider
(b) Positioning the slider to cover the hole
(c) Positioning the slider away from the hole
(d) A floppy cannot be write protected

16. Rotational delay time is also known as
(a) Seek time (b) Shift time
(c) Latency (d) Access time

17. The average drives have an access time of
(a) 14-29 ms (b) 9-14 ms
(c) 60-70 ms (d) None of these

18. In which kind of disk does the read/write head physically touches the surface?
(a) Hard Disk (b) Compact Disk
(c) Floppy Disk (d) None of these

19. RAID stands for
(a) Reproduce Array of Intelligent Disks
(b) Reproduce Array of Inexpensive Disks
(c) Redundant Array of Inexpensive Drives
(d) Redundant Array of Inexpensive Disks

20. CD-ROM is a kind of
(a) Optical disk (b) Magneto-Optical disk
(c) Magnetic disk (d) None of these

Computer Awareness for Bank PO
1. In a survey of more than 500 companies and government agencies, ____________ percent
detected computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C

2. The survey showed that these businesses lost more than ____________ due to security
breaches.
A. $100,000 each
B. $377 million
C. five employees each
D. $1 million
Answer: B

3. The typical computer criminal is a(n):
A. young hacker.
B. trusted employee with no criminal record.
C. trusted employee with a long, but unknown criminal record.
D. overseas young cracker.
Answer: B

4. The majority of computer crimes are committed by:
A. hackers.
B. insiders.
C. overseas criminals.
D. young teenage computer geniuses.
Answer: B

5. The common name for the crime of stealing passwords is:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: C Reference: Theft by Computer

6. Collecting personal information and effectively posing as another individual is known as the
crime of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B
7. Malicious software is known as:
A. badware.
B. malware.
C. maliciousware.
D. illegalware.
Answer: B

8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate

9. An intentionally disruptive program that spreads from program to program or from disk to
disk is known as a:
A. Trojan horse.
B. virus.
C. time bomb.
D. time-related bomb sequence.
Answer: B

10. In 1999, the Melissa virus was a widely publicized:
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A

11. What type of virus uses computer hosts to reproduce itself?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B

12. The thing that eventually terminates a worm virus is a lack of:
A. memory or disk space.
B. time.
C. CD drive space.
D. CD-RW.
Answer: A

13. When a logic bomb is activated by a time-related event, it is known as a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C

14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C

15. What is the name of an application program that gathers user information and sends it to
someone through the Internet?
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B
16. Standardization of Microsoft programs and the Windows operating system has made the
spread of viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C

17. HTML viruses infect:
A. your computer.
B. a Web page in the HTML code.
C. both a Web page and the computer that is viewing it.
D. No
Answer: B

18. Software programs that close potential security breaches in an operating system are known
as:
A. security breach fixes.
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D

19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it
is known as:
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
Answer: D

20. ___________ is the measurement of things such as fingerprints and retinal scans used for
security access.
A. Biometrics
B. Biomeasurement
C. Computer security
D. Smart weapon machinery
Answer: A

21. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer: B

22. The most common passwords in the U.S. or Britain include all EXCEPT:
A. love.
B. Fred.
C. God.
D. 123.
Answer: D

23. Hardware or software designed to guard against unauthorized access to a computer network
is known as a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
D. encryption safe wall.
Answer: B

24. The scrambling of code is known as:
A. encryption.
B. a firewall.
C. scrambling.
D. password-proofing.
Answer: A

25. If you want to secure a message, use a(n):
A. cryptology source.
B. encryption key.
C. encryption software package.
D. cryptosystem.
Answer: D Reference: How It Works: 10.2 Cryptography

26. To prevent the loss of data during power failures, use a(n):
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.
Answer: D

27. A(n) ____________ can shield electronic equipment from power spikes.
A. encryption program
B. surge protector
C. firewall
D. UPS
Answer: B

28. All of these are suggestions for safe computing EXCEPT:
A. don’t borrow disks from other people.
B. open all e-mail messages but open them slowly.
C. download shareware and freeware with caution.
D. disinfect your system.
Answer: B

29. Freeware ___________ encrypts data.
A. encryption
B. firewall software
C. PGP
D. private and public keys
Answer: C

30. ____________ is defined as any crime completed through the use of computer technology.
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer: B

31. Most computer systems rely solely on ___________ for authentication.
A. logins
B. passwords
C. encryption
D. lock and key
Answer: B

32. Creating strong computer security to prevent computer crime usually simultaneously helps
protect :
A. privacy rights.
B. personal ethics.
C. the number of cookies downloaded to your personal computer.
D. personal space.
Answer: A

33. Over ___________ was spent by businesses and government to repair problems in regard to
Y2K.
A. 20 million dollars
B. 100 million dollars
C. 1 billion dollars
D. 100 billion dollars
Answer: D

34. What is a complex system that takes on nearly complete responsibility for a task eliminating
the need for people, verification, or decision making?
A. Autonomous system
B. Missile defense auto-system
C. Smart weapon
D. Independent system
Answer: D

35. Security procedures can:
A. will eliminate all computer security risk.
B. reduce but not eliminate risks.
C. are prohibitively expensive.
D. are inaccessible for the average home user.
Answer: B

Fill in the Blank:
36. The field of computer ____________ uses special software to scan hard drives of potential
criminal suspects.
Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging

37. Computer ____________ often goes unreported because businesses fear negative publicity.
Answer: crime

38. ____________ connections are the most frequent point of attack for Internet commerce.
Answer: Internet

39. ____________ is the most common form of computer crime.
Answer: Theft

40. A survey by eMarketer.com found that ____________ are the most often cited online fraud
cases.
Answer: online auctions Reference: Identity Theft

41. Theft of computers is most common for PDAs and ____________ computers.
Answer: notebook

42. When you use a disk in several different computers within the same day, you are taking the
chance of contracting a(n) ____________.
Answer: virus Reference: Viruses Difficulty: Easy

43. A(n) ____________ attaches itself to documents that contain embedded programs that
automate tasks.
Answer: macro virus

44. Both viruses and ____________ use computer hosts to replicate.
Answer: worms

45. ____________ programs search for and eliminate viruses.
Answer: Antivirus

46. A security patch is a software program that closes possible security breaches in the operating
system. The cost to the consumer is ____________.
Answer: nothing or free

47. ____________ was once the word used for malicious computer wizardry.
Answer: Hackers or hacking

48. ____________ refers to electronic trespassing or criminal hacking.
Answer: Cracking
49. DoS stands for ___________.
Answer: denial of service

50. DDoS stands for ___________.
Answer: distributed denial of service

51. ____________ hijack Web pages and redirect users to other sites.
Answer: Webjackers

52. ___________ software monitors and records computer transactions.
Answer: Audit-control

53. Each individual who uses a public key cryptosystem has ___________ keys.
Answer: two Reference: How It Works: 10.2 Cryptography

54. PGP stands for ___________.
Answer: Pretty Good Privacy

55. Most operating systems, including Windows XP, assign each user a unique ___________.
Answer: user identifier or user ID

56. It should now be common knowledge that users should not open ___________ from e-mail
recipients that the user does not know.
Answer: attachments



1. The insertion point in a table can be moved by using:

Arrows keys
Tab key
Shift+tab key
All of the above

2. Which bar is usually located below the title bar that provides categorized options?

Scroll bar
Menu bar
Tool bar
Status bar

3. Mail merge is concerned with:

To split main document
Combining main document with data file
Sending a typed letter to share holder of a company
None of the above

4. The thesaurus tool

Corrects two initial capitalized letters in a word
Find repeated words in the document
Adds new words to the custom dictionary
None of the above

5. The cell level F5 refers to:

Function key F5
Row F column 5
Column F rows 5
Function available in cell

6. Which is an example of a formula in MS Excel?

Sum(A1:A2)
=A1+A2
=add(A1:A2)
A1+A2

7. It is possible to display pictures in HTML specification by using the key:






8. How do you display current date and time in MS Excel?

Time()
Date()
Today()
Now()

9. In MS-Excel B7:B9 indicates:

Cell B8 only
Cell B7 and B9 only
Cell B7 through B9
None of the above

10. In MS Excel, what happens when dollar sign ($) are entered in a cell address? (ex: $B$2 : $B$10)

The status bar does not display the cell address
An absolute cell address in created
Cell address will change when it is copied to another cell
The sheet tab is changed

11. In Ms Excel, what do you mean by a workspace?

Group of workbook
Group of columns
Group of worksheets
Group of rows

12. Which of the following is a popular DOS based spreadsheet package?

Lotus 1-2-3
Word
Smart cell
Excel

13. The intersection of a row and column is called:

An equation
Data
A field
A cell

14. Which operator will combine text from two cells into one cell?

Space
& (ampersand)
= (equal)
None of the above

15. An excel workbook is a collection of:

Worksheets and charts
Workbook
Worksheets
Charts

16. Database that contains table linked by common field is called a

Relational database
Centralized database
Flat file database
None of above

17. DBMS is:

Set of programs to update those data
Collection of data
Set of programs to access those data
All of the above

18. What term refers to a collection of related information?

Record
Database
List
Outline

19. A DBMS allows you to create and maintain a database, create reports, and develop application programs, select the best fit answer:

Query language
Database management approach
DBBMS uses
Database administrator

20. …………………. Presents data in a way similar to an excel spreadsheet.

Layout preview
Datasheet view
Design view
Print preview

21. Where form you can insert shapes in your slide

Animations menu
Format menu
Design menu
All of the above

22. Which key used for slide show from beginning

F9
F1
F2
F5

23. Page setup for slides is available on:

View menu
Home menu
Design menu
Insert menu

24. A world wide web contains web pages:

Residing In many computers linked together using HTML
Residing in many computers
Created using HTML
With links to other web pages

25. A web page is located using a

Uniformly reachable links
Universal record linking
Uniform resource locater
Universal record locater

26. FORTRAN programming language is more suitable for…..

Data base application
Business application
Marketing applications
Scientific applications

27. Which of the following is a read only memory storage device?

Magnetic tape
Floppy disk
Compact disk
Hard disk

28. What do you call the translator which takes high level language program as input & produce machine language code as output?

Assembler
Compiler
Interpreter
Debugger

29. The program which is as permanent as hardware & stored in ROM is known as:

Live ware
Hardware
Software
Firmware

30. What is the first stage in software development?

Writing program codes
Specification and design
Testing
System analysis

31. MIS is designed for ….

Managers
Consumers
Workers
End users

32. How many pair cables does RJ45 UTP cable have?

5 pair
2 pair
3 pair
4 pair

33. How was the generation of computer classified?

By the model of the computer
By the device used in memory & processor
By the time period
None of the above

34. Through which device do the main components of the computer communicate with each other?

Memory
Keyboard
System bus
Monitor

35. The digital signals can be represented by

High and low
Binary codes
0 and 1
All of the above

36. Which of the following device is used only in LAN (local area network)?

Router
Gateway
Modem
NIC

37. Which of the following cables can transmit data at high speed?

UTP cable
Coaxial cable
Optic fiber cable
Twisted pair cable

38. When a computer is first turned on or restarted, a special type of absolute loader called is executed?

Relating loader
Compile loader
Boot loader
Bootstrap loader

39. Which among the following are the best tool for fixing errors on disks?

FIXDSK
FDISK
SCANDISK
CHKDSK

40. ……. Runs on a computer hardware and serve as platform for other software to run on.

System software
Operating system
Application software
All of the above

41. Which of the following operating system does not implement multitasking truly?

MS DOS
Windows 98
Windows NT
Windows XP

42. Which of the following operating system do you choose to implement a client-server network?

Windows 2000
MS DOS
Windows 95
Windows 98

43. The operating system manages:

Disk and I/O devices
Memory
Processes
All of the above

44. The operating system is the most common type of ……. Software

Word-processing software
Communication
Application
System

45. Which of the following do you use to change margins?

Paragraph dialog box
Formatting toolbar
Page setup dialog box
Standard toolbar

46. In word-processing the task of changing the appearance of a document is:

Inserting
Formatting
Editing
Proofing

47. In MS-Word, you can insert the hyperlink:

Pressing ctrl+k or by choosing hyperlink from format menu
Pressing ctrl+k or by choosing hyperlink form insert menu
Pressing ctrl+shift+k or by choosing hyperlink insert menu
Pressing ctrl+k or choosing hyperlink from format menu

48. You can break the column by:

Pressing alt+enter
Pressing ctrl+shift+enter
Pressing ctrl+enter
Pressing shift+enter

49. In MS-word, you can convert the documents file format by applying the command:

Convert
Save
Permission
Save as

50. Which page orientation you will select if you wish to print in wide format

Vertical
Landscape
Portrait
Horizontal

Correct Answers

1 – D – All of above

2 – B – Menu bar

3 – B – Combining main document with data file

4 – D – None of the above { Thesaurus does not find repeated words nor the other two options. It displays the synonyms or antonyms which is not on the options. So none of above is correct answer}

