Computer GK

~:THIS PAGE IN UNDER CONSTRUCTION.PLEASE USE THE SEARCH BOX AVAILABLE ON THE MAIN PAGE TO GO TO THE RELEVANT POSTS.SORRY FOR INCONVENIENCE:~
Computer Awareness For Bank PO Exams


1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A

11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D

12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D

13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B

14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B

16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C

17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D

19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C

20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B

21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C

22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C

23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A

24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C

25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D

26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A

27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B

28. The ____________, also called the “brains” of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D

29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B

30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A

31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B

32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C

35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B

38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D

39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A

40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A

41. Which of the following is the correct order of the four major functions of a computer?
A. Process à  Output à  Input à  Storage
B. Input à  Outputà  Process à  Storage
C. Process à  Storage à  Input à  Output
D. Input à  Process à  Output à  Storage
Answer: D

42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A

43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B

44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B

46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A

49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D

50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A

Fill in the Blank:-

51. Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation.
Answer: Mac

52. The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices.
Answer: operating system


53. The type of operating system software you use depends on your computer’s ____________.
Answer: platform

54. ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet.
Answer: Application

55. ____________are the fastest and most expensive computers.
Answer: Supercomputers

56. A ____________ is approximately 1,000 bytes.
Answer: kilobyte

57. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________.
Answer: instructions

58. A computer gathers data, processes it, outputs the data or information, and ____________ the data or information.
Answer: stores


59. The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1

60. A string of ____________ 0s and 1s is called a byte.
Answer: eight (8)

61. The devices you use to enter data into a computer system are known as ____________ devices.
Answer: input

62. The devices on a computer system that let you see the processed information are known as ____________ devices.
Answer: output

63. ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks.
Answer: Software

64. When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP).
Answer: Internet

65. ____________ are computers that excel at executing many different computer programs at the same time.
Answer: Mainframes

66. ____________is the application of computer systems and techniques to gather legal evidence.
Answer: Computer forensics

67. ____________ is the science that attempts to create machines that will emulate the human thought process.
Answer: Artificial intelligence (AI)

68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system.
Answer: Microsoft Windows

69. A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns.
Answer: data mining

70. Hard disk drives and CD drives are examples of ____________ devices.
Answer: storage

71. You would use ____________ software to create spreadsheets, type documents, and edit photos.
Answer: application

72. ____________ are computers that support hundreds or thousands of users simultaneously.
Answer: Mainframes

73. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating.
Answer: Identity theft

74. Surgeons are using ____________ to guide robots to perform delicate surgery.
Answer: computers

75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans.
Answer: simulators
True and False


76. Currently, the performance of tasks by robots is based on preprogrammed algorithms.
Answer: True

77. Data can be a number, a word, a picture, or a sound.
Answer: True


78. Strictly defined, a computer is a data processing device.
Answer: True

79. The discrepancy between the “haves” and “have-nots” with regard to computer technology is commonly referred to as the digital society.
Answer: False (digital divide)

80. One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that posethreats to computer security.
Answer: True

81. Trend-spotting programs, developed for business, have been used to predict criminal activity.
Answer: True

82. Employers do not have the right to monitor e-mail and network traffic on employee systems used at work.
Answer: False

83. Clicking on an icon with the mouse is a form of giving an instruction to the computer.
Answer: True

84. Output devices store instructions or data that the CPU processes.
Answer: False (memory)

85. The CPU and memory are located on a special circuit board in the system unit called the motherboard.
Answer: True

86. Nanostructures represent the smallest human-made structures that can be built.
Answer: True


87. The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible,whereas mainframes are designed to handle many programs running at the same time (but at a slower pace).
Answer: True

88. Being computer fluent means that you should be able to build a computer yourself.
Answer: False

89. Embedded computers are self-contained computer devices that have their own programming and do not receive input.
Answer: True

90. A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network.
Answer: False (network adapter)

91. With a wireless network, it is easier to relocate devices.
Answer: True

92. The most common type of memory that the computer uses to process data is ROM.
Answer: False (RAM)

Matching:


93. Match the following terms with their approximate size:
I. kilobyte A. one million bytes
II. byte B. eight bits
III. gigabyte C. one thousand bytes
IV. megabyte D. one billion bytes
V. terabyte E. one trillion bytes
Answer: C, B, D, A, E


94. Match the following terms with their meanings:
I. printer A. storage device
II. scanner B. output device
III. RAM C. input device
IV. CPU D. a type of memory
V. CD drive E. processor
Answer: B, C, D, E, A


95. Match the following terms with their meanings:
I. mainframe A. the most expensive computers that perform complex calculations extremely rapidly
II. supercomputer B. a computer that provides resources to other computers connected to a network
III. embedded computer C. a large, expensive computer that supports hundreds or thousands of users simultaneously
IV. PDA D. a self-contained computer device that usually performs preprogrammed functions such as temperature control
V. server E. a small mobile computing device
Answer: C, A, D, E, B


