Showing posts with label Computer Awareness. Show all posts
Showing posts with label Computer Awareness. Show all posts

Friday, 6 July 2012

Computer Awareness Quiz -36 for IBPS Bank Exam

Below Questions Asked in 17/06/2012 IBPS PO EXAM

1. ________allows user to upload file to an online site so they can be viewed and edited from another location .
A. General –purpose applications
B. Microsoft outlook
C. Web-hosted technology
D. Office live
E. None


2. What feature adjusts the top and bottom margins so that the text is centered vertically on the printed page ?
A. Vertical justifying
B. Vertical adjusting
C. Dual centering
D. Horizontal centering
E. Vertical centering


3. Which of these not a means of personal communication on the internet ?
A. Chat
B. Instant messaging
C. Instant notes
D. Electronic mail
E. None of these


4. What is the overall term for creating ,editing, formatting, storing, retrieving, and printing text document ?
A. Word processing
B. Spreadsheet design
C. Web design
D. Database management
E. Presentation generation

5. Fourth- generation mobile technology provides enhanced capabilities allowing the transfer of both _____data, including full-motion video ,high speed internet access ,and videoconferencing .
A. Video data and information
B. Voice and non voice
C. Music and video
D. Video and audio
E. None of these


6. ___________is a form of Service attack in which a hostile client repeatedly sends SYN packets to every point on the server using fake ip addresses .
A. Cyber gaming crime
B. Memory shaving
C. Syn flooding
D. Software privacy
E. None of these


7. Which of these is a point and draw device?
A. Mouse
B. Scanner
C. Printer
D. CD-rom
E. Keyboard


8. The letter and number of the intersecting column and row is the ________
A. Cell location
B. Cell position
C. Cell address
D. Cell coordinates
E. Cell contents


9. A set of rules for telling the computer what operations to perform is called a _______
A. Procedural language
B. Structures
C. Natural language
D. Command language
E. Programming language


10. A detailed written description of the programming cycle and the program ,along with the test results and a printout of the program is called _______
A. Documentation
B. Output
C. Reporting
D. Spec sheets
E. Directory


11. Forms that are used to organize business data into rows and columns are called _____
A. Transaction sheets
B. Registers
C. Business forms
D. Spec sheets
E. Directory


12. In power point ,the Header and footer button can be found on the insert tab in what group ?
A. Illustrations group
B. Object group
C. Text group
D. Tables group
E. None of these


13. A(n) _____is a set of program designed to manage the resources of a computer , including starting the computer ,managing programs , managing memory , and coordinating tasks between input and output device .
A. Application suite
B. Complier
C. Input/output system
D. Interface
E. Operating system


14. A typical slide in a slide presentation would not include _____
A. Photo images charts and graphs
B. Graphs and clip art
C. Clip art and audio clip
D. Full-motion video
E. Content templates


15. The PC productivity tool that manipulates data organized in rows and columns is called a ________
A. Spread sheet
B. Word processing document
C. Presentation mechanism
D. Data base round manager
E. EDI creator


Computer Awareness

Monday, 2 July 2012

Computer Awareness Quiz -35 for IBPS Bank Exam

1. The translation of high level language into machine language is called ?
A. Source program
B. Object program
C. Assembler
D. Operating programs
E. None


2. SNOBOL is a
A. High level language
B. Low level language
C. Machine language
D. Assembly language
E. None


3. The _______ translate the whole of the program into the micro computer’s machine language and store it so that it may be loaded into the memory and then executes directly .
A. Interpreter
B. Complier
C. Assembly language
D. Machine language
E. None


4. An___ is a translator the translates a statement in high level language program into machine language and executes it immediately
A. Complier
B. Interpreter
C. Immediate addressing
D. Translator
E. None


5. In ____the processer is usually referred to as a micro processer
A. Mini-computers
B. Personal computer
C. Main frame computers
D. Supercomputer
E. None


6. The Movement Of the ________creates various impulse which are translated by computer inlx Coded data formats .
A. Bubble
B. ROM
C. RAM
D. ENIAC
E. None


7. Within a segment a memory location is identified by a hex nurriber called
A. Segment
B. Off set
C. Bubble
D. Register
E. None


8. The length of a segment is ______
A. 8k
B. 16k
C. 64k
D. 128k
E. None


9. Special circuits in the computer are
A. Register
B. Segment
C. Buffer
D. Offset
E. None


10. The address of a memory location is placed in a register known as
A. Memory data register
B. Memory address register
C. Control bis
D. Address bus
E. None


Friday, 22 June 2012

Computer Awareness Quiz -34 for IBPS Bank Exam

1. If a single Computer acts like several Computers it is called ________
A. Supercomputer
B. Multitasking
C. Several taking
D. Minicomputer
E. None

2. The Device which converts digital signals to analog signal and vice versa is
A. Modem
B. E-mail
C. CPU
D. ALU
E. None

3. The Name of a Computer which combines the feature of Both analog and Digital Computer
A. Special purpose of Computers
B. General Purpose Of Computer
C. Hybrid Computer
D. Digital Computer
E. None


4. Magnetic Tape is a _______ Storage device
A. Sequential Access
B. Random Access
C. Direct access
D. Parallel access
E. None

5. _____is a collection of Individual Disks packed vertically one over the other
A. Disk space
B. Disk tray
C. Disk drive
D. All of these
E. None

6. The time Required by the access arm to reach the specified cylinder is known as
A. Real time
B. Seek time
C. Access time
D. All of these
E. None

