You are on page 1of 65

Father of modern computers Charles Babbage

The father of internet is Vint Cerf


Realtime News Search engine introduced by Rediff.com in 2012

Questions on Computer Awareness have recently been introduced in most Bank Recruitment exams. To help you prepare better for
the Bank exams we present to you the revision notes on Computer Awareness.
1. The earlier computers, which were massive in size, were based on vacuum tubes.
2. Early computing machines, like the ENIAC, were actually meant to assist the armed forces.
3. The printers in pre-1950s were punch cards.
4. An improvement on the ENIAC, which pioneered 'stored program', was made possible with the help of the mathematician John
von Neumann.
5. Before the 1950s, computers were mostly owned by universities and research labs.
6. The B-programming language was developed by Ken Thompson.
7. Famous people, associated with the ENIAC, EDVAC, UNIVAC computers are Eckert & Mauchly.
8. The 1st commercially produced and sold computer (1951) was UNIVAC.
9. IBM was provided software for PCs by Microsoft.
10. Time-sharing, teletyping, were associated with mainframe computers.
11. The transformation from heavy computers to PCs was made possible using microprocessors.
12. The first microprocessor was developed in 1971 by Intel.
13. The term 'micro' (extremely small) denotes 10-6 m.
14. The Harvard student, who chose to write computer programs and dropped studies was Bill Gates.
15. A pentium 4 (P-4) employs roughly 40 million transistors.
16. Mark-1, Apple-1, and collossus were initial desktop computers.
17. Binary digits are briefed as bit.
18. A collection of bits is called byte.
19. C++, is a computer language.
20. The process of eliminating programming faults is called debugging.
21. Starting up on operating system is called booting.
22. A program used to browse the web is called browser.
23. An error in software designing which can even cause a computer to crash is called bug.
24. Click and double-click are achieved using the mouse.
25. Java, C, ForTran, Pascal and BASIC are computer programming languages.
26. The device which sends computer data using a phone line is called MODEM.
27. 'Worm' and 'virus' are actually programs.
28. A 'file' is a unit of information.
29. A megabyte has 106 (million) bytes.
30. A small, single-site network is called LAN.
31. A processor that collects several data and sends them over a single line is called bridge.
32. 'Nano' stands for one billionth part.
33. The number of bit patterns using an n-bit code is 2n.
34. The part of a computer that works with the data/programs is called CPU.
35. To convert a binary number to a decimal, we have to express it in power of 2.
36. www stands for world wide web.
37. Mathematics employed in computers is called Boolean algebra.
38. A collection of 8 bits is called byte.
39. The first home computer (1977), which was sold in millions of units was Apple II.
40. 'PARAM' is a supercomputer.
41. A website containing periodic posts is called blog.
42. While cutting and pasting, the cutitem is temporarily stored in the clipboard.
43. http stands for hyper text transfer protocol.
44. The unwanted or non-requested emails are called "spam".
45. A computer framed to give various network services is called server.

Mostly Asked Computer Awareness Questions For SBI PO 2014


1.

All of the following are examples of real security and privacy risks EXCEPT:

A.

hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2.

A process known as ____________ is used by large retailers to study trends.


A. data mining
B. data selection
C. POS
D. data conversion
Answer: A

3.

____________terminals (formerly known as cash registers) are often connected to complex inventory and sales
computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

4.

A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the
current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A

5.

The ability to recover and read deleted or damaged files from a criminals computer is an example of a law
enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C

6.

Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

7.

____________ tags, when placed on an animal, can be used to record and track in a database all of the
animals movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B

8.

Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This
technology is known as:

A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
9.

Technology no longer protected by copyright, available to everyone, is considered to be:


A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A

10.

____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to produce machines that display the same type of intelligence that
humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D

11. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
12. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
13. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
14. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is
considered:
A. data.
B. output.

C. input.
D. the process.
Answer: B
15. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
16. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
17. In the binary language each letter of the alphabet, each number and each special character is made up of a unique
combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
18. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
19. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
20. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
21. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte

D. terabyte
Answer: C
22. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
23. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
24. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
25. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A
26. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
27. ____________, also called the brains of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D
28. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B

29. Word processing, spreadsheet, and photo-editing are examples of:


A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A
30.

____________ is a set of computer programs used on a computer to help perform tasks.


A. An instruction
B. Software
C. Memory
D. A processor
Answer: B

31. System software is the set of programs that enables your computers hardware devices and ____________
software to work together.
A. management
B. processing
C. utility
D. application
Answer: D
32.

The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A

33. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C
34. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
35. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D
36. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers

B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
37. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D
38. The difference between people with access to computers and the Internet and those without this access is known
as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A
39.

____________ is the science revolving around the use of nano structures to build devices on an extremely small
scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A

40. Which of the following is the correct order of the four major functions of a computer?
A. Process Output Input Storage
B. Input Output Process Storage
C. Process Storage Input Output
D. Input Process Output Storage
Answer: D
41.

____________ bits equal one byte.


A. Eight
B. Two
C. One thousand
D. One million
Answer: A

42. The binary language consists of ____________ digit(s).


A. 8
B. 2
C. 1,000
D. 1
Answer: B
43. A byte can hold one ____________ of data.
A. bit
B. binary digit

C. character
D. kilobyte
Answer: C
44. ____________ controls the way in which the computer system functions and provides a means by which users can
interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B
45. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C
46.

____________ are specially designed computer chips that reside inside other devices, such as your car or your
electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B

47. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A
48. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D
49. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A

State Bank of India - Clerical Cadre (Clerk) Recruitment Exam., 2009 - Marketing
Aptitude/Computer Knowledge : Solved Paper

1.

A keyboard is this kind of device


(A) black
(B) input
(C) output
(D) word Processing
(E) None of these
Ans : (B)
2. IT stands for
(A) information Technology
(B) integrated Technology
(C) intelligent Technology
(D) interesting Technology
(E) None of these
Ans : (A)
3. Which of the following refers to the fastest, biggest and most expensive computers ?
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
Ans : (B)
4. A collection of related information sorted and dealt with as a unit is a
(A) disk
(B) data
(C) file
(D) floppy
(E) None of these
Ans : (C)
5. The process of a computer receiving information from a server on the Internet is known as
(A) pulling
(B) pushing
(C) downloading
(D) transferring
(E) None of these
Ans : (C)
6. Which part of the computer helps to store information ?
(A) Disk drive
(B) Keyboard
(C) Monitor
(D) Printer
(E) None of these
Ans : (A)
7. is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)
8. The role of agenerally is to determine a buyers needs and match it to the correct hardware and software.
(A) computer Scientist
(B) computer sales representative
(C) computer consultant
(D) corporate trainer

(E) None of these


Ans : (B)
9. Which of the following groups consist of only output devices ?
(A) Scanner, Printer, Monitor
(B) Keyboard, Printer, Monitor
(C) Mouse, Printer, Monitor
(D) Plotter, Printer, Monitor
(E) None of these
Ans : (D)
10. The rectangular area of the screen that displays a program, data, and/or information is a
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)
11. A(n)contains commands that can be selected.
(A) pointer
(B) menu
(C) icon
(D) button
(E) None of these
Ans : (B)
12. An error is also known as
(A) bug
(B) debug
(C) cursor
(D) icon
(E) None of these
Ans : (A)
13. Arithmetic Operations
(A) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other
item
(B) sort data items according to standard, predefined criteria in ascending order or descending order
(C) use conditions with operators such as AND, OR and NOT
(D) include addition, subtraction, multiplication and division
(E) None of these
Ans : (D)
14. Sending an e-mail is similar to
(A) picturing an event
(B) narrating a story
(C) writing a letter
(D) creating a drawing
(E) None of these
Ans : (C)
15. Promotion in Marketing means
(A) passing an examination
(B) elevation from one grade to another
(C) selling the products through various means
(D) selling the product in specific areas
(E) None of these
Ans : (C)
16. Microsoft Word is an example of

(A) an operating system


(B) a processing device
(C) application software
(D) an input device
(E) None of these
Ans : (B)
17. Sources of Sales Leads are
(A) Data Mining
(B) Market Research
(C) Media Outlets
(D) Promotional Programs
(E) All of these
Ans : (E)
18. Any data or instruction entered into the memory of a computer is considered as
(A) storage
(B) output
(C) input
(D) information
(E) None of these
Ans : (A)
19. Which part of the computer displays the work done ?
(A) RAM
(B) printer
(C) monitor
(D) ROM
(E) None of these
Ans : (C)
20. One of the methods for Market Monitoring is
(A) to watch TV serials
(B) to discuss with other sales persons
(C) to monitor media outlets
(D) All of these
(E) None of these
Ans : (C)
21. Market Expansion means
(A) hiring more staff
(B) firing more staff
(C) buying more products
(D) buying more companies
(E) None of these
Ans : (E)
22. A series of instructions that tells a computer what to do and how to do it is called a
(A) program
(B) command
(C) user response
(D) processor
(E) None of these
Ans : (A)
23. Effective marketing helps in
(A) developing new products
(B) creating a competitive environment
(C) building demand for products
(D) All of these
(E) None of these

Ans : (D)
24. Which is the part of a computer that one can touch and feel ?
(A) Hardware
(B) Software
(C) Programs
(D) Output
(E) None of these
Ans : (A)
25. A Call in Marketing means
(A) to phone the customers
(B) to visit the customers
(C) to visit the marketing site
(D) to call on prospective customers
(E) None of these
Ans : (D)
26. Delivery Channel means
(A) maternity wards
(B) handing over the products to the buyers
(C) places where products are made available to the buyers
(D) All of these
(E) None of these
Ans : (C)
27. Processing involves
(A) inputting data into a computer system
(B) transforming input into output
(C) displaying output in a useful manner
(D) providing relevant answers
(E) None of these
Ans : (B)
28. One of the following is a target group for the marketing of Internet Banking.
(A) All the customers
(B) All the educated customers
(C) All the computer educated customers
(D) Only creditors
(E) All of these
Ans : (C)
29. Innovation mean
(A) Product Designing
(B) New ideas
(C) Impulse
(D) Both (A) and (B)
(E) None of these
Ans : (D)
30. One of the following is a target group for the marketing of educational loan.
(A) All the customers
(B) Students
(C) Only poor students
(D) Students having promising educational track record
(E) All of these
Ans : (B)
31. Service after sale is not the function of
(A) Marketing staff
(B) Seller

(C) Director of the company


(D) Employees of the company
(E) All of the above are wrong
Ans : (A)
32. If done throughthe rural marketing would be more effective.
(A) fairs
(B) village fairs
(C) door to door campaign
(D) All of these
(E) None of these
Ans : (B)
33. Market Survey means
(A) Market Research
(B) Market Planning
(C) Marketing Strategies
(D) Market Monitering
(E) All of these
Ans : (A)
34. can be done through digital Banking ?
(A) Mobile phone
(B) Internet
(C) Telephone
(D) All of these
(E) None of these
Ans : (A)
35. A good seller should have the following quality/qualities ?
(A) Devotion to the work
(B) Submissive
(C) Sympathy
(D) All of these
(E) None of these
Ans : (D)
36. The rural marketing is not required because
(A) rural people do not understand marketing
(B) its not practical from the cost point of view
(C) it is sheer wastage of time
(D) All are wrong
(E) All are correct
Ans : (D)
37. Planned-cost service means
(A) Costly products
(B) Extra profit on the same cost
(C) Extra work by seller
(D) All of these
(E) None of these
Ans : (B)
38. Internet marketing means
(A) Self-marketing
(B) Core Groups monitering
(C) Employees marketing
(D) All of these
(E) None of these
Ans : (E)

39. The aim of successful marketing is


(A) to increase the sale
(B) to increase the profit
(C) to increase the output of sellers
(D) All of these
(E) None of these
Ans : (D)
40. The networking becomesthrough networking.
(A) very difficult
(B) dull
(C) easy
(D) has no role in marketing
(E) None of these
Ans : (C)

Bank Probationary Officers Common Written Exam., 2011


(Held on 18-9-2011)

Computer Knowledge: Solved Paper


1.

Computer uses the.number system to store data and perform calculations.


(A) binary
(B) octal
(C) decimal
(D) hexadecimal
(E) None of these
Ans : (A)
2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is
(A) Memory-only
(B) Write-only
(C) Once-only
(D) Run-only
(E) Read-only
Ans : (E)
3. Which of the following can be used to select the entire document ?
(A) CTRL+A
(B) ALT+F5
(C) SHIFT+A
(D) CTRL+K
(E) CTRL+H
Ans : (A)
4. .are 'attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above
Ans : (A)
5. Part number, part description, and number of parts ordered are examples of
(A) control
(B) output
(C) processing
(D) feedback
(E) input
Ans : (E)

6. A Web site's main page is called its


(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these
Ans : (A)
7. The simultaneous processing of two or more programs by multiple processors is
(A) multiprogramming
(B) multitasking
(C) time-sharing
(D) multiprocessing
(E) None of these
Ans : (D)
8. Codes consisting of lines of varying widths or lengths that are computer-readable are known as
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
(E) None of these
Ans : (D)
9. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to
AutoFit Contents.
(A) Fit to Form
(B) Format
(C) Autosize
(D) Contents
(E) AutoFit
Ans : (E)
10. Why is it unethical to share copyrighted files with your friends ?
(A) It is not unethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.
(E) It is not unethical-anyone can access a computer
Ans : (C)
11. Reusable optical storage will typica1ly have the acronym
(A) CO
(B) DVD
(C) ROM
(D) RW
(E) ROS
Ans : (D)
12. The most common type of storage devices are
(A) persistent
(B) optical
(C) magnetic
(D) flash
(E) steel
Ans : (D)
13. A device that connects to a network without the use of cables is said to be
(A) distributed
(B) free
(C) centralized

(D) open source


(E) None of these
Ans : (B)
14. A person who used his or her expertise to gain access to other people's computers to get information illegally or do
damage is a
(A) hacker
(B) analyst
(C) instant messenger
(D) programmer
(E) spammer
Ans : (A)
15. To access properties of an object, the mouse technique to use is
(A) dragging
(B) dropping
(C) right-clicking
(D) shift-clicking
(E) None of these
Ans : (C)
16. To change selected text to all capital letters, click the change case button, then click
(A) UPPERCASE
(B) UPPER ALL
(C) CAPS LOCK
(D) Lock Upper
(E) Large Size
Ans : (A)
17. The basic unit of a worksheet into which you enter data in Excel is called a
(A) tab
(B) cell
(C) box
(D) range
(E) None of these
Ans : (B)
18. You can keep your personal files / folders in
(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Ans : (B)
19. In Word you can force a page break
(A) By positioning your cursor at the appropriate place and pressing the F1 key
(B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter
(C) By using the Insert/Section Break
(D) By changing the font size of your document
(E) None of these
Ans : (B)
20. A DVD is an example of a(n)
(A) hard disk
(B) optical disc
(C) output device
(D) solid-state storage device
(E) None of these
Ans : (B)

21. The default view in Excel is.view.


(A) Work
(B) Auto
(C) Normal
(D) Roman
(E) None of these
Ans : (C)
22. The process of transferring files from a computer on the Internet to your computer is called
(A) downloading
(B) uploading
(C) FTP
(D) JPEC
(E) downsizing
Ans : (A)
23. .is the process of dividing the disk into tracks and sectors.
(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
(E) None of these
Ans : (B)
24. Help Menu is available at which button ?
(A) End
(B) Staft
(C) Turnoff
(D) Restart
(E) Reboot
Ans : (B)
25. The contents of.are lost when the computer turns off.
(A) storage
(B) input
(C) output
(D) memory
(E) None of these
Ans : (D)
26. When you save to this, your data will remain intact even when the computer is turned off
(A) RAM
(B) Motherboard
(C) Secondary storage device
(D) Primary storage device
(E) None of these
Ans : (C)
27. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is
a(n)
(A) supercomputer
(B) minicomputer
(C) laptop
(D) server
(E) None of these
Ans : (D)
28. The.folder retains copies of messages that you have started but are not yet ready to send.
(A) Drafts
(B) Outbox
(C) Address Book