96. Match the following terms with their meanings:
I. software A. transforming data into information
II. hardware B. data that has been organized or presented in a meaningful fashion
III. operating system C. any part of the computer that you can physically touch
IV. processing D. a set of computer programs that enables hardware to perform different tasks
V. information E. the most common type of system software, it controls the way in which the computer system functions
Answer: D, C, E, A, B


97. Match the following terms with their meanings:
I. system software A. the set of programs that enables computer hardware devices and application software to work together
II. application software B. the kind of operating system software you will use depends on this
III. platform C. operating system software generally used on PCs
IV. Microsoft Windows D. a set of programs used to accomplish a specific task
V. Mac OS E. operating system software used on the Apple Macintosh
Answer: A, D, B, C, E


98. Match the following terms with their meanings:
I. data A. the main circuit board in the system unit
II. memory B. the representation of a fact or idea (unprocessed information)
III. output C. processed data or information
IV. storage D. holds instructions or data that the CPU processes
V. motherboard E. data or information that can be accessed again
Answer: B, D, C, E, A


99. Match the following terms with their meanings:
I. bit A. the science revolving around the use of nanostructures to build devices on an extremely small scale
II. binary language B. the case that contains the system components
III. instructions C. consists of 0s and 1s
IV. system unit D. short for binary digit
V. nanotechnology E. steps and tasks necessary to process data into usable information
Answer: D, C, E, B, A


100. Match the following fields to the related computer technology:
I. medicine A. Internet research and virtual tours
II. business B. data mining
III. law enforcement C. robotics and simulation
IV. education D. computer forensics
V. archeology E. digital recreations of ruins
Answer: C, B, D, A, E

------------------------------------------------------------------------------------------------------------

