Professional Documents
Culture Documents
Questions on Computer Awareness have recently been introduced in most Bank Recruitment exams. To help you prepare better for
the Bank exams we present to you the revision notes on Computer Awareness.
1. The earlier computers, which were massive in size, were based on vacuum tubes.
2. Early computing machines, like the ENIAC, were actually meant to assist the armed forces.
3. The printers in pre-1950s were punch cards.
4. An improvement on the ENIAC, which pioneered 'stored program', was made possible with the help of the mathematician John
von Neumann.
5. Before the 1950s, computers were mostly owned by universities and research labs.
6. The B-programming language was developed by Ken Thompson.
7. Famous people, associated with the ENIAC, EDVAC, UNIVAC computers are Eckert & Mauchly.
8. The 1st commercially produced and sold computer (1951) was UNIVAC.
9. IBM was provided software for PCs by Microsoft.
10. Time-sharing, teletyping, were associated with mainframe computers.
11. The transformation from heavy computers to PCs was made possible using microprocessors.
12. The first microprocessor was developed in 1971 by Intel.
13. The term 'micro' (extremely small) denotes 10-6 m.
14. The Harvard student, who chose to write computer programs and dropped studies was Bill Gates.
15. A pentium 4 (P-4) employs roughly 40 million transistors.
16. Mark-1, Apple-1, and collossus were initial desktop computers.
17. Binary digits are briefed as bit.
18. A collection of bits is called byte.
19. C++, is a computer language.
20. The process of eliminating programming faults is called debugging.
21. Starting up on operating system is called booting.
22. A program used to browse the web is called browser.
23. An error in software designing which can even cause a computer to crash is called bug.
24. Click and double-click are achieved using the mouse.
25. Java, C, ForTran, Pascal and BASIC are computer programming languages.
26. The device which sends computer data using a phone line is called MODEM.
27. 'Worm' and 'virus' are actually programs.
28. A 'file' is a unit of information.
29. A megabyte has 106 (million) bytes.
30. A small, single-site network is called LAN.
31. A processor that collects several data and sends them over a single line is called bridge.
32. 'Nano' stands for one billionth part.
33. The number of bit patterns using an n-bit code is 2n.
34. The part of a computer that works with the data/programs is called CPU.
35. To convert a binary number to a decimal, we have to express it in power of 2.
36. www stands for world wide web.
37. Mathematics employed in computers is called Boolean algebra.
38. A collection of 8 bits is called byte.
39. The first home computer (1977), which was sold in millions of units was Apple II.
40. 'PARAM' is a supercomputer.
41. A website containing periodic posts is called blog.
42. While cutting and pasting, the cutitem is temporarily stored in the clipboard.
43. http stands for hyper text transfer protocol.
44. The unwanted or non-requested emails are called "spam".
45. A computer framed to give various network services is called server.
All of the following are examples of real security and privacy risks EXCEPT:
A.
hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
2.
3.
____________terminals (formerly known as cash registers) are often connected to complex inventory and sales
computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
4.
A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the
current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5.
The ability to recover and read deleted or damaged files from a criminals computer is an example of a law
enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6.
Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7.
____________ tags, when placed on an animal, can be used to record and track in a database all of the
animals movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8.
Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This
technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
9.
10.
____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to produce machines that display the same type of intelligence that
humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
11. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
12. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
13. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
14. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is
considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
15. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
16. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
17. In the binary language each letter of the alphabet, each number and each special character is made up of a unique
combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
18. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
19. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
20. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
21. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
22. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
23. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
24. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
25. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A
26. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
27. ____________, also called the brains of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D
28. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
31. System software is the set of programs that enables your computers hardware devices and ____________
software to work together.
A. management
B. processing
C. utility
D. application
Answer: D
32.
The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A
33. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C
34. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
35. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D
36. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
37. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D
38. The difference between people with access to computers and the Internet and those without this access is known
as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A
39.
____________ is the science revolving around the use of nano structures to build devices on an extremely small
scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A
40. Which of the following is the correct order of the four major functions of a computer?
A. Process Output Input Storage
B. Input Output Process Storage
C. Process Storage Input Output
D. Input Process Output Storage
Answer: D
41.
