Sunday, 20 May 2012

Computer Awareness Quiz -28 for Bank exam po and Sbi clerk

1.. The four main functions of a computer are

A. input, processing, output and storage

B. learning, thinking,intelligence and virtuosity

C. data, information, bits, and bytes

D. hardware,software, modeling and operations

E. None of these



2. Which of the following computers can be carried around easily ?
A). Laptops
B) Super computers
C) PCs
D)Minicomputers
E) None


3. What menu is selected to change the font and style ?
A) Tools
B) File
C)Format
D) Edit
E) None


4. Where is the disk put in a computer ?
A) In the hard drive
B) in the disk drive
C) in the CPU
D)In the modem
E) None


5.The field that investigates the mechanics of human intelligence is
A) Artifical science
B)Cognitive science
C) Psychology
D)Sociology
E) None


6. A 'C' data structure, called a structure, is a group of items in which each item is identified by its own identifier, each of which is known as a member of a structure. The member is also known as ?
A) Information
B)Field
C) Record
D)Data type
E) None


7. SONET is used
A) for exchanging data between I WAN and WAN
B) to provide support for operations, administration and
maintenance (GAM)
C) to provide a way to multiplex multiple digital channels
D) All the above
E) None of these


8._____ trminals (formerly known as cash registers) are often connected to complex inventory and sales computer
systems.
A) Data
B)Sales
C) Query
D)Point of Sales(POS)
E) None


9. The OSI model is divided into ______ processes calledlayers.
A) Five
B) Six
C)Seven
D) Eight
E) None



10.System software is the et of programs that enables your computer's hardware devices and ____ software to work together.
A) management
B) processing
C) utility
D) application
E) None


11. Which of the following is NOT a good Web security strategy ?
A)Restrict access to the Web server, keep a minimum number of ports open
B)Limit the users who can load software, edit or add files
C)Add demo programs, so that users can test system without accessing production data
D)Remove unnecessary compilers and interpreters
E)None of these


12. The altering of data so that it is not usable unless the changes are undone is known as A).Biometrics
B)Compression
C) Encryption
D)Ergonomics
E) None


13.FTP stands for
A) File Translate Protocol
B) File Transit Protocol
C) File Typing protocol
D) File Transfer Protocol
E) None


14. A voice mail.
A) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the internet
B) permits users to converse in real time with each other via the computer while connected to the Internet.
C) functions much like an answering machine,allowing callers to leave a voice message for the called party
D) involves using video and computer technology to conduct a meeting between participants at geographically separate locations
E) None of these


15. A communication processor that connects dissimilar networks by providing translation from one set of protocol to another is known as
A) Bridge
B) Gateway
C) Router
D)Modem
E) All


No comments:

Post a Comment