1. UNIVAC is ?
A) Universal
automatic computer
B) Universal array
computer
C) Unique automatic
computer
D) Unvalued
automatic computer
Correct answer: A
Solution :
UNIVAC is the name of a line of electronic digital
stored-program computers starting with the products of the Eckert-Mauchly
Computer Corporation. Later the name was applied to a division of the Remington
Rand company and successor organizations.
The BINAC, built by the Eckert-Mauchly Computer Corporation,
was the first general-purpose computer for commercial use. The descendants of
the later UNIVAC 1107 continue today as products of the Unisys company.
2. Which of the following is NOT associated with computers?
A) Bit
B) Binary
C) Pencil
D) Mouse
E) Screen
Correct answer: C
3. A byte is a collection of
A) Four bits
B) Six bits
C) Eight bits
D) Ten bits
E) Twelve bits
Correct answer: C
Solution :
Explanation: A byte
is a unit of measurement used to measure data. One byte contains eight binary
bits, or a series of eight zeros and ones. Therefore, each byte can be used to
represent 2^8 or 256 different values.
4. CD-ROM is an
example of
A) Input device
B) Output device
C) Both input &
output device
D) Pointing devices
E) None of these
Correct answer: E
Solution :
A CD-ROM is a
pre-pressed optical compact disc which contains data. The name is an acronym
which stands for "Compact Disc Read-Only Memory". Computers can read
CD-ROMs, but cannot write to CD-ROMs which are not writable or erasable.
5. Volatility is a property of
A) Compute network
B) ROM
C) Disk
D) Software
E) RAM
Correct answer: E
Solution :
Alternatively
referred to as main memory, primary memory, or system memory, Random Access
Memory (RAM) is a hardware device that allows information to be stored and
retrieved on a computer. RAM is usually associated with DRAM, which is a type
of memory module. Because information is accessed randomly instead of
sequentially like it is on a CD or hard drive, the computer can access the data
much faster. However, unlike ROM or the hard drive, RAM is a volatile memory
and requires power to keep the data accessible. If the computer is turned off,
all data contained in RAM is lost.
6. Java is an example of a(n)
A) Machine language
B) Assembly language
C) High-level
language
D) Fourth-generation
language
E) None of these
Correct answer: C
Solution :
Java is a general
purpose, high-level programming language developed by Sun Microsystems. A small
team of engineers, known as the Green Team, initiated the language in 1991.
Java was originally called OAK, and was designed for handheld devices and
set-top boxes. Oak was unsuccessful, so in 1995 Sun changed the name to Java
and modified the language to take advantage of the burgeoning World Wide Web.
7. What is the name given to the database management system
which is able to handle full text data, image data, audio and video?
A) Full media
B) Graphics media
C) Multimedia
D) Hypertext
E) None of these
Correct answer: C
8. …………………. Is/are processed by the computer into
information.
A) Numbers
B) Processors
C) Input
D) Data
E) None of these
Correct answer: D
9. Which of the following commercial software products are
examples of operating system software and application software respectively?
A) Microsoft Windows
XP and Microsoft Word
B) Microsoft office
XP and Microsoft Windows XP
C) MS DOS and
Microsoft Windows XP
D) UNIX and LINUX
E) UNIX and Java
Correct answer: A
10. What is default file extension for all coral documents?
A) .cdr
B) .jpg
C) .png
D) .cmp
E) None of these
Correct answer: A
Solution :
CDR is a file
extension for a vector graphics file used by Corel Draw, a popular graphics
design program. Corel Paint Shop Pro and Adobe illustrator 9 and later can also
open some CDR files.
11. Which of the following is a popular programming language
developing multimedia web pages?
A) JAVA
B) COBOL
C) C + +
D) PASCLE
E) None of these
Correct answer: A
Solution:
Java is a general-purpose
computer programming language that is concurrent, class-based, object-oriented,
and specifically designed to have as few implementation dependencies as
possible. It is intended to let application developers "write once, run
anywhere" (WORA), meaning that compiled Java code can run on all platforms
that support Java without the need for recompilation. Java applications are
typically compiled to byte code that can run on any Java virtual machine (JVM)
regardless of computer architecture. As of 2016, Java is one of the most
popular programming languages in use, particularly for client-server web
applications, with a reported 9 million developers. Java was originally
developed by James Gosling at Sun Microsystems (which has since been acquired
by Oracle Corporation) and released in 1995 as a core component of Sun
Microsystems' Java platform. The language derives much of its syntax from C and
C++, but it has fewer low-level facilities than either of them.
12. An example of a processing device would be ____.
A) Scanner
B) Special function
cards
C) Disc
D) Both 1 and 2
E) None of these
Correct answer: B
13. What is windows explorer?
A) A Navigation tool
B) System software
C) Application
software
D) A file manager
E) Both 1 and 4
Correct answer: E
Solution :
Windows Explorer - is
a program within Windows 7 that displays the contents of libraries, folders and
files on your computer. Windows Explorer enables you to find, create and
organize and manage your files and folders. It is used to copy, move, sort,
rename and delete files.
14. Unsolicited e-mail is called _____.
A) Spam
B) Junk
C) Personal mail
D) Informal mail
E) None of these
Correct answer: A
Solution :
Unsolicited mail sent
out usually by direct marketing or direct mail firms. Used mainly for
introducing new products, books and magazines, investment opportunities,
merchandise catalogs, etc., junk mail is big business in industrialized
countries especially the US, UK, and Canada. Unsolicited email is called spam.
15. What is a list of data (all) files of any database
called?
A) File
B) Data dictionary
C) Folder
D) Data disc
E) None of these
Correct answer: B
Solution :
A data dictionary is
a collection of descriptions of the data objects or items in a data model for
the benefit of programmers and others who need to refer to them. A first step
in analyzing a system of objects with which users interact is to identify each
object and its relationship to other objects.
16. What is the main folder on a storage device called?
A) Downloads
B) RAM
C) Hard disc
D) Root directory
E) None of these
Correct answer: D
Solution :
In a computer file
system, and primarily used in the Unix and Unix-like operating systems, the
root directory is the first or top-most directory in a hierarchy. It can be
likened to the trunk of a tree, as the starting point where all branches
originate from.
17. In database system, which is/are the smallest units of
information?
A) Fields
B) Character
C) Column
D) Row
E) None of these
Correct answer: A
Solution :
In computer science,
data that has several parts, known as a record, can be divided into fields.
Relational databases arrange data as sets of database records, also called
rows. Each record consists of several fields; the fields of all records form
the columns. Examples of fields: name,gender,hair colour.
18. Which of the following memory is slower in speed ____.
A) RAM
B) ROM
C) PROM
D) Register
E) None of these
Correct answer: D
Solution :
A special, high-speed
storage area within the CPU. All data must be represented in a register before
it can be processed. For example, if two numbers are to be multiplied, both
numbers must be in registers, and the result is also placed in a register. (The
register can contain the address of a memory location where data is stored
rather than the actual data itself.) The number of registers that a CPU has and
the size of each (number of bits) help determine the power and speed of a CPU.
For example a 32-bit CPU is one in which each register is 32 bits wide.
Therefore, each CPU instruction can manipulate 32 bits of data. Usually, the
movement of data in and out of registers is completely transparent to users,
and even to programmers. Only assembly language programs can manipulate
registers. In high-level languages, the compiler is responsible for translating
high-level operations into low-level operations that access registers.
19. Dump terminal have only ______
A) Monitor and
processor
B) Hard-disc
C) Keyboard
D) Both 1 and 2
E) Both 1 and 3
Correct answer: E
Solution :
A display monitor
that has no processing capabilities. A dumb terminal is simply an output device
that accepts data from the CPU. In contrast, a smart terminal is a monitor that
has its own processor for special features, such as bold and blinking
characters.
20. ________ are words that a programming language has set
aside for its own use.
A) Control words
B) Reserved words
C) Control structure
D) Reserved keys
E) None of these
Correct answer: B
Solution :
In a computer
language, a reserved word (also known as a reserved identifier) is a word that
cannot be used as an identifier, such as the name of a variable, function, or
label – it is "reserved from use". This is a syntactic definition,
and a reserved word may have no meaning.
21. What is the primary difference between a virus and a
worm?
A) A worm has the
ability to self-propagate from an infected user’s computer to other computers.
B) A worm is usually
written by a cracker. Script bunnies do not have the skills to develop a worm
program.
C) A virus is very
harmful to the computer it infects; a worm is not a serious problem.
D) Anti-virus
software is effective in fighting against viruses but not worms.
E) None of these
Correct answer: A
22. Mobile commerce is best described as
A) the use of kiosks
in marketing
B) transporting
products
C) buying &
selling goods/services through wireless hand-held devices
D) using notebook
PCs in Marketing
E) None of these
Correct answer: C
23. Spiral-shape track formatting is present in
A) Floppy Disk
B) Optical Disk
C) Hard Disk
D) Half-Inch Tape
Cartridge
E) None of these
Correct answer: B
24. A ________ is a design tool that graphically shows the
logic in a solution algorithm.
A) flowchart
B) hierarchy chart
C) structure chart
D) context diagram
E) None of these
Correct answer: A
Solution :
A flowchart is a type
of diagram that represents an algorithm, workflow or process, showing the steps
as boxes of various kinds, and their order by connecting them with arrows. This
diagrammatic representation illustrates a solution model to a given problem.
25. What is the name of the process that is used to convert
a series of instructions or programs writ¬ten in a high-level language into
instructions or a programs that can be run on a computer?
A) Assembling
B) Compiling
C) Translating
D) Uploading
E) None of these
Correct answer: B
26. When you are selecting a mouse for a particular computer
system, what is the most important consideration?
A) The type of
drivers that come with the mouse
B) The length of the
mouse cord
C) The type of
connector the mouse is equipped with
D) The number of
buttons that the mouse has
E) None of these
Correct answer: C
27. How is it possible that both programs and data can be
stored in the same floppy disk?
A) A floppy disk has
two sides – one for data and another for programs.
B) Programs and data
are both software, and both can be stored in any memory device.
C) A floppy disk has
to be formatted for one or the other.
D) Floppy disks can
only store data, not programs.
E) None of these
Correct answer: B
28. Which of the following is the latest version of Excel?
A) Excel 2000
B) Excel 2002
C) Excel ME
D) Excel XP
E) Excel 2010
Correct answer: B
29. Deleted data remains on a disk until
A) the data is
overwritten.
B) the recycle bin
is emptied.
C) a file compression
utility is used.
D) the disk is
scanned.
E) None of these
Correct answer: B
30. Which elements of a Word document can be displayed in
colour?
A) Only graphics
B) Only text
C) All elements
D) All elements, but
only if you have a colour printer
E) None of these
Correct answer: C
31. A complete electronic circuit with transistors and other
electronic components on a small silicon chip is called a(n) ________ .
A) workstation
B) CPU
C) magnetic disk
D) integrated circuit
E) None of these
Correct answer: D
Solution : an
electronic circuit formed on a small piece of semiconducting material, which
performs the same function as a larger circuit made from discrete components.
32. What characteristic of read-only memory (ROM) makes it
useful?
A) ROM information
can be easily updated.
B) Data in ROM is
nonvolatile, that is, it remains there even without electrical power.
C) ROM provides very
large amounts of inexpensive data storage.
D) ROM chips are
easily swapped between different brands of computers.
E) None of these
Correct answer: B
33. The ________ controls a client’s computer resources.
A) application
program
B) instruction set
C) operating system
D) server
application
E) compiler
Correct answer: C
Solution :
An operating system
(OS) is system software that manages computer hardware and software resources
and provides common services for computer programs. All computer programs,
excluding firmware, require an operating system to function. Time-sharing
operating systems schedule tasks for efficient use of the system and may also
include accounting software for cost allocation of processor time, mass
storage, printing, and other resources.
34. Which of the following is NOT one of the four major data
processing functions of a computer?
A) Gathering data
B) Processing data
into information
C) Analysing the
data or information
D) Storing the data
or information
E) None of these
Correct answer: C
35. All the logical and mathematical calculations done by
the computer happen in/on the
A) system board
B) central control
unit
C) central
processing unit
D) mother board
E) memory
Correct answer: C
36. (IP) Internet Protocol is
A) Unique address of
every terminal
B) Alternate address
of every terminal
C) Temporary address
of every terminal
D) Any IP address
can be used for every terminal by the user.
E) None of these
Correct answer: A
Solution :
The Internet Protocol
(IP) is the principal communications protocol in the Internet protocol suite
for relaying datagrams across network boundaries. Its routing function enables
internetworking, and essentially establishes the Internet. IP has the task of
delivering packets from the source host to the destination host solely based on
the IP addresses in the packet headers. For this purpose, IP defines packet
structures that encapsulate the data to be delivered. It also defines
addressing methods that are used to label the datagram with source and
destination information.
37. In the OSI model, which layer works as an interface
between the user and the network?
A) Transport layer
B) Data-link layer
C) Network layer
D) Application layer
E) None of these
Correct answer: D
Solution :
The application layer
is a layer in the Open Systems Interconnection (OSI) seven-layer model and in
the TCP/IP protocol suite. It consists of protocols that focus on
process-to-process communication across an IP network and provides a firm
communication interface and end-user services.
38. After a user has saved and deleted many files, many
scattered areas of stored data remain that are too small to be used
efficiently, causing
A) Disorder
B) Turmoil
C) Disarray
D) Fragmentation
E) None of these
Correct answer: D
Solution :
Refers to the
condition of a disk in which files are divided into pieces scattered around the
disk. Fragmentation occurs naturally when you use a disk frequently, creating,
deleting, and modifying files. At some point, the operating system needs to
store parts of a file in noncontiguous clusters.
39. Which of the following is the communication protocol
that sets the standard used by every computer that accesses web-based
information?
A) XML
B) DML
C) HTTP
D) HTML
E) None of these
For more questions regarding you banking exam preparation on line and off line at oureducity.com
No comments:
Post a Comment