5 – C – Column F row 5

6 – B – =A1+A2

7 – D –

8 – D – =NOW()

9 – C – Cell B7 through B9

10 – B – An absolute cell address is created

11 – A – A group of Workbook

12 – A – Lotus 1-2-3

13 – D – A cell

14 – B – & (Ampersand)

15 – A – worksheets and charts

16 – A – Relational database

17 – D – All of above {DBMS is the integration of databases and applications to manipulate that database}

18 – B – Database

19 – D – Database Administrator

20 – B – Datasheet View

21 – No correct answer. Insert Shapes is available in Insert menu or Home menu (Ribbons). There is no format ribbon and in Animations or Design, there is not Insert Shapes command available.

22 – D – F5

23 – C – Design menu

24 – A – Residing In many computers linked together using HTML

25 – C – Uniform Resource Locator

26 – D – Scientific Applications

27 – C – Compact Disk

28 – B – Compiler

29 – D – Firmware

30 – D – System analysis

31 – A – Managers

32 – D – 4 pair

33 – B – By the device used in memory & processor

34 – C – System Bus

35 – D – All of above {high/low, binary codes, 0/1 are all same thing}

36 – D – NIC

37 – C – Optical fiber cables

38 – D – Bootstrap loader

39 – C – Scandisk

40 – B – Operating System

41 – A – MS DOS

42 – A – Windows 2000

43 – D – All of above

44 – D – System software

45 – C – Page Setup Dialog Box

46 – B – Formatting

47 – A – Pressing Ctrl+K or by choosing hyperlink from format menu

48 – B – Ctrl+Shift+Enter

49 – D – Save As

50 – B – Landscape


1. Fonts install from

a) Add from control panel

b) Font setup file

c) Font.exe file

d) All of above

2. Which one is not system tool?

a) Backup

b) Disk defragment

c) Virus scanning

d) All of above

3. Recently deleted files restore from

a) Recycle bin

b) Desktop

c) Taskbar

d) My computer

4. Which one is not part of control panel

a) Date and time

b) My documents

c) Add or remove program

d) Display

5. What is the file extension of MS-Word document?

a) Txt

b) Dot

c) Doc

d) Dom

6. In H2O the figure 2 is appeared lowered. Which effect has been applied?

a) Laid down

b) Superscript

c) Lowered

d) Subscript

7. Why are headers and footers used in document?

a) To allow page headers and footers to appear on document when it is printed

b) To enhance the overall appearance of the document

c) To mark the starting and ending of a page

d) To mark large document more readable

8. Which of the following shortcut key is used to check spelling?

a) F9

b) F1

c) F2

d) F7

9. What is the thesaurus used for?

a) Opposite words

b) Spelling options

c) Grammar options

d) Synonyms and antonyms

10. How can you insert a sound file in your word document?

a) From insert -> file menu option

b) From insert -> object menu option

c) From insert -> sound menu option

d) By right clicking the document and choosing ‘Add sound’ option

11. A bookmark is an item or location in document that you identify a name for future reference. Which of the following task is accomplished by using bookmarks?

a) To mark the ending of a page of document

b) To quickly jump to a specific location in the document

c) To add hyperlinks in a web page

d) To add anchors in a web page

12. Macros are:

a) Small programs created in MS-Word to automate repetitive tasks by using VBA

b) Small add-on programs that are installed afterwards if you need them

c) Programming language that you can use to customize MS-Word

d) Large tools in Word such as mail merge

13. A template stores:

a) Graphics, text, styles, macros

b) Customized word command setting

c) Auto text entries

d) All of above

14. What do you mean by vertical separation between columns?

a) Orientation

b) Gutter

c) Margin

d) Index

15. The default header for a worksheet is

a) The sheet tab name

b) Your name

c) The date and time

d) None of these

16. Which of the following is an absolute cell reference?

a) A1

b) !A!!

c) $A$1

d) #a#1

17. Which symbol must all formula begin with:

a) @

b) =

c) +

d) (

18. To add two cells (A1 and A2) together you use the following formula:

a) A1 plus A2

b) =A1 + A2

c) =Add(A1+A2)

d) =together(A1:A2)

19. In an excel sheet the active cell is indicated by:

a) A blinking border

b) A dark wide boarder

c) A dotted border

d) None of above

20. You can create hyperlinks from the Excel workbook to

a) A webpage on company internet

b) A web page on the internet

c) Other office 97 application documents

d) All of above

21. The advantage of using a spreadsheet is

a) Calculations can be done automatically

b) Changing data automatically updates calculations

c) More flexibility

d) All of a the above

22. There are three types of data found in a spreadsheet:

a) Numbers, formulas, labels

b) Data, words, numbers

c) Equations, data, numbers

d) Words, numbers, labels

23. To merge the cells which tab do you use from the format, cells menu?

a) Merge tab

b) Number tab

c) Alignment tab

d) Font tab

24. How do you rearrange the date in ascending or descending order?

a) Data, subtotals

b) Data, sort

c) Data, form

d) Data, table

25. Which of the following is not a data base application?

a) Access

b) dBase

c) edit

d) FoxPro

26. Size of a database are usually measured in terms of

a) Gigabytes

b) Terabytes

c) Megabyte

d) Data bytes

27. An organized collection of logically related data is known as

a) Data versus information

b) Data

c) Meta data

d) Database

28. Which of the following is NOT one of the four major data processing functions of a computer?

a) Storing data or information

b) Gathering data

c) Processing data into information

d) Analyzing the data or information

29. A field that uniquely identify each record in a table is:

a) Index key

b) Main field

c) Primary key

d) Key field

30. How can you stop a slide show?

a) Press the down arrow

b) Press the right arrow

c) Press escape

d) Press the left arrow

31. What would I choose to create a pre-formatted style?

a) Slide design

b) Slide sorter

c) Slide layout

d) Slide transition

32. Which view shows all the slides at once?

a) Slide show view

b) Normal view

c) All slide view

d) Slide sorter view

33. What is the syntax to write the HTML tags?

a)

b) (html)

c) <% html>

d) “ html “

34. Which is not HTML tag?

a) Dr

b) Tr

c) Br

d) Hr

35. Email uses …….. protocol to transfer data from client to email server?

a) www

b) SMTP

c) HTTP

d) All of above

36. Which operation is not performed by computers?

a) Understanding

b) Processing

c) Inputting

d) Controlling

37. The word length of mainframe computer is

a) 32 to 64 bit

b) 8 to 16 bit

c) 16 to 32 bit

d) None of above

38. The input unit of a computer

a) Directs all other units

b) Feeds data to the CPU or memory

c) Retrieves data from CPU

d) All of the above

39. Which of the following holds the ROM, CPU, RA and expansion cards?

a) Motherboard

b) Hard disk

c) Floppy disk

d) None of the above

40. Which of the following device can be used to directly input printed text?

a) MICR

b) OCR

c) OMR

d) None of the above

41. CD-ROM is a

a) Magnetic memory

b) Semiconductor memory

c) Memory register

d) None of the above

42. Actual execution of instructions in a computer takes place in:

a) Storage unit

b) ALU

c) Control unit

d) None of the above

43. Software can be categories into

a) Six major groups

b) Three major groups

c) Four major groups

d) Five major groups

44. An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called

a) Trojan horse

b) Virus

c) Worm

d) Denial-of-service-attack

45. Typical data transfer rate in LAN are the order of

a) Mega bits per sec

b) Bits per sec

c) Kilo bits per sec

d) None of the above

46. The errors that can be pointed out by the compiler are

a) Logical errors

b) Syntax errors

c) Semantic errors

d) None of the above

47. The ASCII code of ‘A’ is

a) 01100011

b) 66H

c) 41H

d) 01000010

48. In the URL http://lokesewa.com.np the portion labeled http is the

a) Top-level domain

b) Host

c) Domain name

d) Protocol

49. The number of pixels displayed on a screen is known as the screen

a) Viewing size

b) Resolution

c) Color depth

d) Refresh rate

50. Which one is example of GUI?

a) Linux

b) Window XP

c) Windows 7

d) All of above

ANSWERS
1 – d – All of above
2 – c – Virus scanning
3 – a – Recycle bin
4 – b – My documents
5 – c – doc
6 – d – subscript
7 – a – To allow page headers and footers to appear on document when it is printed
8 – d – F7
9 – d – synonyms and antonyms
10 – b – insert -> object menu option
11 – b – to quickly jump to a specific location in the document
12 – a – small programs created in MS-Word to automate repetitive tasks by using VBA
13 – d – all of above
14 – c – margin
15 –
16 – c - $A$1
17 – b - =
18 – b – = A1 + A2
19 – b – a dark wide border
20 – d – all of above
21 – d – all of above
22 – a – numbers, formula, labels
23 – c – alignment tab
24 – b – data, sort
25 – c – edit
26 – a – gigabytes (?)
27 – d – database
28 – b – gathering data
29 – c – primary key
30 – c – press escape
31 – a – slide design
32 – d – slide sorter view
33 – a -
34 – a – dr
35 – b – smtp
36 – a – understanding
37 – a – 32 to 64 bit (?)
38 – b – feeds data to the CPU or memory
39 – a – mother board
40 – b – OCR
41 – d – None of the above (CD ROM is an optical storage device)
42 – b – ALU (?)
43 – b – three major groups
44 – d – Denial of service attack
45 – a – mega bits per sec
46 – b – syntax error
47 – d – 01000010
48 – d – protocol
49 – b – resolution
50 – d – all of above

1. Which among the following is a device , that is used in computers to add external components?
(A)Storage Device such as USB
(B)Keyboard
(C)Ports / System Boards
(D)RAM
2. The term Round-trip delay time, used in telecommunication is replaced in computers with which among the following?
(A)Access time
(B)Response time
(C)Entrance time
(D)Ping Time

3. The One-time password (OTPs) can be obtained by a customer, via which among the following?
(A)Approaching the nearest Bank Branch
(B)SMS on Mobile
(C)E-mail by applying for OTP online
(D)All of above


4. The terms "push and pull services" in context with the Banking are used in which among the following generally?
(A)Rural Banking
(B)Unit Banking
(C)Online Banking
(D)Mobile Banking
Mobile Banking, refers to sms sending on customer's request and without requests

5. Consider the following in context with the CVV or Card security code of an ATM or Credit Card:
1.Magnetic Stripe
2.Front of the in embossed or printed digits
3.Back of the card as a separate group of 3 digits to the right of the signature strip
At which among the above locations CVV or Card Security Code of an ATM is found?
(A)1 & 2
(B)2 & 3
(C)1 & 3
(D)1, 2 & 3

6. What do we call the process of collecting, organizing, storing and otherwise maintaining a complete historical record of programs and other documents used or prepared during the different phases of the system?
(A)Segmentation
(B)Documentation
(C)Data Management
(D)Data History

7. Which among the following is an example of "Card not present transaction" in context with the Credit / Debit Cards?
(A)A person paying a restaurant bill by giving details of his credit card
(B)A person making an online purchase using his / her credit card
(C)A person making a purchase using mobile banking
(D)Both 2 & 3

8. Consider the following:
1. Application software
2. Hardware
3. Operating systems
The PDF documents are dependent upon which among the above to display the text, fonts, graphics, and other information contained by them?
(A)Only 1
(B)1 & 2
(C)1, 2 & 3
(D)None of them

9. As a person working in internet banking environment, why you should be aware of the "Dictionary attack"?
(A)It is used to inject worms or viruses in the system
(B)It is used to determine a password
(C)It is used to access customer's account by determining other details
(D)It is used for stealing info from the Credit Card

10. Consider the following:
1. Software
2. Hardware
3. Internet Programmes
The terms Bug and Debugging are generally used in which among the above?
(A)1 & 2
(B)2 & 3
(C)1 & 3
(D)1, 2 & 3

11. What is ISO 9362 is related to in context with Banking Technology?
(A)RTGS Transfers
(B)NEFT Transfers
(C)SWIFT Transfers SWIFT Transfers, refers to SWIFT Code
(D)All of them

12. The Clearing House Interbank Payments System or CHIPS is a clearing system for large value transactions in which among the following countries / regions?
(A)United States
(B)United Kingdom
(C)Entire Europe
(D)Australia

13. The terms Goodput , Throughput and Maximum throughput are most closely associated with which among the following in computers?
(A)Bit Rate
(B)Response Time
(C)Command Line Interface
(D)Random memory

14. Which among the following is the time period during which a computer is malfunctioning or not operating correctly due to machine failures?
(A)Downtime
(B)Uptime
(C)Response time
(D)Runtime

15. What would be the number of bytes, transferred at the rate of 1 Kilobit per second?
(A)100
(B)108
(C)125
(D)140

In Context with the computer terminology, how many bits are there in a nibble?
(A)2
(B)4
(C)8
(D)16
(E)32


1
MONDAY, JUNE 6, 2011
Union Bank of India PO Exam Solved Paper 2011 : Computer Awareness
Computer Knowledge
1. You can keep your personal files/folders in
(A) My folder (B) My Documents (C) My Files (D) My Text (E) None of these
2. The primary purpose of software is to turn data into
(A) Web sites (B) Information (C) Programs (D) Objects (E) None of these
3. A directory within a directory is called
(A) Mini Directory (B) Junior Directory (C) Part Directory (D) Sub Directory (E) None of these
4. A compiler translates a program written in a high-level language into
(A) Machine language (B) An algorithm (C) A debugged program (D) Java (E) None of these
5. When you turn on the computer, the boot routine will perform this test
(A) RAM test (B) Disk drive test (C) Memory test (D) Power-on self-test (E) None of these
6. A ……is a unique name that you give to a file of information.
(A) device letter (B) folder (C) filename (D) filename extension (E) None of these
7. Hardware includes
(A) all devices used to input data into a computer
(B) sets of instructions that a computer runs or executes
(C) the computer and all the devices connected to it that are used to input and output data
(D) all devices involved in processing information including the central processing unit, memory and
storage
(E) None of these
8. A ……… contains specific rules and words that express the logical steps of an algorithm.
(A) programming language (B) syntax (C) programming structure (D) logic chart (E) None of
these
9. All the deleted files go to
(A) Recycle Bin (B) Task Bar (C) Tool Bar (D) My Computer (E) None of these
2
10. The simultaneous processing of two or more programs by multiple processors is
(A) Multiprogramming (B) Multitasking (C) Time-sharing (D) Multiprocessing (E) None of these
11. The secret code that restricts entry to some programs
(A) Password (B) Passport (C) Entry-code (D) Access-code (E) None of these
12. Computers use the ……… number system to store data and perform calculations.
(A) binary (B) octal (C) decimal (D) hexadecimal (E) None of these
13. The main function of the ALU is to
(A) Perform arithmetic and logical operations
(B) Store data and information for future use
(C) Control computer output, such as printing
(D) Monitor all computer activities
(E) None of these
14. ……is the process of carrying out commands.
(A) Fetching (B) Storing (C) Executing (D) Decoding (E) None of these
15. Softcopy is the intangible output, so then what is hardcopy ?
(A) The physical parts of the computer
(B) The printed parts of the computer
(C) The printed output
(D) The physical output devices
(E) None of these
16. A(n) ……… is a program that makes the computer easier to use.
(A) utility (B) application (C) operating system (D) network (E) None of these
17. A complete electronic circuit with transistors and other electronic components on a small
silicon chip is called a(n)
(A) Workstation (B) CPU (C) Magnetic disk (D) Integrated circuit (E) None of these
18. Computer systems are comprised of
(A) Hardware, programs, processors, procedures and people
(B) Hardware, programs, information, people and procedures
(C) Hardware, programs, information, people and networks
(D) Hardware, software, procedures, networks and people
(E) None of these
19. An error in a computer program
(A) Crash (B) Power Failure (C) Bug (D) Virus (E) None of these
3
20. What is output ?
(A) What the processor takes from the user
(B) What the user gives to the processor
(C) What the processor gets from the user
(D) What the processor gives to the user
(E) None of these
21. The person who writes and tests computer programs is called a
(A) programmer (B) computer scientist (C) software engineer (D) project developer (
22. A set of instructions telling the computer what to do is called
A) mentor (B) instructor (C) compiler (D) program (E) None of these
23. What menu is selected to print ?
(A) Edit
(B) Special
(C) File
(D) Tools
(E) None of these
24. What is backup ?
(A) Adding more components to your network
(B) Protecting data by copying it from the original source to a different destination
(C) Filtering old data from the new data
(D) Accessing data on tape
(E) None of these
25. The term bit is short for—
(A) Megabyte
(B) Binary language
(C) Binary digit
(D) Binary number
(E) None of these
26. A saved document is referred to as a
(A) file
(B) word
(C) folder