(D) Sent Items


(E) Inbox
Ans : (B)
29. Grouping and processing all of a firm's transactions at one time is called
(A) a database management system
(B) batch processing
(C) a real-time system
(D) an on-line system
(E) None of these
Ans : (B)
30. The.enables you to simultaneously keep multiple Web pages open in one browser window.
(A) tab box
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key
Ans : (C)
31. Which ports connect special types of music instruments to sound cards ?
(A) BUS
(B) CPU
(C) USB
(D) MIDI
(E) MINI
Ans : (C)
32. You can.a search by providing more information the search engine can use to select a smaller, more useful set
of results.
(A) refine
(B) expand
(C) load
(D) query
(E) slowdown
Ans : (A)
33. What is the permanent memory built into your computer called ?
(A) RAM
(B) Floppy
(C) CPU
(D) CO-ROM
(E) ROM
Ans : (E)
34. What displays the contents of the active cell in Excel ?
(A) Name box
(B) Row Headings
(C) Formula bar
(D) Task pane
(E) None of these
Ans : (A)
35. The piece of hardware that converts your computer's digital signal to an analog signal that can travel over telephone
lines is called a
(A) red wire
(B) blue cord
(C) tower
(D) modem
(E) None of these
Ans : (D)

36. Video processors consist of.and., which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) None of these
Ans : (C)
37. If you want to connect to your own computer through the Internet from another location, you can use
(A) e-mail
(B) FTP
(C) instant message
(D) Telnet
(E) None of these
Ans : (D)
38. To reload a Web page, press the.button.
(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh
Ans : (E)
39. This first step in the transaction processing cycle captures business data through various modes such as optical
scanning or at an electronic commerce website
(A) Document and report generation
(B) Database maintenance
(C) Transaction processing startup
(D) Data Entry
(E) None of these
Ans : (D)
40. A(n) .is a special visual and audio effect applied in Power-point to text or content.
(A) animation
(B) flash
(C) wipe
(D) dissolve
(E) None of these
Ans : (A)
41. When the pointer is positioned on a.it is shaped like a hand.
(A) grammar error
(B) Formatting error
(C) Screen Tip
(D) Spelling error
(E) hyperlink
Ans : (E)
42. Personal computers can be connected together to form a
(A) server
(B) supercomputer
(C) network
(D) enterprise
(E) None of these
Ans : (C)
43. A.is the term used when a search engine returns a Web page that matches the search criteria.
(A) blog
(B) hit

(C) link
(D) view
(E) success
Ans : (E)
44. .are words that a programming language has set aside for its own use.
(A) Control words
(B) Control structures
(C) Reserved words
(D) Reserved keys
(E) None of these
Ans : (C)
45. Mobile Commerce is best described as
(A) The use of Kiosks in marketing
(B) Transporting products
(C) Buying and selling goods/services through wireless handheld devices
(D) Using notebook PC's in marketing
(E) None of the above
Ans : (C)
46. Which of, the following is a storage device that uses rigid, permanently installed magnetic disks to store
data/information
(A) floppy diskette
(B) hard disk
(C) permanent disk
(D) optical disk
(E) None of these
Ans : (B)
47. The computer abbreviation KB usually means
(A) Key Block
(B) Kernel Boot
(C) Key Byte
(D) Kit Bit
(E) Kilo Byte
Ans : (E)
48. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) Configuration
(B) Download
(C) Storage
(D) Upload
(E) Installation
Ans : (D)
49. In Excel.allows users to bring together copies of work-books that other users have worked on independently.
(A) Copying
(B) Merging
(C) Pasting
(D) Compiling
(E) None of these
Ans : (B)
50. Which of the following are advantages of CD-ROM as a storage media?
(A) CD-ROM is an inexpensive way to store large, amount of data and information
(B) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) An of the above
(E) None of these
Ans : (D)

Allahabad Bank Probationary Officers Exam., 2010


(Held on 21-2-2010)

Computer Knowledge : Solved Paper


1.

Atypically connects personal computers within a very limited geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)
2. Computers manipulate data in many ways, and this manipulation is called
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)
3. An e-mail address typically consists of a user ID followed by the sign and the name of the e-mail server that
manages the users electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)
4. Software applies, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)
5. A file extension is separated from the main file name with a(n) , but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)

6. An ad hoc query is a
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)
7. A Web consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these

Ans : (B)
8. A computer is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other
files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Ans : (B)
9. The desktop contains small graphics called
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Ans : (C)
10. C, BASIC, COBOL, and Java are examples of languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)
11. A(n)camera is a peripheral device used to capture still images in a digital format that can be easily transferred
into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Ans : (A)
12. makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) E-commerce
(C) E-spend
(D) E-business
(E) None of these
Ans : (D)
13. Networks are monitored by security personnel and supervised by who set(s) up accounts and passwords for
authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Ans : (C)
14. Application software is designed to accomplish
(A) real-world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Ans : (D)

15. A telephone number, a birth date, and a customer name are all examples of
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Ans : (D)
16. The human-readable version of a program is called
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Ans : (D)
17. A computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the
screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
Ans : (A)
18. is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Ans : (C)
19. Programs such as Internet Explorer that serve as navigable windows into the Web are called
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Ans : (D)
20. A is a device that not only provides surge protection, but also furnishes your computer with battery backup
power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Ans : (C)
21. When you save to , your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
Ans : (C)
22. The motherboard is the
(A) circuit board that houses peripheral devices
(B) same as the CPU chip

(C) the first chip that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Ans : (D)
23. A computer-intensive problemruns on a
(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these
Ans : (C)
24. A(n)converts and executesone statement at a time.
(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these
Ans : (B)
25. The term designates equipment that might be added to a computer system to enhance its functionality.
(A) digital device
(B) system add-on
(C) disk pack
(D) peripheral device
(E) None of these
Ans : (D)
26. Approximately how many bytes make one megabyte ?
(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these
Ans : (D)
27. What is MP3 ?
(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these
Ans : (C)
28. All the deleted files go to
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)
29. this is the act of copying or downloading a program from a network and making multiple copies of it.
(A) Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site-license piracy
(E) None of these
Ans : (C)

30. A directory within a directory is called


(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)
31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
Ans : (B)
32. In MICR, C stands for .
(A) Code
(B) Colour
(C) Computer
(D) Character
(E) None of these
Ans : (D)
33. Fax machines and imaging systems are examples of
(A) bar-code readers
(B) imaging systems
(C) scanning devices
(D) pen-based systems
(E) None of these
Ans : (B)
34. When writing a document, you can use the feature to find an appropriate word or an alternative word if you find
yourself stuck for the right word.
(A) dictionary
(B) word finder
(C) encyclopedia
(D) thesaurus
(E) None of these
Ans : (A)
35. Which key is used in combination with another key to perform a specific task ?
(A) Function
(B) Control
(C) Arrow
(D) Space bar
(E) None of these
Ans : (B)
36. A disks content that is recorded at the time of manufacture and that cannot be changed or erased by the user is
(A) read-only
(B) memory-only
(C) run-only
(D) write-only
(E) None of these
Ans : (A)
37. In an information system, alphanumeric data normally takes the form of
(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures

(D) Human voice and other sounds


(E) None of these
Ans : (B)
38. A Websites main page is called its
(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these
Ans : (A)
39. When installing , the user must copy and usually decompress program files from a CDROM or other medium to
the hard disk.
(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these
Ans : (A)
40. A collection of interrelated files in a computer is a
(A) file manager
(B) field
(C) record
(D) database
(E) None of these
Ans : (D)
41. A computer is a large and expensive computer capable of simultaneously processing data for hundreds or
thousands of users.
(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these
Ans : (B)
42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a
trackball is described as
(A) a roller ball which moves the cursor
(B) a pen-shaped device which allows data to be entered through the CRT screen
(C) a figure which resembles a familiar office device
(D) an outdated input device
(E) None of these
Ans : (A)
43. Various applications and documents are represented on the Windows desktop by
(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these
Ans : (D)
44. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these

Ans : (D)
45. The real business and competitive value of information technology lies in
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
(D) The capabilities of the hardware and the speed at which it processes information
(E) None of these
Ans : (B)
46. Companies use which of the following vendors to provide access to software and services rather than purchasing the
applications and maintaining the applications themselves ?
(A) Open source vendors
(B) Alliances
(C) Application service providers
(D) All of the above
(E) None of these
Ans : (C)
47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(A) Opening an application previously installed on the computer
(B) Borrowed copies of software
(C) Viewing a website without causing any additional transactions
(D) Running antivirus programs
(E) None of these
Ans : (B)
48. Collecting personal information and effectively posing as another individual is known as the crime of
(A) spooling
(B) dentity theft
(C) spoofing
(D) hacking
(E) None of these
Ans : (B)
49. The first step in the transaction processing cycle is
(A) database operations
(B) audit
(C) data entry
(D) user inquiry
(E) None of these
Ans : (C)
50. In the information systems concept, the output function involves
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation process to their ultimate destination
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
(E) None of these
Ans : (A)
Bank Probationary Officers Common Written Exam., 2011
(Held on 18-9-2011)
Computer Knowledge: Solved Paper
1.

Computer uses the.number system to store data and perform calculations.


(A) binary
(B) octal
(C) decimal

(D) hexadecimal
(E) None of these
Ans : (A)
2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is
(A) Memory-only
(B) Write-only
(C) Once-only
(D) Run-only
(E) Read-only
Ans : (E)
3. Which of the following can be used to select the entire document ?
(A) CTRL+A
(B) ALT+F5
(C) SHIFT+A
(D) CTRL+K
(E) CTRL+H
Ans : (A)
4. .are 'attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above
Ans : (A)
5. Part number, part description, and number of parts ordered are examples of
(A) control
(B) output
(C) processing
(D) feedback
(E) input
Ans : (E)

6. A Web site's main page is called its


(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these
Ans : (A)
7. The simultaneous processing of two or more programs by multiple processors is
(A) multiprogramming
(B) multitasking
(C) time-sharing
(D) multiprocessing
(E) None of these
Ans : (D)
8. Codes consisting of lines of varying widths or lengths that are computer-readable are known as
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
(E) None of these
Ans : (D)

9. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to
AutoFit Contents.
(A) Fit to Form
(B) Format
(C) Autosize
(D) Contents
(E) AutoFit
Ans : (E)
10. Why is it unethical to share copyrighted files with your friends ?
(A) It is not unethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.
(E) It is not unethical-anyone can access a computer
Ans : (C)
11. Reusable optical storage will typica1ly have the acronym
(A) CO
(B) DVD
(C) ROM
(D) RW
(E) ROS
Ans : (D)
12. The most common type of storage devices are
(A) persistent
(B) optical
(C) magnetic
(D) flash
(E) steel
Ans : (D)
13. A device that connects to a network without the use of cables is said to be
(A) distributed
(B) free
(C) centralized
(D) open source
(E) None of these
Ans : (B)
14. A person who used his or her expertise to gain access to other people's computers to get information illegally or do
damage is a
(A) hacker
(B) analyst
(C) instant messenger
(D) programmer
(E) spammer
Ans : (A)
15. To access properties of an object, the mouse technique to use is
(A) dragging
(B) dropping
(C) right-clicking
(D) shift-clicking
(E) None of these
Ans : (C)
16. To change selected text to all capital letters, click the change case button, then click
(A) UPPERCASE
(B) UPPER ALL

(C) CAPS LOCK


(D) Lock Upper
(E) Large Size
Ans : (A)
17. The basic unit of a worksheet into which you enter data in Excel is called a
(A) tab
(B) cell
(C) box
(D) range
(E) None of these
Ans : (B)
18. You can keep your personal files / folders in
(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Ans : (B)
19. In Word you can force a page break
(A) By positioning your cursor at the appropriate place and pressing the F1 key
(B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter
(C) By using the Insert/Section Break
(D) By changing the font size of your document
(E) None of these
Ans : (B)
20. A DVD is an example of a(n)
(A) hard disk
(B) optical disc
(C) output device
(D) solid-state storage device
(E) None of these
Ans : (B)
21. The default view in Excel is.view.
(A) Work
(B) Auto
(C) Normal
(D) Roman
(E) None of these
Ans : (C)
22. The process of transferring files from a computer on the Internet to your computer is called
(A) downloading
(B) uploading
(C) FTP
(D) JPEC
(E) downsizing
Ans : (A)
23. .is the process of dividing the disk into tracks and sectors.
(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
(E) None of these
Ans : (B)

24. Help Menu is available at which button ?


(A) End
(B) Staft
(C) Turnoff
(D) Restart
(E) Reboot
Ans : (B)
25. The contents of.are lost when the computer turns off.
(A) storage
(B) input
(C) output
(D) memory
(E) None of these
Ans : (D)
26. When you save to this, your data will remain intact even when the computer is turned off
(A) RAM
(B) Motherboard
(C) Secondary storage device
(D) Primary storage device
(E) None of these
Ans : (C)
27. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is
a(n)
(A) supercomputer
(B) minicomputer
(C) laptop
(D) server
(E) None of these
Ans : (D)
28. The.folder retains copies of messages that you have started but are not yet ready to send.
(A) Drafts
(B) Outbox
(C) Address Book
(D) Sent Items
(E) Inbox
Ans : (B)
29. Grouping and processing all of a firm's transactions at one time is called
(A) a database management system
(B) batch processing
(C) a real-time system
(D) an on-line system
(E) None of these
Ans : (B)
30. The.enables you to simultaneously keep multiple Web pages open in one browser window.
(A) tab box
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key
Ans : (C)
31. Which ports connect special types of music instruments to sound cards ?
(A) BUS
(B) CPU
(C) USB

(D) MIDI
(E) MINI
Ans : (C)
32. You can.a search by providing more information the search engine can use to select a smaller, more useful set
of results.
(A) refine
(B) expand
(C) load
(D) query
(E) slowdown
Ans : (A)
33. What is the permanent memory built into your computer called ?
(A) RAM
(B) Floppy
(C) CPU
(D) CO-ROM
(E) ROM
Ans : (E)
34. What displays the contents of the active cell in Excel ?
(A) Name box
(B) Row Headings
(C) Formula bar
(D) Task pane
(E) None of these
Ans : (A)
35. The piece of hardware that converts your computer's digital signal to an analog signal that can travel over telephone
lines is called a
(A) red wire
(B) blue cord
(C) tower
(D) modem
(E) None of these
Ans : (D)
36. Video processors consist of.and., which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) None of these
Ans : (C)
37. If you want to connect to your own computer through the Internet from another location, you can use
(A) e-mail
(B) FTP
(C) instant message
(D) Telnet
(E) None of these
Ans : (D)
38. To reload a Web page, press the.button.
(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh
Ans : (E)

39. This first step in the transaction processing cycle captures business data through various modes such as optical
scanning or at an electronic commerce website
(A) Document and report generation
(B) Database maintenance
(C) Transaction processing startup
(D) Data Entry
(E) None of these
Ans : (D)
40. A(n) .is a special visual and audio effect applied in Power-point to text or content.
(A) animation
(B) flash
(C) wipe
(D) dissolve
(E) None of these
Ans : (A)
41. When the pointer is positioned on a.it is shaped like a hand.
(A) grammar error
(B) Formatting error
(C) Screen Tip
(D) Spelling error
(E) hyperlink
Ans : (E)
42. Personal computers can be connected together to form a
(A) server
(B) supercomputer
(C) network
(D) enterprise
(E) None of these
Ans : (C)
43. A.is the term used when a search engine returns a Web page that matches the search criteria.
(A) blog
(B) hit
(C) link
(D) view
(E) success
Ans : (E)
44. .are words that a programming language has set aside for its own use.
(A) Control words
(B) Control structures
(C) Reserved words
(D) Reserved keys
(E) None of these
Ans : (C)
45. Mobile Commerce is best described as
(A) The use of Kiosks in marketing
(B) Transporting products
(C) Buying and selling goods/services through wireless handheld devices
(D) Using notebook PC's in marketing
(E) None of the above
Ans : (C)
46. Which of, the following is a storage device that uses rigid, permanently installed magnetic disks to store
data/information
(A) floppy diskette

(B) hard disk


(C) permanent disk
(D) optical disk
(E) None of these
Ans : (B)
47. The computer abbreviation KB usually means
(A) Key Block
(B) Kernel Boot
(C) Key Byte
(D) Kit Bit
(E) Kilo Byte
Ans : (E)
48. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) Configuration
(B) Download
(C) Storage
(D) Upload
(E) Installation
Ans : (D)
49. In Excel.allows users to bring together copies of work-books that other users have worked on independently.
(A) Copying
(B) Merging
(C) Pasting
(D) Compiling
(E) None of these
Ans : (B)
50. Which of the following are advantages of CD-ROM as a storage media?
(A) CD-ROM is an inexpensive way to store large, amount of data and information
(B) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) An of the above
(E) None of these
Ans : (D)
Allahabad Bank Probationary Officers Exam., 2010
(Held on 21-2-2010)
Computer Knowledge : Solved Paper
1.

Atypically connects personal computers within a very limited geographical area, usually within a single
building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)
2. Computers manipulate data in many ways, and this manipulation is called
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)

3. An e-mail address typically consists of a user ID followed by the sign and the name of the e-mail server
that manages the users electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)
4. Software applies, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)
5. A file extension is separated from the main file name with a(n) , but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)

6. An ad hoc query is a
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)
7. A Web consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)
8. A computer is a set of program instructions that can attach itself to a file, reproduce itself, and spread to
other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Ans : (B)
9. The desktop contains small graphics called
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Ans : (C)
10. C, BASIC, COBOL, and Java are examples of languages.
(A) low-level

(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)
11. A(n)camera is a peripheral device used to capture still images in a digital format that can be easily
transferred into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Ans : (A)
12. makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) E-commerce
(C) E-spend
(D) E-business
(E) None of these
Ans : (D)
13. Networks are monitored by security personnel and supervised by who set(s) up accounts and passwords
for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Ans : (C)
14. Application software is designed to accomplish
(A) real-world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Ans : (D)
15. A telephone number, a birth date, and a customer name are all examples of
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Ans : (D)
16. The human-readable version of a program is called
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Ans : (D)
17. A computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the
screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary

(D) briefcase
(E) None of these
Ans : (A)
18. is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Ans : (C)
19. Programs such as Internet Explorer that serve as navigable windows into the Web are called
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Ans : (D)
20. A is a device that not only provides surge protection, but also furnishes your computer with battery backup
power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Ans : (C)
21. When you save to , your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
Ans : (C)
22. The motherboard is the
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Ans : (D)
23. A computer-intensive problemruns on a
(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these
Ans : (C)
24. A(n)converts and executesone statement at a time.
(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these
Ans : (B)

25. The term designates equipment that might be added to a computer system to enhance its functionality.
(A) digital device
(B) system add-on
(C) disk pack
(D) peripheral device
(E) None of these
Ans : (D)
26. Approximately how many bytes make one megabyte ?
(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these
Ans : (D)
27. What is MP3 ?
(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these
Ans : (C)
28. All the deleted files go to
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)
29. this is the act of copying or downloading a program from a network and making multiple copies of it.
(A) Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site-license piracy
(E) None of these
Ans : (C)
30. A directory within a directory is called
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)
31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
Ans : (B)
32. In MICR, C stands for .
(A) Code
(B) Colour
(C) Computer
(D) Character

(E) None of these


Ans : (D)
33. Fax machines and imaging systems are examples of
(A) bar-code readers
(B) imaging systems
(C) scanning devices
(D) pen-based systems
(E) None of these
Ans : (B)
34. When writing a document, you can use the feature to find an appropriate word or an alternative word if
you find yourself stuck for the right word.
(A) dictionary
(B) word finder
(C) encyclopedia
(D) thesaurus
(E) None of these
Ans : (A)
35. Which key is used in combination with another key to perform a specific task ?
(A) Function
(B) Control
(C) Arrow
(D) Space bar
(E) None of these
Ans : (B)
36. A disks content that is recorded at the time of manufacture and that cannot be changed or erased by the user is

(A) read-only
(B) memory-only
(C) run-only
(D) write-only
(E) None of these
Ans : (A)
37. In an information system, alphanumeric data normally takes the form of
(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these
Ans : (B)
38. A Websites main page is called its
(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these
Ans : (A)
39. When installing , the user must copy and usually decompress program files from a CDROM or other
medium to the hard disk.
(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these
Ans : (A)

40. A collection of interrelated files in a computer is a


(A) file manager
(B) field
(C) record
(D) database
(E) None of these
Ans : (D)
41. A computer is a large and expensive computer capable of simultaneously processing data for hundreds or
thousands of users.
(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these
Ans : (B)
42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems,
a trackball is described as
(A) a roller ball which moves the cursor
(B) a pen-shaped device which allows data to be entered through the CRT screen
(C) a figure which resembles a familiar office device
(D) an outdated input device
(E) None of these
Ans : (A)
43. Various applications and documents are represented on the Windows desktop by
(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these
Ans : (D)
44. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these
Ans : (D)
45. The real business and competitive value of information technology lies in
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
(D) The capabilities of the hardware and the speed at which it processes information
(E) None of these
Ans : (B)
46. Companies use which of the following vendors to provide access to software and services rather than purchasing
the applications and maintaining the applications themselves ?
(A) Open source vendors
(B) Alliances
(C) Application service providers
(D) All of the above
(E) None of these
Ans : (C)
47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?

(A) Opening an application previously installed on the computer


(B) Borrowed copies of software
(C) Viewing a website without causing any additional transactions
(D) Running antivirus programs
(E) None of these
Ans : (B)
48. Collecting personal information and effectively posing as another individual is known as the crime of
(A) spooling
(B) dentity theft
(C) spoofing
(D) hacking
(E) None of these
Ans : (B)
49. The first step in the transaction processing cycle is
(A) database operations
(B) audit
(C) data entry
(D) user inquiry
(E) None of these
Ans : (C)
50. In the information systems concept, the output function involves
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation process to their ultimate destination
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
(E) None of these
Ans : (A)
General Knowledge and Computer : Solved Paper
Bank of India Clerk Exam., 2008
(Held on 22-6-2008)
TestIII
1.