C. character
D. kilobyte
Answer: C
44. ____________ controls the way in which the computer system functions and provides a means by which users can
interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B
45. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C
46.
____________ are specially designed computer chips that reside inside other devices, such as your car or your
electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B
47. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A
48. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D
49. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
State Bank of India - Clerical Cadre (Clerk) Recruitment Exam., 2009 - Marketing
Aptitude/Computer Knowledge : Solved Paper
1.
Ans : (D)
24. Which is the part of a computer that one can touch and feel ?
(A) Hardware
(B) Software
(C) Programs
(D) Output
(E) None of these
Ans : (A)
25. A Call in Marketing means
(A) to phone the customers
(B) to visit the customers
(C) to visit the marketing site
(D) to call on prospective customers
(E) None of these
Ans : (D)
26. Delivery Channel means
(A) maternity wards
(B) handing over the products to the buyers
(C) places where products are made available to the buyers
(D) All of these
(E) None of these
Ans : (C)
27. Processing involves
(A) inputting data into a computer system
(B) transforming input into output
(C) displaying output in a useful manner
(D) providing relevant answers
(E) None of these
Ans : (B)
28. One of the following is a target group for the marketing of Internet Banking.
(A) All the customers
(B) All the educated customers
(C) All the computer educated customers
(D) Only creditors
(E) All of these
Ans : (C)
29. Innovation mean
(A) Product Designing
(B) New ideas
(C) Impulse
(D) Both (A) and (B)
(E) None of these
Ans : (D)
30. One of the following is a target group for the marketing of educational loan.
(A) All the customers
(B) Students
(C) Only poor students
(D) Students having promising educational track record
(E) All of these
Ans : (B)
31. Service after sale is not the function of
(A) Marketing staff
(B) Seller
36. Video processors consist of.and., which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) None of these
Ans : (C)
37. If you want to connect to your own computer through the Internet from another location, you can use
(A) e-mail
(B) FTP
(C) instant message
(D) Telnet
(E) None of these
Ans : (D)
38. To reload a Web page, press the.button.
(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh
Ans : (E)
39. This first step in the transaction processing cycle captures business data through various modes such as optical
scanning or at an electronic commerce website
(A) Document and report generation
(B) Database maintenance
(C) Transaction processing startup
(D) Data Entry
(E) None of these
Ans : (D)
40. A(n) .is a special visual and audio effect applied in Power-point to text or content.
(A) animation
(B) flash
(C) wipe
(D) dissolve
(E) None of these
Ans : (A)
41. When the pointer is positioned on a.it is shaped like a hand.
(A) grammar error
(B) Formatting error
(C) Screen Tip
(D) Spelling error
(E) hyperlink
Ans : (E)
42. Personal computers can be connected together to form a
(A) server
(B) supercomputer
(C) network
(D) enterprise
(E) None of these
Ans : (C)
43. A.is the term used when a search engine returns a Web page that matches the search criteria.
(A) blog
(B) hit
(C) link
(D) view
(E) success
Ans : (E)
44. .are words that a programming language has set aside for its own use.
(A) Control words
(B) Control structures
(C) Reserved words
(D) Reserved keys
(E) None of these
Ans : (C)
45. Mobile Commerce is best described as
(A) The use of Kiosks in marketing
(B) Transporting products
(C) Buying and selling goods/services through wireless handheld devices
(D) Using notebook PC's in marketing
(E) None of the above
Ans : (C)
46. Which of, the following is a storage device that uses rigid, permanently installed magnetic disks to store
data/information
(A) floppy diskette
(B) hard disk
(C) permanent disk
(D) optical disk
(E) None of these
Ans : (B)
47. The computer abbreviation KB usually means
(A) Key Block
(B) Kernel Boot
(C) Key Byte
(D) Kit Bit
(E) Kilo Byte
Ans : (E)
48. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) Configuration
(B) Download
(C) Storage
(D) Upload
(E) Installation
Ans : (D)
49. In Excel.allows users to bring together copies of work-books that other users have worked on independently.
(A) Copying
(B) Merging
(C) Pasting
(D) Compiling
(E) None of these
Ans : (B)
