Allahabad Bank Probationary Officers Exam., 2010 (Held on ) Computer Knowledge : Solved Paper

Similar documents
8. A ---- represents approximately one billion memory location a. Kilobyte b. Megabyte c. Gigabyte d. Terabyte 9. A collection of programs that

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them)

Computer Technology Flash Card 2

8. A is approximately one billion bytes a. Kilobyte b. Bit c. Gigabyte d. Megabyte 9. SMPT, FTP and DNS are applications of the layer a. Data link b.

CHAPTER 1 TYPES & COMPONENTS OF COMPUTER SYSTEM

Unit A: Computer and Internet Basics

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti

Digital Literacy. Identify types of computers, how they process information, and the purpose and function of different hardware components

1. Restarting a computer which is already running is referred to as

Parts of the Computer System. Parts of the Computer System. Parts of the Computer System. Essential Computer Hardware. Information Processing Cycle

Introduction to Computers. Joslyn A. Smith

COMPUTER HARDWARE RAYMOND ROSE

COMPUTER BASICS LECTURER: ATHENA TOUMBOURI

Types of Data. PE 231 Education Media AND Technology. Information. Assessment. Information Concepts

c. Compiler d. Program 9. To maximize a window means a. Fill it to capacity b. Expand it to fit the desktop c. Put only like files inside d.

City College Computing

Information Communications Technology (CE-ICT) 6 th Class

Introduction to Computers

Zimmer CSCI /24/18. CHAPTER 1 Overview. COMPUTER Programmable devices that can store, retrieve, and process data.

Computer ANAMIKA ACADEMY. Mo Which function has the ability to move from one web page to another Hyper link

Total Mark out of 35

Chapter 2 Basic Computer Configuration

1. A folder inside a folder is called. a) Mini Directory b) Sub Directory c) Root Folder d) Child Folder e) None of these

Terminology, Types of Computers & Computer Hardware

Computer Basics. Lesson 1 Introduction to Computers. Edited by C. Rhodes 08/11

Introduction to Computers and Applications

Lecture 2 Winter 2006 Essentials of Computing

Chapter. IT Infrastructure: Hardware and Software

There are many types of computers, including:

HIGHER SECONDARY FIRST YEAR 2 MARK & 5 MARK NOTES CHAPTER 1 1. INTRODUCTION TO COMPUTER

The Lester Vaughan School Information Technology (Theory) Unit Plans Year 1 Term 1

ST. MARY S COLLEGE FORM 4

v.m.g.rajasekaran ramani sri sarada sakthi mat. Hr. sec. school

Defining Computers. Defining Computers. Understanding Essential Computer Concepts

Padasalai.Net s Computer Instructor TRB Exam Study Material Chapter One Introduction to Computer

Lecture -1- By lec. (Eng.) Hind Basil University of technology Department of Materials Engineering

COMPUTER SYSTEMS. Section 1

Downloaded From :

Lesson 2 Essential Computer Concepts

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

Computer is an electronic machine that can receive, store, transform and output data of all kinds (image, text, numeric, graphics and sound).

QUESTIONS ABOUT COMPUTERS

1. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. 2.

1. This memory is for short term storage and is lost when the computer is turned off. A. Icon B. CPU C. Hard drive D. RAM 2. This input device will

IBPS Practice Exam 1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2.

Suggested New Devices

Chapter 1 Introduction to Computers

Computer Concepts and C Programming. Unit I 06CCP13

Fig 1.1 A designer working on a personal computer

THINGS TO REMEMBER INTRODUCTION TO COMPUTERS

d. Window list 9. A large space common in most of the windows which is for users work with that application is --- a. Application view b.

6. Something which has easily understood instructions is said to be: 1) User friendly 2) Information 3) Word Processing 4) Icon 5) None of these

central processing unit (CPU) software operating system (OS) input device output device

Input: is any data or instructions that are used by a computer.

INFORMATION TECHNOLOGY CONCEPTS (391)

UNIQUE IAS ACADEMY- COMPUTER QUIZ 2

Masters of Computer Application (MCA) Entrance 2012 Computer Knowledge Paper I 1. All of the following are examples of real security and privacy

Downloaded from various sources on the NET

Community Development and Training Centre Semester IT 245 Management Information Systems

GCSE ICT AQA Specification A (Full Course) Summary

Computer Programming for Engineering

CLASSIFYING AND EVALUATING COMPUTERS

Copyright 2006 Prentice-Hall. All rights reserved. 1

True/False Indicate whether the statement is true or false. Bubble A for True and B for False

True/False Indicate whether the statement is true or false. Bubble A for True and B for False

KULLEĠĠ SAN BENEDITTU Secondary School, Kirkop

Computer Overview. A computer item you can physically see or touch. A computer program that tells computer hardware how to operate.