Very often we read about financial inclusion in newspapers these days. Financial Inclusion means
(A) Providing loans to all eligible persons
(B) Creating a mechanism of providing financial help to business people of society whenever they are in need of the
same
(C) Providing banking services to all those who are staying in remote and interior areas of the country
(D) To ensure that each and every person pays tax on his/her income regularly and honestly
(E) None of these
Ans : (C)
2. Mid Day Meals is a scheme to provide nutritious food to
(A) Those taking treatment in hospitals
(B) School going children
(C) Daily wage employees/or labours
(D) Labours engaged in jobs in unorganized sectors
(E) Girls who are residing in girls/youth hostels
Ans : (B)
3. The Govt. of India is running a National Programme to control which of the following disease ?
(A) Renal Failures
(B) Heart Ailments
(C) Cancer (D) AIDS
(E) None of these

Ans : (D)
4. Sarva Shiksha Abhiyan is aimed at the education of which of the following ?
(A) Engineering and technical education
(B) Education of girls upto graduation level
(C) College education
(D) Adult education
(E) Education of children between 6-14 years
Ans : (E)
5. Five year plans in India are designed and launched by which of the following organizations ?
(A) Ministry of Rural Development
(B) Ministry of Agriculture
(C) Panchayat Raj Samitees of each state
(D) Planning Commission of India
(E) Ministry of Home Affairs
Ans : (D)
6. Which of the following Ministries prepares its own budget and presents it in the Parliament every year ?
(A) Finance Ministry
(B) Railway Ministry
(C) Ministry of Defence
(D) Ministry of Home Affairs
(E) None of these
Ans : (B)
7. Which of the following banks is a nationalized bank ?
(A) ICICI Bank
(B) Yes Bank
(C) Saraswat Co-op. Bank
(D) Reserve Bank of India
(E) Bank of India
Ans : (E)
8. Which of the following types of accounts are known as Demat Accounts ?
(A) Accounts which are Zero Balance Accounts
(B) Accounts which are opened to facilitate repayment of a loan taken from the bank. No other business can be
conducted from there
(C) Accounts in which shares of various companies are traded in electronic form
(D) Accounts which are operated through internet banking facility
(E) None of these
Ans : (C)
9. Which of the following is definitely a major indication of the state of the economy of a country ?
(A) Rate of GDP growth
(B) Rate of inflation
(C) Number of Banks in a country
(D) Stock of foodgrains in a country
(E) None of these
Ans : (A)
10. Which of the following taxes levied by the Govt. of India is withdrawn now ? (As announced in Union Budget
200809)
(A) Income Tax
(B) VAT
(C) Corporate Tax
(D) Banking Cash Transaction Tax
(E) None of these
Ans : (D)
11. Sakhalin oilfields are located in

(A) China
(B) Russia
(C) France
(D) USA
(E) None of these
Ans : (B)
12. Twenty 20 Cricket Matches are very popular these days. What is the format of the game ?
(A) Every player has to play 20 balls only
(B) Every team has to play 20 overs only
(C) Every team will now have twenty players
(D) The team who makes maximum runs in 20 hours will be the winner
(E) None of these
Ans : (B)
13. Which of the following countries won the finals of under 19 Cricket World Cup held in March 2008 ?
(A) South Africa
(B) India
(C) England
(D) New Zealand
(E) None of these
Ans : (B)
14. Who amongst the following presented the Union Budget 2008-09 in the Parliament ?
(A) Dr. Manmohan Singh
(B) Mr. Lalu Prasad Yadav
(C) Smt. Sonia Gandhi
(D) Mr. Arjun Singh
(E) None of these
Ans : (E)
15. Late Benazir Bhutto was the
(A) Present President of Pakistan
(B) Former President of Pakistan
(C) Present Prime Minister of Pakistan
(D) Former Prime Minister of Pakistan
(E) Present Foreign Minister of Pakistan
Ans : (D)
16. If you visit the branch of a bank you will normally not see a department/section/counter names as
(A) Cash
(B) Credit
(C) Customer care
(D) Housekeeping
(E) Retail Banking
Ans : (D)
17. Who amongst the following is the Chairperson of the National Knowledge Commission ?
(A) Dr. Manmohan Singh
(B) Mr. Arjun Singh
(C) Dr. Pranav Mukherjee
(D) Justice Arijit Pasayat
(E) Mr. Sam Pitroda
Ans : (E)
18. Which of the following phenomenon has created a state of anxiety in the economic and financial sector in India
these days ?
(A) Rate of Inflation
(B) Sub-prime crisis in USA
(C) High level of fluctuation in Sensex
(D) Population growth in Metro cities in India

(E) None of these


Ans : (A)
19. Name of Ishant Sharma is associated with the game of
(A) Hockey
(B) Chess
(C) Cricket
(D) Football
(E) Badminton
Ans : (C)
20. Which of the following programmes is launched to develop basic infrastructure in the country ?
(A) Bharat Nirman programme
(B) Technology Mission
(C) Special Economic Zones
(D) National Rural Employment Guarantee Act
(E) None of these
Ans : (A)
21. Which of the following is permanent venue of International Film festivals in India ?
(A) Goa
(B) Pune (Maharashtra)
(C) Jaipur (Rajasthan)
(D) Hyderabad (Andhra Pradesh)
(E) None of these
Ans : (A)
22. Foreign investments in India are normally known as
(A) CII
(B) FDI
(C) SFI
(D) SME
(E) MDI
Ans : (B)
23. Which of the following is a computer package for preparing / typing letters / documents ?
(A) Word
(B) Excel
(C) PowerPoint
(D) Windows
(E) Unix
Ans : (D)
24. Duleep Trophy is associated with the game of
(A) Badminton
(B) Hockey
(C) Football
(D) Cricket
(E) Chess
Ans : (D)
25. Jnanpith Award is given for excellence in the field of
(A) Social Service
(B) Sports
(C) Classical Dance
(D) Music
(E) Literature
Ans : (E)
26. Which of the following organizations is a popular name in the field of computer & softwares ?
(A) Rotman

(B) Henley
(C) Microsoft
(D) Louis Vuitton
(E) DLA Piper
Ans : (C)
27. King of which of the following countries has to leave as the country has adopted parliamentary form of
democratic govt. and first election has taken place ?
(A) Jordan
(B) Bhutan
(C) Nepal
(D) Myanmar
(E) None of these
Ans : (C)
28. For applying for this project, the applicants were required to
(A) Send physical applications
(B) Apply on-line
(C) Buy scannable form and send after filling
(D) Send only Demand Draft
(E) Apply in employment exchange
Ans : (B)
29. Dyanchand Trophy is associated with the game of
(A) Golf
(B) Cricket
(C) Football
(D) Tennis
(E) Hockey
Ans : (E)
30. Who amongst the following is a famous Lawn tennis player ?
(A) Irfan Khan
(B) Sania Mirza
(C) Sujata Sharma
(D) Kiran Desai
(E) None of these
Ans : (B)
31. Which of the following bills was placed in the Parliament recently after a waiting period of several years ?
(A) Womens Reservation Bill
(B) Financial Inclusion Bill
(C) Income Tax Amendment Bill
(D) Companies Amendment Bill
(E) None of these
Ans : (A)
32. Who amongst the following is the author of the book Business at the Speed of Thought ?
(A) V. S. Naipaul
(B) Jaswant Singh
(C) Ritu Beri
(D) Bill Gates
(E) None of these
Ans : (D)
33. Govt. normally does not announce the support price of
(A) Wheat
(B) Paddy
(C) Mango
(D) Sugar cane
(E) Cotton

Ans : (C)
34. Mr. Dmitry Medvedev has become the new
(A) Prime Minister of Russia
(B) President of Russia
(C) Prime Minister of France
(D) President of France
(E) Prime Minister of Italy
Ans : (B)
35. If you visit USA you have to make all your payments in
(A) Euro
(B) Dollar
(C) Rupee
(D) Pound Sterling
(E) Any one of these
Ans : (B)
36. Census in India is done after a period of
(A) 5 years
(B) 7 years
(C) 8 years
(D) 10 years
(E) 12 years
Ans : (D)
37. TRAI regulates the functioning of which of the following services ?
(A) Telecom
(B) Trade
(C) Port
(D) Transport
(E) None of these
Ans : (A)
38. Firewalls are used to protect against
(A) Unauthorised Attacks
(B) Virus Attacks
(C) Data Driven Attacks
(D) Fire Attacks
(E) None of these
Ans : (A)
39. The directory is mandatory for every disk.
(A) Root
(B) Base
(C) Sub
(D) Case
(E) None of these
Ans : (C)
40. WWW stands for
(A) World Word Web
(B) World Wide Web
(C) World White Web
(D) World Work Web
(E) None of these
Ans : (B)
41. For applying for this project, the applicants were required to
(A) Pay fee by Cheque
(B) Pay fee by Demand Draft