50. Which of the following are advantages of CD-ROM as a storage media?
(A) CD-ROM is an inexpensive way to store large, amount of data and information
(B) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) An of the above
(E) None of these
Ans : (D)
Atypically connects personal computers within a very limited geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)
2. Computers manipulate data in many ways, and this manipulation is called
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)
3. An e-mail address typically consists of a user ID followed by the sign and the name of the e-mail server that
manages the users electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)
4. Software applies, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)
5. A file extension is separated from the main file name with a(n) , but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)
6. An ad hoc query is a
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)
7. A Web consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)
8. A computer is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other
files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Ans : (B)
9. The desktop contains small graphics called
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Ans : (C)
10. C, BASIC, COBOL, and Java are examples of languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)
11. A(n)camera is a peripheral device used to capture still images in a digital format that can be easily transferred
into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Ans : (A)
12. makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) E-commerce
(C) E-spend
(D) E-business
(E) None of these
Ans : (D)
13. Networks are monitored by security personnel and supervised by who set(s) up accounts and passwords for
authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Ans : (C)
14. Application software is designed to accomplish
(A) real-world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Ans : (D)
15. A telephone number, a birth date, and a customer name are all examples of
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Ans : (D)
16. The human-readable version of a program is called
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Ans : (D)
17. A computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the
screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
Ans : (A)
18. is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Ans : (C)
19. Programs such as Internet Explorer that serve as navigable windows into the Web are called
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Ans : (D)
20. A is a device that not only provides surge protection, but also furnishes your computer with battery backup
power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Ans : (C)
21. When you save to , your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
Ans : (C)
22. The motherboard is the
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Ans : (D)
23. A computer-intensive problemruns on a
(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these
Ans : (C)
24. A(n)converts and executesone statement at a time.
(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these
Ans : (B)
25. The term designates equipment that might be added to a computer system to enhance its functionality.
(A) digital device
(B) system add-on
(C) disk pack
(D) peripheral device
(E) None of these
Ans : (D)
26. Approximately how many bytes make one megabyte ?
(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these
Ans : (D)
27. What is MP3 ?
(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these
Ans : (C)
28. All the deleted files go to
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)
29. this is the act of copying or downloading a program from a network and making multiple copies of it.
(A) Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site-license piracy
(E) None of these
Ans : (C)
Ans : (D)
45. The real business and competitive value of information technology lies in
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
(D) The capabilities of the hardware and the speed at which it processes information
(E) None of these
Ans : (B)
46. Companies use which of the following vendors to provide access to software and services rather than purchasing the
applications and maintaining the applications themselves ?
(A) Open source vendors
(B) Alliances
(C) Application service providers
(D) All of the above
(E) None of these
Ans : (C)
47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(A) Opening an application previously installed on the computer
(B) Borrowed copies of software
(C) Viewing a website without causing any additional transactions
(D) Running antivirus programs
(E) None of these
Ans : (B)
48. Collecting personal information and effectively posing as another individual is known as the crime of
(A) spooling
(B) dentity theft
(C) spoofing
(D) hacking
(E) None of these
Ans : (B)
49. The first step in the transaction processing cycle is
(A) database operations
(B) audit
(C) data entry
(D) user inquiry
(E) None of these
Ans : (C)
50. In the information systems concept, the output function involves
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation process to their ultimate destination
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
(E) None of these
Ans : (A)
Bank Probationary Officers Common Written Exam., 2011
(Held on 18-9-2011)
Computer Knowledge: Solved Paper
1.
(D) hexadecimal
(E) None of these
Ans : (A)
2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is
(A) Memory-only
(B) Write-only
(C) Once-only
(D) Run-only
(E) Read-only
Ans : (E)
3. Which of the following can be used to select the entire document ?
(A) CTRL+A
(B) ALT+F5
(C) SHIFT+A
(D) CTRL+K
(E) CTRL+H
Ans : (A)
4. .are 'attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above
Ans : (A)
5. Part number, part description, and number of parts ordered are examples of
(A) control
(B) output
(C) processing
(D) feedback
(E) input
Ans : (E)
9. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to
AutoFit Contents.
(A) Fit to Form
(B) Format
(C) Autosize
(D) Contents
(E) AutoFit
Ans : (E)
10. Why is it unethical to share copyrighted files with your friends ?
(A) It is not unethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.
