Tuesday, March 26, 2013

500 -COMPUTER AWARENESS QUESTION FOR BANK EXAM


1.The most widely used input device is--- the
  • A.Keyboard
  • B.Mouse
  • C.Modem
  • D.Moniter
Answer Click here :

2. ____________ bits equal one byte.
  • A.8
  • B.16
  • C.24
  • D.18
Answer Click here :

3.The binary language consists of ____________ digit(s).
  • A.8
  • B.1000
  • C.2
  • D.1
Answer Click here :

4. A byte can hold one ____________ of data.
  • A.bit
  • B.binary digit
  • C.character
  • D.kilobyte
Answer Click here :

5. A CPU contains_
  • A.a card reader and a printing device
  • B.an analytical engine and a control unit
  • C.a control unit and an arithmetic logic unit
  • D.an arithmetic logic unit and a card reader
Answer Click here :

6.In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
  • A.8 bits
  • B.8 bytes
  • C.8 characters
  • D.None of these
Answer Click here :

7.Computers use the ____________ language to process data.
  • A.processing
  • B.kilobyte
  • C.binary
  • D.representational
Answer Click here :

8. Computers process data into information by working exclusively with:
  • A.Multimedia
  • B.Character
  • C.Numbers
  • D.Words
Answer Click here :

9.The ability of an OS to run more than one application at a time is called
  • A.multitasking
  • B.object-oriented programming
  • C.multi-user computing
  • D.time sharing
Answer Click here :

10.Permanent instructions that the computer uses when it is turned on and that cannot be changed by other instructions are contained in
  • A.ROM
  • B.RAM
  • C.REM
  • D.EPROM
Answer Click here :

11.All of the following are examples of real security and privacy risks EXCEPT
  • A.hackers
  • B.spam
  • C.viruses
  • D.identity theft
Answer Click here :

12.A process known as ____________ is used by large retailers to study trends.
  • A.data mining
  • B.data selection
  • C.POS
  • D.data conversion
Answer Click here :

13.____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
  • A.Data
  • B.Point-of-sale (POS)
  • C.Sales
  • D.Query
Answer Click here :

14.What type of resource is most likely to be a shared common resource in a computer network?
  • A.Printers
  • B.Speakers
  • C.Floppy disk drives
  • D.Keyboards
Answer Click here :

15.The vast network of computers that connects millions of people all over the world is called
  • A.LAN
  • B.Web
  • C.Hypertext
  • D.Internet
Answer Click here :

16.Which is not an item of hardware?
  • A.AnMP3file
  • B.A keyboard
  • C.A disk drive
  • D.A monitor
Answer Click here :

17.To shrink a window to an icon_
  • A.open a group window
  • B.minimise a window
  • C.maximise a window
  • D.restore a window
Answer Click here :

18.Computers connected to a LAN (local area network) can
  • A.run faster
  • B.go on line
  • C.share information and/or ' share peripheral equipment
  • D.E-mail
Answer Click here :

19.____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
  • A.Nanoscience
  • B.Microelectrodes
  • C.Computer forensics
  • D.Artificial intelligence
Answer Click here :

20.Every device on the Internet has a unique______address (also called an “Internet address”) that identifies it in the same way that a street address identifies the location of a house.
  • A.DH
  • B.DA
  • C.IP
  • D.IA
Answer Click here :

21.In a client/ server model, a client program -
  • A.asks for information
  • B.provides information and files
  • C.serves software files to other computers
  • D.distributes data files to other computers
Answer Click here :

22.The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
  • A.instructions.
  • B.the operating system.
  • C.application software.
  • D.the system unit.
Answer Click here :

23.The two broad categories of software are:
  • A.word processing and spreadsheet
  • B.transaction and application.
  • C.Windows and Mac OS.
  • D.system and application.
Answer Click here :

24.Storing same data in many places is called
  • A.iteration
  • B.concurrency
  • C.redundancy
  • D.enumeration
Answer Click here :


25.The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
  • A.robotics.
  • B.simulation
  • C.computer forensics
  • D.animation
Answer Click here :

FOR PART TWO CLICK HERE

1 comment: