You are on page 1of 33

www.bankersguru.

org

1.
2.
3.
4.

5.

6.
7.
8.

9.
10.

11.

12.

13.

14.

15.

16.
17.

18.

____is the process of dividing the disk into tracks and sectors.
(1) Tracking
(2) Formatting
(3) Crashing
(4) Allotting
(5) Fragmentation
Help Menu is available at which button?
(1) End
(2) Start
(3) Turnoff
(4) Restart
(5) Reboot
Which ports connect special types of music instruments to sound cards?
(1)BUS
(2) CPU
(3) USB
(4) MAX
(5) MINI
You can _____, a search by providing more information the search engine can use to select a smaller, more
useful set of results.
(1) Refine
(2) Expand
(3) Load
(4) Query
(5) Slowdown
What is backup?
(1) Adding more components to your network
(2) Protecting data by copying it from the originally source to a different destination
(3) Filtering Old data from the new data
(4) Accessing data on tape
(5) All
What menu is selected to cut, copy and paste?
(1) File
(2) Tools
(3) Special
(4) Edit
(5) Styles
A _____is an electronic device that process data, converting it into information.
(1) Processor
(2) Computer
(3) Case
(4) Stylus
(5) Both 1 and 2
Application software ________.
(1) is used to control the operating system
(2) is designed to help programmers
(3) performs specific task for computer users
(4) is used for making design only
(5) All of the above
Which is the part of a computer that one can touch and feel?
(1) Hardware
(2) Software
(3) Programs
(4) Output
(5) Instructions
Which Of the following controls the manner of interaction between the user and the operating system?
(1) user interface
(2) language translator
(3) platform
(4) screen saver
(5) Loader
The dbase lll plus is mostly used for ______.
(1) Office automation
(2) Database management problems
(3) Scientific problems
(4) Calculation only
(5) Data flow diagram
The most common method of entering text and numerical data into a computer system is through the use of
a ________.
(1) keyboard
(2)Scanner
(3) printer
(4) Mouse
(5) Cursor
Use ______, When you want to make all letters capital without having to use the shift key for each
character.
(1) shifter
(2) upper case (3) caps lock key (4) icon
(5) alt key
What characteristic of read only memory (ROM) makes it useful?
(1) ROM information can be easily updated
(2) Data in ROM is nonvolatile, that is, it remains there even without electrical power
(3) ROM provides very large amounts of inexpensive data storage
(4) ROM chips arc easily swapped between different brands of computers
(5) Data in ROM is volatile, that is, it remains there even without electrical power
To make a notebook act as a desktop Model, the notebook can be connected to a _____which is connected
to a monitor and other devices.
(1) bay
(2) docking station (3) port
(4) network
(5) drive
What type of resource is most likely to be a shared common resource in a computer network?
(1) keyboards
(2) speakers
(3) floppy disk drives (4) printers (5) mouse
When your computer stops working suddenly. it is referred to as a ________.
(1) crash
(2) die
(3) death
(4) penalty
(5) fault tolerance
To make the number pad act as directional arrows, you press the _____ key.
(1) num lock
(2) caps lock
(3) arrow lock
(4) shift
(5) insert

www.bankersguru.org

19.

20.

21.
22.
23.
24.
25.
26.
27.
28
29.
30.

31.
32.

33.
34.
35.

36.

37.

_____also called the Web, contains billion of documents,


(1) World Wide web
(2) HTTP
(3) Web portal
(4) Domain
(5) URL
The desktop' of a computer refers to ________.
(1) The Visible Screen
(2) The area around the monitor
(3) The top of mouse pad
(4) The inside of a folder
(5) My documents
Which of the following position is not available for fonts on MS Word?
(1) Normal
(2) Raised
(3) Lowered
(4) Centered
(5) Both 1 and 2
What is the maximum scale percentage available in Scale drop down box?
(1) 500
(2) 200
(3)100
(4) 90
(5) 250
The communications device that allows the computer to access a network is called a ______ card.
(1) Modem
(2) Video
(3) Sound
(4) Network
(5) Interface
Bit is short for _______
(1) Binary system (2) Digital byte (3) Binary digit
(4) Binary Unit (5) Byte Digit
A computer cant boot if it does not have the ________
(1) Compiler
(2) Loader
(3) Operating System (4) MS office (5) Keyboard
Which type of RAM is normally the fastest?
(1)DRAM
(2)VRAM
(3)SRAM
(4)WRAM
(5)SDRAM
The System BIOS and ROM chips are called ____
(1) Software
(2) Firmware
(3) Hardware
(4) Bootware
(5) Motherboard
In a document what is the maximum number of columns that can be inserted in MS Word Table?
(1) 35
(2) 15
(3) 63
(4) 65
(5) 66
You can detect spelling and grammar errors by ________.
(1) Press Shift + F7 (2) Press Ctrl + F7(3) Press Alt+ F7 (4) Press F7
(5) Press F8
A screen element of MS Word that is usually located below the title bar that provides categorized options is
________.
(1) Menu mar
(2) Tool Bar
(3) Status Bar
(4) Formula Bar (5) Ruler Bar
Which type of memory cannot be erased and reprogrammed?
(1) EEPROM
(2) PROM
(3) Flash
(4) Cache memory(5) EPROM
Most of the inexpensive personal computer does not have any disk or diskette drive. What is the name of
such computes?
(1) Home computers
(2) Diskless computers (3) Dedicated computer
(4) General computer
(5) Driveless computer
Which of the following required large computer memory?
(1) Imaging
(2) Graphics
(3) Voice
(4) All of above (5) 1 and 2
A term associated with the comparison of processing speeds of different computer system is ______.
(1) EFTS
(2) MPG
(3) MIPS
(4) CFPS
(5) MICS
Transformation of input into output is performed by _______.
(1) Peripherals
(2) Memory
(3) Storage
(4) The input output unit
(5) The CPU
Which of the following best explains e-governance?
(1) Improving the functioning of government
(2) Teaching govt employees the basics of computing
(3) Delivery of public services through internet
(4) Framing of cyber-laws of chatting on internet
(5) Convergence of e-mail and video-conferencing
Smart Card is _________
(1) Special purpose Cards
(3) Processing unit contains memory for storing data
(4) Processing unit for software handling
(5) Identification Proof

www.bankersguru.org

38.

39.

40.

41.
42.
43.
44.

45.
46.
47.
48.

49.
50.
51.
52.
53.

54.
55.
56.
57.

A ____ is a flash memory storage device that plugs into a USB port.
(1) USB snap drive
(2) USB flash drive
(3) USB memory maker drive
(4) All
(5) None of these
An operating system version designed for use with a Media Center PC is Microsoft Windows XP ____.
(1) Home Edition
(2) Media Center Edition
(3) Tablet PC Edition
(4) Media fire
(5) All of the above
Which of the following does NOT occur during the power-on self-test (POST)?
(1) The Scandisk utility begins to run
(2) The video card and video memory are tested
(3) The BIOS identification process occurs
(4) Memory chips are checked to ensure they are working properly
(5) ALL
What are individual boxes in spreadsheets called?
(1) Rows
(2) Columns
(3) Grid
(4) Containers
(5) Cells
What year was Windows XP released?
(1) 1999
(2) 2001
(3) 2003
(4) 2005
(5) 1990
A device or system connected to a network is also called what?
(1) Branch
(2) Leaf
(3) Node
(4) Block
(5) Hop
What is the purpose of a file extension?
(1) It ensures each file has a unique filename.
(2) It makes the file visible to the user.
(3) It identifies the file type.
(4) It prevents the file from being overwritten.
(5) It ensures each file has a unique file number
Half of a byte is also called what?
(1) Bit
(2) Half-byte
(3) Quadra
(4) Nybble
(5) Binary
How is the number 100 represented in hexadecimal notation?
(1) 0x8
(2) 0x10
(3) 0x64
(4) 0x100
(5) 0x16
What company originally developed Flash?
(1) Microsoft
(2) Corel
(3) Symantec
(4) Macromedia
(5) Adobe
What do the I and O stand for in I/O?
(1) In / Out
(2) Inside / Outside
(3) Input / Output
(4) Instream / Outstream
(5) Inbound/ Outbound
How many megahertz are in one gigahertz?
(1) 100
(2) 1,000
(3) 1,000,000
(4) 1,000,000,000 (5) 100000
What company developed the Visual Basic programming language?
(1) Apple
(2) Microsoft
(3) IBM
(4) Borland
(5) Dell
Which two operations add new data to the clipboard?
(1) Copy and Paste (2) Cut and Paste
(3) Cut and Copy (4) Copy and Select All (5) Cut and Delete
Where is the smallest unit of data that can be accessed on a hard disk called?
(1) Bit
(2) Byte
(3) Partition
(4) Sector
(5) Clutter
A table is comprised of what two elements?
(1) Boxes and lines
(2) Rows and columns (3) Records and functions
(4) Charts and graphs
(5) Charts and text
Saving one or more copies of a file is also called what?
(1) Documenting (2) Uploading
(3) Exporting
(4) Filtering
(5) Importing
Which of the following units of measurement is the largest?
(1) Exbibyte
(2) Pebibyte
(3) Gibibyte
(4) Tebibyte
(5) Megabyte
What technology allows you to receive messages without checking your email?
(1) Push
(2) Pull
(3) Drive
(4) Sweep
(5) Inbox
A dot matrix printer is an example of what type of printer?
(1) Inkjet Printer
(2) Laser Printer
(3) Impact Printer (4) 3D Printer
(5) Non-Impact Printer

www.bankersguru.org

58.
59.

60.

61.
62.

63.
64.
65.
66.
67.

68.
69.

70.
71.

72.
73
74.

75.

What company develops the Windows operating system?


(1) Apple
(2) Microsoft
(3) Google
(4) Oracle
(5) Sony
What might Mbps be used to measure?
(1) Storage Capacity
(2) System Memory
(3) File Size
(4) Download Speed
(5) Both 1 and 4
Which memory card format is most widely used?
(1) Compact Flash (CF)
(2) Secure Digital (SD)
(3) Memory Stick
(4) Smart Media
(5) Memory Media
________ Printer is a non-impact printer and is quite in working.
(1) Inkjet
(2) Laser
(3) Thermal
(4) Dot matrix
(5) All
MAN stands for __________.
(1) Maximum Area Network
(2) Minimum Area Network
(3) Main Area Network
(4) Metropolitan Area Network
(5) Maintenance Area Network
Which of the following is a network topology
(1) LAN
(2) WAN
(3) MAN
(4) BUS
(5) All
Which of the following is a type of network
(1) Ring
(2) Bus
(3) Star
(4) PAN
(5) Mesh
VOIP stands for_________.
(1) Voice Over IP (2) Video Over IP
(3) Viruses Over IP (4) Virtual Over IP (5) Vertical Over IP
The first web browser is _______.
(1) Mosaic
(2) Netscape
(3) Internet explorer (4) WorldWideWeb (5) Chrome
Track and sector is associated with _________.
(1) Computer language
(2) Data storage on disk
(3) Artificial intelligence
(4) Display resolution
(5) Space in Random Access Memory
_______ are set of rules and procedures to control the data transmission over the internet.
(1) IP address
(2) Domains
(3) Protocol
(4) Gateway
(5)Topology
NOS stands for ________.
(1) Node operating system
(2) Non-open software
(3) Network Operating system
(4) Non-operating software
(5) Network Open Software
_____ are provided with operating systems to facilitate editing of text and data.
(1) MS Word
(2) Editors
(3) PowerPoint
(4) MS publisher
(5) MS Outlook
Which of the following is a part of the Central Processing Unit?
(1) Printer
(2) Key board
(3) Mouse
(4) Arithmetic & Logic unit
(5) Logic Unit
You organize files by storing them in _______.
(1) archives
(2) folders
(3) indexes
(4) lists
(5) document
What type of resource is most likely to be a shared common resource in a computer Network?
(1) Printers
(2) Speakers
(3) Floppy disk drives (4) Keyboards
(5) CD ROM
CAD stands for ________.
(1) Computer Aided Design
(2) Computer Algorithm for Design
(3) Computer Application in Design
(4) Computer Analogue Design
(5) Computer Analyses Design
What is a light pen?
(1) A Mechanical Input device
(2) Optical input device
(3) Electronic input device
(4) Optical output device
(5) Both optical and electronic output device

www.bankersguru.org

76.

77.

78.

79.
80.

81.
82.
83.
84.
85.
86.

87.
88.

89.
90.
91.
92.
93.

The SCANDISK program _______.


(1) is a disk analysis and repair tool
(2) scans disk and eliminate viruses
(3) scans disk and eliminate .BAK files
(4) scans disk and eliminate cache files
(5) all the above
Soft page breaks _______.
(1) are induced by the user
(2) are inserted by word automatically at the end of the page
(3) can be deleted
(4) are the one to show end of the paragraph
(5) are inserted by word automatically at the start of the page
What is a database?
(1) It is a collection of data arranged in rows
(2) It is a collection of data arranged in columns
(3) It is a collection of data arranged in rows and columns
(4) All of these
(5) None of these
What is the name of the blinking point that shows your position in the text?
(1) Blinker
(2) Cursor
(3) Causer
(4) Pointer
(5) Mouse
The term bandwidth refers to _________.
(1) How much data can be sent through a connection
(2) The amount of data in a multimedia file
(3) How fast your computer is
(4) How much e-mail can be sent through a connection
(5) How much video can be sent through a connection
While working on Microsoft Word, which among the following is the command for Undo?
(1) Cntrl +A
(2) Cntrl +Z
(3) Cntrl +Y
(4) Cntrl +C
(5) Cntrl+U
While browsing the internet, which of the following key is used for full screen view?
(1) F3
(2) F5
(3) F11
(4) F9
(5) F6
To see the document before the printout is taken, use___
(1) Insert Table
(2) Paste
(3) Cut
(4) Print Preview
(5) Print Layout
Which of the following device is a volatile storage?
(1) RAM
(2) Hard Disc
(3) Magnetic Tape (4) Floppy Disc
(5) ROM
Another name for a pre-programmed formula in Excel is___
(1) range
(2) graph
(3) function
(4) cell
(5) Label
To move data from one part of the document to another, __________ is used.
(1) Cut and Paste
(2) Copy and Paste
(3) Copy and Undo
(4) Cut an Delete
(5) All
ALU works on the instructions and data held in the___
(1) Notebook
(2) I/O devices
(3) Registers
(4) Copy Pad
(5) D
The ALU performs ____ operations.
(1) Arithmetic and logical
(2) ASCII
(3) Logarithm-based
(4) Algorithm-based
(5) Algebric- based
Peripheral devices such as printers and plotters are considered to be____
(1) hardware
(2) software
(3) data
(4) information
(5) both 1 and 2
In a sequence of events that takes place in an instruction cycle, the first cycle is___
(1) Store cycle
(2) Execute cycle (3) Decode cycle
(4) Fetch cycle (5) Restore cycle
____ is the part of the computer that does the arithmetical calculations.
(1) OS
(2) ALU
(3) CPU
(4) Memory
(5) Control Unit
Which of the following is a secondary memory device?
(1) Keyboard
(2) Disk
(3) Mouse
(4) ALU
(5) RAM
Which of the following is not an example of hardware?
(1) word
(2) Printer
(3) Mouse
(4) Monitor
(5) Scanner

www.bankersguru.org

94.

95.
96.
97.

98.
99.

100.
101.

102.
103.

104.

105.
106.
107.
108.
109.
110.

Pick the wrong statement.


(1) Banks educational institutions & insurance companies use mainframe computers to store data about
their customers
(2) Desktop computers, laptops, personal digital assistant (PDA), tablets & smartphones are all types of
microcomputers.
(3) Minicomputers are used by small businesses & firms.
(4) Some super computers can span an entire building.
(5) Supercomputer are not as powerful as Mainframes.
Which of the following is not a storage medium?
(1) hard disk
(2) flash drive
(3) DVD
(4) Monitor
(5) Memory Card
Which of the following is not an input device?
(1) Joystick
(2) Touch Screen
(3) Optical Scanner (4) Headphone
(5) Bar Code Reader
Which of the following is not true about computer files?
(1) They are collections of data saved to a storage medium
(2) Every file has a filename.
(3) A file extension is established by the user to indicate the computer on which it was created
(4) All files contain data
(5) Files can be created in Word, Excel and PowerPoint.
The _____ enables you to simultaneously keep multiple Web pages open in one browser window.
(1) Tab box
(2) Pop-up helper
(3) Tab row
(4) Address bar
(5) Tab Column
What is the ultimate purpose of Defragmentation?
(1) Create More Free Space
(2) Make the PC faster
(3) Delete temporary files
(4) Reduce Power consumption
(5) Both 1 and 3
Which among the following has been standardized in the IEEE 802.3 specification?
(1) Bluetooth
(2) Ethernet
(3) WiMAX
(4) WLAN
(5) All of them
Ctrl + D is short cut used for ________.
(1) Open Dialogue Box
(2) Font Dialogue Box
(3) Save as Dialogue Box
(4) Save Dialogue Box
(5) Print Dialogue Box
What function displays row data in a column or column data in a row?
(1) Transpose
(2) Index
(3) Rows
(4) Hyperlinks
(5) Reverse
In terms of network what is meaning of SAP?
(1) Smart Access Point
(2) Service Access Point
(3) Service At Point
(4) Service Access Permission
(5) Service At Permission
What is GPS technology used for?
(1) Satellite Navigation
(2) Weather Forecasting
(3) Motion Detection
(4) Network Security
(5) All of the above
IDE (ATA) or SATA interface connect Mother Board with ______.
(1)
Processor (2) RAM
(3) Monitor
(4) USB
(5) Hard Disk
USB is a type of ________.
(1) Processor
(2) Port
(3) Monitor
(4) Program
(5) Media file
What menu is selected for printing?
(1) Edit
(2) Special
(3) File
(4) Tools
(5) Insert
The name a user assigns to file is called ________.
(1) File name
(2) Program
(3) Record
(4) Data
(5) Document
To access properties of an object, we use mouse to ____.
(1) Left Click
(2) Right Click
(3) Drag
(4) Drop
(5) Both 1 and 2
To access a Main Frame Computer Users normally use ______.
(1) Terminal
(2) PC
(3) Laptop
(4) Keyboard
(5) POS

www.bankersguru.org

111.
112.
113.
114.
115.

116.
117.
118.
119.
120.
121.

122.

123.
124.
125.
126.
127.
128.
129.
130.

131.

What verb describes inserting data from the clipboard?


(1) Add
(2) Copy
(3) Cut
(4) Paste
(5) Insert
What is the name of Apple's portable operating system?
(1) Android
(2) Ios
(3) iMac
(4) Mac OS X
(5) Apple
Firefox, Chrome, and Safari are all types of what software?
(1) Utilities
(2) Web Browsers (3) Image Editors (4) Video Players.(5) Web Server
Mainboard and logic board are alternative names for what computer component?
(1) CPU
(2) Video Card
(3) System Unit
(4) Motherboard
(5) Cabinet
What is dot pitch used to measure?
(1) The sharpness of a monitor's display
(2) The resolution of a printed document
(3) The megapixel count of a digital camera
(4) The shape of individual pixels on a screen
(5) All
Reload is a synonym for what command?
(1) Restart
(2) Reformat
(3) Refresh
(4) Retry
(5) Reimage
What type of storage device uses flash memory to store data?
(1) Hard Drive
(2) Tape Drive
(3) DVD
(4) SSD
(5) Magnetic Tape
Portable security keys and hardware adapters are sometimes called what?
(1) Keystones
(2) Dongles
(3) Tokens
(4) Bezels
(5) Firewall
RISC and CISC are types of what computer component?
(1) RAM
(2) Hard Drive
(3) Video Card
(4) Micro Processor
(5) Virus
Viruses, worms, and Trojan horses all fall under which category?
(1) Shareware
(2) Scareware
(3) Spyware
(4) Shapeware
(5) Malware
An Assembler is used to translate a program written in _______.
(1) Assembly Language
(2) High-Level language
(3) Machine Language
(4) Low-Level Language
(5) Object Oriented Language
HTTP Stands for ______
(1) Hyper Text Transfer Protocol
(2) Hyper Transfer Text Package
(3) Hyper Transfer Text Protocol
(4) Hyper Text Transfer Package
(5) Hyper Test Transmit Package
RAM is _____ type of storage device?
(1) Off-line
(2) Secondary
(3) Online
(4) Primary
(5) Non-volatile
Which is called as engine of the computer?
(1) Scanner
(2) Keyboard
(3) Monitor
(4) Processor
(5) Storage
A set of parallel wires that carries digital signals among a computers components is called a(n):
(1) Peripheral
(2) Port
(3) Bus
(4) Medium
(5) Component
Which of the following is the latest version of MS Word?
(1) Word 2000
(2) Word 2007
(3) Word 2010
(4) Word 2011
(5) Word 2010i
Changing the appearance of a document is called ________.
(1) Proofing
(2) Editing
(3) Formatting
(4) All of above
(5) None of these
In a document what is the maximum number of columns that can be inserted in MS Word Table?
(1) 35
(2) 15
(3) 63
(4) 65
(5) 66
You can detect spelling and grammar errors by _______.
(1) Press Shift + F7 (2) Press Ctrl + F7 (3) Press Alt+ F7 (4) Press F7
(5) Press F9
A screen element of MS Word that is usually located below the title bar that provides categorized options is
_______.
(1) Menu mar
(2) Tool Bar
(3) Status Bar
(4) All of the above (5) None of these
Ubuntu is an example of which kind of Source Model?
(1) Open Source
(2) Vertical Market Software
(3) Horizontal Market Software
(4) Shareware
(5) Close Source

www.bankersguru.org

132.

133.

134.

135.
136.
137.

138.
139.