(E) It is not unethical-anyone can access a computer
Ans : (C)
11. Reusable optical storage will typica1ly have the acronym
(A) CO
(B) DVD
(C) ROM
(D) RW
(E) ROS
Ans : (D)
12. The most common type of storage devices are
(A) persistent
(B) optical
(C) magnetic
(D) flash
(E) steel
Ans : (D)
13. A device that connects to a network without the use of cables is said to be
(A) distributed
(B) free
(C) centralized
(D) open source
(E) None of these
Ans : (B)
14. A person who used his or her expertise to gain access to other people's computers to get information illegally or do
damage is a
(A) hacker
(B) analyst
(C) instant messenger
(D) programmer
(E) spammer
Ans : (A)
15. To access properties of an object, the mouse technique to use is
(A) dragging
(B) dropping
(C) right-clicking
(D) shift-clicking
(E) None of these
Ans : (C)
16. To change selected text to all capital letters, click the change case button, then click
(A) UPPERCASE
(B) UPPER ALL
(D) MIDI
(E) MINI
Ans : (C)
32. You can.a search by providing more information the search engine can use to select a smaller, more useful set
of results.
(A) refine
(B) expand
(C) load
(D) query
(E) slowdown
Ans : (A)
33. What is the permanent memory built into your computer called ?
(A) RAM
(B) Floppy
(C) CPU
(D) CO-ROM
(E) ROM
Ans : (E)
34. What displays the contents of the active cell in Excel ?
(A) Name box
(B) Row Headings
(C) Formula bar
(D) Task pane
(E) None of these
Ans : (A)
35. The piece of hardware that converts your computer's digital signal to an analog signal that can travel over telephone
lines is called a
(A) red wire
(B) blue cord
(C) tower
(D) modem
(E) None of these
Ans : (D)
36. Video processors consist of.and., which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) None of these
Ans : (C)
37. If you want to connect to your own computer through the Internet from another location, you can use
(A) e-mail
(B) FTP
(C) instant message
(D) Telnet
(E) None of these
Ans : (D)
38. To reload a Web page, press the.button.
(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh
Ans : (E)
39. This first step in the transaction processing cycle captures business data through various modes such as optical
scanning or at an electronic commerce website
(A) Document and report generation
(B) Database maintenance
(C) Transaction processing startup
(D) Data Entry
(E) None of these
Ans : (D)
40. A(n) .is a special visual and audio effect applied in Power-point to text or content.
(A) animation
(B) flash
(C) wipe
(D) dissolve
(E) None of these
Ans : (A)
41. When the pointer is positioned on a.it is shaped like a hand.
(A) grammar error
(B) Formatting error
(C) Screen Tip
(D) Spelling error
(E) hyperlink
Ans : (E)
42. Personal computers can be connected together to form a
(A) server
(B) supercomputer
(C) network
(D) enterprise
(E) None of these
Ans : (C)
43. A.is the term used when a search engine returns a Web page that matches the search criteria.
(A) blog
(B) hit
(C) link
(D) view
(E) success
Ans : (E)
44. .are words that a programming language has set aside for its own use.
(A) Control words
(B) Control structures
(C) Reserved words
(D) Reserved keys
(E) None of these
Ans : (C)
45. Mobile Commerce is best described as
(A) The use of Kiosks in marketing
(B) Transporting products
(C) Buying and selling goods/services through wireless handheld devices
(D) Using notebook PC's in marketing
(E) None of the above
Ans : (C)
46. Which of, the following is a storage device that uses rigid, permanently installed magnetic disks to store
data/information
(A) floppy diskette
Atypically connects personal computers within a very limited geographical area, usually within a single
building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)
2. Computers manipulate data in many ways, and this manipulation is called
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)
3. An e-mail address typically consists of a user ID followed by the sign and the name of the e-mail server
that manages the users electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)
4. Software applies, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)
5. A file extension is separated from the main file name with a(n) , but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)
6. An ad hoc query is a
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)
7. A Web consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)
8. A computer is a set of program instructions that can attach itself to a file, reproduce itself, and spread to
other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Ans : (B)
9. The desktop contains small graphics called
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Ans : (C)
10. C, BASIC, COBOL, and Java are examples of languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)
11. A(n)camera is a peripheral device used to capture still images in a digital format that can be easily
transferred into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Ans : (A)
12. makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) E-commerce
(C) E-spend
(D) E-business
(E) None of these
Ans : (D)
13. Networks are monitored by security personnel and supervised by who set(s) up accounts and passwords
for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Ans : (C)
14. Application software is designed to accomplish
(A) real-world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Ans : (D)
15. A telephone number, a birth date, and a customer name are all examples of
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Ans : (D)
16. The human-readable version of a program is called
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Ans : (D)
17. A computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the
screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
Ans : (A)
18. is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Ans : (C)
19. Programs such as Internet Explorer that serve as navigable windows into the Web are called
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Ans : (D)
20. A is a device that not only provides surge protection, but also furnishes your computer with battery backup
power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Ans : (C)
21. When you save to , your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
Ans : (C)
22. The motherboard is the
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Ans : (D)
23. A computer-intensive problemruns on a
(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these
Ans : (C)
24. A(n)converts and executesone statement at a time.
(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these
Ans : (B)
25. The term designates equipment that might be added to a computer system to enhance its functionality.
(A) digital device
(B) system add-on
(C) disk pack
(D) peripheral device
(E) None of these
Ans : (D)
26. Approximately how many bytes make one megabyte ?
(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these
Ans : (D)
27. What is MP3 ?
(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these
Ans : (C)
28. All the deleted files go to
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)
29. this is the act of copying or downloading a program from a network and making multiple copies of it.
(A) Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site-license piracy
(E) None of these
Ans : (C)
30. A directory within a directory is called
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)
31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
Ans : (B)
32. In MICR, C stands for .
(A) Code
(B) Colour
(C) Computer
(D) Character
(A) read-only
(B) memory-only
(C) run-only
(D) write-only
(E) None of these
Ans : (A)
37. In an information system, alphanumeric data normally takes the form of
(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these
Ans : (B)
38. A Websites main page is called its
(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these
Ans : (A)
39. When installing , the user must copy and usually decompress program files from a CDROM or other
medium to the hard disk.
(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these
Ans : (A)
Very often we read about financial inclusion in newspapers these days. Financial Inclusion means
(A) Providing loans to all eligible persons
(B) Creating a mechanism of providing financial help to business people of society whenever they are in need of the
same
(C) Providing banking services to all those who are staying in remote and interior areas of the country
(D) To ensure that each and every person pays tax on his/her income regularly and honestly
(E) None of these
Ans : (C)
2. Mid Day Meals is a scheme to provide nutritious food to
(A) Those taking treatment in hospitals
(B) School going children
(C) Daily wage employees/or labours
(D) Labours engaged in jobs in unorganized sectors
(E) Girls who are residing in girls/youth hostels
Ans : (B)
3. The Govt. of India is running a National Programme to control which of the following disease ?
(A) Renal Failures
(B) Heart Ailments
(C) Cancer (D) AIDS
(E) None of these
Ans : (D)
4. Sarva Shiksha Abhiyan is aimed at the education of which of the following ?
(A) Engineering and technical education
(B) Education of girls upto graduation level
(C) College education
(D) Adult education
(E) Education of children between 6-14 years
Ans : (E)
5. Five year plans in India are designed and launched by which of the following organizations ?
(A) Ministry of Rural Development
(B) Ministry of Agriculture
(C) Panchayat Raj Samitees of each state
(D) Planning Commission of India
(E) Ministry of Home Affairs
Ans : (D)
6. Which of the following Ministries prepares its own budget and presents it in the Parliament every year ?
(A) Finance Ministry
(B) Railway Ministry
(C) Ministry of Defence
(D) Ministry of Home Affairs
(E) None of these
Ans : (B)
7. Which of the following banks is a nationalized bank ?
(A) ICICI Bank
(B) Yes Bank
(C) Saraswat Co-op. Bank
(D) Reserve Bank of India
(E) Bank of India
Ans : (E)
