Computer Questions for Competitive Exams such as - TopicsExpress



          

Computer Questions for Competitive Exams such as Banking Following are the questions asked in various Examinations of Computer Paper (Clerical and PO) - Technology that consists of electromagnetic devices and systems for communicating over long distances is known as – Communications Technology - What is the name given to specialized phones which allow users to make phone calls as well as browse the World Wide Web? – Smartphones - High-capacity computers with hundreds of thousands of processors that can perform more than one trillion calculations per second are called – Supercomputers - Embedded computers are known as – Microcontrollers - A communications system connecting two or more computers is called a – Network - Which toolbar provides access to file management and editing commands, in addition to special features? – Standard Toolbar - The cut, copy, and paste buttons are normally located on which toolbar? –Standard Toolbar - When conducting a Spelling and Grammar check, potential spelling errors are shown in which colour? – Red - Which is the popular term for connecting to a network? – Log-on - What consists of hardware and software and allows voice, video, and data to be communicated over traditional copper-wire telephone lines? – ISDN - An expression for how much data can be sent through a communications channel in a given amount of time is referred to as? – Bandwidth - The communications rules or protocols that allow browsers to connect with web servers is – HTTP - The internet connection that uses regular phone lines to transmit data in megabits per second is – DSL - Bps stands for – Bits per second - If text was highlighted and ‘Edit’ ‘Copy’ was clicked, what would happen - Text would be copied from the document and placed in the clipboard - The blinking point which shows your position in the text is called—Cursor For seeing the output, you use — Monitor - A directory within in directory is called— Sub Directory - For opening and closing of the file in Excel, you can use which bar – Title Bar - In many MS Office applications, You click at B to make the text— Bold - A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is— Read Only Memory - Data that is copied from an application is stored in the— Clipboard - Changing an existing document is called – Editing the Document - Preparing any document for the first time is called – Creating the Document - In a spreadsheet program the ………… contains related worksheets and documents –Workbook - A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a – Server - A Compiler is - A program which translates from one high-level to a machine level - When a key is pressed on the keyboard, which standard is used for converting the keystroke into the corresponding bits – ANSI - A Pixel is - The smallest resolvable part of a picture - Which device is used as the standard pointing device in a Graphical User Environment – Mouse - Which number system is usually followed in a typical 32-bit computer – 2 - The memory location address are limited to - 00000 to 9ffff(16) - The programs which are as permanent as hardware and stored in ROM is known as –Firmware - Which technology is used in Compact disks – Laser or Optical - EPROM can be used for doing what - Erasing and reconstructing the contents of ROM - The contents of information are stored in which type of register – Memory Data Register - Algorithm and Flow chart help us to - Specify the problem completely and clearly - The process of a computer receiving information from a server on the Internet is known as— Downloading NOTES COMPILED BY : sujeet Mehta - The process of a computer sending information to a server on the Internet is known as – Uploading - ………………is the process of carrying out commands – Executing - An error is also known as— Bug - The rectangular area of the screen that displays a program, data, and/or information is a— Window - A series of instructions that tells a computer what to do and how to do it is called a—Program - Collection of many commands is – a Program - Collection of many programs is – a Software - Collection of many software is – a Package - Collection of many software to achieve a common or homogeneous goal is – a Suit (such as MS – Office) - CAD stands for – Computer Aided Design - DTP stands for – DeskTop Publishing - Which type of printer cannot print graphics – Dot matrix - The father of Modern Computer is – Charles Babbage - Memory which forgets every thing when you switch off the power is known as –Volatile Memory - The linking of computers with a communication system is called – Networking - Information travels between components on the mother board through – Buses - How are data organized in a spreadsheet – In rows and Columns - World’s most famous spreadsheet program is – MS Excel - How many options does a BINARY choice offer – two - IBM stands for - International Business Machines - What is also known as brain of computer – CPU (Central Processing Unit) - A _______ is a bi-stable electronic circuit that has two stable states – Flip Flop - Unwanted repetitious messages, such as unsolicited bulk e-mail is known as –Spam - DOS stands for – Disk Operating System - ___________ translates and executes program at run time line by line –Interpreter - What is meaning of OOP – Object Oriented Programming - What are the basic principles of OOP – Inheritance and Polymorphism - COBOL is used in which types of applications – Commercial Applications SMPS stands for - Switched Mode Power Supply - The device used to carry digital data on analog lines is called as – Modem - With which two words is the word modem made – Modulate and Demodulate - 1 Byte = 8 bits - BIOS stands for – Basic Input Output System - ROM stands for - Read Only Memory - RAM Stands for – Random Access Memory - Who is credited with inventing the ‘C’ language – Dennis Ritchie - If a word is typed that is not in Word’s dictionary, a ___ wavy underline appears below the word – Red - The _____ button on the quick access Toolbar allows you to cancel your recent commands or actions – Undo - In MS - Excel, any set of characters containing a letter , hyphen, or space is considered – Text - ________ Software allows users to perform calculations on rows and columns of data – Electronic Spreadsheet - The operating system is the most common type of which software – System - MS – Word is the most common type of which software – Application - If a doctor hires a software engineer to develop a software to suit his specific needs such as recording names of his patients, the diagnosis suggested by his, fees charged by him, etc, then which type of software it would be called – Custom Software or Customized Software - ______ cells involves creating a single cell by combining two or more selected cells –Merging - A _________ represent approximately one billion memory locations – Gigabyte - When you quickly press and release the left mouse button twice , you are doing what – Double-clicking - The horizontal and vertical lines on a worksheet are called – Gridlines - During the boot process what is it that looks for the system files – BIOS - What is the ability of an operating system to control the activities of multiple programs at the same time called – Multitasking - The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an – Interrupt - The blocks of code, included in the operating system, that software applications interact with are known as - Application Programming Interfaces (APIs) - MS – DOS is which type of Operating System (OS) – Command Driven and Single User OS - A spooler is a - program that coordinates the print jobs that are waiting to print - Virtual memory is typically located on – Hard Disk - The combination of the operating system and the processor is referred to as the computer’s – Platform - Verification of a login name and password is known as – Authentication - The definition of thrashing is - A swapping data between virtual memory and RAM too frequently - The purpose of a swap (or page) file is to - hold a program’s data or instructions in virtual memory when it can’t fit in RAM - The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM – BIOS - The BIOS is stored in – ROM - Ensuring that the essential peripheral devices are attached and operational is the ____________ process – POST - The memory resident portion of the operating system is called the – Kernel - Using Windows Explorer, a plus (+) sign in front of a folder indicates - the folder contains subfolders - What is GUI – Graphic User Interface (where we give commands graphically such as clicking, holding, dragging, dropping, etc.) - World’s most popular GUI is – Windows and different versions of windows OS - What is CUI – Character User Interface (Where we give commands by syntax based commands) - Example of a CUI is – MS DOS (Microsoft Disk Operating System) - A process known as ____________ is used by large retailers to study trends – Data Mining - ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems – POS (Point- of - Sales terminals) - Technology no longer protected by copyright, available to everyone, is considered to be – proprietary - ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do – Artificial Intelligence - ____________ is data that has been organized or presented in a meaningful fashion – Information - The name for the way that computers manipulate data into information is called –Processing - Computers gather data, which means that they allow users to ____________ data –Input - After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered – Output - Computers use the ____________ language to process data – Binary - Computers process data into information by working exclusively with – Numbers - In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of – Eight Bits - The term bit is short for – Binary Digit - A string of eight 0s and 1s is called a – Gigabyte NOTES COMPILED BY sujeet Mehta - A ____________ is approximately a million bytes – megabytes - A component that expands a computer’s input, storage, or output capabilities is referred to as a – Peripheral device - A central computer that holds collections of data and programs for connecting PCs, workstations, and other devices is called a – Server - Tower PCs are ____ whose case or main housing sits on a desk, with the –microcomputers - Users access mainframes by means of a ____, which has a display screen and a keyboard – Terminal - Tiny, specialized microprocessors installed in “smart” appliances and automobiles are called – microcontrollers - A system that connects, usually by special cables, a group of desktop PCs and other devices such as printers in an office or a building is called – Local Area Network (LAN) - The next generation of smaller, faster computers that will fit into a single human cell are known as – Nano-computers - The process of copying software programs from secondary storage media to the system’s hard disk is called – Installation - What is the main feature of smartphones? – They allows users to make phone calls as well as browse the World Wide Web - High-capacity computers with hundreds of thousands of processors that can perform more than one trillion calculations per second are called – Supercomputers - A communications system connecting two or more computers is called a – Network - Using a user name and password, the ISP will allow the user to connect. What is the correct terminology for this action? – Log on - What consists of hardware and software and allows voice, video, and data to be communicated over traditional copper-wire telephone lines? – ISDN Line - ISP Stands for – Internet Service Provider - An expression for how much data can be sent through a communications channel in a given amount of time is referred to as – Bandwidth - A set of communications rules for exchanging information is called a - Protocol - The communications rules or protocols that allow browsers to connect with web servers is – HTTP - HTTP stands for – Hyper Text Transfer Protocol - The communication rules or protocols that allow browsers to connect with file servers is – FTP - FTP stands for – File Transfer Protocol - An automatic email mailing list of people who regularly participate in discussion topics are called – Listserv - If you wish to be part of an online discussions on a favorite topic of interest, you would subscribe to a – Listserv - The transmission of data from a local computer to a remote computer is – Upload - An independently controllable section of a web page is called a – Frame - The .gov, , .net and .edu extensions are examples of – top level domains - What is ISP? – Internet Service Provider - With which command is the file named config.sys associated? – with memory management - What is a hyperlink? – A character, string, picture or anything, clicking on which a website or a new web page is opened - What a character or a string or a picture, is called, cursor takes shape of a hand, when placed over? – a Hyperlink - In MS – Word, what is the function of the F7 button? – Checking Grammar related errors in the written text - Which part of computer is generally called a computer’s mind? – the CPU (Central Processing Unit) - What is Hacking? – Any unauthorized access and use of data and information - Which is the best way to make Backup of important files? – By transferring important files to non-working drive (Such as moving files from C: to D:) - Web-Form is used to – post information on a website’s server - Which facility Notepad not provides which MS Word provides? – Usage of multiple types of fonts on a single text document - Which is the most popular medium of making input in CAD? – Joystick NOTES COMPILED BY sujeet Mehta - Twisted Pair Transmission is – Online Analog Transmission - While making search in Windows platform, for what character ‘?’ stands for? – single length character - Winzip is a popular software to – Compress the size of files - What is true meaning of Backup? – Securing the vital data or information by transferring the data on destination different from the destination of primary source - What is the process of copying software from secondary storage device to Hard Disk known as? – Installation Computer General Knowledge For Bank Examination 1. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. Answer: B 2. A process known as ____________ is used by large retailers to study trends. A. data mining B. data selection C. POS D. data conversion Answer: A 3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. A. Data B. Point-of-sale (POS) C. Sales D. Query Answer: B 4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop. A. PSS B. POS C. inventory D. data mining Answer: A 5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called: A. robotics. B. simulation. C. computer forensics. D. animation. Answer: C 6. Which of the following is NOT one of the four major data processing functions of a computer? A. gathering data B. processing data into information C. analyzing the data or information D. storing the data or information Answer: C 7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements. A. POS B. RFID C. PPS D. GPS Answer: B 8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as: A. robotics. B. computer forensics. C. simulation. D. forecasting. Answer: A 9. Technology no longer protected by copyright, available to everyone, is considered to be: A. proprietary. B. open. C. experimental. D. in the public domain. Answer: A 10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. A. Nanoscience B. Microelectrodes C. Computer forensics D. Artificial intelligence Answer: A 11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do. A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AI) Answer: D 12. ____________ is data that has been organized or presented in a meaningful fashion. A. A process B. Software C. Storage D. Information Answer: D 13. The name for the way that computers manipulate data into information is called: A. programming. B. processing. C. storing. D. organizing. Answer: B 14. Computers gather data, which means that they allow users to ____________ data. A. present B. input C. output D. store Answer: B 15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered: A. data. B. output. C. input. D. the