7. The Speed represented with which data can be transferred from the disk to CPU is
A. Seek time
B. Rotational delay
C. Transfer rate
D. Access time
E. None

8. In _______generation of Computers saw the emergence of compliers ,subroutines ,libraries and batch monitors
A. First
B. Second
C. Third
D. Fourth
E. None

9. Personal computer emerging in the _____Generation of Computers
A. First
B. Second
C. Third
D. Fourth
E. None

10. The Number of Different Characters can a 8-bit representation encode is
A. 256
B. 64
C. 32
D. 128
E. None

11. The latest Bus technology is closely connected to the processor ____
A. RAID
B. PCI
C. ADC
D. CRT
E. NONE

12. The most commonly use error detecting code is
A. PCI
B. Parity check code
C. Error code
D. Raid
E. None

13. The bit rate at which microwaves signals transferred from the satellites
A. Million bits/sec
B. Billion bits/sec
C. Thousand bits /sec
D. All of these
E. None

14. ____ Computer design involves massive parallelism
A. Mini
B. Micro
C. Super
D. Personal
E. None

15. The ASCII-code for “end of message “ is
A. 1100
B. 0011
C. 1010
D. 1001
E. None

Computer Awareness bank Exam

Thursday, 7 June 2012

Computer Awareness Quiz -33 for Ibps exam

1. The optical disk which can be written once by the user is called ?
A. CD-ROM
B. WORM
C. Erasable Optical disk
D. CD-R Disk
E. None


2. _______is a group of binary cells
A. Magnetic bubbles
B. Register
C. Accumulator
D. Program centre
E. None


3. The register which holds the address of the next instruction to be fetched from the memory is
A. Accumulator
B. Program Counter
C. Memory Address Register (MAR)
D. Memory Buffer Register (MBR)
E. None


4. The Register which holds the address of the location when an instruction is read out or written in the memory is
A. PC
B. MAR
C. MBR
D. IR
E. NONE


5. The Device which is Capable of recognizing a prescribed type of mark made by pencil or pen is
A. Optical Mark Reader
B. Optical Character reader
C. Point-of- sale terminal
D. All of these
E. None of these


6. The register which acts as a buffer between the CPU and the memory is
A. PC
B. MAR
C. MBR
D. IR
E. NONE


7. The printers which print one character at a time is
A. Character printer
B. Dot-matrix print
C. Daisy wheel printer
D. Laser printer
E. None


8. The language in which binary code is used to write a program is known as
A. Machine language
B. Assembly language
C. High level language
D. Low-level-language
E. None


9. APL is
A. A programming language
B. Software package
C. Operating system
D. Program documentation
E. None


10. A program written in Assembly or high level language is known as
A. Source program
B. Object program
C. Translator
D. Assembler
E. None


11. _____translates entire program at atime
A. Source program
B. Complier
C. Assembler
D. Translator
E. None


12. The material coated on CD-ROM is
A. Copper
B. Brass
C. Aluminum
D. Zinc
E. None


13. The bit-size of a program counter is
A. 8 bits
B. 16 bits
C. 64 bits
D. 32 bits
E. None


14. Each high level language Statement is known as
A. Assembly language
B. Instructions
C. Programming language
D. High level language
E. None


15. The _______is thus the logical Address of the item searched
A. Key
B. CPU
C. Keyboard
D. Mouse
E. None

Computer Awareness Quiz -33 Ibps exam

Wednesday, 30 May 2012

Computer Awareness Quiz -32 Ibps exam

1.Most mail programs automatically complete the following two pain an e-mail:
A) From: and Body:
B)From: and Date:
C) From: and Tl:
D)From: and Subject:
E) None of these


2. The computer's capability of distinguishing spoken words is called
A) voice analysis
B) speech acnowledgment
C) voice recognition
D) speech interpretation
E) vocalisation


3. Which of the following is an advantage of mounting an application on the Web ?
A) The possibility of 24-hour access for users
B) Creating a system that can extend globally
C) Standardising the design of the interface
D) All of these
E) None of these


4. The first page of a Web site is called the
A) Home page
B) Index
C) java script
D) Book mark
E) Intropage


5. ERP is an acronym for
A) Enterprise Retirement Planning
B) Enterprise Relationship Planning
C) Enterprise Resource Planning
D) Enterprise Reorder Planning
E) Enterprise Retention Planning


6. The a/an software that alows users to surf the Internet is called
A.)Search engine
B) Internet Service Provider (ISP)
C) Multimedia application
D) Browser
E) Internet Surfing provider


7. The issues that deal with the collection and use of data about individuals is
A) access
B) publicity
C) accuracy
D) property
E) privacy


8. A term related to sending data to a satellite is
A)downlink
B) modulate
C) demodulate
D) uplink
E) inter-relate


9. Online document containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with relative information are called
A) hypermedia
B) hypertext
C) HTML
D) URL
E) FTP


10. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and ____ security is concerned with protecting software from unauthorised tampering or damage.
A) data
B) cyber
C) Internet
D) metaphysical
E)publicity


11. Hackers
A) all have the same motive
B) are people who maintain computers
C) may legally break into computers as long as they do not do any damage
D) are people who are allergic to computers
E) break into other people's computers


12. Unauthorised copying of software to be used for personal gain instead of for personal backups is called
A) program thievery
B) data snatching
C) software piracy
D) program looting
E) data looting


13. Junk e-mail is also called
A) spam
B) spoof
C) cooke crumb
D) sniffer script
E) spill


14. What is usually used for displaying information at pulic places ?
A) Monitors
B) Overhead Projections
C) Monitors and Overhead Projections
D) Touch screen Kiosks
E) Loud Speakers


15. What is MP3 ?
A) A Mobile Phone
B) A Mouse
C) A sound format
D) A scanner
E) A Printer

Computer Awareness Quiz -32

Sunday, 27 May 2012

Computer Awareness Quiz -31 Ibps exam

Computer Awareness Quiz -30
1.If you wish to extend the length of the network without having the signal degrade, you would use a
A) resonance
B) router
C) gateway
D) switch
E) repeater


2.A repair for a known software bug, usually available at no charge on the internet, is called
A) Version
B) Patch
C) tutorial
D) FAQ
E) rectifier


3 URL stnds for
A) Universal Research List
B) Universal Resource List
C) Uniform Research Lis
D) Uniform Research Locator
E) Uniform Resource Locator


4. When data changes in multiple lists and all lists are not updated, this causes
A) data redundancy
B) information overload
C) duplicate data
D) data inconsistency
E)data repetition


5. What is a backup ?
A) Restoring the information backup
B) An exact copy of a system's information
C) The ability to get a system up and running in the event of a system crash or failure
D) All of these
E) None of these


6. The Internet is
A) a large network of networks
B) an internal communication system for a business
C) a communication system for the Indian government
D) a communication system for some cities of India
E) a communication system for some cities of India


7. Computers that are portable and convenient for users who travel are known as
A) supercomputers
B) planners
C) minicomputers
D) file servers
E) laptops


8. What is the storage area for e-mail messages called ?
A) A folder
B) A mail box
C) A directory
D) The hard disk
E) None


9. One advantage of dial-up Internet access is that
A) it utlises broadband technology
B) it is Indian
C) it uses a router for security
D) modem speeds are very fast
E) it utilises existing telephone service


10. What is the process of copying software programs from secondary storage media to the hard disk called ?
A) Configuration
B) Download
C) Storage
D) Upload
E) Installation


11. Which process checks to ensure the components of the computer are operating and connected properly ?
A) Booting
B)Processing
C) Saving
D)Editing
E)Starting


12.A means of capturing an image (drawing or photo) so that it can be stored on a computer is
A) Modem
B) Software
C) Scanner
D) Key board
E) Mouse


13. An error in a computer program is called a _____.
A) crash
B) power failure
C) bug
D) virus
E) fatal er-


14. Access control based on a person's fingerprints is an example of
A) biometic identification
B) characteristic identification
C) characteristic security
D) fingerprint security
E) logistics


15. The patterns of printed lines on most products are called
A) prices
B) striping
C) scanners
D) OCR
E) barcodes

Tuesday, 22 May 2012

Computer Awareness Quiz -30 Ibps exam

1.The primary purpose of a computer is to process ___ and convert it into information.
A) electricity
B) data
C) raw material
D) a bit
E) None

2. The Extension of Batch file is
A) .doc
B) .btc
C).bpc
D) .bat
E) None


3. The File that is executed at the time of Booting is
A) Autoexec.bat
B)ABC.txt
C)windows.bat
D)Start.bat
E) None


4 BIOS Stands for
A). Basic Input Output System
B) Big Integrity of System
C) Base Interface Outerface System
D) Basic Inter Operating System
E) None of these


5 DISK operating system is a
A) Single-user operating system
B) Multi-user operating system
C) Multi-programming operating system
D) All the above
E) None of these


6 RAM Stands for
A) . Random Access Memory
B) Random All Memory
C) Rise All Memory
D) Random Access Memory Chip
E) None of these


7 Bit refers to a
A) computer language
B) CPU instruction
C) 0 or 1 value
D) digital representation of an alphabetic character


8. There are ____ bits in a byte.
A) two
B) four
C) six
D) eight
E) None


9. In computer language, each letter, number, and an array of special characters consists of
A) 8 k byte
B) 8 bytes
C) a bit
D) 8 bits
E) None


10.A small biomedical device available in the market that can be implanted underneath the skin for identification purposes is called
A) Identitron
B) Verichip
C) Digicard
D) Nanogurard
E) None


11. Physical components of a cmputer are called _____.
A) hardware
B) software
C) firewall
D) driver
E) None


12. Microprocessor was introduced in which generation of computer ?
A) Second Generation
B) Fourth Generation
C) Both 1) & 2)
D) Third Generation
E) None


13 GUI Stands for
A) Graphical User Interface
B) Graph Use Interface
C) Graphical Universal Interface
D) All the above
E) None of these


14. The time taken by the CPU to retrieve and interpret the instruction to be executed is called as
A) Instruction cycle
B) Fetch cycle
C) Both 1 & 2
D)All of these
E) None


15. Which of the following is responsible for all types of calculations ?
A) ALU
B) Control Unit
C) Registers
D) BUS
E) None


16.Internal memory in a CPU is nothing but
A) a set of registers
B) a set of ALU
C) Microprocessor
D) BUS
E) None


17. Which of the following is permanent memroy ?
A) SRAM
B) DRAM
C) ROM
D) All
E) None


18. Which of the following is used as a primary storage device ?
A) Magnetic tape
B) PROM
C) Floppy disk
D) All of the above
E) None


19. Information retrieval is faster from
A) Floppy disk
B) Magnetic tape
C) Hard disk
D) All of the above
E) None


20 Operating system is
A) a collection of hardware components
B) a collection of input-output devices
C) a collection of software routines
D) All the above
E) None of these