8. Which of the following types of accounts are known as Demat Accounts ?
(A) Accounts which are Zero Balance Accounts
(B) Accounts which are opened to facilitate repayment of a loan taken from the bank. No other business can be
conducted from there
(C) Accounts in which shares of various companies are traded in electronic form
(D) Accounts which are operated through internet banking facility
(E) None of these
Ans : (C)
9. Which of the following is definitely a major indication of the state of the economy of a country ?
(A) Rate of GDP growth
(B) Rate of inflation
(C) Number of Banks in a country
(D) Stock of foodgrains in a country
(E) None of these
Ans : (A)
10. Which of the following taxes levied by the Govt. of India is withdrawn now ? (As announced in Union Budget
200809)
(A) Income Tax
(B) VAT
(C) Corporate Tax
(D) Banking Cash Transaction Tax
(E) None of these
Ans : (D)
11. Sakhalin oilfields are located in
(A) China
(B) Russia
(C) France
(D) USA
(E) None of these
Ans : (B)
12. Twenty 20 Cricket Matches are very popular these days. What is the format of the game ?
(A) Every player has to play 20 balls only
(B) Every team has to play 20 overs only
(C) Every team will now have twenty players
(D) The team who makes maximum runs in 20 hours will be the winner
(E) None of these
Ans : (B)
13. Which of the following countries won the finals of under 19 Cricket World Cup held in March 2008 ?
(A) South Africa
(B) India
(C) England
(D) New Zealand
(E) None of these
Ans : (B)
14. Who amongst the following presented the Union Budget 2008-09 in the Parliament ?
(A) Dr. Manmohan Singh
(B) Mr. Lalu Prasad Yadav
(C) Smt. Sonia Gandhi
(D) Mr. Arjun Singh
(E) None of these
Ans : (E)
15. Late Benazir Bhutto was the
(A) Present President of Pakistan
(B) Former President of Pakistan
(C) Present Prime Minister of Pakistan
(D) Former Prime Minister of Pakistan
(E) Present Foreign Minister of Pakistan
Ans : (D)
16. If you visit the branch of a bank you will normally not see a department/section/counter names as
(A) Cash
(B) Credit
(C) Customer care
(D) Housekeeping
(E) Retail Banking
Ans : (D)
17. Who amongst the following is the Chairperson of the National Knowledge Commission ?
(A) Dr. Manmohan Singh
(B) Mr. Arjun Singh
(C) Dr. Pranav Mukherjee
(D) Justice Arijit Pasayat
(E) Mr. Sam Pitroda
Ans : (E)
18. Which of the following phenomenon has created a state of anxiety in the economic and financial sector in India
these days ?
(A) Rate of Inflation
(B) Sub-prime crisis in USA
(C) High level of fluctuation in Sensex
(D) Population growth in Metro cities in India
(B) Henley
(C) Microsoft
(D) Louis Vuitton
(E) DLA Piper
Ans : (C)
27. King of which of the following countries has to leave as the country has adopted parliamentary form of
democratic govt. and first election has taken place ?
(A) Jordan
(B) Bhutan
(C) Nepal
(D) Myanmar
(E) None of these
Ans : (C)
28. For applying for this project, the applicants were required to
(A) Send physical applications
(B) Apply on-line
(C) Buy scannable form and send after filling
(D) Send only Demand Draft
(E) Apply in employment exchange
Ans : (B)
29. Dyanchand Trophy is associated with the game of
(A) Golf
(B) Cricket
(C) Football
(D) Tennis
(E) Hockey
Ans : (E)
30. Who amongst the following is a famous Lawn tennis player ?
(A) Irfan Khan
(B) Sania Mirza
(C) Sujata Sharma
(D) Kiran Desai
(E) None of these
Ans : (B)
31. Which of the following bills was placed in the Parliament recently after a waiting period of several years ?
(A) Womens Reservation Bill
(B) Financial Inclusion Bill
(C) Income Tax Amendment Bill
(D) Companies Amendment Bill
(E) None of these
Ans : (A)
32. Who amongst the following is the author of the book Business at the Speed of Thought ?
(A) V. S. Naipaul
(B) Jaswant Singh
(C) Ritu Beri
(D) Bill Gates
(E) None of these
Ans : (D)
33. Govt. normally does not announce the support price of
(A) Wheat
(B) Paddy
(C) Mango
(D) Sugar cane
(E) Cotton
Ans : (C)
34. Mr. Dmitry Medvedev has become the new
(A) Prime Minister of Russia
(B) President of Russia
(C) Prime Minister of France
(D) President of France
(E) Prime Minister of Italy
Ans : (B)
35. If you visit USA you have to make all your payments in
(A) Euro
(B) Dollar
(C) Rupee
(D) Pound Sterling
(E) Any one of these
Ans : (B)
36. Census in India is done after a period of
(A) 5 years
(B) 7 years
(C) 8 years
(D) 10 years
(E) 12 years
Ans : (D)
37. TRAI regulates the functioning of which of the following services ?
(A) Telecom
(B) Trade
(C) Port
(D) Transport
(E) None of these
Ans : (A)
38. Firewalls are used to protect against
(A) Unauthorised Attacks
(B) Virus Attacks
(C) Data Driven Attacks
(D) Fire Attacks
(E) None of these
Ans : (A)
39. The directory is mandatory for every disk.
(A) Root
(B) Base
(C) Sub
(D) Case
(E) None of these
Ans : (C)
40. WWW stands for
(A) World Word Web
(B) World Wide Web
(C) World White Web
(D) World Work Web
(E) None of these
Ans : (B)
41. For applying for this project, the applicants were required to
(A) Pay fee by Cheque
(B) Pay fee by Demand Draft
All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Ans : B
2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Ans : A
3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales
computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Ans : B
4. A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the current
price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Ans : A
5. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement
specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Ans : C
6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Ans : C
7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animals
movements.
A. POS
B. RFID
C. PPS
D. GPS
Ans : B
8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This
technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Ans : A
9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Ans : A
10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Ans : A
11. ____________ is the science that attempts to produce machines that display the same type of intelligence that
humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Ans : D
12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Ans : D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Ans : B
14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Ans : B
15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is
considered:
A. data.
B. output.
C. input.
D. the process.
Ans : B
16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Ans : C
17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Ans : D
18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique
combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Ans : D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Ans : C
20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Ans : B
21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Ans : C
22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Ans : C
23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Ans : A
24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Ans : C
25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Ans : D
26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Ans : A
27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Ans : B
28. The ____________, also called the brains of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Ans : D
29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Ans : B
30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Ans : A
31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Ans : B
32. System software is the set of programs that enables your computers hardware devices and ____________ software
to work together.
A. management
B. processing
C. utility
D. application
Ans : D
33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Ans : A
34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Ans : C
35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Ans : A
36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Ans : D
37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Ans : B
38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Ans : D
39. The difference between people with access to computers and the Internet and those without this access is known as
the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Ans : A
40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Ans : A
41. Which of the following is the correct order of the four major functions of a computer?
A. Process Output Input Storage
B. Input Output Process Storage
C. Process Storage Input Output
D. Input Process Output Storage
Ans : D
42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Ans : A
43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Ans : B
44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Ans : C
45. ____________ controls the way in which the computer system functions and provides a means by which users can
interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Ans : B
46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Ans : C
47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your
electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Ans : B
48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Ans : A
49. The two broad categories of software are:
If a word is typed that is not in Words dictionary, a____________wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)
2. The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)
6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)
8. When you quickly press and releaes the left mouse button twice , you are
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans : (C)
10. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans : (D)
12. During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
Ans : (B)
14. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
Ans : (A)
15. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is
called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Ans : (C)
16. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the
processors attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
Ans : (B)
17. The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.
Ans : (A)
26. The combination of the operating system and the processor is referred to as the computers:
(A) CPU.
(B) platform.
(C) BIOS.
(D) CMOS.
Ans : (B)
28. Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
Ans : (B)
29. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
Ans : (D)
30. The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent
location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor program
Ans : (A)
32. Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
(A) configuration
(B) CMOS
(C) POST
(D) ROM
Ans : (C)
33. The memory resident portion of the operating system is called the
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
Ans : (D)
34. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
Ans : (A)
35. All of the following are TRUE regarding virtual memory EXCEPT
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
Ans : (A)
36. The operating system allows users to organize the computers contents in a hierarchical structure of directories that
include all of the following EXCEPT:
(A) files.
