Search

Monday, October 31, 2011

F R I D AY , A U G U S T 2 0 , 2 0 1 0
Allahabad Bank PO Exam., 2010 : Computer Awareness
Allahabad Bank PO Exam., 2010
1. A………typically connects personal computers within a very limited geographical area, usually
within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)
2. Computers manipulate data in many ways, and this manipulation is called—
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)
3. An e-mail address typically consists of a user ID followed by the ……… sign and the name of the
e-mail server that manages the user’s electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)
4. Software applies……, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)
5. A file extension is separated from the main file name with a(n) ……, but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)
6. An ad hoc query is a—
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)
7. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)
8. A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself,
and spread to other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Ans : (B)
9. The desktop contains small graphics called—
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Ans : (C)
10. C, BASIC, COBOL, and Java are examples of ……… languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)
11. A(n)………camera is a peripheral device used to capture still images in a digital format that can
be easily transferred into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Ans : (A)
12. ……makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) E-commerce
(C) E-spend
(D) E-business
(E) None of these
Ans : (D)
13. Networks are monitored by security personnel and supervised by ………who set(s) up accounts
and passwords for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Ans : (C)
14. Application software is designed to accomplish—
(A) real-world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Ans : (D)
15. A telephone number, a birth date, and a customer name are all examples of—
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Ans : (D)
16. The human-readable version of a program is called—
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Ans : (D)
17. A ……… computer (also referred to as a laptop), is a small, lightweight personal computer that
incorporates the screen, the keyboard, storage, and processing components into a single portable
unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
Ans : (A)
18. ……… is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Ans : (C)
19. Programs such as Internet Explorer that serve as navigable windows into the Web are called—
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Ans : (D)
20. A ……… is a device that not only provides surge protection, but also furnishes your computer
with battery backup power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Ans : (C)
21. When you save to ………, your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
Ans : (C)
22. The motherboard is the—
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Ans : (D)
23. A computer-intensive problemruns on a—
(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these
Ans : (C)
24. A(n)……converts and executesone statement at a time.
(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these
Ans : (B)
25. The term ……… designates equipment that might be added to a computer system to enhance its
functionality.
(A) digital device
(B) system add-on
(C) disk pack
(D) peripheral device
(E) None of these
Ans : (D)
26. Approximately how many bytes make one megabyte ?
(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these
Ans : (D)
27. What is MP3 ?
(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these
Ans : (C)
28. All the deleted files go to—
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)
29. ……… this is the act of copying or downloading a program from a network and making multiple
copies of it.
(A) Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site-license piracy
(E) None of these
Ans : (C)
30. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)
31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
Ans : (B)
32. In MICR, C stands for ……….
(A) Code
(B) Colour
(C) Computer
(D) Character
(E) None of these
Ans : (D)
33. Fax machines and imaging systems are examples of—
(A) bar-code readers
(B) imaging systems
(C) scanning devices
(D) pen-based systems
(E) None of these
Ans : (B)
34. When writing a document, you can use the ……… feature to find an appropriate word or an
alternative word if you find yourself stuck for the right word.
(A) dictionary
(B) word finder
(C) encyclopedia
(D) thesaurus
(E) None of these
Ans : (A)
35. Which key is used in combination with another key to perform a specific task ?
(A) Function
(B) Control
(C) Arrow
(D) Space bar
(E) None of these
Ans : (B)
36. A disk’s content that is recorded at the time of manufacture and that cannot be changed or
erased by the user is—
(A) read-only
(B) memory-only
(C) run-only
(D) write-only
(E) None of these
Ans : (A)
37. In an information system, alphanumeric data normally takes the form of—
(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these
Ans : (B)
38. A Website’s main page is called its—
(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these
Ans : (A)
39. When installing ………, the user must copy and usually decompress program files from a
CDROM or other medium to the hard disk.
(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these
Ans : (A)
40. A collection of interrelated files in a computer is a—
(A) file manager
(B) field
(C) record
(D) database
(E) None of these
Ans : (D)
41. A ……… computer is a large and expensive computer capable of simultaneously processing
data for hundreds or thousands of users.
(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these
Ans : (B)
42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these
operating systems, a trackball is described as—
(A) a roller ball which moves the cursor
(B) a pen-shaped device which allows data to be entered through the CRT screen
(C) a figure which resembles a familiar office device
(D) an outdated input device
(E) None of these
Ans : (A)
43. Various applications and documents are represented on the Windows desktop by—
(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these
Ans : (D)
44. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these
Ans : (D)
45. The real business and competitive value of information technology lies in—
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many
companies
(D) The capabilities of the hardware and the speed at which it processes information
(E) None of these
Ans : (B)
46. Companies use which of the following vendors to provide access to software and services rather
than purchasing the applications and maintaining the applications themselves ?
(A) Open source vendors
(B) Alliances
(C) Application service providers
(D) All of the above
(E) None of these
Ans : (C)
47. Which one of the following would be considered as a way that a computer virus can enter a
computer system ?
(A) Opening an application previously installed on the computer
(B) Borrowed copies of software
(C) Viewing a website without causing any additional transactions
(D) Running antivirus programs
(E) None of these
Ans : (B)
48. Collecting personal information and effectively posing as another individual is known as the
crime of—
(A) spooling (B) dentity theft (C) spoofing (D) hacking (E) None of these Ans : (B)
49. The first step in the transaction processing cycle is—
(A) database operations
(B) audit
(C) data entry
(D) user inquiry
(E) None of these
Ans : (C)
50. In the information systems concept, the output function involves—
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation process to their ultimate
destination
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the
achievement of its goal
(E) None of these
Ans : (A)