140.
141
142
143
144
145

146
147
148
149

________ is a computer program that fills the screen with moving images or patterns when the
Computer is not in use.
(1) Wallpaper
(2) Computer Screen
(3) Screen Saver
(4) Desktop
(5) Start
Which of the following is a valid unit of measurement of Bandwidth?
(1) Data Per second
(2) Information Per second
(3) Bits Per second
(4) Hrtz per second
(5) Instruction per second
Which of the following is true about Intranet?
(1) It is a Private Network
(2) It is a Public Network
(3) It is a Network which can access illegally.
(4) Only 1 and 3
(5) It can be access by anyone
The process of loading an Operating System into main memory is called _______.
(1) Formatting
(2) Posting
(3) Booting
(4) Partitioning
(5) fragmentation
Line by line translation of a program is done by:
(1) Interpreter
(2) Translator
(3) Compiler
(4) All the above
(5) None of these
SQL is a _________.
(1) Programming Language
(2) Communication Language
(3) Low-level language
(4) Query Language
(5) Object Language
Network of Networks is known as __________.
(1) Intranet
(2) Internet
(3) Extranet
(4) VPN
(5) MAN
Which of the following is true about Java?
(1) It is an OOP language
(2) It is Platform Independent
(3) It provides more security
(4) It was designed by Sun Microsystems.
(5) All the above
The process of replacing software with a newer version is called __________.
(1) Upgrading
(2) Installing
(3) Updating
(4) Downloading
(5) Replacing
DSL speed typically lists the __________ speed.
(1) Transfer
(2) Download
(3) Upload
(4) Control
(5) Overflow
The name for the Windows version of the Internet API is ______.
(1) Winsock
(2) Sockets
(3) WinModem
(4) DirectX
(5) Winzip
Accessing the Internet in a very remote location is the job of a __________ connection.
(1) Dial-up
(2) Satellite
(3) Cable
(4) DSL
(5) Rural
Which of the following describes a wireless network you might install in your home?
(1) WLAN
(2) WWAN
(3) Cell
(4) Radio IP
(5) Home WAN
____ type of software is designed for users who want to customize the programs they use.
(1) Freeware
(2) Open-source software
(3) Shareware
(4) Macros
(5) Close-source
The __________ of software contains lists of commands and options.
(1) Menu bar
(2) Title bar
(3) Formula bar
(4) Tool bar
(5) Setting Bar
Changing an existing document is called __________ the document.
(1) Creating
(2) Modifying
(3) Adjusting
(4) Editing
(5) Changing
A __________ is a named set of characters that have the same characteristics.
(1) Type face
(2) Type style
(3) Font
(4) Pico
(5) Format
In a spreadsheet program the __________ contains related worksheets and documents.
(1) workbook
(2) column
(3) cell
(4) formula
(5) Excel

www.bankersguru.org

150

Off-line operation is the operation of devices without the control of ______.


(1) Memory
(2) CPU
(3) ALU
(4) Control unit
(5) RAM
151. A type of line printer that uses an embossed steel band to form the letters printed on the paper is
(1) Golf ball printer
(2) Dot-matrix printer
(3) Laser printer
(4) Band printer
(5) thermal Printer
152. A software used to convert source program instructions to object instruction is known as ______.
(1) Compiler
(2) Assembler
(3) Interpreter
(4) Language processor
(5) Object Translator
153. The IC chip, used in computers, is made of ________.
(1) Chromium
(2) Iron oxide
(3) Silica
(4) Silicon
(5) Zinc
154. The size of commonly used Floppy disk is ________.
(1) 4.5
(2) 3.5
(3) 3.25
(4) 5.5
(5) 2.5
155. Which of the following statement is wrong?
(1) Windows XP is an operating system
(2) Linux is owned and sold by Microsoft
(3) Photoshop is a graphical design tool by Adobe
(4) Linux is free and open source software
(5) Linux is an operating system
156. Operating system of a computer is ______.
(1) Enables the programmer to draw a flow chart
(2) Links a program with subroutine with references
(3) Provides a layer, user friendly interface
(4) Provides a layer, command interface
(5) Provides a layer, System friendly interface
157. The term Operating System means _________.
(1) A set of programs which control computer working
(2) The way a user operates the computer system
(3) Conversion of high level language to machine language
(4) The way computer operator works
(5) A set of programs which control computer networking
158. Which of the below is not an iPhone 4 feature
(1) 4G
(2) Front facing camera
(3) HD recording
(4) Multitasking
(5) All
159. What is SSL short for?
(1) Secure Socket LAN
(2) Software Security Layer
(3) Secure Software Layer
(4) Secure Socket Layer
(5) Secure System Layer
160. Which of the following device can store large amounts of data?
(1) Floppy Disk
`(2) Hard Disk
(3) CDROM
(4) Zip Disk
(5) Memory card
Q.161. The advantage of using a spreadsheet is:
(1) calculations can be done automatically.
(2) changing data automatically updates calculations
(3) more flexibility
(4) All of the above
(5) None of these
Q.162. Documentations should include
(1) Destination and users of the output data
(2) Source of input data
(3) Information on the purpose of the workbook
(4) All of the above
(5) None of these
Q.163. To edit the selected cell in MS Excel(1) Press F1
(2) Press F2
(3) Press F4
(4) Press F5
(5) None of these

www.bankersguru.org

Q.164.

Q.165.
Q.166.

Q.167.
Q.168.
Q.169.
Q.170.

Q.171.

Q.172.

Q.173.

Q.174.

Q.175.

You can convert existing Excel worksheet data and charts to HTML document by using the
(1) FTP Wizard
(2) Internet Assistant Wizard
(3) Intranet Wizard
(4) Import Wizard
(5) None of these
Which of the following is graphics solution for Word Processors?
(1) Clipart
(2) WordArt
(3) Drop Cap
(4) All of above (5) None of these
You can detect spelling and grammar errors by(1) Press Shift + F7
(2) Press Ctrl + F7
(3) Press Alt+ F7
(4) Press F7
(5) None of these
What is the shortcut key to indent the paragraph in MS Word?
(1) Ctrl + M
(2) Ctrl + P
(3) Shift + M
(4) Ctrl + I
(5) None of these
Which of the following storage media provides sequential access only ?
(1) Floppy disk
(2) Magnetic disk (3) Magnetic tape (4) Optical disk
(5) None of these
What is the storage area for e-mail messages called?
(1) A folder
(2) A directory
(3) A mailbox
(4) The hard disk (5) None of these
The set of parallel electrical conducting lines through which different components on the mother board of a
PC unit are linked together are called:
(1) Conductors
(2) Buses
(3) Slide Master (4) Consecutives (5) None of these
A PDAs memory contents remain intact when it is turned off because:
(1) A battery keeps current available for RAM
(2) The memory contents are synchronized with a desktop
(3) The memory contents are copied to flash cards
(4) The memory contents are stored in ROM
(5) None of these
A network of geographically distant computers and terminals is called a(1) Integrated Services Digital Network (ISDN)
(2) Metropolitan area network (MAN).
(3) Wide area network (WAN)
(4) Local area network (LAN)
(5) None of these
One byte represents:
(1) Eight characters
(2) Eight bits
(3) A single digit with two possible states
(4) A word
(5) None of these
Saving files in HTML format:
(1) Makes it possible for anyone to view the file in a Web browser
(2) Increases file conversion costs
(3) Decreases software compatibility
(4) All of the above
(5) None of these
Which of the following would NOT be performed with application software?
(1) Financial report sent to investors
(2) Hard disk cleanup
(3) Charts for a sales meeting presentation
(4) Customer list used for mailing invoices
(5) None of these

www.bankersguru.org

Q.176.

Q.177.

Q.178.
Q.179.

Q.180.
Q.181.

Q.182.

Q.183.

Q.184.

Q.185.
Q.186.
Q.187.

Q.188.

Which of the following statements is TRUE about the public switched telephone network (PSTN)?
(1) PSTN is a packet-switching network
(2) PSTN is comprised of a variety of physical media, including twisted pair and fiber optic
cable
(3) PSTN is exclusively a digital network system
(4) PSTN is only used for voice transmissions, while the Internet is used for data transmissions
(5) None of these
Which of the following best describes the difference between the Internet and the World Wide Web?
(1) The Internet is the collection of computers, while the World Wide Web is the wiring and
transmission protocols that connect them
(2) The Internet carries traffic for schools, government offices, and other public organizations,
while the World Wide Web carries commercial traffic
(3) The Internet consists of software programs such as e-mail and IRC, while the World Wide
Web is a collection of Web pages
(4) The Internet is the physical network of global computers, while the World Wide Web is
many hypertext documents distributed globally over many computers
(5) None of these
Which of the following runs on a users local computer and is used to request and display Web pages?
(1) FTP
(2) Web browser (3) Web server (4) HTML
(5) None of these
Which of the following computer types is most powerful?
(1) Professional workstation
(2) Internet appliance
(3) Desktop computer
(4)
Network computer (5) None of these
Which of the following is the most frequently used input device?
(1) Microphone (2) Scanner
(3) Touch screen (4) Mouse
(5) None of these
A modem is necessary if you want to(1) Add a scanner to your computer system
(2) Have voice mail added to your regular telephone service
(3) Connect to other computers or to the Internet using phone line, cable, or wireless connections.
(4) Display digital camera photographs on your computer screen
(5) None of these
MS Excel is a?
(1) Window based word processor package (2) Window based spreadsheet package
(3) DOS based spreadsheet package
(4) Window based accounting package
(5) None of these
What is the flow of data between countries commonly called?
(1) International information system (2) EDI
(3) Outsourcing
(4) Trans border data flow
(5) None of these
Which of the following is NOT a purpose of antivirus programs?
(1) Remove any identified viruses
(2) Copy the name of the virus and send it to Microsoft for inspection
(3) Notify a user if a virus is found
(4) Search for viruses
(5) None of these
<H1> is an example of _____.
(1) HTML
(2) GML
(3) SGML
(4) NSGML
(5) None of these
Which type of network requires HPNA adapters for communication between network nodes?
(1) Phone line
(2) Wireless
(3) Power line
(4) Ethernet
(5) None of these
To analyze vast quantities of scientific data and display underlying patterns, you would use a:
(1) Mainframe
(2) Server
(3) Supercomputer
(4) Minicomputer (5) None
these
The free, open-source operating system that is becoming popular is:
(1) Mac OS X
(2) Microsoft Windows XP
(3) UNIX
(4) Linux
(5) None of these

www.bankersguru.org

of

Q.189.
Q.190.

Q.191.

Q.192.

Q.193.

Q.194.

Q.195.
Q.196.

Q.197.

Q.199.
Q.199.
Q.200.
Q.201.

Q.202.

Q.203.

Q.204.

What term is used to describe software that monitors your online computer activities?
(1) Snooper ware (2) Spyware
(3) Tracker ware (4) Travel ware (5) None of these
Which of the following is a memory management technique that makes the random access memory appear
larger than it is?
(1) Byte mapping
(2) Preemptive multitasking
(3) Read-only memory
(4) Virtual memory
(5) None of these
The two major components of system software are:
(1) The operating system and system utilities
(2) Application software and system utilities
(3) Primary memory and storage
(4) The operating system and application software
(5) None of these
Which of the following may be necessary for you to do after you install new application software?
(1) Turn the computer power switch off and then back on
(2) Do a cold boot
(3) Press Shift + Alt + Del
(4) Do a warm boot
(5) None of these
The power-on self-test
(1) checks for upgrades to the application software
(2) verifies that the computer hardware is working properly
(3) is able to provide easy-to-follow on-screen instructions to correct hardware problems
(4) is conducted after the BIOS instructions are placed in memory
(5) None of these
Input, processing, output, and storage are collectively referred to as:
(1) The systems cycle
(2) The information processing cycle
(3) The system unit
(4) Communication
(5) None of these
Which of the following is NOT part of the motherboard?
(1) System clock (2) Connector
(3) CPU
(4) Chipset
(5) None of these
An example of a wireless medium that sends data through the air or space is:
(1) Fiber-optic cable.
(2) Coaxial cable.
(3) Twisted pair.
(4) Microwaves.
(5) None of these
To reverse the effect of your last action in word
(1) Use the cut command
(2) Use the Undo command
(3) Press the delete key
(4) Use the Redo command
(5) None of these
Information that comes from an external source and fed into computer software is called ................
(1) Output
(2) Input
(3) Throughput (4) Reports
(5) None of these
The basic unit of a worksheet into which you enter data in Excel is called a
(1) tab
(2) box
(3) range
(4) cell
(5) None of these
All of the following are examples of real security and privacy risks EXCEPT
(1) hackers
(2) viruses
(3) Spam
(4) identity theft
(5) None of these
Which of the following is not an example of hardware?
(1) Scanner
(2) Printer
(3) Monitor
(4) Mouse
(5) Interpreter
In Excel, this is a prerecorded formula that provides a shortcut for complex calculations.........
(1) Value
(2) Data Series
(3) Function
(4) Field
(5) None of these
The process of trading goods over the Internet is known as ..............
(1) e-selling and buying
(2) e-trading
(3) e-finance
(4) e-salesmanship
(5) e-commerce
A device that connects to a network without the use of cables is said to be
(1) distributed
(2) free
(3) centralized
(4) open source
(5) None of these

www.bankersguru.org

Q.205. Which of the following is a circuit that issue signals at regular intervals ?
(1) Circuit board
(2) Clock
(3) Circuit card
(4) Gates
(5) None of these
Q.206. A set of related programs are known as(1) File
(2) Arrays
(3) Package
(4) Subscripts
(5) None of these
Q.207. The 0 and 1 in the binary numbering system are called binary digits or ....
(1) bytes
(2) kilobytes
(3) decimal bytes (4) bits
(5) nibbles
Q.208. The 7-bit ASCII cod
e widely used----(1) For data communication work
(2) In IBM mainframe models
(3) For coding external memory
(4) In large machines produced by non-IBM vendors
(5) None of these
Q.209. A hard copy would be prepared on a------(1) Line printer
(2) Dot matrix printer
(3) Type writer terminal
(4) Plotter
(5) All of the above
Q.210. Which of the following animations cannot be done in PowerPoint?
(1) bullet list, revealed one bullet point at a time
(2) clip art - Fly in from the bottom
(3) table, revealed row by row
(4) chart, revealed by series
(5) None of these
Q.211. Several views are available in MS Front Page. Which one of the following is NOT a valid view ?
(1) Design View
(2) Folders View
(3) Navigation View
(4) Web Server View
(5) None of these
Q.212. One of the components of Central Processing Unit (CPU) of the computer that performs mathematical and
logical operations is ...
(1) ALU (arithmetic logical unit)
(2) Address register
(3) Analog
(4) All of the above
(5) None of these
Q.213. ......... is the key we use to run the selected command.
(1) Shift
(2) Tab
(3) Enter
(4) Ctrl
(5) None of these
Q.214. To name a constant, you use the _____________dialog box.
(1) Create names
(2) Define name
(3) Paste name
(4) Format cells
(5) None of these
Q.215. When you insert an Excel file into a Word document, the data are-----(1) Hyperlinked
(2) Placed in a word table
(3) Linked
(4) Embedded
(5) None of these
Q.216. A function inside another function is called a .. Function.
(1) Nested
(2) Round
(3) Sum
(4) Text
(5) None of these
Q.217.
Selects the entire row press(1) Shift + Space
(2) Shift + Ctrl
(3) Shift + Alt
(4) Space + Enter
(5) None of these

www.bankersguru.org

Q.218. In Assembly language....


(1) Mnemonics are used to code operations
(2) Alphanumeric symbols are used for addresses
(3) Language lies between high-level language and machine language
(4) All of the above
(5) None of these
Q.219. CPU capacity can be measured in------(1) BPS
(2) MIPS
(3) MHz
(4) MPI
(5) KHz
Q.220. Zipping a fie means------(1) Encrypting the message
(2) Compressing the message
(3) Transfer the message
(4) All of the above
(5) None of these
Q.221. A .......... shares hardware, software, and data among authorized users.
(1) network
(2) protocol
(3) hyperlink
(4) transmitter
(5) None of these
Q.222. To produce a high - quality graphics (hardcopy) in color, you would want to use a------(1) Virtual Printer
(2) Laser Printer
(3) Ink - jet Printer
(4) Plotter
(5) RGB Monitor
Q.223. When was the first Windows operating system launched?
(1) 1984
(2) 1985
(3) 1988
(4) 1989
(5) 1990
Q.224. Thesaurus tool in MS Word is used for------(1) Spelling suggestions
(2) Grammar options
(3) Synonyms and Antonyms words (4) All of the above
(5) None of these
Q.225. What is the smallest and largest font size available in Font Size tool on formatting toolbar?
(1) 8 and 72
(2) 8 and 64
(3) 12 and 72
(4) All of the above
(5) None of these
Q.226.
Aligns the selected text or line to justify the screen press(1) Ctrl + C
(2) Ctrl + I
(3) Ctrl + J
(4) Ctrl + K
(5) None of these
Q.227. Which of the following is different from other ?
(1) Internet
(2) Windows
(3) Unix
(4) Linux
(5) None of these
Q.228. When data changes in multiple lists and all lists are not updated, this causes--(1) data redundancy
(2) information overload
(3) duplicate data
(4) data inconsistency
(5) None of these
Q.229. Granting an outside organization access to internet web pages is often implemented using a(n)(1) extranet
(2) intranet
(3) internet
(4) hacker
(5) None of these
Q.230. Loading Operating System onto RAM is called(1) Printing
(2) Saving
(3) Booting
(4) Starting
(5) None of these

www.bankersguru.org

Q.231. The purpose of the primary key in a database is to :


(1) unlock the database
(2) provide a map of the data
(3) uniquely identify a record
(4) establish constraints on database operations
(5) None of these
Q.232. Using Windows Explorer, a plus (+) sign in front of a folder indicates
(1) an open folder.
(2) the folder contains subfolders.
(3) a text file.
(4) a graphics file
(5) None of these
Q.233. All of the following statements concerning windows are true EXCEPT
(1) windows are an example of a command-driven environment.
(2) windows can be resized and repositioned on the desktop.
(3) more than one window can be open at a time.
(4) toolbars and scrollbars are features of windows.
(5) None of these
Q.234. The memory resident portion of the operating system is called the
(1) Registry.
(2) API.
(3) CMOS.
(4) Kernel.
(5) None of these
Q.235. The basic input/output system (BIOS) is stored in:
(1) RAM
(2) ROM
(3) CPU
(4) Hard drive
(5) None of these
Q.236. Which of the following is not a tower?
(1) CPU
(2) Motherboard
(3) Peripheral
(4) All of the above
(5) None of these
Q.237. The horizontal and vertical lines on a worksheet are called
(1) cells
(2) sheets
(3) block lines
(4) gridlines
(5) None of these
Q.238. What is usually used for displaying information at public places ?
(1) Monitors
(2) Overhead Projections
(3) Monitors and Overhead Projections
(4) Touch Screen Kiosks
(5) None of these
Q.239. Which key is used in combination with another key to perform a specific task ?
(1) Function
(2) Control
(3) Arrow
(4) Space bar
(5) None of these
Q.240. Fax machine is an example of
(1) bar-code readers
(2) imaging systems
(3) scanning devices
(4) pen-based systems
(5) None of these
Q.241. Pick the odd one out:
(1) Interpreter
(2) Operating System
(3) Compiler
(4) Assembler
(5) None of these
Q.242. When a particular object or an image is copied, in which of the following places it is stored?
(1) Notice Board
(2) Interim Board
(3) Notepad
(4) Clipboard
(5) None of these
Q.243. The Term BIT is the short form for:
(1) Mega Byte
(2) Binary Language
(3) Binary Digit .
(4) Binary Number
(5) None of these

www.bankersguru.org

Q.244. Servers are computers that provide resources to other computers connected to a
(1) Network
(2) Super Computer
(3) Micro Computer
(4) Client
(5) None of these
Q.245. A bar which is seen at the bottom of the screen (usually) when the computer is turned on is known as:
(1) Address Bar
(2) Task Bar
(3) Windows Bar
(4) Line bar
(5) None of these
Q.246. Something which has easily understood instructions is said to be:
(1) User friendly
(2) Information
(3) Word Processing
(4) Icon
(5) None of these
Q.247. To save an existing file with a new name or to a new location, you should use the .....
command.
(1) Save
(2) Save and Replace
(3) Save as
(4) New file
(5) None of these
Q.248. Peripheral devices such as printers and monitors are considered to be:
(1) Hardware
(2) Software
(3) Data
(4) Information
(5) None of these
Q.249. In a database, ....... fields store numbers used to perform calculations.
(1) Next
(2) Key
(3) Alpha Numeric
(4) Numeric
(5) None of these
Q.250. Where is data saved permanently?
(1) RAM
(2) ROM
(3) CPU
(4) Printer
(5) None of these
Q.251. To change selected text to ALL CAPITAL LETTERS, click the change case button, and then click__
(1) UPPERCASE
(2) UPPER ALL
(3) CAPS LOCK
(4) LOCK UPPER
(5) LARGE SIZE
Q.252. A person who used his expertise to gain access to other peoples computers to get information illegally or do
damage is(1) Hacker
(2) Analyst
(3) Instant messenger
(4) Programmer
(5) Spammer
Q.253. A device that connects to a network without the use of cables is said to be__________
(1) Distributed
(2) Free
(3) Centralized
(4) Open source (5) None of these
Q.254. Reusable optical storage will typically have the acronym
(1) CD
(2) DVD
(3) ROM
(4) RW
(5) None of these
Q.255. The most common type of storage devices are___________
(1) Persistence
(2) Optical
(3) Magnetic
(4) Flash
(5) None of these
Q.256. Codes consisting of lines of varying widths or lengths that are computer readable are known as_______
(1) an ASCII Code
(2) a magnetic type
(3) an OCR scanner
(4) a bar code
(5) None of these
Q.257. A website's main page is called it's__________
(1) Home page
(2) Browser page (3) Search page (4) Index page
(5) None of these
Q.258. Part number, part description ,and number of parts ordered are examples of_______
(1) control
(2) output
(3) processing
(4) feedback
(5) input
Q.259. To access properties of an object, the mouse technique to use is __________
(1) dragging
(2) dropping
(3) right-clicking (4) shift-clicking (5) None of these
Q.260. Computers used the__________ number systems to store data and perform calculations
(1) binary
(2) octal
(3) decimal
(4) hexadecimal (5) None of these
Q.261. Which of the following functions are not performed by servers ?
(1) Email processing
(2) Database sharing
(3) Processing Web sites
(4) Storage
(5) Word processing

www.bankersguru.org

Q.262. Why is it unethical to share copyrighted files with your friends?