(C) Pay fee by Postal Order


(D) No fee/postage was required to be paid
(E) None of these
Ans : (B)
42. Which of the following is NOT associated with Computers ?
(A) Bit
(B) Binary
(C) Pencil
(D) Mouse
(E) Screen
Ans : (C)
43. MICR technology used for clearance of cheques by banks refers to
(A) Magnetic Ink Character Recognition
(B) Magnetic Intelligence Character Recognition
(C) Magnetic Information Cable Recognition
(D) Magnetic Insurance Cases Recognition
(E) None of these
Ans : (A)
44. Modern Computers represent characters and numbers internally using one of the following number systems
(A) Penta
(B) Octal
(C) Hexa
(D) Septa
(E) Binary
Ans : (E)
45. Smallest storage unit of a computer is
(A) Bit
(B) Byte
(C) Nibble
(D) Pixel
(E) None of these
Ans : (A)
46. A MODEM is connected in between a telephone line and a
(A) Network
(B) Computer
(C) Communication Adapter
(D) Serial Port
(E) All of these
Ans : (B)
47. Window is and Window 95, Window 98 are
(A) Graphical User Interface, Operating System
(B) Graphics Useful Interface, Executing Systems
(C) Graph User Interval, Expert Systems
(D) Graphical Use Interphase, Excel Systems
(E) None of these
Ans : (A)
48. Which of the following best explains e-governance ?
(A) Improving the functioning of Government
(B) Teaching Government employees the basics of computing
(C) Delivery of public services through internet
(D) Framing of cyber-laws of chatting on internet
(E) Convergence of e-mail and videoconferencing
Ans : (C)

49. Buy NowPay Now is commonly used for


(A) Visa Cards
(B) Vault Cards
(C) Credit Cards
(D) E-purse
(E) Debit Cards
Ans : (A)
50. Smart Card is
(A) Special purpose Cards
(B) Microprocessor Cards
(C) Processing unit contains memory for storing data
(D) Processing unit for software handling
(E) None of these
Ans : (B)

Computer General Knowledge for Bank P.O. & Clerk Exams


1.

All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Ans : B
2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Ans : A
3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales
computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Ans : B
4. A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the current
price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Ans : A
5. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement
specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Ans : C
6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information

Ans : C
7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animals
movements.
A. POS
B. RFID
C. PPS
D. GPS
Ans : B
8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This
technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Ans : A
9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Ans : A
10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Ans : A
11. ____________ is the science that attempts to produce machines that display the same type of intelligence that
humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Ans : D
12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Ans : D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Ans : B
14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Ans : B
15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is

considered:
A. data.
B. output.
C. input.
D. the process.
Ans : B
16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Ans : C
17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Ans : D
18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique
combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Ans : D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Ans : C
20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Ans : B
21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Ans : C
22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Ans : C
23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral

D. An application
Ans : A
24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Ans : C
25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Ans : D
26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Ans : A
27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Ans : B
28. The ____________, also called the brains of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Ans : D
29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Ans : B
30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Ans : A
31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Ans : B
32. System software is the set of programs that enables your computers hardware devices and ____________ software
to work together.

A. management
B. processing
C. utility
D. application
Ans : D
33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Ans : A
34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Ans : C
35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Ans : A
36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Ans : D
37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Ans : B
38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Ans : D
39. The difference between people with access to computers and the Internet and those without this access is known as
the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Ans : A
40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence

Ans : A
41. Which of the following is the correct order of the four major functions of a computer?
A. Process Output Input Storage
B. Input Output Process Storage
C. Process Storage Input Output
D. Input Process Output Storage
Ans : D
42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Ans : A
43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Ans : B
44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Ans : C
45. ____________ controls the way in which the computer system functions and provides a means by which users can
interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Ans : B
46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Ans : C
47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your
electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Ans : B
48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Ans : A
49. The two broad categories of software are:

A. word processing and spreadsheet.


B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Ans : D
50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Ans : A
Allahabad Bank Clerk Exam., 2008
Computer General Knowledge : Solved Paper
(Held on 30-08-2008)
1.

If a word is typed that is not in Words dictionary, a____________wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)

2. The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)

3. In Excel, any set of characters containing a letter , hyphen, or space is considered


(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans : (B)

4. ____________Software allows users to perform calculations on rows and columns of data.


(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these
Ans : (C)

5. A ____________represent approximately one billion memory locations.


(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (C)

6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging

(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)

7. The operating system is the most common type of____________software.


(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (C)

8. When you quickly press and releaes the left mouse button twice , you are
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans : (C)

9. The horizontal and vertical lines on a worksheet are called


(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
Ans : (D)

10. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans : (D)

11. The operating system does all of the following EXCEPT:


(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing.
Ans : (D)

12. During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
Ans : (B)

13. ____________ are lists of commands that appear on the screen.


(A) GUIs
(B) Icons
(C) Menus
(D) Windows
Ans : (C)

14. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting

Ans : (A)

15. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is
called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Ans : (C)

16. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the
processors attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
Ans : (B)

17. The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.
Ans : (A)

18. MS-DOS is a ____________ operating system.


(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
Ans : (C)

19. An interrupt handler is a(n):


(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device.
(C) utility program.
(D) special numeric code that indicates the priority of a request.
Ans : (D)

20. A spooler is a(n):


(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.
Ans : (C)

21. Virtual memory is typically located:


(A) on a floppy disk.
(B) in the CPU.
(C) in a flash card.
(D) on the hard drive.
Ans : (D)

22. The purpose of a swap (or page) file is to:


(A) maintain pages of documents that are being spooled to the printer.
(B) hold a programs data or instructions in virtual memory when it cant fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously.
Ans : (B)

23. The definition of thrashing is:


(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.

(C) too many processors being managed by the operating system.


(D) inaccurate information stored in the registry.
Ans : (A)

24. All of the following are TRUE of Safe Mode EXCEPT:


(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
Ans : (B)

25. Verification of a login name and password is known as:


(A) configuration.
(B) accessibility.
(C) authentication.
(D) logging in.
Ans : (C)

26. The combination of the operating system and the processor is referred to as the computers:
(A) CPU.
(B) platform.
(C) BIOS.
(D) CMOS.
Ans : (B)

27. The following message generally means:


(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
Ans : (A)

28. Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
Ans : (B)

29. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
Ans : (D)

30. The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent
location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor program
Ans : (A)

31. The basic input/output system (BIOS) is stored in:


(A) RAM.
(B) ROM.
(C) the CPU.
(D) the hard drive.
Ans : (B)

32. Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
(A) configuration

(B) CMOS
(C) POST
(D) ROM
Ans : (C)

33. The memory resident portion of the operating system is called the
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
Ans : (D)

34. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
Ans : (A)

35. All of the following are TRUE regarding virtual memory EXCEPT
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
Ans : (A)

36. The operating system allows users to organize the computers contents in a hierarchical structure of directories that
include all of the following EXCEPT:
(A) files.
(B) folders.
(D) drives.
(D) systems.
Ans : (D)

37. All of the following statements concerning windows are true EXCEPT
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
Ans : (A)

38. All of the following statements concerning files are true EXCEPT
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
Ans : (C)

39. Using Windows Explorer, a plus (+) sign in front of a folder indicates
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
Ans : (B)

40. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the
__________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon
Ans : (C)

Allahabank Bank Probationary Officers Exam , 2008


Computer General Awareness : Solved Paper
(Held on 17-08-2008)
1. Programs from the same developer , sold bundled together , that provide better integration and share common features , toolbars
and menus are known as ....
(A) software suites
(B) integrated software packages
(C) software processing packages
(D) personal information managers
(E) none of these
Ans : (A)

2. A data warehouse is which of the following ?


(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these
Ans : (C)

3. ______________ servers store and manages files for network users.


