Tuesday, January 29, 2013

BANK EXAM COMPUTER AWARENESS PRACTICE QUESTIONS SET 5


1. Programs from the same developer, sold bundled together, that provide better integration and share common features, toolbars and menus are known as?

1) software suites
2) integrated software
3) software processing
4) personal information
5) none of these

2. A data warehouse is which of the following?
1) Can be updated by the users
2) Contains numerous conventions and formats
3) Organized around subject areas
4) Contains only current data
5) None of these

3. _____ servers store and manages files for network users.
1) Authentication
2) Main
3) Web
4) File
5) None of these

4. All of the following are examples of real security and privacy risks except?
1) hackers
2) spam
3) viruses
4) identify theft
5) None of these

5. Loading Operating System onto RAM is called?
1) Printing
2) Saving
3) Booting
4) Staring
5) None of these

6. In MICR, C stands for?
1) Code
2) Colour
3) Computer
4) Character
5) None of these

7. System software is the set of programs that enables your computer's hardware devices and ____ software to work together?
1) management
2) processing
3) utility
4) application
5) None of these

8. _____ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat?
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these

9. The following are all computing devices, except?
1) notebook computers
2) cellular telephones
3) digital scanners
4) personal digital assistants
5) None of these

10. In a ring topology, the computer in possession of the _____ can transmit data?
1) packet
2) data
3) access method
4) token
5) None of these

11. This part of operating system manages the essential peripherals, such as the keyboard, screen, disk drives and parallel and serial ports ______
1) basic input/output
2) secondary system
3) peripheral system
4) marginal system
5) None of these

12. The bar at the top of a window that bears the name of the window is known as?
1) control panel
2) task bar
3) menu bar
4) status bar
5) title bar

13. ______ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
1) The platform
2) Application software
3) Operating system
4) The motherboard
5) None of these

14. Servers are computers that provide resources to other computers connected to a?
1) mainframe
2) network
3) super computer
4) client
5) None of these

15. A device that operates under the control of another device is called?
1) Stem
2) Slave
3) Simulator
4) Emulator
5) None of these

16. URL stands for?
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator
4) Uniform Research Locator
5) None of these

17. A database management system (DBMS) is a?
1) hardware system used to create, maintain and provide controlled access to a data- base
2) hardware system used to create, maintain, and provide uncontrolled access to a database.
3) software system used to create, maintain, and provide uncontrolled access to a database.
4)software system used to create, maintain and provide controlled access to a database.
5)None of these

18. The design of the network is called the network?
1) architecture
2) server
3) transmission
4) type
5) None of these

19.A Proxy server is used for which of the following?
1)To provide security against unauthorized users
2)To process client requests for web pages
3)To provide TCP/IP
4)To process client requests for database access
5) None of these

20.When data changes in multiple lists and all lists are not updated, this causes?
1) data redundancy
2) information overload
3) duplicate data
4) data inconsistency
5) None of these

21._____ are words that a programming language has set aside for its own use?
1) Control words
2) Reserved words
3) Control structures
4) Reserved keys
5) None of these

22.The most frequently used instru-ctions of a computer program are likely to be fetched from?
1) the hard disk
2) cache memory
3) RAM


4) registers
5) None of these

23.What is the shortcut key to "Undo" the last action in a document?
1) Ctrl + X
2) Ctrl + Y
3) Ctrl + Z
4) Ctrl + U
5) None of these

24.You must install a(n) ________ on a network if you want to share a broadband Internet connection.
1) router
2) modem
3) node
4) cable
5) None of these

25.The errors that can be pointed out by the compiler are?
1) Syntax errors
2) Semantic errors
3) Logic errors
4) System errors
5) None of these

26.Granting an outside organization access to internet web pages is often implemented using a(n)?
1) extranet
2) intranet
3) internet
4) hacker
5) None of these

27.Which term identifies a specific computer on the web and the main page of the entire site?
1) URL
2) Web site address
3) Hyperlink
4) Domain name
5) None of these

28.The code that relational database management systems use to perform their database task is referred to as?
1) QBE
2) SQL
3) OLAP
4) Sequel Server
5) None of these

29.Chip is a common nickname for a(n)?
1) transistor
2) resistor
3) integrated circuit
4) semiconductor
5) None of these

30.Programs such as Internet Explorer that serve as navigable windows into the Web are called
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these

31.What menu is selected to cut, copy and paste?
1) File
2) Tools
3) Special
4) Edit
5) None of these

32.The most important or powerful computer in a typical network is?
1) desktop
2) network client
3) network server
4) network station
5) None of these

33.The primary purpose of software is to turn data into?
1) Web sites
2) information
3) programs
4) objects
5) None of these

34.The ability to find an individual item in a file immediately _______ is used?
1) file allocation table
2) directory
3) sequential access
4) direct access
5) None of these

35.To make a notebook act as a desktop model, the notebook can be connected to a ______ which is connected to a monitor and other devices?
1) bay
2) docking station
3) port
4) network
5) None of these

36.You can use the tab key to?
1) move cursor across the screen
2) indent a paragraph
3) move the cursor down the screen
4) Only (1) and (2)
5) None of these

37.A collection of related files is called a?
1) character
2) field
3) database
4) adjusting
5) None of these

38.Storage that retains its data after the power is turned off is referred to as?
1) volatile storage
2) non-volatile storage
3) sequential storage
4) direct storage
5) None of these

39.Which of the following is an example of connectivity?
1) Internet
2) floppy disk
3) power card
4) data
5) None of these

40._______ is the process of finding errors in software code?
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these

41.A _______ contains specific rules and words that express the logical steps of an algorithm?
1) syntax
2) programming structure
3) programming language
4) logic chart
5) None of these

42.Changing an existing document is called ______ the document?
1) creating
2) editing
3) modifying
4) adjusting
5) None of these

43.Virtual memory is?
1) memory on the hard disk that the CPU uses an extended RAM
2) in RAM
3) only necessary if you do not have any RAM in your computer
4) a back up device for floppy disks
5) None of these

44.Computers use the ________ number system to store data and perform calculations?
1) decimal
2) hexadecimal
3) octal
4) binary
5) None of these

45.The ______ key will launch the start buttons?
1) esc
2) shift
3) windows
4) shortcut
5) None of these

46.To move to the beginning of a line of text, press the _____ key?
1) home
2) a
3) page up
4) enter
5) None of these

47.When sending an e-mail, the ______ line describes the contents of the message?
1) to
2) subject
3) contents
4) CC
5) None of these

48.Which groupings do you work with when formatting text in Word?
1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs
4) Indexes, characters and tables
5) None of these

49.Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these


50.The ______ tells the computer how to use its components?
1) utility
2) network
3) operating system
4) application program
5) None of these

ANSWERS:

1. (1) 2. (3) 3. (4) 4. (2) 5. (3) 6. (4) 7. (4) 8. (2) 9. (3) 10. (4)
11. (1) 12. (5) 13. (3) 14. (2) 15. (2) 16. (3) 17. (4) 18. (1) 19. (2) 20.(4)
21. (2) 22. (2) 23. (3) 24. (1) 25. (1) 26. (1) 27. (1) 28. (2) 29. (3) 30.(4)
31. (4) 32. (3) 33. (2) 34. (3) 35. (2) 36. (4) 37. (3) 38. (2) 39. (1) 40.(2)
41. (1) 42. (2) 43. (1) 44. (4) 45. (3) 46. (1) 47. (2) 48. (1) 49. (1) 50.(3)

No comments: