RECENT COMMENTS

  • Breaking News

    Sunday, 6 November 2016

    Computer related question with answer detail for banking exam preparation

    1. UNIVAC is ?
    A)   Universal automatic computer
    B)   Universal array computer
    C)   Unique automatic computer
    D)   Unvalued automatic computer
    Correct answer: A
    Solution :
    UNIVAC is the name of a line of electronic digital stored-program computers starting with the products of the Eckert-Mauchly Computer Corporation. Later the name was applied to a division of the Remington Rand company and successor organizations.
    The BINAC, built by the Eckert-Mauchly Computer Corporation, was the first general-purpose computer for commercial use. The descendants of the later UNIVAC 1107 continue today as products of the Unisys company.
    2. Which of the following is NOT associated with computers?
    A)   Bit
    B)   Binary
    C)   Pencil
    D)   Mouse
    E)   Screen
    Correct answer: C






    3. A byte is a collection of
    A)   Four bits
    B)   Six bits
    C)   Eight bits
    D)   Ten bits
    E)   Twelve bits
    Correct answer: C
    Solution :
     Explanation: A byte is a unit of measurement used to measure data. One byte contains eight binary bits, or a series of eight zeros and ones. Therefore, each byte can be used to represent 2^8 or 256 different values.
    4. CD-ROM is an example of
    A)   Input device
    B)   Output device
    C)   Both input & output device
    D)   Pointing devices
    E)   None of these
    Correct answer: E
    Solution :
     A CD-ROM is a pre-pressed optical compact disc which contains data. The name is an acronym which stands for "Compact Disc Read-Only Memory". Computers can read CD-ROMs, but cannot write to CD-ROMs which are not writable or erasable.




    5. Volatility is a property of

    A)   Compute network
    B)   ROM
    C)   Disk
    D)   Software
    E)   RAM
    Correct answer: E
    Solution :
     Alternatively referred to as main memory, primary memory, or system memory, Random Access Memory (RAM) is a hardware device that allows information to be stored and retrieved on a computer. RAM is usually associated with DRAM, which is a type of memory module. Because information is accessed randomly instead of sequentially like it is on a CD or hard drive, the computer can access the data much faster. However, unlike ROM or the hard drive, RAM is a volatile memory and requires power to keep the data accessible. If the computer is turned off, all data contained in RAM is lost.
    6. Java is an example of a(n)
    A)   Machine language
    B)   Assembly language
    C)   High-level language
    D)   Fourth-generation language
    E)   None of these
    Correct answer: C
    Solution :
     Java is a general purpose, high-level programming language developed by Sun Microsystems. A small team of engineers, known as the Green Team, initiated the language in 1991. Java was originally called OAK, and was designed for handheld devices and set-top boxes. Oak was unsuccessful, so in 1995 Sun changed the name to Java and modified the language to take advantage of the burgeoning World Wide Web.


    7. What is the name given to the database management system which is able to handle full text data, image data, audio and video?
    A)   Full media
    B)   Graphics media
    C)   Multimedia
    D)   Hypertext
    E)   None of these
    Correct answer: C
    8. …………………. Is/are processed by the computer into information.
    A)   Numbers
    B)   Processors
    C)   Input
    D)   Data
    E)   None of these
    Correct answer: D
    9. Which of the following commercial software products are examples of operating system software and application software respectively?
    A)   Microsoft Windows XP and Microsoft Word
    B)   Microsoft office XP and Microsoft Windows XP
    C)   MS DOS and Microsoft Windows XP
    D)   UNIX and LINUX
    E)   UNIX and Java
    Correct answer: A


    10. What is default file extension for all coral documents?
    A)   .cdr
    B)   .jpg
    C)   .png
    D)   .cmp
    E)   None of these
    Correct answer: A
    Solution :
     CDR is a file extension for a vector graphics file used by Corel Draw, a popular graphics design program. Corel Paint Shop Pro and Adobe illustrator 9 and later can also open some CDR files.
    11. Which of the following is a popular programming language developing multimedia web pages?
    A)   JAVA
    B)   COBOL
    C)   C + +
    D)   PASCLE
    E)   None of these
    Correct answer: A
    Solution:
     Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible. It is intended to let application developers "write once, run anywhere" (WORA), meaning that compiled Java code can run on all platforms that support Java without the need for recompilation. Java applications are typically compiled to byte code that can run on any Java virtual machine (JVM) regardless of computer architecture. As of 2016, Java is one of the most popular programming languages in use, particularly for client-server web applications, with a reported 9 million developers. Java was originally developed by James Gosling at Sun Microsystems (which has since been acquired by Oracle Corporation) and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++, but it has fewer low-level facilities than either of them.