Monday, 21 May 2012

Computer Awareness Quiz -29 Ibps exam

1.In MS-Excel 2003, the default workbook sheet contain maximum ___
A) 65535 rows
B)65536 rows
c)1048576 rows
D)65537 rows
E) None


2. In MS-word, a menu item in dim color(gray) indicates that the menu is
A) Toggle menu
B) Unavailable for current context
C) Not much required menu
D) Over used menu
E) None of these


3.Hot key is a
A) Fire Wire port
B) Alternate Key
C)keyboardshortcut
D) primary key
E) None


4.A group of attribute/field in a database is known as a __,
A) Record
B) File
C)Database
D) Entry
E) None


5.A(n) ____ Describes a category of information in a table of database.
A) Record
B) File
C) Entry
D) Field
E) None


6. A goal of data mining includes which of the following ?
A). To confirm that data exists
B) To create a new data warehouse
C) To analyse data for expected relationships
D) To explain some observed events or conditions
E) None of these


7. The correct hierarchical order, smallest to largest, for the following database terms is
A) File,Field,Record,Database
B) File, Record,Field,Database
C) Record, Field, File, Database
D) Field, Record, File, Database
E) None of these


8. Which of the following is not a unit of measurement in computer systems ?
A) DPI
B) PPI
C) API
D) Bd
E) MB


9. In Windows XP, which shortcut is used to cycle through opened items in taskbar ?
A)Ctrl+tab
B)Alt+tab
C)Ctrl+Esc
D)Alt+Esc
E) None


10. A digital computer computes the value of the expression 2*5-2>2 inside
A) RAM
B)CPUChip
C) HDD
D)Flopy Dist
E)MS-Excel


11.Software providers who develop many productivity tools may also provide strippeddown versions that combine the simpler features of these tools bundled together into a(n)
A) software suite
B) personal information manager
C) integrated software application
D) limited software edition
E) None of these


12. To produce a high-quality graphics (hardcopy) in colour, you would want to use a
A) Virtual Printer
B)Laser Printer
C) Ink-jet Printer
D) Plotter
E) RGB Monitor


13 .Which of the following is the fastest memory ?
A) DDR RAM
B) DDR2 RAM
C) DDR3 RAM
D) Swap Memory
E) Buffer Memory



14. Which protocol is used by an operating system to generate error messge like 'Host Unreachable' over a TCP/IP Network ?
A)HTTP/1.1
B) ICMP
C) PPP
D) ICGM
E)TCP/IP


15. SNMP Stands for
A). Simple Network Mail Protocol
B) Single Network Mail Protocol
C) Single network Message protocol
D) Simple Network Management Protocol
E) None of these

Computer Awareness Quiz -29 Ibps exam

Sunday, 20 May 2012

Computer Awareness Quiz -28 for Bank exam po and Sbi clerk

1.. The four main functions of a computer are

A. input, processing, output and storage

B. learning, thinking,intelligence and virtuosity

C. data, information, bits, and bytes

D. hardware,software, modeling and operations

E. None of these



2. Which of the following computers can be carried around easily ?
A). Laptops
B) Super computers
C) PCs
D)Minicomputers
E) None


3. What menu is selected to change the font and style ?
A) Tools
B) File
C)Format
D) Edit
E) None


4. Where is the disk put in a computer ?
A) In the hard drive
B) in the disk drive
C) in the CPU
D)In the modem
E) None


5.The field that investigates the mechanics of human intelligence is
A) Artifical science
B)Cognitive science
C) Psychology
D)Sociology
E) None


6. A 'C' data structure, called a structure, is a group of items in which each item is identified by its own identifier, each of which is known as a member of a structure. The member is also known as ?
A) Information
B)Field
C) Record
D)Data type
E) None


7. SONET is used
A) for exchanging data between I WAN and WAN
B) to provide support for operations, administration and
maintenance (GAM)
C) to provide a way to multiplex multiple digital channels
D) All the above
E) None of these


8._____ trminals (formerly known as cash registers) are often connected to complex inventory and sales computer
systems.
A) Data
B)Sales
C) Query
D)Point of Sales(POS)
E) None


9. The OSI model is divided into ______ processes calledlayers.
A) Five
B) Six
C)Seven
D) Eight
E) None



10.System software is the et of programs that enables your computer's hardware devices and ____ software to work together.
A) management
B) processing
C) utility
D) application
E) None


11. Which of the following is NOT a good Web security strategy ?
A)Restrict access to the Web server, keep a minimum number of ports open
B)Limit the users who can load software, edit or add files
C)Add demo programs, so that users can test system without accessing production data
D)Remove unnecessary compilers and interpreters
E)None of these


12. The altering of data so that it is not usable unless the changes are undone is known as A).Biometrics
B)Compression
C) Encryption
D)Ergonomics
E) None


13.FTP stands for
A) File Translate Protocol
B) File Transit Protocol
C) File Typing protocol
D) File Transfer Protocol
E) None


14. A voice mail.
A) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the internet
B) permits users to converse in real time with each other via the computer while connected to the Internet.
C) functions much like an answering machine,allowing callers to leave a voice message for the called party
D) involves using video and computer technology to conduct a meeting between participants at geographically separate locations
E) None of these


15. A communication processor that connects dissimilar networks by providing translation from one set of protocol to another is known as
A) Bridge
B) Gateway
C) Router
D)Modem
E) All


Thursday, 17 May 2012

Computer Awareness Quiz -27 for Bank exam po and Sbi clerk

1. ___________Converts assembly language written program into the machine language
A. Complier
B. Assembler
C. Interpreter
D. Translator
E. None


2. The error occur in a computer program is termed as
A. Syntax
B. Bug
C. Output
D. Input
E. None


3. The errors occur due to the violation of the rules of the language like incorrect punctuations etc..is
A. Syntax error
B. Logical
C. Exectution error
D. All of these
E. None


4. ________errors arise from faulty programming logic
A. Syntax
B. Execution
C. Logical
D. Data
E. None


5. A long and complex program is split into a number of smaller programs known as
A. Modules
B. Structured programming
C. Top –down design
D. Bottom up design
E. None


6. A method or writing program in a certain systematic way is known as
A. Modular programming
B. Structural programming
C. Top- down design
D. Bottom up design
E. None


7. Writing explanation about the program in the form of comments and remarks placed at various places in the program is called
A. Programming
B. Program documentation
C. Operating system
D. Software package
E. None


8. In Pascal The Documentation line is
A. Enclosed in /*and*/
B. Enclosed in a pair of braces (and )
C. Enclosed in a pair of *and
D. All of these
E. None


9. Scheduling (selecting )new jobs for execution according to the desired priority is
A. Resource management
B. Job management
C. I/O management
D. Data management
E. None


10. Managing the flow of data and instructions between the I/O units and the primary memory is
A. Job Management
B. I/O management
C. Data management
D. Resource management
E. None


Saturday, 12 May 2012

Computer Awareness Quiz -26 for Bank exam po and Sbi clerk

1. ASCII data representation is similar to
A. Handwriting
B. Morse code
C. Scientific notation
D. Letters of the alphabet
E. None


2. Which of the following is an example of a value expressed in hexadecimal representation ?
A. 11001111
B. 2B
C. R2B
D. (1024)*16
E. None


3. The Category of computer with the fastest processor is
A. Mini Computer
B. Micro processor
C. Main frames
D. Super computer
E. None


4. A bit is the smallest part of a (n)
A. Arithmetic /logic unit
B. Analog
C. Byte
D. Scientific nation
E. None


5. Binary digit can represent
A. On.off.neutral sates
B. On,off states
C. Analog,digital states
D. All of these
E. None


6. Eight consecutive bits are called a
A. BUS
B. Byte
C. Logic gate
D. Binary digit
E. None


7. Which of the following is a valid ASCII representation ?
A. 11.000
B. 1A8C
C. 1,0,0
D. 01000001
E. None


8. Which of the following Correctly shows an add parity representation assuming the left most bit is the parity bit ?
A. 101000100
B. 001000001
C. 101001100
D. 111001001
E. None


9. A Gigabyte is used to measure
A. Speed in fractions of seconds
B. Storage capacity in fractions of seconds
C. Storage capacity in number of characters
D. Microprocessor clock speed
E. None


10. A nanosecond is used to measure
A. Speed in fractions of seconds
B. Storage capacity in fractions of seconds
C. Storage capacity in number of characters
D. Microprocessor clock speed
E. None


Thursday, 3 May 2012

Computer Awareness Quiz -25 for Bank exam po and clerk

1. If F=30 then PRINT USING “##+;” F will PRINT
A. 30
B. 30+
C. -30
D. 3.0
E. NONE


2. IF A =532 Then PRINT using “**##;” A will Print
A. 532
B. *532
C. 532
D. -532
E. None


3. Statement 20 MOD 6 will return the value
A. 20
B. 6
C. 3
D. 2
E. None


4. RESTORE statement in BASIC is used to
A. Add more data
B. Restore missing data
C. Transfer pointer to first values of the data list
D. All of the above
E. None


5. PRINT # is used to
A. Read data from program
B. Read data from file
C. Write data onto a file
D. Write data on screen
E. None


6. _________ is a network of computer based data processing procedure developed in a business organisation
A. WIP
B. MIS
C. CIS
D. LCS
E. None


7. _______takes care of efficient creation editing and printing of documents
A. Wordstar
B. LOTUS-2-3
C. Word processing
D. Dbase
E. None


8. A Byte is usually the equivalent of
A. A bit
B. A character
C. Hexadecimal data representation
D. Octal data representation
E. None


9. Common word lengths range from _______to _______in most micro computers of the mind 1990 s
A. Binary;octal
B. 1 mega byte;1giga byte
C. RAM;ROM
D. 8 bits;32 bits
E. None


10. A larger Word size
A. Means that more data can be moved through the computer at one time
B. Means that fewer storage devices will be needed
C. Does not translate into EBCD/C or ASCII
D. All of these
E. None


11. What is mega flop ?
A. High capacity data transmission
B. Large storage device
C. One million flooting point operations per second
D. Measurement of primary storage capacity
E. None


12. The Term ‘bit’is the shortend word for
A. Base digit
B. Binary digit
C. Base length
D. BIT character
E. None


13. ASCII codes represent
A. Numbers only
B. Digital storage
C. Characters only
D. Numbers and characters
E. None


14. ASCII codes represent
A. 2048 bits
B. 1,000 characters
C. 1,000,000 characters
D. 2,048 bytes
E. None


15. Generally the computer with the largest storage capacity and greatest physical size is called a
A. Main frame
B. Micro computer
C. Main frames
D. Super computer
E. None


Monday, 30 April 2012

Computer Awareness Quiz -24 for ibps Bank exam and for sbi clerk exam

1. Which of the following unables a set of instructions to be used in a number of instances in the same program ?
A. Subroutine
B. Jumping
C. Looping
D. Multiple branching
E. None


2. In Which of the following Computer languages, binary digits are used to write a programme
A. ADA
B. Binary language
C. Machine language
D. Source language
E. None


3. In which of the following mode ,several users can simultaneously make use of a computer ?
A. Time sharing
B. Off line processing
C. Batch processing
D. Multi-processing
E. None


4. Which of the following is not a unit of the computer ?
A. Disk Drive
B. VDU
C. LAN
D. CPU
E. NONE


5. Which of the following facility is not available in any word processing package ?
A. Bold face printing
B. Spelling check
C. Assigning values to variables
D. All of these
E. None


6. Word processor scan be used by
A. Students
B. Teachers
C. Secretaries
D. All of the above
E. None


7. if a word misspelt while creating a database
A. computer cautions the user
B. the computer automatically correct the database
C. the computer cannot make any correction on its own
D. all of the above
E. none


8. updating a file enables the user
A. to get correct information
B. to organize vast amount of data
C. to organize information more than one way
D. all above
E. none


9. spread sheet are used by
A. teachers
B. scientists
C. businessman
D. all the above
E. none


10. if an entry in one of the cells is changed in an electronic spreadsheet
A. all other entries vanish completely
B. some of the cells become empty
C. other numbers that depend on this entry will change automatically
D. nothing happens
E. none


11. BASIC was invented By
A. Van Neumann and Henry
B. John Kemney and Thomas Kurtz
C. Brown and white
D. Jacquard
E. None



12. GWBASIC is a version of
A. COBOL
B. BASIC
C. FORTRON
D. PASCAL
E. NONE


13. REM is a (n) __________ statement
A. Assignment
B. Remark
C. Conditional
D. Uncondtional
E. None



14. LET is a (n) _______________Statemet
A. Assignment
B. Remark
C. Conditional
D. Unconditional
E. None


15. CLS statement is used to ________the screen
A. Open
B. Clear
C. Close
D. Menu
E. None



Saturday, 28 April 2012

Computer Awareness Quiz -23 for ibps Bank exam and for sbi clerk exam

1. Which of the following is an unary gate
A. AND
B. OR
C. NOT
D. XOR
E. NONE


2. Which of the following are Analog measurements ?
A. Flowing water
B. Distance between earth and stars
C. Area of a square
D. Both A) and B)
E. None


3. Which of the following software is USER friendly ?
A. Complier
B. Interpreter
C. A BASIC program
D. A data file
E. None


4. Which of the following is a set of records ?
A. MS DOS
B. WORDSTAR
C. GWBASIX EXE
D. A DATA FILE
E. NONE


5. In which of the following languages the programs are written within BEGIN and END
A. BASIC
B. COBAL
C. FORTRAN
D. PASCAL
E. None


6. A built in memory is termed as
A. RAM
B. ROM
C. FUNCTION
D. CHIP
E. None


7. Which of the following is not related with programming
A. PROGRAMMER
B. LANGUAGE
C. OPERATING SYSTEM
D. FLOW CHART
E. NONE


8. The software used for creation of a DATABASE is
A. D base
B. Interpreter
C. Operating system
D. Wordstar
E. None


9. Which of the following functions return a string value
A. ASC
B. MOD
C. STR
D. LEN
E. NONE


10. Which of the following is the LARGEST set of bits ?
A. NIBBLE
B. KBYTE
C. BYTE
D. WORD
E. NONE


11. An example of a DATA file is
A. KANYA.DAT
B. KANYA.BAS
C. Both A) and B)
D. KBYTE
E. None


12. Which of the following is a UNIVERSAL gate ?
A. AND
B. OR
C. NOT
D. NAND
E. NONE


13. Which of the following not a BASIC instruction ?
A. NAME
B. TYPE
C. RENUM
D. SYSTEM
E. None


14. Which of the following not SET of BITS ?
A. BYTE
B. BIT
C. WORD
D. BAUD
E. NONE


15. Which of the following most essential for effective and efficient running of a computer ?
A. A computer language
B. Auxiliary memory
C. An operating system
D. Interpreter
E. None


Saturday, 14 April 2012

Computer Awareness Quiz -22 for ibps Bank exam and for sbi clerk exam

1. For optical fibre used in point to point transmission ,the repeater spacing is ________
A. 10-100 km
B. 2-10 km
C. 1-10 km
D. 100-1000 km
E. None


2. Favourites are accessible from the ________ menu
A. Start
B. Title
C. Stop
D. Menu
E. None


3. Which one is not needed by server programme from an operating system ?
A. Task pre-emption
B. Task priority
C. Semaphores
D. All of the above
E. None


4. Which of the following in an objective of multiprogrammes operating system ?
A. To maximum CPU utilization
B. To minimize turnaround time
C. To minimize response time
D. Both A and B
E. None


5. The environment provided at ASP is based on ________
A. Client/server
B. Network
C. Centralized system
D. Operator
E. None


6. HUB is ________
A. Layer 1 device
B. Central device
C. Dumb device
D. All of the above
E. None


7. The UNIX , which command is used to display the message or value of any variable on the screen ?
A. Cat
B. Echo
C. Display
D. Char
E. None


8. Which of the following technique is used in high speed modem ?
A. PCM
B. FDM
C. TDM
D. QAM
E. NONE


9. Frame relay technique uses
A. Circuit switching
B. Connection oriented
C. Message switching
D. Hybrid switching
E. None


10. Which encoding type always has a non –zero average amplitude ?
A. Unipolar
B. Multi-polar
C. Bipolar
D. All of the above
E. None


11. In a SONET system, _____ can remove signals from a path.
A. An STS multiplier
B. A regenerator
C. An add / drop multiplier
D. A repeater
E. None


12. IBM stands for ______
A. International business machine
B. Interconnected business machine
C. Internal business machine
D. Interacting business machine
E. None


13. The server on the internet is also known as _______
A. Repeater
B. Host
C. Gateway
D. And gate
E. None


14. For multiple branching in “ C” we use _____ statement
A. Switch
B. Go to
C. Cout
D. Case
E. Cin


15. Website is collection of ________
A. HTML documents
B. Graphic files
C. Audio and video files
D. All of the above
E. None

Wednesday, 11 April 2012

Computer Awareness Practice MCQs for All Bank Exams 2012



1. Selection of command- 
(A) Opens the copy of the document in preview 
(B) Prints the copy of displayed document
(C) Brings change in expansion of displayed document
(D) Saves the copy of displayed document
(E) None of these
Ans: (C)

2. You organize files by storing them in-
(A) archives
(B) folders
(C) indexes    
(D) lists
(E) None of these
Ans: (B)

Read more »

Computer Knowledge Practice MCQs for IBPS 2012


1. ——Key combination that lets you toggle between open windows
a) ALT+SHIFT+TAB
b) ALT+CTRL+TAB
c) ALT+CTRL
d) ALT+TAB


2. When more than one window is open, to switch to the next window — is the key combination
a) CTRL+F5
b) CTRL+F6
c) CTRL+F7
d) CTRL+F8
Read more »

Friday, 6 April 2012

Computer Awareness Quiz -21 for ibps Bank exam and for sbi clerk exam

1. The system BIOS and ROM chips are called :
A. Software
B. Firmware
C. Hardware
D. Bootware
E. None


2. What memory is located above the first 1024k of memory?
A. Conventional
B. Extended
C. Upper
D. Expanded
E. None

3. Which type of RAM is normally fastetst ?
A. DRAM
B. VRAM
C. SRAM
D. WRAM
E. NONE


4. Which computer system component is used for short –term data storage?
A. Hard drive
B. Floppy drive
C. CD-ROM
D. RAM
E. None


5. A SIMM has how many pins?
A. 36
B. 40
C. 34
D. 20
E. None


6. The _______Determines how many bits of date can be sent along a given bus at any one time
A. Control unit
B. Bus width
C. Bus speed
D. Amount of memory
E. None


7. The data flow diagram is for analysing
A. How to do a function effi-ciently
B. Restrict the number of times a function can be performed
C. Requirements of user
D. All of the above
E. None


8. The elements of computer processing system are
A. Hardware; software,information & people
B. Hardware, programs and people
C. Hardware,data,user and procedures
D. All of the above
E. None


9. On august 23, 2008 an accounting clerk prepared an invoice dated august 31,2008 .which control can check this?
A. Size check
B. Hash total
C. Range check
D. All of the above
E. None


10. Cpu contains __________
A. Logical unit
B. Arithmetical unit
C. Control unit
D. All of the above
E. None


11. Library management software is for
A. Documenting the changes that are made to programme
B. Controlling the version numbers of the programme
C. Both A) and B)
D. All the aboe
E. None


12. Steganography is .............
A. Hiding the datato make it necessarily invisible and not easily detectable
B. Hiding the data but not nec-essarily making it invisible and not easily detectable
C. Detecting and destroying the hidden data
D. All of the above
E. None


13. A computer is a__________ device
A. Calculating
B. Electrical
C. Electronic
D. All of the above
E. None


14. An online transaction is _____________
A. One that is done in realtime
B. One that is done via tele phone
C. Transaction done via internet
D. All of the above
E. None


15. Using anti virus software is ............
A. Detective measures
B. Preventive measure
C. Corrective measure
D. All of the above
E. None

Sunday, 26 February 2012

Computer Awareness Quiz -18 for Bank exam

1. For the purposes of defining data needs, a responsibility area is
a) Marketing b) Personnel c) Administration d) Finance e) None


2. The problem statement should include all of the following except:
a) Input. b) Output. c) Processing d) Storage e) None


3. Arranging data such as names in alphabetical order in a table is called:
a)Numbering b)Searching c)Listing d)Sorting e)None


4. Hotmail, a free web-based email service operated by which company?
a) Apple b) Rediff c) Microsoft d) Yahoo e) Google


5. A collection of 4 binary digits is known as.......?
a) Half Bit b)1/2 KB c) Byte d) Nibble e) None


6. Which of the following is not a part of the CPU?
a) Arithmetic and Logic Unit
b) Storage Unit
c) Program Unit
d) Control Unit
e) None


7. Which of the following is not a unit of measurement in computer systems?
a)DPI b)PPI c)API d)Bd e)MB


8. In Windows XP, which shortcut is used to cycle through opened items in taskbar?
a) Ctrl + Tab
b) Alt + Tab
c) Ctrl + Esc
d) Alt + Esc
e) None


9. A digital computer compute the value of expression 2 * 5 - 2 >2 inside
a) RAM b) CPU Chip c) Hard Disk d) Floppy Disk e) MS-Excel


10. To produce a high-quality graphics (hardcopy) in color, you
would want to use a
a)Virtual Printer b)Laser Printer c)Ink-jet Printer d)Plotter e)None


11. Which of the following is fastest memory ?
a) DDR RAM b) DDR2 RAM c) DDR3 RAM d) Swap Memory e) Buffer Memory


12. Which protocol is used by operating system to generate error
message like 'Host Unreachable' over a TCP/IP network?
a) HTTP/1.1 b) ICMP c) PPP d) ICGM e) TCP/IP


13. What does SNMP stands for?
a) Simple Network Mail Protocol
b) Single Network Mail Protocol
c) Single Network Message Protocol
d) Simple Network Management Protocol
e) None


14. On a school computer, Lucy learned how to copy programs.
A classmate asked her to copy a program for his home use.
Her most ethical response would be which of the following?
a) I'll copy it, but you have to promise not to tell anyone.
b) I don't know how to copy disks.
c) I can't copy it because it will break copyright laws.
d) I'll copy it for you, but you can't copy it for anyone else.
e) None


15. Which of the following is not true?
a)LOGO stands for Live On Google’s Orkut
b)BIOS is a system software
c)GRUB is a Linux bootloader
d)Ruby is a web scripting language
e)LILO is a Linux bootloader


16. What is the function of Drop Cap?
a) It does not allow capital letters to be used in the documents.
b) It makes first letter of each word capital letter in the documents
c) It lets you begin a paragraph with a large dropped initial capital letter
d) It automatically starts all paragraphs and sentences with capital letters.
e) None


17. What is Mail-Merge?
a) a web based e-mail service with no spam
b) a name of Yahoo! MINDSET search feature
c) a new virus-hoax which can delete data from mail-inbox
d) a feature of MS-Word used to create multiple documents like letters, mailing labels,name tags etc.
e) None


18. In MS-Excel 2003, the default workbook sheet contain maximum………?
a) 65535 Rows b) 65536 Rows e) 1048576 Rows e) 65537 Rows c) None


19. In MS-Word, a menu item in dim color (gray) indicate that the menu is ?
a) Toggle Menu
b) Unavailable for current context
c) Not much required menu
d) Over Used Menu
e) None


20.Physical components of a computer is called______.
a)Hardware b)Software c)Firewall e)None

Saturday, 25 February 2012

Computer Awareness Quiz -17 Ibps exam :Solved Paper

1. Programs from the same developer , sold bundled together , that provide better integration and share
common features , toolbars and menus are known as ....
(A) software suites
(B) integrated software packages
(C) software processing packages
(D) personal information managers
(E) none of these


2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these


3. ______________ servers store and manages files for network users.
(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these


4. All of the following are examples of real security and privacy risks Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these


5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory
and sales computer systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these


6. The OSI model is divided into _______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(E) None of these


7. System software is the set of programs that enables your computer's hardware devices and ______
software to work together.
(A) management
(B) processing
(C) utility
(D) application
(E) None of these


8. ________ are specially designed computer chips reside inside other devices, such as your car or your
electronic thermostat.
(A) Servers
(B) Embedded computers
(C) Robotic computers
(D) Mainframes
(E) None of these


9. The following are all computing devices , except.........
(A) notebook computers
(B) cellular telephones
(C) digital scanners
(D) personal digital assistants
(E) None of these


10. in a ring topology , the the computer in possession of the ______ can trasmit data
(A) packet
(B) data
(C) access method
(D) token
(E) None of these


11. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk
drives, and parallel and serial ports ____
(A) basic input/output system
(B) secondary input/output system
(C) peripheral input/output system
(D) marginal input/output system
(E) None of these


12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these


13. ________ controls the way in which the computer system functions and provides a meAns : by
which users can interact with the computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these


14. Servers are computers that provide resources to other computers connected to a ___________
(A) mainframe
(B) network
(C) supercomputer
(D) client
(E) None of these


15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition
(B) To confirm that data exists
(C) To analyze data for expected relationships
(D) To create a new data warehouse
(E) None of these


16. URL stands for ........
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(E) None of these


17. A database management system (DBMS) is a ............
(A) hardware system used to create , maintain and provide controlled access to a database
(B) hardware system used to create, maintain, and provide uncontrolled access to a database.
(C) software system used to create, maintain, and provide uncontrolled access to a database.
(D) software system used to create, maintain, and provide controlled access to a database.
(E) None of these


18. Which of the following is NOT a goal of transaction processing system ?
(A) Capture , process and store transactions
(B) Produce a variety of documents related to routine business activities
(C) Reduce manual effort associated with processing business transactions
(D) Produce standard reports used for management decision making
(E) None of these


19. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these


20. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) None of these


21. _____________ are words that a programming language has set aside for its own use.
(A) Control worlds
(B) Reserved words
(C) Control structures
(D) Reserved keys
(E) None of these


22. What is the primary difference between a virus and a worm?
(A) A worm has the ability to self-propagate from an infected user's computer to other computers
(B) A worm is usually written by a cracker: Script bunnies do not have the skills to develop a worm
program
(C) A virus is very harmful to the computers it infects : a worm is not a serious a problem
(D) Anti-virus software is effective in fighting viruses but not worms
(E) None of these


23. ______ describe what is database fields.
(A) Structures
(B) Field markers
(C) Field definition
(D) Field names
(E) None of these


24. You must install a (n) ____________ on a network if you want to share a broadband Internet
connection.
(A) router
(B) modem
(C) node
(D) cable
(E) None of these


25. A goal of normalization is to __________
(A) minimize the number of relationships
(B) minimize the number of entities
(C) minimize the number of tables
(D) minimize the number of redundancy
(E) None of these