1. Compiler is the
(a) name given to the computer operator
(b) part of the digital machine to store the information
(c) translator of source program to object
(d) part of arithmetic logic unit
(e) operator of Boolean Algebra
Ans (c)
2. Main memory is
(a) Random Access Memory (b) Read only Memory
(c) Serial Access Memory (d) None of these
Ans (a)
3. Which of the following is the smallest and fastest computer imitating brain working?
(a) Supercomputer (b) Quantum Computer
(c) Param-10,000 (d) IBM chips
Ans (b)
4. A compact disc (CD) is a data storage of the type
(a) Magnetic (b) Optical (c) Electrical (d) Electromechanical
Ans (a)
5. Which of the following is not as language for computer programming?
(a) WINDOWS (b) PASCAL (c) BASIC
(d) COBOL (e) All of these
Ans (a)
6. What are the two basic types of memory that your computer uses?(
a) RAM (b) RW/RAM (c) ROM (d) ERAM (e) POST
Ans (a)
7. The term gigabyte refers to
(a) 1024 bytes (b) 1024 kilobytes (c) 1024 megabytes
(d) 1024 gigabytes (e) None of the above
Ans (c)
8. A computer with CPU speed around 100 million instructions per second & with the word length of around 64 bits is known as
(a) Super computer (b) Mini computer (c) Micro computer
(d) Micro computer (e) None of the above
Ans (a)
9. What digits are representative of all binary numbers?
(a) 0 (b) 1 (c) Both (a ) and (b) (d) 3 (e) None of the above
Ans (c)
10. To locate a data items for storage is
(a) Field (b) Feed (c) Database
(d) Fetch (e) None of the above
Ans (d)
11. Off-line operation is the operation of devices without the control of
(a) Memory (b) CPU (c) ALU
(d) Control unit (e) None of the above
Ans (b)
12. A type of line printer that uses an embossed steel band to form the letters printed on the paper is
(a) Golf ball printer (b) Dot-matrix printer
(c) Laser printer (d) Band printer (e) None of the above
Ans (d)
13. A software used to convert source program instructions to object instruction is known as
(a) Compiler (b) Assembler (c) Interpreter
(d) Language processor (e) None of the above
14. The 'IC' chip, used in computers, is made of
(a) Chromium (b) Iron oxide (c) Silica (d) Silicon
Ans (d)
15. Name the first general purpose electronic computer
Ans : UNIVAC
16. The size of commonly used Floppy disk is
(a) 4.5” (b) 3.5” (c) 3.25” (d) 5.5”
Ans (b)
17. Which of the following statement is wrong
(a) Windows XP is an operating system
(b) Linux is owned and sold by Microsoft
(c) Photoshop is a graphical design tool by Adobe
(d) Linux is free and open source software
Ans (b)
18. Operating system of a computer
(a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references
(c) Provides a layer, user friendly interface
(d) None of the above
Ans (c)
19. The term ‘Operating System’ means
(a) A set of programs which control computer working
(b) The way a user operates the computer system
(c) Conversion of high level language to machine language
(d) The way computer operator works
Ans (a)
20. Wild card operators specifies
(a) can be used when writing into multiple files
(b) allows several files to be read simultaneously
(c) Provide an easy way of groups of related files
(d) Are only used when printing the contents of a file
Ans (c)
21.Which one of the following is not a broadband communication medium
(a) Microwave (b) Fibre optic cable
(c) Twisted pair (d) Coaxial cable
Ans (c)
22.Which of the following performs modulation and demodulation
(a) Coaxial cable (b) Satellite (c) Modem (d) Optical fibre
Ans (c)
23. Which one of the following is not an application software package
(a) Redhat Linux (b) Microsoft Office
(c) Adobe PageMaker (d) Open Office
Ans (a)
24. Who is the father of computer
Ans : Charles Babbage
25.The function of key F4 is
Ans : To repeat the last action
26.The function of key F4 is
Ans : To repeat the last action
27. The 0 and 1 in the binary numbering system are called binary digits or .......
(a) bytes (b) kilobytes (c) decimal bytes (d) bits (e) nibbles
Ans (D)
28. A monitor's ...... is the distance between the holes in the mask behind the screen. This helps determine how sharp the dots appear.
(a) refresh rate (b) dot pitch (c) resolution
(d) colour depth (e) None of the above
Ans (B)
29. A directly accessible appointment calendar is a feature of a ....... resident package.
(a) CPU (b) memory (c) Buffer (d) ALU (e) None of the above
Ans (B)
30. Perforated paper used as input or output media is known as
(a) Paper tape (b) Magnetic tape (c) Punched paper tape
(d) Card punch (e) None of the above
Ans (A)
31. The invention of the slide rule is attributed to
(a) Babbage (b) Oughtred (c) Pascal
(d) Napier (e) None of the above
Ans (B)
32. Which of the following is not an advantage of magnetic disk storage.
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) All of the above
(e) None of the above
Ans (e)
33. The memory sizes in mainframe computers and advanced technology micro computer are expressed as
(a) Bytes (b) Kilo-bytes (c) Bits
(d) Megabytes (e) None of the above
Ans (d)
34. A prefix for billion which is equal to .... is called as billi.
(a) 100 (b) 10000 (c) 1000 (d) 10 (e) None of the above
Ans (d)
35. Each model of a computer has a unique
(a) Assembly language (b) Machine language
(c) High level language (d) All of the above
(e) None of the above
Ans (b)
36. One kilobyte = ____ byte.
(a) 1250 (b) 2088 (c) 1024 (d) 1000
Ans (c)
37. Which of the following circuit is used as a 'Memory device' in computers?
(a) Rectifier (b) Flip-Flop (c) Comparator (d) Attenuator
Ans (b)
38. To move the cursor to the end of the document press
Ans : Ctrl + End
39. In Word Processing the red underline indicates
Ans : Spelling mistakes
40. The shortcut key to print documents is
Ans : Ctrl + P
41. First layer in the OSI reference model is
(a) Data link (b) Network (c) Physical (d) Application
Ans (c)
42. Viruses, Trojan horses and Worms are
(a) able to harm computer system
(b) unable to detect if affected on computer
(c) user-friendly applications
(d) harmless applications resident on computer
Ans (a)
43. Program threats are
(a) Trap doors (b) Trojan horse (c) Both (a) & (b
Ans (b)
44. Failure of passwords security due to exposure can result from
(a) Electronic monitoring (b) Visual (c) Both (a) & (b)
Ans (c)
45. Data security threats include
(a) Hardware failure (b) Privacy invasion
(c) Fraudulent manipulation of data (d) All of the above
Ans (b)
46. The bar which displays information about the current page number is
Ans : Status bar
47. Graphical pictures that represent an object like file, folder etc. are
(a) Task bar (b) Windows (c) Desktop (d) Icons
Ans (d)
48. Who invented the super-computer?
(a) P.T Farnsworth (b) J.R Whinfield
(c) J.H. Van Tassell (d) Charles Ginsberg
Ans (c)
49. Accessing records from a file directly without searching from the beginning of the file is
(a) Time sharing (b) Random
(c) Direct access (d) Access time (e) None of the above
Ans (c)
50. Time during which a job is processed by the computer is
(a) Delay time (b) Real time (c) Execution time
(d) Down time (e) None of the above
Ans (c)

------------------------------------------------------------------------------------------------------------


Punjab and Sind Bank Clerk Exam., 2011
(Held on 30-1-2011)
Computer Knowledge : Solved Paper


1. The software tools that enable a user to interact with a computer for specific purposes are known as—
(A) Hardware
(B) Networked Software
(C) Shareware
(D) Applications
(E) None of these
Ans : (D)

2. A………shares hardware, software, and data among authorized users.
(A) network
(B) protocol
(C) hyperlink
(D) transmitter
(E) None of these
Ans : (A)

3. Computer programs are written in a high-level programming language; however, the humanreadable version of a program is called—
(A) cache
(B) instruction set
(C) source code
(D) word size
(E) None of these
Ans : (C)


4. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is—
(A) copy and paste
(B) copy, cut and paste
(C) cut, copy and paste
(D) cut and paste
(E) None of these
Ans : (D)

5. Which of the following is not a function of the control unit ?
(A) Read instructions
(B) Execute instructions
(C) Interpret instructions
(D) Direct operations
(E) None of these
Ans : (D)

6. Software for organizing storage and retrieval of information is a(n)—
(A) operating system
(B) database
(C) database program
(D) data warehouse
(E) None of these
Ans : (C)

7. A set of step-by-step procedures for accomplishing a task is known as a(n)—
(A) algorithm
(B) hardware program
(C) software bug
(D) firmware program
(E) None of these
Ans : (A)

8. Which of the following is not true about RAM ?
(A) RAM is a temporary storage area
(B) RAM is the same as hard disk storage
(C) RAM is volatile
(D) Information stored in RAM is gone when you turn the computer off
(E) None of these
Ans : (B)

9. The main directory of a disk is called the………directory.
(A) root
(B) sub
(C) folder
(D) network
(E) None of these
Ans : (A)

10. The physical arrangement of elements on a page is referred to as a document’s……
(A) features
(B) format
(C) pagination
(D) grid
(E) None of these
Ans : (B)

11. =SUM (B1 : B8) is an example of a—
(A) function
(B) formula
(C) cell address
(D) value
(E) None of these
Ans : (B)

12. Which of the following storage media provides sequential access only ?
(A) Floppy disk
(B) Magnetic disk
(C) Magnetic tape
(D) Optical disk
(E) None of these
Ans : (B)

13. Compilers and translators are one form of—
(A) ROM
(B) RAM
(C) Hard disk
(D) Software
(E) None of these
Ans : (D)

14. Data representation is based on the………number system, which uses two numbers to represent all data.
(A) binary
(B) biometric
(C) bicentennial
(D) byte
(E) None of these
Ans : (A)

15. The most common input devices include—
(A) Monitor and keyboard
(B) Monitor and mouse
(C) Mouse and keyboard
(D) Printer and mouse
(E) None of these
Ans : (C)

16. www means—
(A) world wide wonder
(B) world wide wizard
(C) world wide web
(D) wide world web
(E) None of these
Ans : (C)

17. ………processing is used when a large mail-order company accumulates orders and processes them together in one large set.
(A) Batch
(B) Online
(C) Real-time
(D) Group
(E) None of these
Ans : (A)

18. What is the difference between a CD-ROM and a CD-RW ?
(A) They are the same—just two different terms used by different manufacturers
(B) A CD-ROM can be written to and a CD-RW cannot
(C) A CD-RW can be written to, but a CD-ROM can only be read from
(D) A CD-ROM holds more information than a CD-RW
(E) None of these
Ans : (C)

19. Holding the mouse button down while moving an object or text is known as—
(A) Moving
(B) Dragging
(C) Dropping
(D) Highlighting
(E) None of these
Ans : (B)

20. A………is a collection of data that is stored electronically as a series of records in a table.
(A) spreadsheet
(B) presentation
(C) database
(D) web page
(E) None of these
Ans : (C)

21. The………primarily take(s) care of the behind-the-scenes details and manage(s) the hardware.
(A) operating system
(B) application software
(C) peripheral devices
(D) hard disk
(E) None of these
Ans : (A)

22. A……is a professionally designed ‘empty’ document that can be adapted to the user’s needs.
(A) file
(B) guide
(C) template
(D) user guide file
(E) None of these
Ans : (C)

23. A group of 8 bits is known as a—
(A) Byte
(B) Kilobyte
(C) Binary digit
(D) Megabit
(E) None of these
Ans : (A)

24. The hardware device commonly referred to as the ‘brain’ of the computer is the—
(A) RAM chip
(B) Data input
(C) CPU
(D) Secondary storage
(E) None of these
Ans : (C)

25. What is the intersection of a column and a row on a worksheet called ?
(A) Column
(B) Value
(C) Address
(D) Cell
(E) None of these
Ans : (D)

26. ………are often delivered to a PC through an e-mail attachment and are often designed to do harm.
(A) Viruses
(B) Spam
(C) Portals
(D) Email messages
(E) None of these
Ans : (A)

27. What is the storage area for e-mail messages called ?
(A) A folder
(B) A directory
(C) A mailbox
(D) The hard disk
(E) None of these
Ans : (C)

28. A desktop computer is also known as a—
(A) Palm Pilot
(B) PC
(C) Laptop
(D) Mainframe
(E) None of these
Ans : (B)

29. When a file contains instructions that can be carried out by the computer, it is often called a(n) ……file.
(A) data
(B) information
(C) executable
(D) application
(E) None of these
Ans : (C)

30. Documents converted to……can be published to the Web.
(A) a.doc file
(B) http
(C) machine language
(D) HTML
(E) None of these
Ans : (D)

31. If a user needs information instantly available to the CPU, it should be stored—
(A) on a CD
(B) in secondary storage
(C) in the CPU
(D) in RAM
(E) None of these
Ans : (B)

32. To what temporary area can you store text and other data, and later paste them to another location ?
(A) The clipboard
(B) ROM
(C) CD-ROM
(D) The hard disk
(E) None of these
Ans : (A)

33. In a spreadsheet, a………is a number you will use in a calculation.
(A) label
(B) cell
(C) field
(D) value
(E) None of these
Ans : (D)

34. After slide-directed time, if you want to move ahead automatically, click in……check box in transition of this slide group in tab of animations—
(A) Transition timer
(B) Automatically opter
(C) Transition opter
(D) Automatic timer
(E) None of these
Ans : (B)

35. All are included in removable media except the following—
(A) CD-ROMs
(B) Diskette
(C) DVDs
(D) High disk drive
(E) None of these
Ans : (D)

36. If you open some menu and then decide that you do not want to select some option, then click the menu title again or press the…… key to layout the menu.
(A) shift
(B) tab
(C) escape
(D) F1
(E) None of these
Ans : (C)

37. Using the……process, it is easy to change the name of the file.
(A) transforming
(B) crash
(C) renaming
(D) retagging
(E) None of these
Ans : (C)

38. ………view shows that how will content on printed page, alongwith footer and margin header, appear.
(A) Draft
(B) Full screen reading
(C) Outline
(D) Page layout
(E) None of these
Ans : (D)

39. Using………, the text can be entered and edited very efficiently.
(A) spreadsheet
(B) typewriter
(C) word processing programme
(D) desktop publishing programme
(E) None of these
Ans : (D)

40. Other folders, named subfolders, can remain in the folders while creating hierarchical structure—
(A) Mini folder
(B) Teard folder
(C) Subfolders
(D) Object
(E) None of these
Ans : (C)

41. By using slide………, the characteristics of the fonts of all the slides in presentation, can be changed.
(A) theme
(B) icon
(C) master
(D) style
(E) None of these
Ans : (B)

42. Though several programmers can be opened simultaneously yet only…………programmed can be active.
(A) four
(B) three
(C) two
(D) one
(E) None of these
Ans : (B)

43. Straight and Uniform margins on both the sides indicate that there is …………in the document.
(A) full justification
(B) full alignment
(C) left justification
(D) right justification
(E) None of these
Ans : (A)

44. Among the typical computer programming languages used today, the following is not included in—
(A) C++
(B) JAVA
(C)Visual Basic.NET
(D) Machine language
(E) None of these
Ans : (D)

45. In table in excel, there are typical labels alongwith……
(A) Letters
(B) Numbers
(C) Names
(D) Formulae
(E) None of these
Ans : (B)

46. ………….makes available the commands to righten the software. Instructions are translated step-by-step and executed by the processor so that some objective can be achieved or some problem can be solved.
(A) Software patch
(B) Al language
(C) Presentation language
(D) Programming language
(E) None of these
Ans : (C)

47. As you create documents, graphs and pictures your computer holds the data in—
(A) Restore file
(B) Backup drive
(C) Clip board
(D) Memory
(E) None of these
Ans : (D)

48. Which of the following terms is used for the form in which the word will appear on the page ?
(A) Text formatting
(B) Character formatting
(C) Point size
(D) Type face
(E) None of these
Ans : (A)

49. ……….helps to capture the raw data and enter into the computer system.
(A) CPU
(B) Integrated circuit
(C) Input device
(D) Motherboard
(E) None of these
Ans : (C)

50. The following are included in the world programme ………….Title Bar, Ribbon, Status Bar, Views, Document workspace.
(A) Window
(B) Browser
(C) Explorer
(D) Website
(E) None of these
Ans : (A)
------------------------------------------------------------------------------------------------------------


Allahabad Bank Probationary Officers Exam., 2011
(Held on 17-4-2011)
Computer Knowledge : Solved Paper


1. Which of the following are advantages of CD-ROM as a storage media ?
(A) CD-ROM is an inexpensive way to store large amount of data and information
(B) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) All of these
(E) None of these
Ans : (D)

2. A ……… is the term used when a search engine returns a Web page that matches the search criteria.
(A) blog
(B) hit
(C) link
(D) view
(E) success
Ans : (C)

3. The ……… is the term used to describe the window that is currently being used.
(A) Web Window
(B) display area
(C) WordPad Window
(D) active window
(E) monitor
Ans : (D)


4. CPU is an abbreviation for—
(A) central programming unit
(B) central processing unit
(C) computer processing unit
(D) computer protocol unit
(E) central protocol unit
Ans : (B)

5. A microprocessor is the brain of the computer and is also called a(n)—
(A) microchip
(B) macrochip
(C) macroprocessor
(D) calculator
(E) software
Ans : (A)

6. Storage and memory differ with respect to which of the following characteristics ?
(A) Price
(B) Reliability
(C) Speed
(D) All of these
(E) None of these
Ans : (D)

7. What are two examples of freeware ?
(A) WinZip and Linux
(B) Shareware and file sharing
(C) Microsoft Word and the Google toolbar
(D) Instant messaging and the Google toolbar
(E) Microsoft Power Point and Microsoft Excel
Ans : (D)

8. If a disk drive fails but the computer application running and using it can continue processing, this application is said to have been designed with this feature—
(A) 100 per cent uptime
(B) fault tolerance
(C) high reliability
(D) All of these
(E) None of these
Ans : (B)

9. What is e-commerce ?
(A) Buying and selling international goods
(B) Buying and selling products and services over the Internet
(C) Buying and selling products and services not found in stores
(D) Buying and selling products having to do with computers
(E) Buying and selling of electronic goods
Ans : (B)

10. What are the four things needed to connect to the Internet ?
(A) Telephone line, modem, computer, and an ISP
(B) Modem, computer, PDA and ISP
(C) Telephone line, PDA, modem and computer
(D) Computer, ISP, modem and communication software
(E) Monitor, keyboard, mouse, modem
Ans : (A)

11. Which of the following functions are not performed by servers ?
(A) Email processing
(B) Database sharing
(C) Processing Web sites
(D) Storage
(E) Word processing
Ans : (E)

12. Which media have the ability to have data/information stored (written) on them by users more than once ?
(A) CD-R disks
(B) CD-RW disks
(C) Zip disks
(D) OptiDisks
(E) Both CD-RW disks and Zip disks
Ans : (A)

13. The process of transferring files from a computer on the Internet to your computer is called—
(A) downloading
(B) uploading
(C) FTP
(D) JPEG
(E) downsizing
Ans : (C)

14. The………controls a client computer’s resources.
(A) application program
(B) instruction set
(C) operating system
(D) server application
(E) compiler
Ans : (D)

15. To reload a Web page, press the ……… button.
(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh
Ans : (E)

16. Which of the following could be digital input devices for computers ?
(A) Digital camcorder
(B) Microphone
(C) Scanner
(D) All of the above
(E) None of these
Ans : (D)

17. The………enables you to simultaneously keep multiple Web pages open in one browser window.
(A) tab box
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key
Ans : (A)

18. You can use the………bar to type a URL and display a Web page, or type a keyword to display a list of related Web pages.
(A) menu
(B) Title
(C) Search
(D) Web
(E) Address
Ans : (E)

19. Storage media such as a CD read and write information using—
(A) a laser beam of red light
(B) magnetic dots
(C) magnetic strips
(D) All of these
(E) None of these
Ans : (D)

20. Vendor-created program modifications are called—
(A) patches
(B) antiviruses
(C) holes
(D) fixes
(E) overlaps
Ans : (D)

21. Cache and main memory will lose their contents when the power is off. They are—
(A) dynamic
(B) static
(C) volatile
(D) non-volatile
(E) faulty
Ans : (C)

22. The collection of links throughout the Internet creates an interconnected network called the—
(A) WWW
(B) Web
(C) World Wide Web
(D) All of the above
(E) Wide Area Web
Ans : (D)

23. Every computer has a(n) ………;
many also have.
(A) operating system, a client system
(B) operating system; instruction sets
(C) application programs; an operating system
(D) application programs; a client system
(E) operating system; application programs
Ans : (E)

24. Main memory works in conjunction with—
(A) special function cards
(B) RAM
(C) CPU
(D) Intel
(E) All of these
Ans : (C)

25. A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using—
(A) input automation
(B) item data automation
(C) scanning automation
(D) source data automation
(E) None of these
Ans : (C)

26. A(n)……is composed of several computers connected together to share resources and data.
(A) Internet
(B) network
(C) backbone
(D) hyperlink
(E) protocol
Ans : (B)

27. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information—
(A) floppy diskette
(B) hard disk
(C) permanent disk
(D) optical disk
(E) None of these
Ans : (B)

28. Microsoft Office is an example of a—
(A) closed-source software
(B) open-source software
(C) horizontal-market software
(D) vertical-market software
(E) compiler
Ans : (A)

29. A popular way to learn about computers without ever going to a classroom is called—
(A) i-learning
(B) isolated learning
(C) e-learning
(D) close learning
(E) Distance Learning
Ans : (C)

30. A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a—
(A) spammer
(B) hacker
(C) instant messenger
(D) programmer
(E) analyst
Ans : (B)

31. Which of the following is an example of storage devices ?
(A) Magnetic disks
(B) Tapes
(C) DVDs
(D) All of these
(E) None of these
Ans : (D)

32. The………folder retains copies of messages that you have started but are not yet ready to send.
(A) Inbox
(B) Outbox
(C) Drafts
(D) Sent Items
(E) Address Book
Ans : (C)

33. Which of the following is an example of an optical disk ?
(A) Digital versatile disks
(B) Magnetic disks
(C) Memory disks
(D) Data bus disks
(E) None of these
Ans : (A)

34. The main job of a CPU is to—
(A) carry out program instructions
(B) store data/information for future use
(C) process data and information
(D) Both (A) and (C)
(E) None of these
Ans : (D)

35. ……are attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing trips
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) Phishing scams
Ans : (E)

36. An example of a processing device would be—
(A) a magnetic ink reader
(B) a tablet PC
(C) special function cards
(D) scanners
(E) keyboards
Ans : (B)

37. Which of the following is not a type of computer software which can be bought ?
(A) Off-the-shelf
(B) Tailor-made
(C) Custom-developed
(D) Off-the-shelf with alterations
(E) All of these can be purchased
Ans : (D)

38. You can use………to copy selected text, and ……… to paste it in a document.
(A) CTRL + C, CTRL + V
(B) CTRL + C, CTRL + P
(C) CTRL + S, CTRL + S
(D) SHIFT + C, ALT + P
(E) CTRL + D, CTRL + A
Ans : (A)

39. Video processors consist of ……… and ……, which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) VGA and VGI
Ans : (C)

40. The main memory of a computer can also be called—
(A) primary storage
(B) internal memory
(C) primary memory
(D) All of these
(E) None of these
Ans : (C)

41. Computer software can be defined as—
(A) the computer and its associated equipment
(B) the instructions that tell the computer what to do
(C) computer components that act to accomplish a goal
(D) an interface between the computer and the network
(E) the interaction between the computer and its database
Ans : (B)

42. When speaking of computer input and output, input refers to—
(A) any data processing that occurs from new data input into the computer
(B) retrieval of data or information that has been input into the computer
(C) data or information that has been entered into the computer
(D) the transmission of data that has been input into the computer
(E) Both (C) and (D) above
Ans : (E)

43. A ……… is a set of rules.
(A) resource locator
(B) domain
(C) hypertext
(D) URL
(E) protocol
Ans : (E)

44. The connection between your computer at home and your local ISP is called—
(A) the last mile
(B) the home stretch
(C) the home page
(D) the backbone
(E) the vital mile
Ans : (C)

45. All of the logic and mathematical calculations done by the computer happen in/on the—
(A) system board
(B) central control unit
(C) central processing unit
(D) mother board
(E) memory
Ans : (C)

46. There are several primary categories of procedures. Which of the following is not a primary category of procedures ?
(A) Testing
(B) Backup and recovery
(C) Firewall development
(D) Design
(E) None of these
Ans : (C)

47. The operating system called UNIX is typically used for—
(A) desktop computers
(B) laptop computers
(C) supercomputers
(D) Web servers
(E) All of these
Ans : (E)

48. The………file format is a method of encoding pictures on a computer.
(A) HTML
(B) JPEG
(C) FTP
(D) URL
(E) DOC
Ans : (B)

49. Press………to move the insertion point to the Address box, or to highlight the URL in the Address box.
(A) ALT + D
(B) ALT + A
(C) SHIFT + TAB
(D) TAB + CTRL
(E) CTRL + S
Ans : (A)

50. Computer systems are comprised of—
(A) hardware, programs, information, people and networks
(B) hardware, software, procedures, networks and people
(C) hardware, programs, information, people and procedures
(D) hardware, programs, processors, procedures, networks and people
(E) hardware, programs, processors, procedures and people
Ans : (A)

------------------------------------------------------------------------------------------------------------


1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A

11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D

12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D

13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B

14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B

16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C

17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D

19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C

20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B

21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C

22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C

23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A

24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C

25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D

26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A

27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B

28. The ____________, also called the “brains” of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D

29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B

30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A

31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B

32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C

35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B

38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D

39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A

40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A

41. Which of the following is the correct order of the four major functions of a computer?
A. Process à  Output à  Input à  Storage
B. Input à  Outputà  Process à  Storage
C. Process à  Storage à  Input à  Output
D. Input à  Process à  Output à  Storage
Answer: D

42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A

43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B

44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B

46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A

49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D

50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A

Fill in the Blank:-

51. Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation.
Answer: Mac

52. The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices.
Answer: operating system


53. The type of operating system software you use depends on your computer’s ____________.
Answer: platform

54. ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet.
Answer: Application

55. ____________are the fastest and most expensive computers.
Answer: Supercomputers

56. A ____________ is approximately 1,000 bytes.
Answer: kilobyte

57. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________.
Answer: instructions

58. A computer gathers data, processes it, outputs the data or information, and ____________ the data or information.
Answer: stores


59. The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1

60. A string of ____________ 0s and 1s is called a byte.
Answer: eight (8)

61. The devices you use to enter data into a computer system are known as ____________ devices.
Answer: input

62. The devices on a computer system that let you see the processed information are known as ____________ devices.
Answer: output

63. ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks.
Answer: Software

64. When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP).
Answer: Internet

65. ____________ are computers that excel at executing many different computer programs at the same time.
Answer: Mainframes

66. ____________is the application of computer systems and techniques to gather legal evidence.
Answer: Computer forensics

67. ____________ is the science that attempts to create machines that will emulate the human thought process.
Answer: Artificial intelligence (AI)

68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system.
Answer: Microsoft Windows

69. A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns.
Answer: data mining

70. Hard disk drives and CD drives are examples of ____________ devices.
Answer: storage

71. You would use ____________ software to create spreadsheets, type documents, and edit photos.
Answer: application

72. ____________ are computers that support hundreds or thousands of users simultaneously.
Answer: Mainframes

73. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating.
Answer: Identity theft

74. Surgeons are using ____________ to guide robots to perform delicate surgery.
Answer: computers

75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans.
Answer: simulators
True and False


76. Currently, the performance of tasks by robots is based on preprogrammed algorithms.
Answer: True

77. Data can be a number, a word, a picture, or a sound.
Answer: True


78. Strictly defined, a computer is a data processing device.
Answer: True

79. The discrepancy between the “haves” and “have-nots” with regard to computer technology is commonly referred to as the digital society.
Answer: False (digital divide)

80. One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that posethreats to computer security.
Answer: True

81. Trend-spotting programs, developed for business, have been used to predict criminal activity.
Answer: True

82. Employers do not have the right to monitor e-mail and network traffic on employee systems used at work.
Answer: False

83. Clicking on an icon with the mouse is a form of giving an instruction to the computer.
Answer: True

84. Output devices store instructions or data that the CPU processes.
Answer: False (memory)

85. The CPU and memory are located on a special circuit board in the system unit called the motherboard.
Answer: True

86. Nanostructures represent the smallest human-made structures that can be built.
Answer: True


87. The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible,whereas mainframes are designed to handle many programs running at the same time (but at a slower pace).
Answer: True

88. Being computer fluent means that you should be able to build a computer yourself.
Answer: False

89. Embedded computers are self-contained computer devices that have their own programming and do not receive input.
Answer: True

90. A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network.
Answer: False (network adapter)

91. With a wireless network, it is easier to relocate devices.
Answer: True

92. The most common type of memory that the computer uses to process data is ROM.
Answer: False (RAM)

Matching:


93. Match the following terms with their approximate size:
I. kilobyte A. one million bytes
II. byte B. eight bits
III. gigabyte C. one thousand bytes
IV. megabyte D. one billion bytes
V. terabyte E. one trillion bytes
Answer: C, B, D, A, E


94. Match the following terms with their meanings:
I. printer A. storage device
II. scanner B. output device
III. RAM C. input device
IV. CPU D. a type of memory
V. CD drive E. processor
Answer: B, C, D, E, A


95. Match the following terms with their meanings:
I. mainframe A. the most expensive computers that perform complex calculations extremely rapidly
II. supercomputer B. a computer that provides resources to other computers connected to a network
III. embedded computer C. a large, expensive computer that supports hundreds or thousands of users simultaneously
IV. PDA D. a self-contained computer device that usually performs preprogrammed functions such as temperature control
V. server E. a small mobile computing device
Answer: C, A, D, E, B


96. Match the following terms with their meanings:
I. software A. transforming data into information
II. hardware B. data that has been organized or presented in a meaningful fashion
III. operating system C. any part of the computer that you can physically touch
IV. processing D. a set of computer programs that enables hardware to perform different tasks
V. information E. the most common type of system software, it controls the way in which the computer system functions
Answer: D, C, E, A, B


97. Match the following terms with their meanings:
I. system software A. the set of programs that enables computer hardware devices and application software to work together
II. application software B. the kind of operating system software you will use depends on this
III. platform C. operating system software generally used on PCs
IV. Microsoft Windows D. a set of programs used to accomplish a specific task
V. Mac OS E. operating system software used on the Apple Macintosh
Answer: A, D, B, C, E


98. Match the following terms with their meanings:
I. data A. the main circuit board in the system unit
II. memory B. the representation of a fact or idea (unprocessed information)
III. output C. processed data or information
IV. storage D. holds instructions or data that the CPU processes
V. motherboard E. data or information that can be accessed again
Answer: B, D, C, E, A


99. Match the following terms with their meanings:
I. bit A. the science revolving around the use of nanostructures to build devices on an extremely small scale
II. binary language B. the case that contains the system components
III. instructions C. consists of 0s and 1s
IV. system unit D. short for binary digit
V. nanotechnology E. steps and tasks necessary to process data into usable information
Answer: D, C, E, B, A


100. Match the following fields to the related computer technology:
I. medicine A. Internet research and virtual tours
II. business B. data mining
III. law enforcement C. robotics and simulation
IV. education D. computer forensics
V. archeology E. digital recreations of ruins
Answer: C, B, D, A,E





GkG recommeds our readers to BUY IBPS Bank Clerk Online Practice Test Computer Knowledge - 1 By Upkar Prakashan --BUY NOW!!

ShareThis

Related Posts Plugin for WordPress, Blogger...