    12. An example of a processing device would be ____.
    A)   Scanner
    B)   Special function cards
    C)   Disc
    D)   Both 1 and 2
    E)   None of these
    Correct answer: B
    13. What is windows explorer?
    A)   A Navigation tool
    B)   System software
    C)   Application software
    D)   A file manager
    E)   Both 1 and 4
    Correct answer: E
    Solution :
     Windows Explorer - is a program within Windows 7 that displays the contents of libraries, folders and files on your computer. Windows Explorer enables you to find, create and organize and manage your files and folders. It is used to copy, move, sort, rename and delete files.
    14. Unsolicited e-mail is called _____.
    A)   Spam
    B)   Junk
    C)   Personal mail
    D)   Informal mail
    E)   None of these
    Correct answer: A


    Solution :
     Unsolicited mail sent out usually by direct marketing or direct mail firms. Used mainly for introducing new products, books and magazines, investment opportunities, merchandise catalogs, etc., junk mail is big business in industrialized countries especially the US, UK, and Canada. Unsolicited email is called spam.
    15. What is a list of data (all) files of any database called?
    A)   File
    B)   Data dictionary
    C)   Folder
    D)   Data disc
    E)   None of these
    Correct answer: B
    Solution :
     A data dictionary is a collection of descriptions of the data objects or items in a data model for the benefit of programmers and others who need to refer to them. A first step in analyzing a system of objects with which users interact is to identify each object and its relationship to other objects.
    16. What is the main folder on a storage device called?
    A)   Downloads
    B)   RAM
    C)   Hard disc
    D)   Root directory
    E)   None of these
    Correct answer: D


    Solution :
     In a computer file system, and primarily used in the Unix and Unix-like operating systems, the root directory is the first or top-most directory in a hierarchy. It can be likened to the trunk of a tree, as the starting point where all branches originate from.
    17. In database system, which is/are the smallest units of information?

    A)   Fields
    B)   Character
    C)   Column
    D)   Row
    E)   None of these
    Correct answer: A
    Solution :
     In computer science, data that has several parts, known as a record, can be divided into fields. Relational databases arrange data as sets of database records, also called rows. Each record consists of several fields; the fields of all records form the columns. Examples of fields: name,gender,hair colour.
    18. Which of the following memory is slower in speed ____.

    A)   RAM
    B)   ROM
    C)   PROM
    D)   Register
    E)   None of these
    Correct answer: D
    Solution :
     A special, high-speed storage area within the CPU. All data must be represented in a register before it can be processed. For example, if two numbers are to be multiplied, both numbers must be in registers, and the result is also placed in a register. (The register can contain the address of a memory location where data is stored rather than the actual data itself.) The number of registers that a CPU has and the size of each (number of bits) help determine the power and speed of a CPU. For example a 32-bit CPU is one in which each register is 32 bits wide. Therefore, each CPU instruction can manipulate 32 bits of data. Usually, the movement of data in and out of registers is completely transparent to users, and even to programmers. Only assembly language programs can manipulate registers. In high-level languages, the compiler is responsible for translating high-level operations into low-level operations that access registers.
    19. Dump terminal have only ______
    A)   Monitor and processor
    B)   Hard-disc
    C)   Keyboard
    D)   Both 1 and 2
    E)   Both 1 and 3
    Correct answer: E
    Solution :
     A display monitor that has no processing capabilities. A dumb terminal is simply an output device that accepts data from the CPU. In contrast, a smart terminal is a monitor that has its own processor for special features, such as bold and blinking characters.
    20. ________ are words that a programming language has set aside for its own use.

    A)   Control words
    B)   Reserved words
    C)   Control structure
    D)   Reserved keys
    E)   None of these
    Correct answer: B
    Solution :
     In a computer language, a reserved word (also known as a reserved identifier) is a word that cannot be used as an identifier, such as the name of a variable, function, or label – it is "reserved from use". This is a syntactic definition, and a reserved word may have no meaning.


    21. What is the primary difference between a virus and a worm?
    A)   A worm has the ability to self-propagate from an infected user’s computer to other computers.
    B)   A worm is usually written by a cracker. Script bunnies do not have the skills to develop a worm program.
    C)   A virus is very harmful to the computer it infects; a worm is not a serious problem.
    D)   Anti-virus software is effective in fighting against viruses but not worms.
    E)   None of these
    Correct answer: A
    22. Mobile commerce is best described as

    A)   the use of kiosks in marketing
    B)   transporting products
    C)   buying & selling goods/services through wireless hand-held devices
    D)   using notebook PCs in Marketing
    E)   None of these
    Correct answer: C
    23. Spiral-shape track formatting is present in

    A)   Floppy Disk
    B)   Optical Disk
    C)   Hard Disk
    D)   Half-Inch Tape Cartridge
    E)   None of these
    Correct answer: B
    24. A ________ is a design tool that graphically shows the logic in a solution algorithm.

    A)   flowchart
    B)   hierarchy chart
    C)   structure chart
    D)   context diagram
    E)   None of these
    Correct answer: A
    Solution :
     A flowchart is a type of diagram that represents an algorithm, workflow or process, showing the steps as boxes of various kinds, and their order by connecting them with arrows. This diagrammatic representation illustrates a solution model to a given problem.
    25. What is the name of the process that is used to convert a series of instructions or programs writ¬ten in a high-level language into instructions or a programs that can be run on a computer?

    A)   Assembling
    B)   Compiling
    C)   Translating
    D)   Uploading
    E)   None of these
    Correct answer: B




    26. When you are selecting a mouse for a particular computer system, what is the most important consideration?

    A)   The type of drivers that come with the mouse
    B)   The length of the mouse cord
    C)   The type of connector the mouse is equipped with
    D)   The number of buttons that the mouse has
    E)   None of these
    Correct answer: C
    27. How is it possible that both programs and data can be stored in the same floppy disk?
    A)   A floppy disk has two sides – one for data and another for programs.
    B)   Programs and data are both software, and both can be stored in any memory device.
    C)   A floppy disk has to be formatted for one or the other.
    D)   Floppy disks can only store data, not programs.
    E)   None of these
    Correct answer: B
    28. Which of the following is the latest version of Excel?
    A)   Excel 2000
    B)   Excel 2002
    C)   Excel ME
    D)   Excel XP
    E)   Excel 2010
    Correct answer: B




    29. Deleted data remains on a disk until
    A)   the data is overwritten.
    B)   the recycle bin is emptied.
    C)   a file compression utility is used.
    D)   the disk is scanned.
    E)   None of these
    Correct answer: B
    30. Which elements of a Word document can be displayed in colour?
    A)   Only graphics
    B)   Only text
    C)   All elements
    D)   All elements, but only if you have a colour printer
    E)   None of these
    Correct answer: C
    31. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) ________ .

    A)   workstation
    B)   CPU
    C)   magnetic disk
    D)   integrated circuit
    E)   None of these
    Correct answer: D
    Solution : an electronic circuit formed on a small piece of semiconducting material, which performs the same function as a larger circuit made from discrete components.


    32. What characteristic of read-only memory (ROM) makes it useful?
    A)   ROM information can be easily updated.
    B)   Data in ROM is nonvolatile, that is, it remains there even without electrical power.
    C)   ROM provides very large amounts of inexpensive data storage.
    D)   ROM chips are easily swapped between different brands of computers.
    E)   None of these
    Correct answer: B
    33. The ________ controls a client’s computer resources.

    A)   application program
    B)   instruction set
    C)   operating system
    D)   server application
    E)   compiler
    Correct answer: C
    Solution :
     An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs. All computer programs, excluding firmware, require an operating system to function. Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.




    34. Which of the following is NOT one of the four major data processing functions of a computer?

    A)   Gathering data
    B)   Processing data into information
    C)   Analysing the data or information
    D)   Storing the data or information
    E)   None of these
    Correct answer: C
    35. All the logical and mathematical calculations done by the computer happen in/on the
    A)   system board
    B)   central control unit
    C)   central processing unit
    D)   mother board
    E)   memory
    Correct answer: C
    36. (IP) Internet Protocol is

    A)   Unique address of every terminal
    B)   Alternate address of every terminal
    C)   Temporary address of every terminal
    D)   Any IP address can be used for every terminal by the user.
    E)   None of these
    Correct answer: A


    Solution :
     The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. For this purpose, IP defines packet structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information.


    37. In the OSI model, which layer works as an interface between the user and the network?

    A)   Transport layer
    B)   Data-link layer
    C)   Network layer
    D)   Application layer
    E)   None of these
    Correct answer: D
    Solution :
     The application layer is a layer in the Open Systems Interconnection (OSI) seven-layer model and in the TCP/IP protocol suite. It consists of protocols that focus on process-to-process communication across an IP network and provides a firm communication interface and end-user services.
    38. After a user has saved and deleted many files, many scattered areas of stored data remain that are too small to be used efficiently, causing

    A)   Disorder
    B)   Turmoil
    C)   Disarray
    D)   Fragmentation
    E)   None of these
    Correct answer: D
    Solution :
     Refers to the condition of a disk in which files are divided into pieces scattered around the disk. Fragmentation occurs naturally when you use a disk frequently, creating, deleting, and modifying files. At some point, the operating system needs to store parts of a file in noncontiguous clusters.
    39. Which of the following is the communication protocol that sets the standard used by every computer that accesses web-based information?

    A)   XML
    B)   DML
    C)   HTTP
    D)   HTML
    E)   None of these
    Correct answer: C

    Source : https://goo.gl/WgryNB  
    For  more questions  regarding you banking exam preparation  on line and  off line  at  oureducity.com


    No comments:

    Post a Comment

    Fashion

    Beauty

    Culture