(1) It is not unethical, because it is legal
(2) It is unethical because the files are being given for free
(3) Sharing copyrighted files without permission breaks copyrights laws.
(4) It is not unethical because the files are being given for free
(5) It is not unethical- because anyone can access a computer
Q.263. Which media have the ability to have data/information stored (written) on them by users more than once ?
(1) CD-R disks
(2) CD-RW disks
(3) Zip disks
(4) Optical Disks
(5) Both CD-RW disks and Zip disks
Q.264. The process of transferring files from a computer on the Internet to your computer is called_______.
(1) Downloading (2) Uploading
(3) FTP
(4) JPEG
(5) Downsizing
Q.265. Thecontrols a client computer's resources.
(1) application program
(2) instruction set
(3) operating system
(4) server application
(5) compiler
Q.266. To reload a web page, press the button.
(1) Redo
(2) Reload
(3) Restore
(4) Ctrl
(5) Refresh
Q.267. Which of the following could be digital input devices for computers ?
(1) Digital camcorder
(2) Microphone
(3) Scanner
(4) All of the above
(5) None of these
Q.268. Theenables you to simultaneously keep multiple web pages open in one browser window.
(1) Tab box
(2) Pop-up helper (3) Tab row
(4) Address bar (5) Esc key
Q.269. You can use thebar to type a URL and display a Web page, or type a keyword to display a list of related
Web pages.
(1) menu
(2) title
(3) search
(4) web
(5) address
Q.270. Storage media such as a CD read and write information using(1) A laser beam of red light
(2) Magnetic dots
(3) Magnetic strips
(4) All of these
(5) None of these
Q.271. Vendor-created program modifications are called(1) Patches
(2) Antiviruses
(3) Holes
(4) Fixes
(5) Overlaps
Q.272. Cache and main memory will lose their contents when the power is off. They are(1) dynamic
(2) static
(3) volatile
(4) non-volatile
(5) faulty
Q.273. The collection of links throughout the Internet creates an interconnected network called the(1) WWW
(2) Server
(3) World Wide Web
(4) 1 and 3
(5) Wide Area Web
Q.274. The basic unit of a work sheet into which you enter data in excel is called a ______________
(1) Tab
(2) Cell
(3) Box
(4) Range
(5) None of these
Q.275. To move the previous work sheet, we press:
(1) Alt + PgUp
(2) Ctrl + PgUp
(3) Ctrl + PgDn
(4) Shift + Tab
(5) None of these
Q.276. If you press ____, the cell accepts your typing as its contents.
(1) Enter
(2) Ctrl + Enter
(3) Tab
(4) Insert
(5) None of these
Q.277.
Which of the following displays buttons for changing text style, alignment and size?
(1) Standard tool bar
(2) Status bar
(3) Drawing tool bar
(4) Formulating tool bar
(5) None of these
Q.278.
All formula in Excel starts with__.
(1) %
(2) +
(3) =
(4) &
(5) None of these
Q.279. Find the correct set of three types of data found on a spreadsheet.
(1) Data, words, numbers
(2) Equation, data, numbers
(3) Words, numbers, labels
(4) Number, formulas, labels
(5) None of these
Q.280. This component is required to process data into information and consists of integrated circuits(1) Hard disk
(2) RAM
(3) CPU
(4) ROM
(5) None of these

www.bankersguru.org

Q.281. One advantage of Dial-up Internet access is


(1) It utilizes broadband technology (2) It utilizes existing telephone service
(3) It uses a router for security
(4) Modem speed is very fast
(5) None of these
Q.282. What is Back Up ?
(1) Adding more components to your network
(2) Protecting data by copying it from the original source to a different destination
(3) Filtering old data from the new data
(4) Accessing data on Tape
(5) None of these
Q.283. To add two cells (A1 and A2) together you use which of the following formulas?
(1) = A1+ A2
(2) = Add (A1 + A2)
(3) = together (A1:A2)
(4) A1 + A2
(5) None of these
Q.284. Network components are connected to the same cable in the -------------- Topology.
(1) Star
(2) Ring
(3) Bus
(4) Mesh
(5) Mixed
Q.285.If text was highlighted and 'Edit' 'Copy' was clicked, what would happen ?
(1) Text would be copied from the document and placed in the clipboard
(2) Text would be removed from the document and placed in the clipboard
(3) Text from the clipboard would be placed in the document at the place where the cursor is blinking
(4) 2 and 3
(5) None of these
Q.286. You can start Microsoft Word by using button.
(1) New
(2) Enter
(3) Program
(4) Control Panel (5) None of these
Q.287. You click at B to make the text(1) Italics
(2) Underlined
(3) Italics and Underlined
(4) Bold
(5) None of these
Q.288. Thebecomes different shapes depending on the task you are performing.
(1) Active tab
(2) Insertion point (3) Mouse pointer (4) Ribbon
(5) None of these
Q.289. The primary purpose of an operating system is....
(1) To make the most efficient use of the computer hardware
(2) To allow people to use the computer
(3) To keep systems programmers employed
(4) To make computers easier to use
(5) None of these
Q.290. WIMAX is related to which one of the following?
(1) Biotechnology
(2) Space technology
(3) Missile technology
(4) Telecommunication technology
(5) None of these
Q.291. Which company is likely to expand Quick office in competition with Microsoft?
(1) Google
(2) Yahoo
(3) Intel
(4) Apple
(5) None of these
Q.292. What is Fanala?
(1) A virus
(2) A social networking site for kids
(3) An antivirus
(4) A software
(5) None of these
Q.293. Which company punched the eco-friendly computers?
(1) I-JEN
(2) Google
(3) Apple
(4) Microsoft
(5) Samsung
Q.294. Which search engine is preparing a computer in which a hard disk is not required to store the data?
(1) Google
(2) Yahoo
(3) AltaVista
(4) Mozilla
(5) None of these
Q.295. What is Windows Azure Platform?
(1) A Google cloud computing platform
(2) An Intel cloud computing platform
(3) A Microsoft cloud computing platform
(4) A Yahoo cloud computing platform
(5) None of these

www.bankersguru.org

Q.296. What is CCMP?


(1) Encryption protocol
(2) A network connection
(3) 1 and 2
(4) Software
(5) None of these
Q.297. What is the full form of OSA?
(1) Open system Author
(2) Ordinary system Authentication
(3) Open system Authorisation
(4) Open system Authentication
(5) None of these
Q.298. What is Goggle Application Engine?
(1) A Platform as a Service (Paas) (2) A Service as a Service (SaaS)
(3) A Service as a Platform
(4) 1 and 2
(5) None of these
Q.299. What is i Message?
(1) Free service from Nokia
(2) Free service from Microsoft
(3) Free service from Intel
(4) Free service from Apple
(5) None of these
Q.300. The simultaneous processing of two or more programs by multiple processors is(1) Multiprogramming
(2) Multitasking
(3) Time-sharing
(4) Multiprocessing
`(5) None of these
Q.301. Cookies are:
(1) destructive programs embedded in e-mail attachments or downloaded programs.
(2) small files recording personal information about a consumers browsing habits.
(3) programs that monitor the trail of Web sites visited by a consumer.
(4) advertisements that pop up unannounced on a computer system.
(5) 1 and 3
Q.302. This ......... tier processes HTTP protocol, scripting tasks, performs calculations, and provides
access to data.
(1) Client
(2) Applications/Web server
(3) Enterprise server
(4) DBA
(5)None of these
Q.303. What is another name for software that is free to use and distribute?
(1) Shareware
(2) Adware
(3) Commercial Software
(4) Freeware
(5) None of these
Q.304. What is meant by computer literacy?
(1) ability to write computer programs
(2) knowing what a computer can and cannot do
(3) knowing computer related vocabulary
(4) ability to assemble computers
(5) None of these
Q.305. The principle advantage of the centralized approach to organizing a computer facility is:
(1) Cost-effectiveness
(2) Processing activities are easier to coordinate
(3) Processing activities are easier to control
(4) Processing statements can be enforced
(5) All of the above.
Q.306. A ____________ is a unique identification number generated by a computer hardware component
or a program.
(1) GUID
(2).NET Passport (3) private key
(4) cookie
(5) None of these
Q.307. Which is considered a direct entry input device?
(1) Optical scanner (2) Mouse
(3) Light pen
(4) Digitizer
(5) All of the above.
Q.308. Syntax errors and logical errors are collectively known as ___________.
(1) faults
(2) bugs
(3) infections
(4) slipups
(5) None of these
Q.309. Information hiding is also known as ___________.
(1) cloaking
(2) encapsulation (3) integration
(4) concealment (5) All of the above
Q.310. Which programming language is used widely to quickly create Windows applications?
(1) Smalltalk
(2) Fortran
(3) Visual Basic
(4) COBOL
(5) 1 and 3

www.bankersguru.org

Q.311.

A polymorphic virus:
modifies its program code each time it attaches itself to another program or file
is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until
no memory or disk space remains
(3) a malicious logic program that hides within or looks like a legitimate program
(4) infects a program file, but still reports the size and creation date of the original, uninfected
program
(5) None of these
Which of the following button will allow you to add, delete, or change records in your Data Source?
(1) Data Source button
(2) Edit button
(3) Edit Data Source button
(4) Data editing button
(5) None of these
To autofit the width of column
(1) Double click the right border of column
(2) Double click the left border of column
(3) Double click the column header
(4) All of the above
(5) None of these
The Secure Electronic Transaction (SET) specification :
(1) is a notice, issued and verified by a certificate authority, that guarantees a user or Website is legitimate
(2) provides private key encryption of all data that passes between a client and a server
(3) allows users to choose an encryption scheme for the data that passes between a client and a server
(4) uses a public key encryption to secure credit-card transaction systems
(5) None of these
......... allows wireless mobile devices to access the Internet and its services such as the Web and e-mail:
(1)TCP/IP
(2)Ethernet
(3) WAP
(4)Token ring (5) None of these
DOS floppy disk does not have:
(1) A Boot Record
(2) A File Allocation Table
(3) A Root Directory
(4) Virtual Memory
(5) BIOS
All macro keyboard shortcuts include the .. key
(1) Alt
(2) Ctrl
(3) F11
(4) Shift
(5) None of the above
A passive threat to computer security is:
(1) Malicious Intent
(2) Sabotage
(3) Accident Errors
(4) Espionage Agents
(5) None of these
All of the following are basic principles of net works, except:
(1) each computer must have a network card
(2) there must be communications media connecting the network hardware devices
(3) there must be at least one connecting device
(4) each computer must have software that supports the movement of information
(5) None of these
You can add a hyperlink to your worksheet by pressing
(1) Alt + K
(2) Ctrl + H
(3) Ctrl + K
(4) Ctrl + Shift + K
(5) None of the above
MICR technology used for clearance of cheques by banks refers to:
(1) Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition
(5) None of these
To select several cells or ranges that are not touching each other, you would _____ while selecting
(1) hold down the Ctrl key
(2) hold down the Shift key
(3) hold down the Alt key
(4) hold down Ctrl + Shift key
(5) None of the above
All the information collected during database development is stored in a:
(1) Repository
(2) Data warehouse (3) RAD
(4) CASE
(5) None of these
The ... component is used by the data analyst to create the queries that access the database.
(1) Data extraction
(2) End-user query tool
(3) End-user presentation tool
(4) Data store
(5)None of these
(1)
(2)

Q.312.

Q.313.

Q.314.

Q.315.
Q.316.

Q.317.

Q.318.

Q.319.

Q.320.
Q.321.

Q.322.

Q.323.
Q.324.

www.bankersguru.org

Q.325. Which is not an advantage of using computerized spreadsheets?


(1) flexibility of moving entries
(2) speed of calculation
(3) ability of generate tables
(4) cost of initial setup
(5) None of the above
Q.326.
A ......... allows network users to share a single copy of software, which resides on the network
server.
(1) single user license agreement
(2) network site license
(3) end user license agreement
(4) business software license
(5) None of these
Q.327. To open the Format Cells dialog box, press
(1) Alt + 1
(2) Ctrl + 1
(3) Ctrl + Shift + 1 (4) F1
(5) None of the above
Q.328.

Q.329.

Q.330.

Q.331.
Q.332.

Q.333.

Q.334.

Q.335.

Q.336.
Q.337.
Q.338.

Q.339.

A communication processor that connects dissimilar networks by providing the translation from one set
of protocol to another is:
(1) Bridge
(2) Gateway
(3) Router
(4) Modem
(5) All of the above
How is power supplied to a low power USB device?
(1) Through a power cable
(2) From an external power supply
(3) Directly from the computers power supply
(4) Through the USB cable
(5) None of these
RSA is:
(1) Symmetric Cryptosystem
(2) Asymmetric Cryptosystem
(3) Block Cypher
(4) Digital Signature
(5) None of these
A DVD-RAM is similar to a ......... except it has storage capacities up to 5.2 GB.
(1) CD-R
(2) floppy disk
(3) CD-RW
(4) hard disk
(5) None of these
Which of the following is a general-purpose programming language, designed by Sun Microsystems,
and well suited for use on the Web?
(1) VB Script
(2) Java Script
(3) CSS
(4) Java
(5) None of these
What is the purpose of providing a Drafts folder in an email system?
(1) to save unsent emails
(2) to store spam emails
(3) to save a copy of sent emails
(4) to store deleted emails
(5) None of these
Voice mail
(1) is the exchange of text messages and computer files transmitted via a communications
network such as a local area network or the Internet
(2) functions much like an answering machine, allowing callers to leave a voice message for the
called party
(3) involves using video and computer technology to conduct a meeting between participants at
geographically separate locations
(4) permits users to converse in real time with each other via the computer while connected to
the Internet
(5) None of these
Which of the following identifies a specific web page and its computer on the Web?
(1) Web site
(2) Web site address
(3) URL
(4) Domain Name
(5) None of these
For sound recording, what is necessary?
(1) Speaker
(2) Microphone
(3) Talker
(4) Mouse
(5) Telephone
Which port doesnt exist in computer?
(1) Computer port (2) USB port
(3) Printer port
(4) Parallel port (5) None of these
What are the two parts of an E-mail address?
(1) User name and street address
(2) Legal name and phone number
(3) User name and domain name
(4) Initials and password.
(5) Username and recepient
Workgroup means
(1) Individual computer
(2) Individual user
(3) Computers in network
(4) All of the above
(5) None of the above

www.bankersguru.org

Q.340. The type of software that can, store, update, manipulate, and retrieve data is called
(1) database management
(2) spreadsheet
(3) desktop publishing
(4) graphics
(5) none of these
Q.341. Which of the following is not available on the Ruler of MS Word screen?
(1) Tab stop box
(2) Left Indent
(3) Right Indent
(4) Center Indent
(5) All of them are available on ruler
Q.342. Which file starts MS Word?
(1) winword.exe (2) word.exe
(3) msword.exe
(4) word2003.exe
(5) None of these
Q.343. How many ways you can save a document?
(1) 3
(2) 4
(3) 5
(4) 6
(5) None of these
Q.344. What is the full form of FAT?
(1) File Accomodation Table
(2) File Access Tape
(3) File Allocation Table
(4) File Activity Table
(5) None of these
Q.345. A proxy server is used as the computer.
(1) With external access
(2) Acting as a backup
(3) Performing file handling
(4) Access user permissions
(5) None of these
Q.346. A reusable set of commands or steps saved by a user is called a:
(1) function
(2) template
(3) macro
(4) relative reference
(5) None of these
Q.347. What is place to the left of horizontal scroll bar ?
(1) Tab stop buttons
(2) View buttons
(3) Split buttons
(4) Indicators
(5) None of above
Q.348. Types of charts that can be created in a MS-Excel include all EXCEPT a ____________ chart.
(1) pie
(2) scatter
(3) block
(4) bar
(5) None of these
Q.349. Pixels are:
(1) dots on the screen arranged in rows.
(2) dots of ink from an inkjet printer.
(3) points of light used by a cordless, wireless, optical mouse.
(4) points on the end of PDA handheld devices
(5) None of these
Q.350. The density of pixels on a screen is known as:
(1) screen clarity (2) pixility
(3) pixel depth
(4) resolution
(5) None of these
Q.351. Which command allows you to reduce fragments of file and optimize the performance of disk?
(1) Scandisk
(2) Defrag
(3) Chkdsk
(4) Diskcomp (5) None of these
Q.352. What type of telecommunications hardware allows you to access the web?
(1) Browser
(2) IRC
(3)FTP protocol
(4)Modem
(5)None of these
Q.353. Information travels between components on the mother board through(1) buses
(2) cmos
(3) Peripherals
(4) flash memory
(5) None of these
Q.354. What is the process of copying software programs from secondary storage media to the hard disk called?
(1) Download
(2) Configuration (3) Storage
(4) Upload
(5) Installation
Q.355. The code for a Web page is written using _____
(1) HTML
(2) Winzip
(3) URL
(4) A Fifth Generation Language
(5) C++
Q.356. Office LANs that are spread geographically apart on a large scale can be connected using a corporate _____
(1) TAN
(2) CAN
(3) WAN
(4) LAN
(5) DAN
Q.357. In a relational database, this is a data structure that organizes the information about a single topic into rows
and columns.
(1) tuple
(2) record
(3) table
(4) block
(5) None of these
Q.358. When we run a program in HTML coding _____ is used as backend and ____ works as front-end.
(1) Notepad - Msn-messenger
(2) Notepad - Internet-Explorer
(3) MS-Word - Internet Explorer
(4) Both (1) and (2)
(5) None of these
Q.359. Network components are connected to the same cable in the _____ topology.
(1) Mesh
(2) Mixed
(3) Star
(4) Bus
(5) Ring

www.bankersguru.org

Q.360. How can you print three copies of a workbook?


(1) Select File>Properties form the menu and type 3 in the Copies to print text box.
(2) Select File >Print from the menu and type 3 in the Number of copies text box.
(3) Click the Print button on the standard toolbar to print the document
(4) Press Ctrl+P+3
(5) None of these
Q.361. Two or more computers connected to each other of sharing information form a _____
(1) Server
(2) Network
(3) Tunnel
(4) Pipeline
(5) Router
Q.362. _____is the process of finding errors in software code.
(1) testing
(2) running
(3) compiling
(4) debugging (5) Formating
Q.363. How can the user determine what programs are available on a computer?
(1) Viewing the installed programs during the booting process
(2) Checking the existing files saved on the disk
(3) Checking the hard disk properties
(4) Checking the operating system for a list of installed programs
(5) None ofthese
Q.364. A computer checks the _____ of user names and passwords for a match before granting access.
(1) Backup Files (2) Network
(3) Database
(4) Website
(5) None of these
Q.365. Which process checks to ensure the components of the computer and operating are connected properly?
(1) booting
(2) editing
(3) processing
(4) saving
(5) None of these
Q.366. What is the term for unsolicited e-mail?
(1) News Group (2) Spam
(3) Usenet
(4) Flamming (5) Backbone
Q.367. Small application programs that run on a web page and may ensure a form is completed properly or provide
animation are known as _____
(1) Sparks
(2) Spiders
(3) Cookies
(4) Flash
(5) Applets
Q.368. The ___converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
(1) Modem
(2) Router
(3) Gateway
(4) Bridge
(5) All of these
Q.369. Before a package can be used in a java program, it must be___.
(1) executed
(2) referenced
(3) imported
(4) declared
(5) None of these
Q.370. A comment line, that is, a line will not be executed as an instruction___.
(1) begin the line with a # sign
(2) begin the line with double slashes (/ /)
(3) begin and end the line with double hyphens (-_-)
(4) indent the line
(5) None of these
Q.371. Programming language built into user programs such as Word and Excel are known as____
(1) 4GLs
(2) Macro languages
(3) Object-oriented languages
(4) Visual programming languages
(5) None of these
Q.372. Firewalls are used to protect against___.
(1) Unauthorized Attacks
(2) Virus Attacks (3) Data Driven Attacks
(4) Fire Attacks
(5) All of these
Q.373. Which number system is commonly used as a shortcut notation for groups of four binary digits?
(1) Binary
(2) Decimal
(3) Octal
(4) Hexadecimal (5) None of these
Q.374. IEEE Stands for the _____.
(1) Elementary and Electronics Engineers
(2) Electrical and Electronics Engineers
(3) Electrical and Electronics Engine (4) Electrical and Energy Engineers
(5) None of these
Q.375. FLOPS Stands for____
(1) Floating Point Operations Per Second
(2) Fixed Point Operation Per Second
(3) Floating Print Operations Per Second
(4) Floating Print Operations Per Second
(5) None of these
Q.376. The minimum number of rows and columns in MS Word document is
(1) 1 and 1
(2) 2 and 1
(3) 2 and 2
(4) 0 and 1
(5) None of these

www.bankersguru.org

Q.377. Thesaurus tool in MS Word is used for


(1) Spelling suggestions
(2) Grammar options
(3) Synonyms and Antonyms words (4) All of above
(5) None of these
Q.378. Why Drop Caps are used in document?
(1) To drop all the capital letters
(2) To automatically begin each paragraph with capital letter
(3) To begin a paragraph with a large dropped initial capital letter
(4) To begin a paragraph with a large dropped initial small letter
(5) None of above
Q.379. A bookmark is an item or location in document that you identify as a name for future reference. Which of the
following task is accomplished by using bookmarks?
(1) To add anchors in web page
(2) To mark the ending of a paragraph of document
(3) To quickly jump to specific location in document
(4) To add hyperlinks in webpage
(5)None of these
Q.380. A word processor would most likely be used to do
(1) Keep an account of money spent
(2) Do a computer search in media center
(3) Maintain an inventory
(4) Type a biography
(5) None of these
Q.381. Which of the following is not a transmission medium?
(1) telephone lines
(2) coaxial cables
(3) modem
(4) microwave systems
(5) None of these
Q.382. Which of the following is an advantage to using fiber optics data transmission?
(1) resistance to data theft
(2) fast data transmission rate
(3) low noise level
(4) all of above
(5) None of these
Q.383. Which of the following is required to communicate between two computers?
(1) communications software
(2) protocol
(3) communication hardware
(4) all of above including access to transmission medium
(5) None of these
Q.384. In word-processing the task of changing the appearance of a document is:
(1) Inserting
(2) Formatting
(3) Editing
(4) Proofing
(5) None of these
Q.385. In MS-Word, you can insert the hyperlink:
(1) Pressing ctrl+k or by choosing hyperlink from format menu
(2) Pressing ctrl+k or by choosing hyperlink form insert menu
(3) Pressing ctrl+shift+k or by choosing hyperlink insert menu
(4) Pressing ctrl+k or choosing hyperlink from format menu
(5) None of these
Q.386. C is a general-purpose, procedural, imperative computer programming language developed in 1972 by
at the Bell Telephone Laboratories
(1) Dennis Ritchie (2) James Gosling (3) John Backus (4) All
(5) None of these
Q.387. The older version of VB was derived heavily from language.
(1) BASIC
(2) Visual Basic .NET.
(3) SQL
(4) All
(5) None of these
Q.388. Computer programming (often shortened to programming or coding) is the process of writing, testing, and
maintaining the of computer programs.
(1) Source Code (2) Object code
(3) Compile code (4) Machine code
(5) None of these
Q.389. ___________ is a technique of temporarily removing inactive programs from the memory of computer system.
(1) Swapping
(2) Spooling
(3) Semaphore
(4) Scheduler (5) None of these
Q.390. What is software add ons?
(1) ActiveX controls
(2) OLE framework (3) Web Page (4) All (5) None of these

www.bankersguru.org

Q.391. Cross platform refer to.


(1) Hardware
(2) Software
(3) Operating System
(4) All
(5) None of these
Q.392. Photoshop and Word are considered to be applications.
(1) Cross platform
(2) graphics editing program
(3) word processor
(4) System Software
(5) None of these
Q.393. MANET Stands for
(1) Mobile Ad Hoc Network.
(2) Mobile Add Hoc Networking.
(3) Moblisation Ad Hoch Network. (4) Mobiling Ad Hoc interNetwork.
(5) All
Q.394. In a 10BaseT Ethernet connection, data transfer speeds can reach through a copper cable.
(1) 10 mbps (megabits per second)
(2) 100MBPS(megabyte per second)
(3) 10 MBPS ( megabyte per second)
(4) All
(5) None of these
Q.395. Quad-Core consists of.
(1) 2
(2) 3
(3) 6
(4) 8
(5) None of these
Q.396.
Example of quad-core CPUs is/are ?
(1) Intel Core 2 Quad,
(2) Intel Nehalem,
(3) AMD Phenom X4 processors.
(4) All
(5) None of these.
Q.397. From the given below options, one is not related to the same group, find the different one?
(1)DOS
(2) window
(3)Unix
(4)MS-word
(5)None of the above
Q.398. When the computer is turned off, all the data in main memory disappears data. Storage method of this type
is called
(1) non-volatile
(2) volatile
(3) cache
(4) temporary (5)none of the above
Q.399. Number written with just 0 and 1 are called _________numbers.
(1) binary
(2) digital
(3) logical
(4) general numbers
(5) None of these
Q.400.
____________is the amount of the data CPU can transmit at a time to main memory and to input and
output devices?
(1) bus width
(2) data width
(3) memory width (4) All
(5)None of these
Q.401. EDVAC stands for_______
(1) Electronic Discrete Variable Automatic Computer
(2) Electronic Discrete Value Automatic Computer
(3) Electronic Device Variable Automatic Computer
(4) Electronic Discrete Variable Advanced Computer
(5) None of these
Q.402. When a file is saved for the first time-_______
(1) a copy is automatically printed
(2) it must be given a name to identify it
(3) it does not need a name
(4) it only needs a name if it is not going to be printed
(5) None of these
Q.403. The computers which are relatively rare because of their cost and size are:
(1) Mini Computers
(2) Micro Computers
(3) Super Computers
(4) Laptops
(5) Mainframe Computer
Q.404. A mistake in an algorithm that causes incorrect results is called a .......
(1) Logical error
(2) Syntax error
(3) Machine Error
(4) Compiler error
(5) None of these
Q.405. A(n) .... program is one that is ready to run and does not need to be altered in any way.
(1) Interpreter
(2) High-level
(3) Compiler
(4) COBOL
(5) Executable
Q.406. A set of step-by-step procedures for accomplishing a task is known as a(n)
(1) algorithm
(2) hardware program
(3) software bug
(4) firmware program
(5) None of these

www.bankersguru.org

Q.407. The main directory of a disk is called thedirectory.


(1) root
(2) sub
(3) folder
(4) network
(5) None of these
Q.408. Ais a collection of data that is stored electronically as a series of records in a table.
(1) spreadsheet
(2) presentation
(3) database
(4) web page
(5) None of these
Q.409. When you create documents, graphs and pictures your computer holds the data in
(1) Restore file
(2) Backup drive (3) Clip board
(4) Memory
(5) None of these
Q.410. All are included in removable media except the
(1) CD-ROMs
(2) Diskette
(3) DVDs
(4) Hard disk drive
(5) None of these
Q.411. processing is used when a large mail-order company accumulates orders and processes them together
in one large set.
(1) Batch
(2) Online
(3) Real-time
(4) Group
(5) None of these
Q.412. Computer programs are written in a high-level programming language; however, the human readable version
of a program is called
(1) cache
(2) instruction set
(3) source code
(4) word size
(5) None of these
Q.413. What happens if you press Ctrl + Shift + F8?
(1) It activates extended selection
(2) It activates the rectangular selection
(3) It selects the paragraph on which the insertion line is.
(4) All of the above
(5) None of these
Q.414. Which of the following is not valid version of MS Office?
(1) Office XP
(2) Office Vista
(3) Office 2007
(4) All of the above
(5) None of these
Q.415. What is the short cut key to open the Open dialog box in MS word?
(1) F12
(2) Shift + F12
(3) Alt + F12
(4) Ctrl + F12 (5) None of these
Q.416. How can you disable extended selection mode?
(1) Press F8 again to disable
(2) Press Del to disable
(3) Press Esc to disable
(4) Press Enter to disable
(5) None of these
Q.417. Auto Calculate will quickly add selected cells if you..
(1) right click on the status bar and select Sum
(2) click the Auto Calculate button on the toolbar
(3) use the key combination Ctrl+$
(4) Double click the selection
(5) None of these
Q.418. You can add a hyperlink to your worksheet by pressing(1) Alt + K
(2) Ctrl + H
(3) Ctrl + K
(4) Ctrl + Shift + K
(5) None of these
Q.419. ___________are 'attempts by individuals to obtain confidential information from you by falsifying their identity.
(1) Phishing
(2) Computer viruses
(3) Spyware scams
(4) Viruses
(5) None of these
Q.420. Which of the following is the fastest type of computer?
(1) Laptop
(2) Notebook
(3) Personal computer
(4) Workstation
(5) Supercomputer
Q.421. Which of the following is not a term pertaining to the Internet ?
(1) Keyboard
(2) Link
(3) Browser
(4) Search Engine
(5) Hyperlink
Q.422. The operating system that is self-contained in a device and resident in the ROM is .......
(1) Batch Operating System
(2) Real - time Operating System
(3) Embedded Operating System
(4) Multi Operating System
(5) None of these
Q.423. The computer abbreviation KB usually means
(1) Key Block
(2) Kernel Boot
(3) Key Byte
(4) Kit Bit
(5) Kilo Byte
Q.424. .......... is the key to close a selected drop - down list; cancel a command and close a dialog box.
(1) Tab
(2) Shift
(3) Esc
(4) F10
(5) None of these

www.bankersguru.org

Q.425. Which of the following is NOT one of the four major data processing functions of a computer?
(1) gathering data
(2) processing data into information
(3) analyzing the data or information (4) storing the data or information
(5) None of these
Q.426. The CPU and memory are located on the :
(1) expansion board
(2) motherboard
(3) storage device
(4) output device
(5) display board
Q.427. A ............ is an additional set of commands that the computer displays after you make a selection from the
main menu
(1) dialog box
(2) submenu
(3) menu selection
(4) All of the above
(5) None of these
Q.428. A letter, memo, proposal or other file that is created using Microsoft Word is called as--(1) Master
(2) Slide
(3) Document
(4) Worksheet (5) None of these
Q.429. Which of the following are parts of the CPU?
(1) Secondary Memory
(2) Control unit
(3) Input device
(4) Printer
(5) None of these
Q.430. Which is not the portable computer?
(1) Micro-processor
(2) Calculator
(3) Series Computers
(4) Parallel Computers
(5) None of these
Q.431. The ROM chip which can be rewritten several times and requires the action of ultraviolet radiations to erase
its contents called________
(1) Flash memory (2) PROM
(3) EEPROM
(4) EPROM
(5) None of these
Q.432. FPI stands for____
(1) Faults Per Inch
(2) Frames Per Inch
(3) Figure Per Inch
(4) Film Per Inch
(5) None of these
Q.433. One terabyte is equal to ---------(1) 1024 gigabyte (2) 1024 kilobyte (3) 1024 megabyte (4) 1024 byte (5) None of these
Q.434. The memory which is utmost accessible to the processor is_____
(1) Cache memory
(2) RAM
(3) Hard disk
(4) Flash memory
(5) None of these
Q.435. In which kind of disk does the read/write head physically touches the surface?
(1) Hard Disk
(2) Compact Disk (3) Floppy Disk
(4) All of the above
(5) None of these
Q.436. What is the correct syntax for typing a function into a cell?
(1) Equal sign, Function Name, Matching brackets
(2) Function Name, Equal sign, Matching brackets
(3) Equal sign, Matching brackets, Function Name
(4) All of the above
(5) None of these
Q.437. If you see a small red triangle in the top right corner of a cell, it means there is something attached to the cell.
What is it?
(1) A comment
(2) An attachment (3) An error
(4) All of the above
(5) None of these
Q.438. Cache memory is
(1) Smaller and faster than main storage
(2) Bigger and slower than main storage
(3) Smaller but slower than main memory
(4) Bigger and faster than main memory
(5) None of these
Q.439. The overall design, construction, organization and interconnecting of the various components of a computer
system is referred as
(1) Computer Architecture
(2) Computer Flowchart
(3) Computer Algorithm
(4) All of the above
(5) None of these
Q.440. BIOS are responsible for
(1) Handling the input/output operations
(2) Output operations
(3) Input operations
(4) All of the above
(5) None of these