(B) folders.
(D) drives.
(D) systems.
Ans : (D)
37. All of the following statements concerning windows are true EXCEPT
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
Ans : (A)
38. All of the following statements concerning files are true EXCEPT
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
Ans : (C)
39. Using Windows Explorer, a plus (+) sign in front of a folder indicates
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
Ans : (B)
40. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the
__________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon
Ans : (C)
4. All of the following are examples of real security and privacy risks Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
Ans : (B)
5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer
systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these
Ans : (B)
7. System software is the set of programs that enables your computer's hardware devices and ______ software to work together.
(A) management
(B) processing
(C) utility
(D) application
(E) None of these
Ans : (D)
8. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
(A) Servers
(B) Embedded computers
(C) Robotic computers
(D) Mainframes
(E) None of these
Ans : (B)
10. in a ring topology , the the computer in possession of the ______ can trasmit data
(A) packet
(B) data
(C) access method
(D) token
(E) None of these
Ans : (D)
11. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and
serial ports ____
(A) basic input/output system
(B) secondary input/output system
(C) peripheral input/output system
(D) marginal input/output system
(E) None of these
Ans : (A)
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these
Ans : (B)
13. ________ controls the way in which the computer system functions and provides a meAns : by which users can interact with the
computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
Ans : (C)
14. Servers are computers that provide resources to other computers connected to a ___________
(A) mainframe
(B) network
(C) supercomputer
(D) client
(E) None of these
Ans : (B)
20. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) None of these
Ans : (D)
21. _____________ are words that a programming language has set aside for its own use.
(A) Control worlds
(B) Reserved words
(C) Control structures
(D) Reserved keys
(E) None of these
Ans : (B)
(A) Structures
(B) Field markers
(C) Field definition
(D) Field names
(E) None of these
Ans : (D)
24. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
(A) router
(B) modem
(C) node
(D) cable
(E) None of these
Ans : (A)
26. Granting an outside organization access to internet web pages is often implemented using a (n) ____
(A) extranet
(B) intranet
(C) internet
(D) hacker
(E) None of these
Ans : (A)
27. Which term identifies a specific computer on the web and the main page of the entire site
(A) URL
(B) Web site address
(C) Hyperlink
(D) Domain name
(E) None of these
Ans : (A)
28. The code that relational database management systems use to perform their database task is referred to as .....
(A) QBE
(B) SQL
(C) OLAP
(D) Sequel Server
(E) None of these
Ans : (B)
31. A _________ contains specific rules and words that express the logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
Ans : ()
32. The design of the network is called the network:
(A) architecture
(B) server
(C) transmission
(D) type
(E) None of these
Ans : (A)
33. The most frequently used instructions of a computer program are likely to be fetched from:
(A) the hard disk
(B) cache memory
(C) RAM
(D) registers
(E) None of these
Ans : (B)
34. The ____________ contains data descriptions and defines the name, data type, and length of each field in the database.
(A) data dictionary
(B) data table
(C) data record
(D) data field
(E) None of these
Ans : (A)
35. Personal logs or journal entries posted on the Web are known as:
(A) listservs
(B) Webcasts
(C) blogs
(D) subject directories
(E) None of these
Ans : (C)
36. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
(A) command - based user interface
(B) GUI
(C) system utility
(D) API
(E) None of these
Ans : (B)
37. The _____ manual tells you how to use a software program.
(A) documentation
(B) programming
(C) technical
(D) user
(E) None of these
Ans : ()
38. Which of the following is NOT a type of broadband Internet connection?
(A) Cable
(B) DSL
(C) Dial-up
(D) Satellite
39. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(A) spyware
(B) adware
(C) spam
(D) malware
(E) None of these
Ans : (D)
45. Which of the following places the common data elements in order from smallest to largest
(A) character, file, record, field, database
(B) character, record, field, database, file
(C) character, field, record, file, database
(D) Bit, byte, character, record, field, file, database,
(E) None of these
Ans : (C)
50. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear.
(B) The CD-ROM stops functioning.
(C) The Web browser opens to an unusual home page.
(D) Odd messages or images are displayed on the screen.
(E) None of these
Ans : (B)