Computer knowledge MCQ For Bank PO exams « MCQ Objective Sample Model Tests for INDIA

Enter your email address:

Delivered by FeedBurner

Computer knowledge MCQ For Bank PO exams

Computer knowledge MCQ For Bank PO exams

Basis computer knowledge objective questions

practice test computers for job exams like

SBI PO

Canara Bank PO

Indian Bank PO

Indian Bank PO

Bank Of Baroda PO

PNB PO

and other Bank Probati

Computer Knowledge

1. A ……… typically connects personal computers within a very
limited geographical area, usually within a single building.

(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these

Answer.A

2. Computers manipulate data in
many ways, and this manipulation is ca1led—

(A) utilizing
(B) hatching
(C) upgrading
(D) processing
(E) None of these

Answer.D

3. An e—mail address typically
consists of a user ID followed by
the ,….,… sign and the name of
the e-rnaii server that manages
the user’s electronic post office
box.

(A) @
(B) #
(C) &
(D) *
(E) None of these

Answer.A

4. Software applies .,…. , also called
algorithms, to process data.

(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these

Answer.A

5. A file extension is separated from
the main file name with a(n)
. ..,.,, but no spaces.

(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these

Answer.E

6. An ad hoc query is a—

(A) pre-planned question
(B) pre—scheduled question
(C) spur—of-the-moment
question
(D) question that will not return
any results
(E) None of these

Answer.B

7. A Web ……… consists of one or
more Web pages located on a
Web server.

(A) hub
(B) site
(C) story
(D) template
(E) None of these

Answer.B

8. A computer ……… is a set of
program instructions that can
attach itself to a file, reproduce
itself, and spread to other files.

(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these

Answer.B

9. The desktop contains small
graphics calledé

(A) windows
(B) logos
(C) icons-
(D) pictures
(E) None of these

Answer.C

10. C, BASIC, COBOL, and ]ava are
examples of .r……. languages.

(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these

Answer.D

11. A(n) ….,…. camera is a peripheral
device used to capture still
images in a digital format that
can be easily transferred into a
computer and manipulated using
graphics software.

(A) digital
(B) analog
(C) classic
(D) film
(E) None of these

Answer.A

12. …… makes it possible for shoppers to make purchases using
their computers.

(A) E-world
(B) Ecommerce
(C) E-spend
(D) E-business
(E) None of these

Answer.D

13. Networks are monitored by
security personnel and super-
vised by , .,…., who set(s) up
accounts and passwords for
authorized network users.

(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these

Answer.C

14. Application software is designed
to accomplish—

(A) real world tasks
(B) computer-centric tasks
(C) gaming tasks `
(D) operating system tasks
(E) None of these

Answer.D

15. A telephone number, a birth
date, and a customer name are
all examples of-

(A) a record
(B) data
(C) a file
(D) a database
(E) None of these

Answer.D

16. The human-readable version of a
program is called—

(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these

Answer.D

17. A ……… computer (also referred
to as a laptop), is a small,
lightweight personal computer
that incorporates the screen, the
keyboard, storage, and processing components into a single
portable unit.

(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these

Answer.A

18. ..,,.,… is the result produced by
a computer.

(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these

Answer.C

19. Programs such as Internet
Explorer that serve as navigable
windows into the Web are
called~

(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these

Answer.D

20. A is a device that not only
provides surge protection, but
also furnishes your computer
with battery backup power
during a power outage.

(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these

Answer.C

21. When you save to ….,.., your
data will remain intact even
when the computer is turned off.

(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these

Answer.C

22. The motherboard is the—

(A) circuit board that houses
peripheral devices
(B) same as the CPU chip
(C) the first dup that is accessed
when the computer is turned on
(D) circuit board that contains a
CPU and other chips
(E) None of these

Answer.D

23. A computer-intensive problem
runs on a——

(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these

Answer.C

24. A(n).. …. converts and executes
one statement at a time.

(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these

Answer.B

25. The term . ….. designates
equipment that might be added
to a computer system to enhance
_ its functionality.

(A) digital device
(B) system add~on
(C) disk pack
(D) peripheral device
(E) None of these

Answer.D

26. Approximately how many bytes
make one megabyte

(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these

Answer.D

27. What is MP3 ?

(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these

Answer.C

28. All the deleted files go to—

(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these

Answer.A

29. …….., this is the act of copying
or downloading a program from
a network and making multiple
copies of it.

(A) -Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site—license piracy
(E) None of these

Answer.C

30. A directory within a directory is
called-

(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these

Answer.D

31. Which is the best definition of a
software package ?

(A) An add-on for your com—
puter such as additional memory
(B) A set of computer programs
used for a certain function such
as word processing
(C) A protection you can buy
for a computer
(D) The box, manual and license
agreement that accompany
commercial software
(E) None of these

Answer.B

32. In MICR, C stands for ……….

(A) Code
(B) Colour
(C) Computer
(D) Character
(E) None of these

Answer.D

33. Fax machines and imaging
systems are examples off

(A) bar-code readers
(B) imaging systems
(C) scanning devices
(D) pen-based systems
(E) None of these

Answer.B

34. When writing a document, you
can use the ….,..,. feature to find
an appropriate word or an
alternative word if you find
yourself stuck for the right word.

(A) dictionary
(B) word finder
(C) encyclopedia
(D) thesaurus
(E) None of these

Answer.A

35. Which key is used in combination with another key to perform
a specific task ?

(A) Function
(B) Control
(C) Arrow
(D) Space bar
(E) None of these

Answer.B

36. A disk’s content that is recorded
at the time of manufacture and
that cannot be changed or erased
by the user is—

(A) read-only
(B) memory-only
(C) run-only
(D) write-only
(E) None of these

Answer.A

37. In an information system, alpha»
numeric data normally takes the
form of~

(A) Sentences and paragraphs
(B) Numbers and alphabetical
characters
(C) Graphic shapes and figures
(D) Human voice and other
sounds
(E) None of these

Answer.B

38. A Website’s main page is called
its-

(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these

Answer.A

39. When installing ……… , the user must copy and usually decompress program files from a CD-ROM or other medium to the hard disk.

(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these

Answer.A

40. A collection of interrelated files
in a computer is a—

(A) file manager
(B) field
(C) record
(D) database
(E) None of these

Answer.D

41. A ……… computer is a large and
expensive computer capable of
simultaneously processing data
for hundreds or thousands of
users.

(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these

Answer.B

42. The trend in computer systems
is toward the use of graphical
user interfaces (GUIS). In these
operating systems, a trackball is
described as-

(A) a roller ball which moves
the cursor
(B) a pen-shaped device which
allows data to be entered
through the CRT screen
(C) a figure which resembles a
familiar office device
(D) an outdated input device
(E) None of these

Answer.A

43. Various applications and documents are represented on the
Windows desktop by-

(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these

Answer.D

44. What is usually used for displaying information at public
places ?

(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these

Answer.D

45. The real business and competitive value of information techno-
logy lies in4

(A) The software applications
that are used by many companies
(B) The capabilities of the soft-
ware and value of the information a business acquires and uses
(C) The infrastructure of hard-
ware, networks, and other IT
facilities that are commonly used
by many companies
(D) The capabilities of the
hardware and the speed at which
it processes information
(E) None of these

Answer.B

46. Companies use which of the
following vendors to provide
access to software and services
rather than purchasing the
applications and maintaining the
applications themselves ?

(A) Open source vendors
(B) Alliances
(C) Application service providers
(D) All of the above
(E) None of these

Answer.C

47. V7hich one of the following
would be considered as a way
that a computer virus can enter a
computer system ?

(A) Opening an application
previously installed on the
computer
(B) Borrowed copies of software
(C) Viewing a website without
causing any additional transactions
(D) Running antivirus programs
(E) None of these

Answer.B

48. Collecting personal information
and effectively posing as another
individual is known as the crime
of-

(A) spooling
(B) dentity theft
(C) spoofing
(D) hacking
(E) None of these

Answer.B

49, The first step in the transaction
processing cycle is—

(A) database operations
(B) audit V
(C) data entry
(D) user inquiry
(E) None of these

Answer.C

50. In the information systems concept, the output function
involves—

(A) Capturing and assembling
elements that enter the system to
be processed
(B) Transformation processes
that convert input into output
(C) Transferring elements that
have been produced by a
transformation process to their
ultimate destination
(D) Monitoring and evaluating
feedback to determine whether a
system is moving toward the
achievement of its goal
(E) None of these

Answer.A

8 comments to Computer knowledge MCQ For Bank PO exams

Leave a Reply

  

  

  

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>