www.bankersguru.org

Q.441. BISYNC is an abbreviation for


(1) Binary Input/Binary Output
(2) Binary synchronous
(3) Binary digit
(4) All of the above
(5) None of these
Q.442. A process of trying out a new product by independent users before it is finally manufactured/developed
(1) Alpha test
(2) Beta test
(3) Gamma test
(4) All of the above
(5) None of these
Q.443. An E-mail protocol for storage, management and change, especially in corporate offices
(1) Message handling service
(2) Postal services
(3) Data storage
(4) All of the above
(5) None of these
Q.444. Password is
(1) Code by which a user gains access to a computer system
(2) Pass for viewing movie
(3) Entrance without paying something
(4) All of the above
(5) None of these
Q.445. The technique where digital signals are converted to its analog form for transmission over an analog facility is
called
(1) Modulation
(2) Digitization
(3) Multiprocessing
(4) All of the above
(5) None of these
Q.446. Narrowband channel is a communication channel
(1) that handles low volumes of data
(2) used mainly for telegraph lines and low speed terminals
(3) control CPU
(4) All of the above
(5) None of these
Q.447. MIME stands for -----------(1) Multiprogramming Internet Mail Extension
(2) Multicasting Internet Mail Extension
(3) Multiple Internet Mail Extension
(4) Multipurpose Internet Mail Extension
(5) None of these
Q.448. The........... settings are automatic and standard.
(1) Default
(2) CPU
(3) Peripheral
(4) User-friendly (5) None of these
Q.449. Pop-ups are a form of ________on the World Wide Web.
(1) Instant Messaging
(2) Search Engines
(3) Browsers
(4) Mark-up Languages
(5) Online Advertising
Q.450. Which of the following is true about Operating System?
(1) It is an interface between user and the computer.
(2) It manages all resources
(3) It does all Memory management and Process management tasks
(4) All are true
(5) None of these
Q.451. Systems that are built from a functional viewpoint would typically use which of the following methods?
(1) Structural methods
(2)Object-oriented methods
(3) Constructive methods
(4) Data-oriented methods
(5) Object- Data method
Q.452. Which layer functions as liaison between user support layers and network support layers ?
(1) network layer (2) physical layer (3) transport layer (4) session layer (5) None of these
Q.453. The program counter(1) stores the address of the instruction that is currently being executed
(2) stores the next instruction to be executed
(3) stores the second next instruction to be executed
(4) stores the instruction that is being currently executed
(5) None of these

www.bankersguru.org

Q.454. What is the function of Ctrl + B in Ms-Word?


(1) It converts selected text into the next larger size of the same font
(2) It adds a line break to the document
(3) It makes the selected text bold
(4) It applies Italic formatting to the selected text
(5)
None of these
Q.455. Graphics for word processor is known as ___
(1) Peripheral
(2) Clip art
(3) Highlight
(4) Execute
(5) Image art
Q.456. Periodically adding, changing and deleting file records is called ______.
(1) updating
(2) upgrading
(3) restructuring (4) renewing
(5) None of above
Q.457. What is the function of CTRL+R in MS-Word?
(1) Open the Print dialog box
(2) Update the current Web page
(3) Close the current window
(4) Open the find dialog box
(5) None of these
Q.458. What is the extension of files created in Ms-Word 97- 2003 ?
(1) dot
(2) doc
(3) dom
(4) txt
(5) wrd
Q.459. In Microsoft Word shortcut key CTRL+W is used for ______
(1) open the Print dialog box
(2) Update the current Web page
(3) Close the current window
(4) Open second tab window
(5) None of these
Q.460. A network that requires human intervention of route signals is called a(1) Bus network
(2) Ring netwkork
(3) Star network
(4) T-switched network
(5) None of above
Q.461. In relational schema, each tuple is divided into fields called(1) Relations
(2) Domains
(3) Queries
(4) All of the above
(5) None of these
Q.462. Administrate supervision of database activity is the responsibility of(1) Database administrator
(2) DP Manager
(3) DB Manager
(4) DP Administration
(5) None of above
Q.463. An incremental backup
(1) uses more tapes
(2) should be done each month
(3) saves only files that have recently changed
(4) save files that has not recenly changed
(5) save two copy of unsaved data
Q.464. A polymorphic virus:
(1) modifies its program code each time it attaches itself to another program or file
(2) is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no
memory or disk space remains
(3) a malicious logic program that hides within or looks like a legitimate program
(4) infects a program file, but still reports the size and creation date of the original, uninfected
program
(5) None of these
Q.465. The Secure Electronic Transaction (SET) specification :
(1) is a notice, issued and verified by a certificate authority, that guarantees a user that Website is
legitimate
(2) provides private key encryption of all data that passes between a client and a server
(3) allows users to choose an encryption scheme for the data that passes between a client and a
server
(4) uses a public key encryption to secure credit-card transaction systems
(5) None of these
Q.466. ......... allows wireless mobile devices to access the Internet and its services such as the Web and e-mail:
(1) TCP/IP
(2) Ethernet
(3) WAP
(4) Token ring
(5) None of these
Q.467. DOS floppy disk does not have:
(1) A Boot Record
(2) A File Allocation Table
(3) A Root Directory
(4) Virtual Memory
(5) BIOS

www.bankersguru.org

Q.468. A passive threat to computer security is:


(1) Malicious Intent
(2) Sabotage
(3) Accident Errors
(4) Espionage Agents
(5) None of these
Q.469. All of the following are basic principles of networks, except:
(1) Each computer must have a network card
(2) There must be communications media connecting the network hardware devices
(3) There must be at least one connecting device
(4) Each computer must have software that supports the movement of information
(5) None of these
Q.470. In a ring topology, the computer in possession of the can transmit data
(1) packet
(2) data
(3) access method
(4) token
(5) None of these
Q.471. This part of operating system manages the essential peripherals, such as the key board, screen, disk drive,
and parallel and serial ports(1) basic input/output system
(2) secondary input/output system
(3) peripheral input/output system
(4) marginal input/output system
(5) None of the above
Q.472. These type of viruses are often transmitted by a floppy disk left in the floppy drive(1) Trojan horse
(2) Boot sector
(3) Script
(4) Logic bomb (5) None of these
Q.473. It controls the way in which the computer system functions and provides a way by which users can interact
with the computer(1) The platform
(2) Application software
(3) Operating system
(4) The motherboard
(5) None of the above
Q.474. Servers are computers that provide resources to other computers connected to a
(1) mainframe
(2) network
(3) supercomputer (4) client
(5) None of these
Q.475. A goal of data mining includes which of the following?
(1) To explain some observed event or condition
(2) To confirm that data exists
(3) To analyze data for expected relationships
(4) To create a new data warehouse
(5) None of the above
Q.476. URL stands for
(1) Universal Research List
(2) Universal Resource List
(3) Uniform Resource Locator
(4) Uniform Research Locator
(5) None of the above
Q.477. A database management system (DBMS) is a
(1) Hardware system used to create, maintain and provide controlled access to a database
(2) Hardware system used to create, maintain and provide uncontrolled access to a database
(3) Software system used to create, maintain and provide uncontrolled access to a database
(4) Software system used to create, maintain and provide controlled access to a database
(5) None of the above
Q.478. Which of the following is not a goal of transaction processing system?
(1) Capture, process and store transactions
(2) Produce a variety of documents related to routine business activities
(3) Reduce manual effort associated with processing business tractions
(4) Produce standard reports used for management decision making
(5) None of the above
Q.479. A Proxy server is used for which of the following?
(1) To provide security against unauthorized users
(2) To process client requests for web pages
(3) To process client requests for database access
(4) To provide TCP/IP
(5) None of the above
Q.480. In most IBM PCs, the CPU, the device drives, memory expansion slots and active components are mounted
on a single board. What is the name of this board?
(1) Motherboard
(2) System Unit
(3) Circuitboard
(4) Grandmother board
(5) Network Interface Card

www.bankersguru.org

Q.481. What is meant by a dedicated computer?


(1) Which is used by one person only (2) Which is assigned one and only one task
(3) Which uses one kind of software (4) Which is meant for application software
(5) None of these
Q.482. The system unit of a personal computer typically contains all of the following except:
(1) Microprocessor(2) Disk controller (3) Serial interface (4) Modem
(5) None of these
Q.483. A computer program that converts an entire program into machine language is called a/an__________.
(1) Interpreter
(2) Simulator
(3) Compiler
(4) Commander (5) None of these
Q.484. The time for which a piece of equipment operates is called
(1) Seek time
(2) Effective time (3) Access time (4) Real time
(5) None of these
Q.485. ____ is an area of a computer that temporarily holds data that is waiting to be processed, stored, or output.
(1) Memory
(2) Storage
(3) Input
(4) Output
(5) None of these
Q.486. A computer falls into the ____ category if it is, at the time of construction, one of the fastest computers in the
world.
(1) minicomputer
(2) supercomputer
(3) microcomputer
(4) mainframe
(5) None of these
Q.487. An assembler is a _______.
(1) Program
(2) Person who assemble the parts
(3) Symbol
(4) Language
(5) None of these
Q.488. The two basic types of record-access methods are
(1) Sequential and random
(2) Sequential and indexed
(3) Direct and immediate
(4) On-line and real time
(5) None of these
Q.489. The first firm to mass- market a microcomputer as a personal computer was
(1) IBM
(2) Sperry Univac
(3) Data General corporation
(4) Radio Shack
(5) None of these
Q.490. An integrated circuit is _____.
(1) A complicated circuit
(2) An integrating device
(3) Much costlier than a single transistor
(4) Fabricated on a tiny silicon chip
(5) None of these
Q.491. A process known as ____________ is used by large retailers to study trends.
(1) data mining
(2) data selection (3) POS
(4) data conversion
(5) None of these
Q.492. Which of the following is NOT one of the four major data processing functions of a computer?
(1) gathering data
(2) processing data into information
(3) analyzing the data or information (4) storing the data or information
(5) None of these
Q.493. Surgeons can perform delicate operations by manipulating devices through computers instead of manually.
This technology is known as:
(1) robotics
(2) computer forensics
(3) simulation
(4) forecasting
(5) None of these
Q.494. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
(1) Nanoscience
(2) Microelectrodes
(3) Computer
forensics
(4) Artificial intelligence
(5) None of these
Q.495. Computers gather data, which means that they allow users to ____________ data.
(1) present
(2) input
(3) output
(4) store
(5) None of these
Q.496. The list of coded instructions is called _____.
(1) Computer program
(2) Algorithm
(3) Flowchart
(4) Utility programs
(5) None of these
Q.497. The two broad categories of software are:
(1) Word processing and spreadsheet
(2) Transaction and application
(3) Windows and Mac OS
(4) System and application
(5) None of these
Q.498. Which of the following languages is more suited to a structured program?
(1) PL/1
(2) FORTRAN
(3) BASIC
(4) PASCAL
(5) None of these
Q.499. A computer assisted method for the recording and analyzing of existing or hypothetical systems is(1) Data transmission
(2) Data flow
(3) Data capture
(4) Data processing
(5) None of these

www.bankersguru.org

Q.500. Which output device is used for translating information from a computer into pictorial form on paper?
(1) Mouse
(2) Plotter
(3) Touch panel (4) Card punch
(5) None of these

www.bankersguru.org

You might also like