Prepared BY: Vaibhav Gupta vaibhavbindlish@gmail.com
BANK EXAMS COMPUTER KNOWLEDGE QUESTIONS
1. Compiler is the
(a) name given to the computer operator
(b) part of the digital machine to store the information
(c) translator of source program to object
(d) part of arithmetic logic unit
(e) operator of Boolean Algebra
Ans (c)
2. Main memory is
(a) Random Access Memory
(b) Read only Memory
(c) Serial Access Memory
(d) None of these
Ans (a)
3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer
(b) Quantum Computer
(c) Param-10,000
(d) IBM chips
Ans (b)
4. A compact disc (CD) is a data storage of the type
(a) Magnetic
(b) Optical
(c) Electrical
(d) Electromechanical
Ans (a)
5. Which of the following is not as language for computer programming?
(a) WINDOWS
(b) PASCAL
(c) BASIC
(d) COBOL
Ans (a)
6. What are the two basic types of memory that your computer uses?
a) RAM
(b) RW/RAM
(c) ROM
(d) ERAM
Ans (a)
7. The term gigabyte refers to
(a) 1024 bytes
(b) 1024 kilobytes
(c) 1024 megabytes
(d) 1024 gigabytes
Ans (c)
8. A computer with CPU speed around 100 million instructions per second & with the word length of
around 64 bits is known as
(a) Super computer
(b) Mini computer
(c) Micro computer
(d) Micro computer
Ans (a)
9. What digits are representative of all binary numbers?
Prepared BY: Vaibhav Gupta vaibhavbindlish@gmail.com
(a) 0
(b) 1
(c) Both (a ) and (b)
(d) 3
Ans (c)
10. To locate a data items for storage is
(a) Field
(b) Feed
(c) Database
(d) Fetch
Ans (d)
11. Off-line operation is the operation of devices without the control of
(a) Memory
(b) CPU
(c) ALU
(d) Control unit
Ans (b)
12. A type of line printer that uses an embossed steel band to form the letters printed on the paper is
(a) Golf ball printer
(b) Dot-matrix printer
(c) Laser printer
(d) Band printer
Ans (d)
13. A software used to convert source program instructions to object instruction is known as
(a) Compiler
(b) Assembler
(c) Interpreter
(d) Language processor
14. The 'IC' chip, used in computers, is made of
(a) Chromium
(b) Iron oxide
(c) Silica
(d) Silicon
Ans (d)
15. Name the first general purpose electronic computer
Ans : UNIVAC
16. The size of commonly used Floppy disk is
(a) 4.5”
(b) 3.5”
(c) 3.25”
(d) 5.5”
Ans (b)
17. Which of the following statement is wrong
(a) Windows XP is an operating system
(b) Linux is owned and sold by Microsoft
(c) Photoshop is a graphical design tool by Adobe
(d) Linux is free and open source software
Ans (b)
18. Operating system of a computer
(a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references
(c) Provides a layer, user friendly interface
(d) None of the above
Ans (c)
19. The term ‘Operating System’ means
Prepared BY: Vaibhav Gupta vaibhavbindlish@gmail.com
(a) A set of programs which control computer working
(b) The way a user operates the computer system
(c) Conversion of high level language to machine language
(d) The way computer operator works
Ans (a)
20. Wild card operators specifies
(a) can be used when writing into multiple files
(b) allows several files to be read simultaneously
(c) Provide an easy way of groups of related files
(d) Are only used when printing the contents of a file
Ans (c)
21.Which one of the following is not a broadband communication medium
(a) Microwave
(b) Fibre optic cable
(c) Twisted pair
(d) Coaxial cable
Ans (c)
22.Which of the following performs modulation and demodulation
(a) Coaxial cable
(b) Satellite
(c) Modem
(d) Optical fibre
Ans (c)
23. Which one of the following is not an application software package