(D) project
(E) None of these
27. Specialized programs that assist users in locating information on the Web are called
4
(A) Information engines
(B) Search engines
(C) Web browsers
(D) Resource locators
(E) None of these
28. An application program has which one of the following functions ?
(A) It specifies the information processing procedures required by a particular information processing
job
(B) It controls the input/output and storage functions of the computer system
(C) It provides various support services for the computer system
(D) It supervises the operations of the CPU
(E) None of these
29. In page preview mode—
(A) You can see all pages of your document
(B) You can only see the page you are currently working
(C) You can only see pages that do not contain graphics
(D) You can only see the title page of your document
(E) None of these
30. An operating system that can do multitasking means that
(A) The operating system can divide up work between several CPUs
(B) Several programs can be operated concurrently
(C) Multiple people can use the computer concurrently
(D) All of the above
(E) None of these
31. The quickest and easiest way in Word, to locate a particular word or phrase in a document
is to use the ……… command.
(A) Replace
(B) Find
(C) Lookup
(D) Search
(E) None of these
32. What is the default file extension for all Word documents ?
(A) WRD
(B) TXT
(C) DOC
(D) FIL
(E) None of these
5
33. With a CD you can
(A) Read
(B) Write
(C) Read and Write
(D) Either Read or Write
(E) None of these
34. A collection of interrelated records is called a
(A) Utility file
(B) Management information system
(C) Database
(D) Spreadsheet
(E) None of these
35. To move to the beginning of a line of text, press the ……… key.
(A) PageUp
(B) A
(C) Home
(D) Enter
(E) None of these
36. The term ‘user interface’ refers to—
(A) What the user sees on the screen and how they can interact with it
(B) How the operating system responds to user commands
(C) the means by which the user interacts with the peripheral devices on the computer
(D) The monitor that is available for the computer
(E) None of these
37. The background of any Word document
(A) Is always white colour
(B) Is the colour you preset under the Options menu
(C) Is always the same for the entire document
(D) Can have any colour you choose
(E) None of these
38. Reusable optical storage will typically have the acronym
(A) CD (B) DVD (C) ROM (D) RW (E) None of these
39. For creating a document, you use ……… command at File Menu.
(A) Open (B) Close (C) New (D) Save (E) None of these
40. The contents of ……… are lost when the computer turns off.
(A) storage (B) input (C) output (D) memory (E) None of these
6
41. Grouping and processing all of a firm’s transactions at one time is called
(A) A database management system
(B) Batch processing (C) A real-time system (D) An on-line system (E) None of these
42. A printer is this kind of device
(A) Input (B) Word processing (C) Processing (D) Output (E) None of these
43. Text in a column is generally aligned
(A) Justified (B) Right (C) Center (D) Left (E) None of these
44. What type of device is a computer mouse ?
(A) Input (B) Output (C) Software (D) Storage (E) None of these
45. In Excel, Charts are created using which option ?
(A) Chart Wizard (B) Pivot Table (C) Pie Chart (D) Bar Chart (E) None of these
46. What is the permanent memory built into your computer called ?
(A) RAM (B) ROM (C) CPU (D) CD-ROM (E) None of these
47. If text was highlighted and ‘Edit’ ‘Copy’ was clicked, what would happen ?
(A) Text would be copied from the document and placed in the clipboard
(B) Text would be removed from the document and placed in the clipboard
(C) Text from the clipboard would be placed in the document at the place where the cursor is
blinking
(D) (B) and (C) above
(E) None of these
48. You can start Microsoft Word by using ……… button.
(A) New (B) Start (C) Program (D) Control Panel (E) None of these
49. You click at B to make the text—
(A) Italics (B) Underlined (C) Italics and Underlined (D) Bold (E) None of these
50. The……becomes different shapes depending on the task you are performing.
(A) Active tab (B) Insertion point (C) Mouse pointer (D) Ribbon (E) None of these
Answers:
1.b, 2.b, 3. D 4. A, 5. b, 6. d, 7. d, 8. a, 9. a, 10. d, 11. a, 12. a, 13. a, 14. c, 15. c, 16. a, 17. d, 18. d,
19. c, 20. d, 21. d, 22. d, 23. c, 24. b, 25. c, 26. a, 27. b, 28. a, 29. a, 30. b, 31. b, 32. c, 33. c, 34. c,
35. c, 36. a, 37. d, 38. d, 39. c, 40. d, 41. c, 42. d, 43. d, 44. a, 45. a, 46. b, 47. a, 48. c, 49. c, 50.c

No comments:

Post a Comment