Tuesday 25 September 2012

SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER KNOWLEDGE MCQs


1. Internet Protocol Version 4, Consists of how many bits?
1) 16 bits
2) 8 bits
3) 30 bits
4) 32 bits
5) 64 bits

2. A computer virus is a software program which has the essential ability to-
1) Clone itself
2) Hide itself
3) Damage Program
4) Damage Data
5) None

3. Which of the following is the short cut for opening Task Manager?
1) Ctrl + Shift + Del
2) Alt + Shift + Del
3) Ctrl + Alt + Del
4) Alt + Windows + Del
5) None

4. A ....... is approximately equal to one billion bytes.
1) Kilobyte
2) Bit
3) Gigabyte
4) Megabyte
5) None

5. Which of the following operations is not performed by Computer?
1) Taking the input
2) Processing
3) Controlling
4) Understanding
5) None

6. ....... is a set of computer programs used on a computer to help perform tasks.
1) An instruction
2) Software
3) Memory
4) Processor
5) None

7. What is the capacity of a standard 3.5'' floppy disk?
1) 1.44 GB
2) 1.44 MB
3) 1.44 KB
4) 1.44 B
5) None

8. Which of the following Operating Systems does not have a Graphical User Interface?
1) UNIX
2) LINUX
3) Microsoft Windows
4) Mac OS
5) None

9. Which of the following shortcut keys is used to check spelling in Microsoft Word?
1) F1
2) F5
3) F4
4) F7
5) None


Thursday 20 September 2012

COMPUTER KNOWLEDGE PRACTICE QUESTIONS


1. Which of the following is most essential for effective multimedia presentations incorporates user participation or ....
1) Links
2) Buttons
3) Interactivity
4) Integration
5) None

2. Most of the websites have moving graphics, which are called as:
1) animations
2) vectors
3) links
4) morphs
5) None

3. Which of the following is the term used to enlarge a window to its maximum area so that it fills the entire desktop?
1) Maximize
2) Zoom
3) Enlarge
4) Extend
5) None of these

4. Microsoft Windows and Apple Mac are widely used Operating systems in today's world. Which of the following feature makes them so popular?
1) Multitasking Capacity
2) Calligraphy
3) User-friendly GUI
4) Being Inexpensive
5) None of these

5. Physical components of a computer are called:
1) Hardware
2) Software
3) Viruses
4) Internet
5) None of these

6. Which of the following is an object oriented feature:
1) Structured Programming
2) Multi-Tasking
3) Linking
4) Inheritance
5) None of these

7. In Windows XP, which of the following views is the best to see the file size and modified dates of all files in a folder.
1) List
2) Icon
3) Thumbnails
4) Details
5) None of these

8. Which of the following keys is used to remove a character on the right of the cursor
in a word document?
1) Home
2) End
3) Delete
4) Backspace
5) None of these


Thursday 6 September 2012

COMPUTER KNOELEDGE MCQ CAPSULES FOR ALL BANK EXAMS


1. Which of the following powerpoint view displays each slide of the presentation as a thumbnail and is useful for rearranging slides?
1) Slide show
2) Slide master
3) Slide sorter
4) Notes Page
5) Design Slide

2. A set of rules for telling the computer what operations to perform is / are called:
1) Structures
2) Procedural Language
3) Command Language
4) Natural Language
5) Programming Language

3. Devices that enter information and let you communicate with the computer are called:
1) Software
2) Hardware
3) Output Devices
4) Input / Output devices
5) Input Devices

4. The speed of which of the following memory chips is faster?
1) Not Fixed
2) DRAM
3) SRAM
4) For smaller chips SRAM is faster
5) For larger chips DRAM is faster

5. Mahesh Babu has his cute childhood photos in an album which might fade out in a couple of years, which he wants to show it to his fans by uploading it in his twitter account. Which of the following devices can he use to do that?
1) Keyboard
2) Mouse
3) Printer
4) Scanner
5) None of these

6. Which of the following is not a social networking site?
1) WAYN
2) Hi 5
3) Orkut
4) Yahoo
5) Facebook

7. In the URL https://twitter.com, what does 's' represent in 'https'?
1) Safe
2) System
3) Start-up
4) Semantic
5) Secured

Wednesday 29 August 2012

SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER AWARENESS MCQs


1. Which type of memory gets lost when you switch off?
1) ROM
2) RAM
3) CACHE
4) Dynamic
5) Static

2. Which type of network would use phone lines?
1) WAN
2) LAN
3) WWAN
4) Wireless
5) None of these

3. Speakers / Headphones are ____ devices.
1) Input
2) Input/ Output
3) Software
4) Storage
5) Output

4. A program for viewing web pages is called:
1) hardware
2) software
3) storage
4) browser
5) None of these

5. A computer cannot perform which of the following functions?
1) Addition
2) Subtraction
3) Bake a cake
4) Division
5) None of these

6. CD's or DVD's are ____ type of devices.
1) Input
2) Output
3) Software
4) Storage
5) Input/output

7. In the URL 'www.dbsdynamic.blogspot.in' what does the domain name extension '.in' represent?
1) International
2) internet
3) intra net
4) India
5) None of these

8. Free of cost repair of the software bug available in internet is called:
1) Version
2) Ad-on
3) Tutorial
4) FAR
5) Patch

9. Which of the following is READ only disc?
1) DVD-R
2) DVD-ROM
3) DVD-RW
4) CD-R
5) None of these

10. Which of the following is an/ are advantages of LAN?
1) Sharing peripherals
2) Backing up your data
3) Saving all your data
4) Accessing the web
5) Automatic printing of data


Monday 30 July 2012

SBI ASSOCIATE BANKS CLERKS EXAM COMPUTER AWARENESS PRACTICE QUESTIONS



1. What is e-commerce?
1) Buying and selling of international goods
2) Buying and selling of products and services over the internet
3) Buying and selling of products having to do with computers
4) Buying and selling of products and services not found in stores
5) Buying and selling of electronic goods

2. The term user Interface refers to :
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to the user commands
3) The means by which the user interacts with the peripheral devices on the  computer
4) All of these
5) None of these

3. Which of the following is not an input device?
1) Keyboard
2) Joystick
3) Monitor
4) Microphone

5) None of these

4. An error is also known as :
1) Debug
2) Bug
 3) Cursor
4) Icon
5) None of these

5. Archive is :
1) Back-up Storage
2) Forward Operation
3) Primary Storage
4) Name of famous processor
5) None of these

6. Which media has the ability to have data/information written on them by users more than once
1) CD-R disks
2) CD-RW disks
3) Zip disks
4) Opti disks
5) Both CD-RW and Zip disks

7. BCC in regard to emails, stands for :
1) Best Client Copy
2) Better Communication Copy
3) Best Computer Copy
4) Better Client Copy
5) None of these

Tuesday 17 July 2012

COMPUTER AWARENESS PRACTICE QUESTIONS

1. Hackers ………………
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) break into other people's computers
Answer: break into other peoples computers

2. Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
Answer: software piracy

3. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
Answer: spam

4. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
Answer: Overhead Projections

5. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
Answer: A Sound Format

6. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
Answer: PCs

7. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
Answer: Microphone

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. If you wish to extend the length of the network without having the signal degrade, you would use a ………………
(A) resonance
(B) router
(C) gateway
(D) repeater
Answer: repeater

2. A repair for a known software bug, usually available at no charge on the Internet, is called a ………………
(A) version
(B) patch
(C) tutorial
(D) FAQ
Answer: patch

3. URL stands for ………………
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
Answer: Uniform Resource Locator

4. When data changes in multiple lists and all lists are not updated, this causes ………………
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
Answer: data inconsistency

5. What is a backup ?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
Answer: An exact copy of a systems information