(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these
Ans : (D)

4. All of the following are examples of real security and privacy risks Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
Ans : (B)

5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer
systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these
Ans : (B)

6. The OSI model is divided into _______ processes called layers.


(A) five
(B) six
(C) seven
(D) eight
(E) None of these
Ans : (C)

7. System software is the set of programs that enables your computer's hardware devices and ______ software to work together.
(A) management
(B) processing
(C) utility
(D) application
(E) None of these
Ans : (D)

8. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
(A) Servers
(B) Embedded computers
(C) Robotic computers
(D) Mainframes
(E) None of these
Ans : (B)

9. The following are all computing devices , except.........


(A) notebook computers
(B) cellular telephones
(C) digital scanners
(D) personal digital assistants
(E) None of these
Ans : (C)

10. in a ring topology , the the computer in possession of the ______ can trasmit data
(A) packet
(B) data
(C) access method
(D) token
(E) None of these
Ans : (D)

11. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and
serial ports ____
(A) basic input/output system
(B) secondary input/output system
(C) peripheral input/output system
(D) marginal input/output system
(E) None of these
Ans : (A)

12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these
Ans : (B)

13. ________ controls the way in which the computer system functions and provides a meAns : by which users can interact with the
computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
Ans : (C)

14. Servers are computers that provide resources to other computers connected to a ___________
(A) mainframe
(B) network
(C) supercomputer
(D) client
(E) None of these
Ans : (B)

15. A goal of data mining includes which of the following?


(A) To explain some observed event or condition
(B) To confirm that data exists

(C) To analyze data for expected relationships


(D) To create a new data warehouse
(E) None of these
Ans : (A)

16. URL stands for ........


(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(E) None of these
Ans : (C)

17. A database management system (DBMS) is a ............


(A) hardware system used to create , maintain and provide controlled access to a database
(B) hardware system used to create, maintain, and provide uncontrolled access to a database.
(C) software system used to create, maintain, and provide uncontrolled access to a database.
(D) software system used to create, maintain, and provide controlled access to a database.
(E) None of these
Ans : (D)

18. Which of the following is NOT a goal of transaction processing system ?


(A) Capture , process and store transactions
(B) Produce a variety of documents related to routine business activities
(C) Reduce manual effort associated with processing business transactions
(D) Produce standard reports used for management decision making
(E) None of these
Ans : ()
19. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
Ans : (B)

20. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) None of these
Ans : (D)

21. _____________ are words that a programming language has set aside for its own use.
(A) Control worlds
(B) Reserved words
(C) Control structures
(D) Reserved keys
(E) None of these
Ans : (B)

22. What is the primary difference between a virus and a worm?


(A) A worm has the ability to self-propagate from an infected user's computer to other computers
(B) A worm is usually written by a cracker: Script bunnies do not have the skills to develop a worm program
(C) A virus is very harmful to the computers it infects : a worm is not a serious a problem
(D) Anti-virus software is effective in fighting viruses but not worms
(E) None of these
Ans : ()
23. ______ describe what is database fields.

(A) Structures
(B) Field markers
(C) Field definition
(D) Field names
(E) None of these
Ans : (D)

24. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
(A) router
(B) modem
(C) node
(D) cable
(E) None of these
Ans : (A)

25. A goal of normalization is to __________


(A) minimize the number of relationships
(B) minimize the number of entities
(C) minimize the number of tables
(D) minimize the number of redundancy
(E) None of these
Ans : (D)

26. Granting an outside organization access to internet web pages is often implemented using a (n) ____
(A) extranet
(B) intranet
(C) internet
(D) hacker
(E) None of these
Ans : (A)

27. Which term identifies a specific computer on the web and the main page of the entire site
(A) URL
(B) Web site address
(C) Hyperlink
(D) Domain name
(E) None of these
Ans : (A)

28. The code that relational database management systems use to perform their database task is referred to as .....
(A) QBE
(B) SQL
(C) OLAP
(D) Sequel Server
(E) None of these
Ans : (B)

29. Chip is a common nickname for a (n):


(A) transistor
(B) resistor
(C) integrated circuit
(D) semiconductor
(E) None of these
Ans : (C)

30. The purpose of the primary key in a database is to:


(A) unlock the database
(B) provide a map of the data
(C) uniquely identify a record
(D) establish constraints on database operations.
(E) None of these
Ans : (B)

31. A _________ contains specific rules and words that express the logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
Ans : ()
32. The design of the network is called the network:
(A) architecture
(B) server
(C) transmission
(D) type
(E) None of these
Ans : (A)

33. The most frequently used instructions of a computer program are likely to be fetched from:
(A) the hard disk
(B) cache memory
(C) RAM
(D) registers
(E) None of these
Ans : (B)

34. The ____________ contains data descriptions and defines the name, data type, and length of each field in the database.
(A) data dictionary
(B) data table
(C) data record
(D) data field
(E) None of these
Ans : (A)

35. Personal logs or journal entries posted on the Web are known as:
(A) listservs
(B) Webcasts
(C) blogs
(D) subject directories
(E) None of these
Ans : (C)

36. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
(A) command - based user interface
(B) GUI
(C) system utility
(D) API
(E) None of these
Ans : (B)

37. The _____ manual tells you how to use a software program.
(A) documentation
(B) programming
(C) technical
(D) user
(E) None of these
Ans : ()
38. Which of the following is NOT a type of broadband Internet connection?
(A) Cable
(B) DSL
(C) Dial-up
(D) Satellite

(E) None of these


Ans : (C)

39. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(A) spyware
(B) adware
(C) spam
(D) malware
(E) None of these
Ans : (D)

40. Making a field ______ meAns : that it cannot be left blank.


(A) numeric
(B) required
(C) calculated
(D) validated
(E) None of these
Ans : (B)

41. _________ is the process of finding errors in software code.


(A) Debugging
(B) Compiling
(C) Testing
(D) Running
(E) None pf these
Ans : ()
42. ____________ are viruses that are triggered by the passage of time or on a certain date.
(A) Boot-sector viruses
(B) Macro viruses
(C) Time bombs
(D) Worms
(E) None of these
Ans : (C)

43. Linux is a (n) ____________ operating system.


(A) open-source
(B) Microsoft
(C) Windows
(D) Mac
(E) None of these
Ans : (A)

44. What is a backup?


(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
(E) None of these
Ans : (D)

45. Which of the following places the common data elements in order from smallest to largest
(A) character, file, record, field, database
(B) character, record, field, database, file
(C) character, field, record, file, database
(D) Bit, byte, character, record, field, file, database,
(E) None of these
Ans : (C)

46. The internet is ......


(A) a large network of networks
(B) an internal communication system for a business

(C) a communication system for the Indian government


(D) All of these
(E) None of these
Ans : (D)

47. ____________ are lists of commands that appear on the screen.


(A) GUIs
(B) Icons
(C) Menus
(D) Windows
(E) None of these
Ans : (C)

48. Which of the following statements is FALSE concerning file names?


(A) Files may share the same name or the same extension but not both
(B) Every file in the same folder must have a unique name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.) followed by the file name
(E) None of these
Ans : (D)

49. Verification of a login name and password is known as:


(A) configuration
(B) accessibility
(C) authentication
(D) logging in
(E) None of these
Ans : (C)

50. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear.
(B) The CD-ROM stops functioning.
(C) The Web browser opens to an unusual home page.
(D) Odd messages or images are displayed on the screen.
(E) None of these
Ans : (B)

You might also like