(a) Redhat Linux
(b) Microsoft Office
(c) Adobe PageMaker
(d) Open Office
Ans (a)
24. Who is the father of computer
Ans : Charles Babbage
25.The function of key F4 is
Ans : To repeat the last action
26.The function of key F4 is
Ans : To repeat the last action
27. The 0 and 1 in the binary numbering system are called binary digits or .......
(a) bytes
(b) kilobytes
(c) decimal bytes
(d) bits
Ans (D)
28. A monitor's ...... is the distance between the holes in the mask behind the screen. This helps
determine how sharp the dots appear.
(a) refresh rate
(b) dot pitch
(c) resolution
(d) colour depth
Ans (B)
29. A directly accessible appointment calendar is a feature of a ....... resident package.
(a) CPU
(b) memory
(c) Buffer
(d) ALU
Ans (B)
30. Perforated paper used as input or output media is known as
Prepared BY: Vaibhav Gupta vaibhavbindlish@gmail.com
(a) Paper tape
(b) Magnetic tape
(c) Punched paper tape
(d) Card punch
Ans (A)
31. The invention of the slide rule is attributed to
(a) Babbage
(b) Oughtred
(c) Pascal
(d) Napier
Ans (B)
32. Which of the following is not an advantage of magnetic disk storage.
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) All of the above
Ans (e)
33. The memory sizes in mainframe computers and advanced technology micro computer are expressed
as
(a) Bytes
(b) Kilo-bytes
(c) Bits
(d) Megabytes
Ans (d)
34. A prefix for billion which is equal to .... is called as billi.
(a) 100
(b) 10000
(c) 1000
(d) 10
Ans (d)
35. Each model of a computer has a unique
(a) Assembly language
(b) Machine language
(c) High level language
(d) All of the above
Ans (b)
36. One kilobyte = ____ byte.
(a) 1250
(b) 2088
(c) 1024
(d) 1000
Ans (c)
37. Which of the following circuit is used as a 'Memory device' in computers?
(a) Rectifier
(b) Flip-Flop
(c) Comparator
(d) Attenuator
Ans (b)
38. To move the cursor to the end of the document press
Ans : Ctrl + End
39. In Word Processing the red underline indicates
Ans : Spelling mistakes
40. The shortcut key to print documents is
Ans : Ctrl + P
41. First layer in the OSI reference model is
Prepared BY: Vaibhav Gupta vaibhavbindlish@gmail.com
(a) Data link
(b) Network
(c) Physical
(d) Application
Ans (c)
42. Viruses, Trojan horses and Worms are
(a) able to harm computer system
(b) unable to detect if affected on computer
(c) user-friendly applications
(d) harmless applications resident on computer
Ans (a)
43. Program threats are
(a) Trap doors
(b) Trojan horse
(c) Both (a) & (b)
(d) All of the above
Ans (b)
44. Failure of passwords security due to exposure can result from
(a) Electronic monitoring
(b) Visual
(c) Both (a) & (b)
(d) All of the above
Ans (c)
45. Data security threats include
(a) Hardware failure
(b) Privacy invasion
(c) Fraudulent manipulation of data
(d) All of the above
Ans (b)
46. The bar which displays information about the current page number is
Ans : Status bar
47. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar
(b) Windows
(c) Desktop
(d) Icons
Ans (d)
48. Who invented the super-computer?
(a) P.T Farnsworth
(b) J.R Whinfield
(c) J.H. Van Tassell
(d) Charles Ginsberg
Ans (c)
49. Accessing records from a file directly without searching from the beginning of the file is
(a) Time sharing
(b) Random
(c) Direct access
(d) Access time
(e) None of the above
Ans (c)
50. Time during which a job is processed by the computer is
(a) Delay time
(b) Real time
(c) Execution time
Prepared BY: Vaibhav Gupta vaibhavbindlish@gmail.com
(d) Down time
Ans (c)

No comments:

Post a Comment