6. The Internet is ………………
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) a communication system for some states of India
Answer: a large network of networks

7. Computers that are portable and convenient for users who travel are known as ………………
(A) supercomputers
(B) planners
(C) minicomputers
(D) laptops
Answer: laptops

Monday 16 July 2012

COMPUTER KNOWLEDGE PRACTICE MCQs

1.What is the ultimate purpose of Defragmentation ?
1) Make the PC faster
2) Create More Free Space
3) Delete temporary files
4) Reduce Power consumption
5) All of the above

2.Computers process data into information by working exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these

3.You must install a (n) ......... on a network if you want to share a broadband Internet connection
1) router
2) modem
3) node
4) cable
5) None of these

4.The purpose of the primary key in a database is to :
1) unlock the database
2) provide a map of the data
3) uniquely identify a record
4) establish constraints on database operations
5) None of these

5.The design of the network is called the network
1) architecture
2) server
3) transmission
4) type
5) None of these

6.The most frequently used instructions of a computer program are likely to be fetched from:
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these

7.Personal logs or journal entries posted on the Web are known as :
1) listservs
2) Webcasts
3) blogs
4) subject directories
5) None of these

COMPUTER KNOWLEDGR PRACTICE QUESTIONS FOR BANK EXAMS

1. Compiler is the
(a) name given to the computer operator
(b) part of the digital machine to store the information
(c) translator of source program to object
(d) part of arithmetic logic unit
(e) operator of Boolean Algebra
Ans (c)


2. Main memory is
(a) Random Access Memory (b) Read only Memory
(c) Serial Access Memory (d) None of these
Ans (a) 


3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer (b) Quantum Computer
(c) Param-10,000 (d) IBM chips
Ans (b) 


4. A compact disc (CD) is a data storage of the type
(a) Magnetic (b) Optical (c) Electrical (d) Electromechanical
Ans (a) 


5. Which of the following is not as language for computer programming?
(a) WINDOWS (b) PASCAL (c) BASIC
(d) COBOL (e) All of these
Ans (a) 


6. What are the two basic types of memory that your computer uses?

(a) RAM (b) RW/RAM (c) ROM (d) ERAM (e) POST
Ans (a)


7. The term gigabyte refers to(a) 1024 bytes (b) 1024 kilobytes (c) 1024 megabytes
(d) 1024 gigabytes (e) None of the above
Ans (c) 


COMPUTER KNOWLEDGE

Generation of Computers
It is important to realize that major changes and trends in computer systems have occurred during the major  stages-or generations-of computing, and will continue into the future. The first generation of computers developed in the early 1950s, the second generation blossomed during the late 1960s, the third generation took computing into the 1970s, and the fourth generation has been the computer technology of the 1980s and 1990s. A fifth generation of computers that accelerates the trends of the previous generations is expected to evolve as we enter the 21st century. Notice that computers continue to become smaller, faster, more reliable, less costly to purchase and maintain, and more interconnected within computer networks.
First-generation computing involved massive computers using hundreds or thousands of vacuum tubes for their processing and memory circuitry. These large computers generated enormous amounts of heat; their vacuum tubes had to be replaced frequently. Thus, they had large electrical power, air conditioning, and maintenance requirements. First-generation computers had main memories of only a few thousand characters and millisecond processing speeds. They used magnetic drums or tape for secondary storage and punched cards or paper tape as input and output media.
Second-generation computing used transistors and other solid-state, semiconductor devices that were wired to circuit boards in the computers. Transistorized circuits were much smaller and much more reliable, generated little heat, were less expensive, and required less power than vacuum tubes. Tiny magnetic cores were used for the computer’s memory, or internal storage. Many second-generation computers had main memory capacities of less than 100 kilobytes and microsecond processing, speeds. Removable magnetic disk packs were introduced, and magnetic tape merged as the major input, output, and secondary storage medium for large computer installations.