process. Answer: B : Compiled: sujeet Mehta sujeet Mehta facebook/sujeet.mehta2 16. Computers use the ____________ language to process data. A. processing B. kilobyte C. binary D. representational Answer: C 17. Computers process data into information by working exclusively with: A. multimedia. B. words. C. characters. D. numbers. Answer: D 18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of: A. eight bytes. B. eight kilobytes. C. eight characters. D. eight bits. Answer: D 19. The term bit is short for: A. megabyte. B. binary language. C. binary digit. D. binary number. Answer: C 20. A string of eight 0s and 1s is called a: A. megabyte. B. byte. C. kilobyte. D. gigabyte. Answer: B 21. A ____________ is approximately one billion bytes. A. kilobyte B. bit C. gigabyte D. megabyte Answer: C 22. A ____________ is approximately a million bytes. A. gigabyte B. kilobyte C. megabyte D. terabyte Answer: C 23. ____________ is any part of the computer that you can physically touch. A. Hardware B. A device C. A peripheral D. An application Answer: A 24. The components that process data are located in the: A. input devices. B. output devices. C. system unit. D. storage component. Answer: C 25. All of the following are examples of input devices EXCEPT a: A. scanner. B. mouse. C. keyboard. D. printer. Answer: D : Compiled By: sujeet Mehta facebook/sujeet.mehta2 26. Which of the following is an example of an input device? A. scanner B. speaker C. CD D. printer Answer: A 27. All of the following are examples of storage devices EXCEPT: A. hard disk drives. B. printers. C. floppy disk drives. D. CD drives. Answer: B 28. The ____________, also called the “brains†of the computer, is responsible for processing data. A. motherboard B. memory C. RAM D. central processing unit (CPU) Answer: D 29. The CPU and memory are located on the: A. expansion board. B. motherboard. C. storage device. D. output device. Answer: B 30. Word processing, spreadsheet, and photo-editing are examples of: A. application software. B. system software. C. operating system software. D. platform software. Answer: A 31. ____________ is a set of computer programs used on a computer to help perform tasks. A. An instruction B. Software C. Memory D. A processor Answer: B 32. System software is the set of programs that enables your computers hardware devices and ____________ software to work together. A. management B. processing C. utility D. application Answer: D 33. The PC (personal computer) and the Apple Macintosh are examples of two different: A. platforms. B. applications. C. programs. D. storage devices. Answer: A 34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems. A. languages B. methods C. CPUs D. storage devices Answer: C 35. Servers are computers that provide resources to other computers connected to a: A. network. B. mainframe. C. supercomputer. D. client. Answer: A 36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses. A. supercomputers B. clients C. laptops D. mainframes Answer: D 37. ____________ are specially designed computers that perform complex calculations extremely rapidly. A. Servers B. Supercomputers C. Laptops D. Mainframes Answer: B 38. DSL is an example of a(n) ____________ connection. A. network B. wireless C. slow D. broadband Answer: D 39. The difference between people with access to computers and the Internet and those without this access is known as the: A. digital divide. B. Internet divide. C. Web divide. D. broadband divide. Answer: A 40. ____________ is the science revolving around the use of nano structures to build devices on an extremely small scale. A. Nanotechnology B. Micro-technology C. Computer forensics D. Artificial intelligence Answer: A 41. Which of the following is the correct order of the four major functions of a computer? A. Process à Output à Input à Storage B. Input à Outputà Process à Storage C. Process à Storage à Input à Output D. Input à Process à Output à Storage Answer: D 42. ____________ bits equal one byte. A. Eight B. Two C. One thousand D. One million Answer: A 43. The binary language consists of ____________ digit(s). A. 8 B. 2 C. 1,000 D. 1 Answer: B 44. A byte can hold one ____________ of data. A. bit B. binary digit C. character D. kilobyte Answer: C 45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer. A. The platform B. The operating system C. Application software D. The motherboard Answer: B 46. The operating system is the most common type of ____________ software. A. communication B. application C. system D. word-processing software Answer: C 47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat. A. Servers B. Embedded computers C. Robotic computers D. Mainframes Answer: B 48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called: A. instructions. B. the operating system. C. application software. D. the system unit. Answer: A 49. The two broad categories of software are: A. word processing and spreadsheet. B. transaction and application. C. Windows and Mac OS. D. system and application. Answer: D 50. The metal or plastic case that holds all the physical parts of the computer is the: A. system unit. B. CPU. C. mainframe. D. platform. Answer: A : Compiled By: sujeet Mehta facebook/sujeet.mehta2 I WISH ALL MY STUDENTS GOT HIGHEST DESERVING MARKS...I WILL WAIT FOR YOUR MAIL OR LIKE IN FACEBOOK ... BEST OF LUCK....
Posted on: Sun, 28 Jul 2013 06:40:43 +0000

Trending Topics



Recently Viewed Topics




© 2015