Dawood Public School Computer Studies Course Outline for Class VI. Course book- Right Byte 1 Fourth edition (Oxford University Press)

3. A microprocessor is the brain of the computer and is also called a(n)... A. microchip B. macrochip C. macroprocessor D.

Computer Principles and Components 1

CSC 121 Computers and Scientific Thinking

SYLLABUS. Subject Information B.B.A. I SEM Technology

What is the typical configuration of a computer sold today? 1-1

KENDRIYA VIDYALAYA CHENANI (J & K)

Exercise 2 : Complete each sentence or statement. 1. data consists of numbers that might be used in arithmetic operations.

Sahalsoftware college. Welcome To understanding Basic Computer Concept

Sir Sadiq s computer notes for class IX. Chapter no 3. Input/Output Devices

Homeschool Enrichment. Input & Output

Software is a computer that tells the computer how to perform particular.

Functional Skills. Entry 3 to Level 2. IT Basics Information

UNIQUE IAS ACADEMY-COMPUTER QUIZ-15

Introduction to Computers Chapter1

Personal computer hardware From Wikipedia, the free encyclopedia (Redirected from Computer hardware)

Chapter 1 Introduction to Computers

Microsoft Office and How to Purchase a Personal Computer

Module 1 Concepts of Information and Communication Technology (ICT)

Contents. 1. Hardware Software Networks St Ignatius Girls JL - Form 3

ICT IGCSE Theory Revision Presentation 2.1 Input devices and their uses

Basic computer principles

A utility program included with the many versions of Windows that makes a copy of all files or selected files that have been saved onto a disk.

CSC 170 Introduction to Computers and Their Applications. Computers

Hardware and Software - Revision Summary

First lecture Computer Basics. By lecturer : Raya N.Ismail computer science department

Types of Computers. Computer Technology (S1 Obj 1-1)

This is a list of vocabulary related to information and communication technology. Coloque el significado en español sobre las líneas.

CHAPTER 2 BASIC OPERATING SYSTEM CONCEPT MANAGEMENT

INTRODUCTION TO COMPUTERS

The personal computer system uses the following hardware device types -

INTRODUCTION TO COMPUTERS AND WINDOWS 10

Full file at

Transcription:

Allahabad Bank Probationary Officers Exam., 2010 (Held on 21-2-2010) Computer Knowledge : Solved Paper 1. A typically connects personal computers within a very limited geographical area, usually within a single building. (A) LAN (B) BAN (C) TAN (D) NAN 2. Computers manipulate data in many ways, and this manipulation is called (A) utilizing (B) batching (C) upgrading (D) processing 3. An e-mail address typically consists of a user ID followed by the sign and the name of the e-mail server that manages the user s electronic post office box. (A) @ (B) # (C) & (D) * 4. Software applies, also called algorithms, to process data. (A) arithmetic (B) procedures (C) objects (D) rules 5. A file extension is separated from the main file name with a(n), but no spaces. (A) question mark (B) exclamation mark (C) underscore (D) period Ans : (E)

6. An ad hoc query is a (A) pre-planned question (B) pre-scheduled question (C) spur-of-the-moment question (D) question that will not return any results 7. A Web consists of one or more Web pages located on a Web server. (A) hub (B) site (C) story (D) template 8. A computer is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files. (A) worm (B) virus (C) trojan horse (D) phishing scam 9. The desktop contains small graphics called (A) windows (B) logos (C) icons (D) pictures 10. C, BASIC, COBOL, and Java are examples of languages. (A) low-level (B) computer (C) system programming (D) high-level 11. A(n) camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.

(A) digital (B) analog (C) classic (D) film 12. makes it possible for shoppers to make purchases using their computers. (A) E-world (B) E-commerce (C) E-spend (D) E-business 13. Networks are monitored by security personnel and supervised by who set(s) up accounts and passwords for authorized network users. (A) IT managers (B) the government (C) network administrators (D) password administrators 14. Application software is designed to accomplish (A) real-world tasks (B) computer-centric tasks (C) gaming tasks (D) operating system tasks 15. A telephone number, a birth date, and a customer name are all examples of (A) a record (B) data (C) a file (D) a database 16. The human-readable version of a program is called (A) source code (B) program code (C) human code (D) system code

17. A computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit. (A) notebook (B) journal (C) diary (D) briefcase 18. is the result produced by a computer. (A) Data (B) Memory (C) Output (D) Input 19. Programs such as Internet Explorer that serve as navigable windows into the Web are called (A) Hypertext (B) Networks (C) Internet (D) Web browsers 20. A is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage. (A) surge strip (B) USB (C) UPS (D) battery strip 21. When you save to, your data will remain intact even when the computer is turned off. (A) RAM (B) motherboard (C) secondary storage device (D) primary storage device

22. The motherboard is the (A) circuit board that houses peripheral devices (B) same as the CPU chip (C) the first chip that is accessed when the computer is turned on (D) circuit board that contains a CPU and other chips 23. A computer-intensive problemruns on a (A) server (B) main frame (C) supercomputer (D) super PC 24. A(n) converts and executesone statement at a time. (A) compiler (B) interpreter (C) converter (D) instructions 25. The term designates equipment that might be added to a computer system to enhance its functionality. (A) digital device (B) system add-on (C) disk pack (D) peripheral device 26. Approximately how many bytes make one megabyte? (A) One thousand (B) Ten thousand (C) One hundred (D) One million 27. What is MP3? (A) A mouse (B) A Printer (C) A Sound format

(D) A Scanner 28. All the deleted files go to (A) Recycle Bin (B) Task Bar (C) Tool Bar (D) My Computer 29. this is the act of copying or downloading a program from a network and making multiple copies of it. (A) Network piracy (B) Plagiarism (C) Software piracy (D) Site-license piracy 30. A directory within a directory is called (A) Mini Directory (B) Junior Directory (C) Part Directory (D) Sub Directory 31. Which is the best definition of a software package? (A) An add-on for your computer such as additional memory (B) A set of computer programs used for a certain function such as word processing (C) A protection you can buy for a computer (D) The box, manual and license agreement that accompany commercial software 32. In MICR, C stands for. (A) Code (B) Colour (C) Computer (D) Character 33. Fax machines and imaging systems are examples of

(A) bar-code readers (B) imaging systems (C) scanning devices (D) pen-based systems 34. When writing a document, you can use the feature to find an appropriate word or an alternative word if you find yourself stuck for the right word. (A) dictionary (B) word finder (C) encyclopedia (D) thesaurus 35. Which key is used in combination with another key to perform a specific task? (A) Function (B) Control (C) Arrow (D) Space bar 36. A disk s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is (A) read-only (B) memory-only (C) run-only (D) write-only 37. In an information system, alphanumeric data normally takes the form of (A) Sentences and paragraphs (B) Numbers and alphabetical characters (C) Graphic shapes and figures (D) Human voice and other sounds 38. A Website s main page is called its (A) home page (B) browser page (C) search place (D) bookmark

39. When installing, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk. (A) programming software (B) system hardware (C) applications hardware (D) applications software 40. A collection of interrelated files in a computer is a (A) file manager (B) field (C) record (D) database 41. A computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users. (A) server (B) mainframe (C) desktop (D) tablet 42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as (A) a roller ball which moves the cursor (B) a pen-shaped device which allows data to be entered through the CRT screen (C) a figure which resembles a familiar office device (D) an outdated input device 43. Various applications and documents are represented on the Windows desktop by (A) Symbols (B) Labels (C) Graphs (D) Icons

44. What is usually used for displaying information at public places? (A) Monitors (B) Overhead Projections (C) Monitors and Overhead Projections (D) Touch Screen Kiosks 45. The real business and competitive value of information technology lies in (A) The software applications that are used by many companies (B) The capabilities of the software and value of the information a business acquires and uses (C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies (D) The capabilities of the hardware and the speed at which it processes information 46. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves? (A) Open source vendors (B) Alliances (C) Application service providers (D) All of the above 47. Which one of the following would be considered as a way that a computer virus can enter a computer system? (A) Opening an application previously installed on the computer (B) Borrowed copies of software (C) Viewing a website without causing any additional transactions (D) Running antivirus programs 48. Collecting personal information and effectively posing as another individual is known as the crime of (A) spooling (B) dentity theft (C) spoofing (D) hacking

49. The first step in the transaction processing cycle is (A) database operations (B) audit (C) data entry (D) user inquiry 50. In the information systems concept, the output function involves (A) Capturing and assembling elements that enter the system to be processed (B) Transformation processes that convert input into output (C) Transferring elements that have been produced by a transformation process to their ultimate destination (D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal