You tube

வியாழன், 20 நவம்பர், 2014

Computer GK for Bank P.O. and Clerk Exams


1. All of the following are examples of real security and privacy risks EXCEPT:
(A) hackers. (B) spam. (C) viruses. (D) identity theft.
Ans : B

2. A process known as ____________ is used by large retailers to study trends.
(A) data mining (B) data selection (C) POS (D) data conversion
Ans : A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
(A) Data (B) Point-of-sale (POS) (C) Sales (D) Query
Ans : B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
(A) PSS (B) POS (C) inventory (D) data mining
Ans : A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
(A) robotics. (B) simulation. (C) computer forensics. (D) animation.
Ans : C

6. Which of the following is NOT one of the four major data processing functions of a computer?
(A) gathering data (B) processing data into information
(C) analyzing the data or information (D) storing the data or information
Ans : C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
(A) POS (B) RFID (C) PPS (D) GPS
Ans : B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
(A) robotics. (B) computer forensics. (C) simulation. (D) forecasting.
Ans : A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
(A) proprietary. (B) open. (C) experimental. (D) in the public domain.
Ans : A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
(A) Nanoscience (B) Microelectrodes (C) Computer forensics (D) Artificial intelligence
Ans : A

11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
(A) Nanoscience (B) Nanotechnology (C) Simulation (D) Artificial intelligence (AI)
Ans : D

12. ____________ is data that has been organized or presented in a meaningful fashion.
(A) A process (B) Software (C) Storage (D) Information
Ans : D

13. The name for the way that computers manipulate data into information is called:
(A) programming. (B) processing. (C) storing. (D) organizing.
Ans : B

14. Computers gather data, which means that they allow users to ____________ data.
(A) present (B) input (C) output (D) store
Ans : B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
(A) data. (B) output. (C) input. (D) the process.
Ans : B

16. Computers use the ____________ language to process data.
(A) processing (B) kilobyte (C) binary (D) representational
Ans : C

17. Computers process data into information by working exclusively with:
(A) multimedia. (B) words. (C) characters. (D) numbers.
Ans : D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
(A) eight bytes. (B) eight kilobytes. (C) eight characters. (D) eight bits.
Ans : D

19. The term bit is short for:
(A) megabyte. (B) binary language. (C) binary digit. (D) binary number.
Ans : C

20. A string of eight 0s and 1s is called a:
(A) megabyte. (B) byte. (C) kilobyte. (D) gigabyte.
Ans : B

21. A ____________ is approximately one billion bytes.
(A) kilobyte (B) bit (C) gigabyte (D) megabyte
Ans : C

22. A ____________ is approximately a million bytes.
(A) gigabyte (B) kilobyte (C) megabyte (D) terabyte
Ans : C

23. ____________ is any part of the computer that you can physically touch.
(A) Hardware (B) A device (C) A peripheral (D) An application
Ans : A

24. The components that process data are located in the:
(A) input devices. (B) output devices. (C) system unit. (D) storage component.
Ans : C

25. All of the following are examples of input devices EXCEPT a:
(A) scanner. (B) mouse. (C) keyboar(D) (D) printer.
Ans : D

26. Which of the following is an example of an input device?
(A) scanner (B) speaker (C) CD (D) printer
Ans : A

27. All of the following are examples of storage devices EXCEPT:
(A) hard disk drives. (B) printers. (C) floppy disk drives. (D) CD drives.
Ans : B

28. The ____________, also called the “brains” of the computer, is responsible for processing data.
(A) motherboard (B) memory (C) RAM (D) central processing unit (CPU)
Ans : D

29. The CPU and memory are located on the:
(A) expansion boar(D) (B) motherboard. (C) storage device. (D) output device.
Ans : B

30. Word processing, spreadsheet, and photo-editing are examples of:
(A) application software. (B) system software. (C) operating system software. (D) platform software.
Ans : A

31. ____________ is a set of computer programs used on a computer to help perform tasks.
(A) An instruction (B) Software (C) Memory (D) A processor
Ans : B

32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
(A) management (B) processing (C) utility (D) application
Ans : D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:
(A) platforms. (B) applications. (C) programs. (D) storage devices.
Ans : A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
(A) languages (B) methods (C) CPUs (D) storage devices
Ans : C

35. Servers are computers that provide resources to other computers connected to a:
(A) network. (B) mainframe. (C) supercomputer. (D) client.
Ans : A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
(A) supercomputers (B) clients (C) laptops (D) mainframes
Ans : D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
(A) Servers (B) Supercomputers (C) Laptops (D) Mainframes
Ans : B

38. DSL is an example of a(n) ____________ connection.
(A) network (B) wireless (C) slow (D) broadband
Ans : D

39. The difference between people with access to computers and the Internet and those without this access is known as the:
(A) digital divide. (B) Internet divide. (C) Web divide. (D) broadband divide.
Ans : A

40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
(A) Nanotechnology (B) Micro-technology (C) Computer forensics (D) Artificial intelligence
Ans : A

41. Which of the following is the correct order of the four major functions of a computer?
(A) Process à Output à Input à Storage (B) Input à Outputà Process à Storage
(C) Process à Storage à Input à Output (D) Input à Process à Output à Storage
Ans : D

42. ____________ bits equal one byte.
(A) Eight (B) Two (C) One thousand (D) One million
Ans : A

43. The binary language consists of ____________ digit(s).
(A) 8 (B) 2 (C) 1,000 (D) 1
Ans : B

44. A byte can hold one ____________ of data.
(A) bit (B) binary digit (C) character (D) kilobyte
Ans : C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
(A) The platform (B) The operating system (C) Application software (D) The motherboard
Ans : B

46. The operating system is the most common type of ____________ software.
(A) communication (B) application (C) system (D) word-processing software
Ans : C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
(A) Servers (B) Embedded computers (C) Robotic computers (D) Mainframes
Ans : B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
(A) instructions. (B) the operating system. (C) application software. (D) the system unit.
Ans : A

49. The two broad categories of software are:
(A) word processing and spreadsheet. (B) transaction and application.
(C) Windows and Mac OS. (D) system and application.
Ans : D

50. The metal or plastic case that holds all the physical parts of the computer is the:
(A) system unit. (B) CPU. (C) mainframe. (D) platform.
Ans : A




1. A constructor is called whenever–
(A) an object is created (B) an object is used
(C) a class is declared (D) a class is used
Ans : (A)

2. In object oriented design of software, which of the following is not true?
(A) Objects inherit the properties of the class
(B) Classes are defined based on the attributes of objects
(C) An object can belong to two classes
(D) Classes are always different
Ans : (C)

3. The maximum number of dimension any array can have in clanguage is–
(A) 3 (B) 4
(C) 5 (D) compiler dependent
Ans : (D)

4. Data structure suitable for the application is discussed in–
(A) Data design (B) Architectural design
(C) Procedural design (D) Interface design
Ans : (A)

5. The following program fragment–
Int a = 5, b = 6;
Print f ("%d", a = =b);
Prints
(A) Outputs an error message (B) Prints 0
(C) Prints 1 (D) None of the above
Ans : (A)

6. Which of the following bus types are used by Apple Macintosh Computer?
(A) ISA (B) NuBus
(C) EISA (D) MCA
Ans : (A)

7. What is the difference in the degree measures of the angles in degrees formed by the hour hand and the minute hand of a clock at 12 : 35 and 12 : 36 ?
(A) 1(B) 5
(C) 5.5 (D) 6
Ans : (C)

8. The extent to which the software can continue to operate correctly despite the introduction of invalid input is called–
(A) Reliability (B) Robustness
(C) Fault tolerance (D) Portability
Ans : (B)

9. What is the maximum transfer speed of the wireless 802.11 a standard?
(A) 100 Mbps (B) 54 Mbps
(C) 24 Mbps (D) 10 Mbps
Ans : (B)

10. How many bits are in a mega-bit?
(A) 1000000 (B) 1024
(C) 256 (D) 8
Ans : (A)

11. Which of the below commands displays the time on most Linux and Unix computers?
(A) Time (B) Date
(C) Timex (D) Now
Ans : (B)

12. Which of the following is not considered a super user?
(A) Admin (B) Agent
(C) Op (D) Root
Ans : (B)

13. Design phase includes–
(A) Data, architectural and procedural designs only
(B) Architectural, procedural and interface designs only
(C) Data, architectural and interface design only
(D) Data, architectural, interface and procedural designs
Ans : (A)

14. Which year was Microsoft Windows XP released?
(A) 2000 (B) 2001
(C) 2002 (D) 2003
Ans : (B)

15. The railway reservation system currently operational in India can be classified as a–
(A) Batch processing system (B) Real time system
(C) Online system (D) Expert system
Ans : (C)

16. In C language x – = y + 1 means–
(A) x = x – y + 1 (B) x = – x – y – 1
(C) x = – x + y + 1 (D) x = x – y –1
Ans : (D)

17. The topology with highest reliability is–
(A) Bus topology (B) Star topology
(C) Ring topology (D) Mesh topology
Ans : (D)

18. The method of communication in which transmission takes place in both directions, but only in one direction at a time is called–
(A) Simplex (B) Four wire circuit
(C) Full duplex (D) Half duplex
Ans : (C)

19. Judy is now twice as old as Adam, but 6 years ago, she was 5 times as old as he was. How old is Judy now?
(A) 10 (B) 16
(C) 20 (D) 24
Ans : (B)

20. The following loop–
for (i = 1, j = 10; i < 6; ++ i, – – j)
print f("% d %d", i, j);
prints
(A) 1 10 2 9 3 8 4 7 5 6
(B) 1 2 3 4 5 10 9 8 7 6
(C) 1 1 1 1 1 9 9 9 9 9
(D) None of the above
Ans : (D)

21. The cost for storing a bit is minimum in–
(A) cache (B) register
(C) RAM (D) magnetic tape
Ans : (D)

22. In C language–
Print f ("ab", "cd", "ef");
Prints
(A) ab (B) abcdef
(C) abcdef, followed by garbage (D) None of the above
Ans : (B)

23. If 7x + 3y = 17 and 3x + 7y = 19, what is the average of x and y ?
(A) 31/30 (B) 3.6
(C) 1.8 (D) 36
Ans : (C)

24. C++ was originally developed by–
(A) Clocksin and Mellish (B) Donal E. Knuth
(C) Sir Richard Hadlee (D) Bjarne Stroustrup
Ans : (D)

25. An important aspect in coding is–
(A) Readability
(B) Productivity
(C) To use as small memory space as possible
(D) Brevity
Ans : (A)

26. The term MIPS refers to–
(A) Millions of instructions per second
(B) Multiple instruction per second
(C) Megabytes of instructions per second
(D) Million input processor set
Ans : (A)

27. The following loop–
For putchar (‘ c’): putchar (‘a’);
putchar (‘r); putchar (‘t’);
Outputs–
(A) a syntax error (B) cartrt
(C) catrat (D) catratratratrat ……
Ans : (A)

28. Which of the following is a desirable property of a module?
(A) Independency (B) Low cohesiveness
(C) High coupling (D) Multi functional
Ans : (A)

29. cfront–
(A) Is the front end of C compiler
(B) Is the pre-processor of a C compiler
(C) Translates a C++ code to its equivalent C code
(D) None of the above
Ans : (C)

30. A jar contains 10 red marbles and 30 green ones. How many red marbles must be added to the jar so that 60% of the marbles will be red?
(A) 25 (B) 30
(C) 35 (D) 40
Ans : (C)

31. Baud means–
(A) the number of bits transmitted per unit time
(B) the number of bytes transmitted per unit time
(C) the rate at which signal changes
(D) None of the above
Ans : (C)

32. Which of the below is not a type of printer?
(A) Bubble Jet printer (B) LED printer
(C) Thermal printer (D) Microwave printer
Ans : (D)

33. At a High School each student studies exactly one foreign language. Three-fifths of the students take Spanish and one- fourth of the remaining students take German. If all of the others French, what percentage of the student take French?
(A) 10 (B) 15
(C) 20 (D) 30
Ans : (D)

34. Which of the below people is credited for developing the World Wide Web?
(A) Alan Kay (B) Tim Bemers-Lee
(C) Jack Kilby (D) Robert Noyee
Ans : (B)

35. Integer division results in–
(A) Truncation (B) Rounding
(C) Overflow (D) None of the above
Ans : (A)

Directions–(Q. 36 to 39) As part of their sports physicals, seven collegiate athletes-F, G, H, I, J, K and L are being weighed. In announcing the results of the physical exams, the coach has given the following information–
None of the athletes has exactly the same weight as another athlete,
K is heavier than L, but lighter than H.
I is heavier than J.
Both F and G are heavier than H.

36. If H is heavier than I, which of the following cannot be true ?
(A) I’s weight is equal to the average of weights of F and G
(B) I’s weight is equal to the average of weights of K and L
(C) J’s weight is equal to the average of weights of K and L
(D) J is the second lightest
Ans : (A)

37. Each of the following could be true except–
(A) F is heaviest (B) G is heaviest
(C) I is heaviest (D) More than three athletes are lighter than K
Ans : (D)

38. Which of the following, if true, would be sufficient to determine which athlete is the lightest?
(A) I is the heaviest (B) I is lighter than K
(C) K is heavier than J (D) J is heavier than K 
Ans : (D)

39. If J is heavier than F, how many different rankings by weight of the athletes are possible?
(A) 1 (B) 2
(C) 4 (D) 6
Ans : (C)

40. On a certain project, the only grades awarded were 75 and 100. If 85 students completed the project and the average of their grades was 85, how many earned 100 ?
(A) 34 (B) 40
(C) 45 (D) 51
Ans : (A)

41. In a group of 100 students, more students are on the fencing team than are members of the French club. If 70 are in the club and 20 are neither on the team nor in the club, what is the minimum number of students who could be both on the team and in the club?
(A) 10 (B) 49
(C) 60 (D) 61
Ans : (D)

42. If it is now June, what month will it be 400 months from now?
(A) January (B) April
(C) June (D) October
Ans : (D)

43. As a fund-raiser, the school band was selling two types of candy : lollipops for 40 cents each and chocolate bars for 75 cents each. They sold 150 candies and raised 74 dollars (1 dollar = 100 cents). How many lollipops did they sell ?
(A) 75 (B) 90
(C) 96 (D) 110
Ans : (D)

44. AI’s GPA is higher than Bob’s. Carol’s GP A is lower than Bob’s but it is higher than Dan’s. If the preceding statements are true, which of the following statements would have to be true in order to conclude that Ellen has a higher GP A than carol ?
(A) Ellen’s GP A is higher than Dan’s
(B) Bob’s GP A is lower than Ellen’s
(C) Ellen’s GPA is equal to the average of GP As of AI’s and Dan’s
(D) AI’s GP A is higher than Ellen’s
Ans : (B)

45. Howard has three times as much money as Ronald. If Howard gives Ronald $ 50, Ronald will then have three times as much money as Howard. How much money do the two of them have together?
(A) $ 75 (B) $ 100
(C) $ 125 (D) $ 150
Ans : (B)
Allahabad Bank Probationary Officers Exam., 2011
(Held on 17-4-2011)
Computer Knowledge : Solved Paper
1. Which of the following are advantages of CD-ROM as a storage media ?
(A) CD-ROM is an inexpensive way to store large amount of data and information
(B) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) All of these
(E) None of these
Ans : (D)

2. A ……… is the term used when a search engine returns a Web page that matches the search criteria.
(A) blog
(B) hit
(C) link
(D) view
(E) success
Ans : (C)

3. The ……… is the term used to describe the window that is currently being used.
(A) Web Window
(B) display area
(C) WordPad Window
(D) active window
(E) monitor
Ans : (D)


4. CPU is an abbreviation for—
(A) central programming unit
(B) central processing unit
(C) computer processing unit
(D) computer protocol unit
(E) central protocol unit
Ans : (B)

5. A microprocessor is the brain of the computer and is also called a(n)—
(A) microchip
(B) macrochip
(C) macroprocessor
(D) calculator
(E) software
Ans : (A)

6. Storage and memory differ with respect to which of the following characteristics ?
(A) Price
(B) Reliability
(C) Speed
(D) All of these
(E) None of these
Ans : (D)

7. What are two examples of freeware ?
(A) WinZip and Linux
(B) Shareware and file sharing
(C) Microsoft Word and the Google toolbar
(D) Instant messaging and the Google toolbar
(E) Microsoft Power Point and Microsoft Excel
Ans : (D)

8. If a disk drive fails but the computer application running and using it can continue processing, this application is said to have been designed with this feature—
(A) 100 per cent uptime
(B) fault tolerance
(C) high reliability
(D) All of these
(E) None of these
Ans : (B)

9. What is e-commerce ?
(A) Buying and selling international goods
(B) Buying and selling products and services over the Internet
(C) Buying and selling products and services not found in stores
(D) Buying and selling products having to do with computers
(E) Buying and selling of electronic goods
Ans : (B)

10. What are the four things needed to connect to the Internet ?
(A) Telephone line, modem, computer, and an ISP
(B) Modem, computer, PDA and ISP
(C) Telephone line, PDA, modem and computer
(D) Computer, ISP, modem and communication software
(E) Monitor, keyboard, mouse, modem
Ans : (A)

11. Which of the following functions are not performed by servers ?
(A) Email processing
(B) Database sharing
(C) Processing Web sites
(D) Storage
(E) Word processing
Ans : (E)

12. Which media have the ability to have data/information stored (written) on them by users more than once ?
(A) CD-R disks
(B) CD-RW disks
(C) Zip disks
(D) OptiDisks
(E) Both CD-RW disks and Zip disks
Ans : (A)

13. The process of transferring files from a computer on the Internet to your computer is called—
(A) downloading
(B) uploading
(C) FTP
(D) JPEG
(E) downsizing
Ans : (C)

14. The………controls a client computer’s resources.
(A) application program
(B) instruction set
(C) operating system
(D) server application
(E) compiler
Ans : (D)

15. To reload a Web page, press the ……… button.
(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh
Ans : (E)

16. Which of the following could be digital input devices for computers ?
(A) Digital camcorder
(B) Microphone
(C) Scanner
(D) All of the above
(E) None of these
Ans : (D)

17. The………enables you to simultaneously keep multiple Web pages open in one browser window.
(A) tab box
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key
Ans : (A)

18. You can use the………bar to type a URL and display a Web page, or type a keyword to display a list of related Web pages.
(A) menu
(B) Title
(C) Search
(D) Web
(E) Address
Ans : (E)

19. Storage media such as a CD read and write information using—
(A) a laser beam of red light
(B) magnetic dots
(C) magnetic strips
(D) All of these
(E) None of these
Ans : (D)

20. Vendor-created program modifications are called—
(A) patches
(B) antiviruses
(C) holes
(D) fixes
(E) overlaps
Ans : (D)

21. Cache and main memory will lose their contents when the power is off. They are—
(A) dynamic
(B) static
(C) volatile
(D) non-volatile
(E) faulty
Ans : (C)

22. The collection of links throughout the Internet creates an interconnected network called the—
(A) WWW
(B) Web
(C) World Wide Web
(D) All of the above
(E) Wide Area Web
Ans : (D)

23. Every computer has a(n) ………;
many also have.
(A) operating system, a client system
(B) operating system; instruction sets
(C) application programs; an operating system
(D) application programs; a client system
(E) operating system; application programs
Ans : (E)

24. Main memory works in conjunction with—
(A) special function cards
(B) RAM
(C) CPU
(D) Intel
(E) All of these
Ans : (C)

25. A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using—
(A) input automation
(B) item data automation
(C) scanning automation
(D) source data automation
(E) None of these
Ans : (C)

26. A(n)……is composed of several computers connected together to share resources and data.
(A) Internet
(B) network
(C) backbone
(D) hyperlink
(E) protocol
Ans : (B)

27. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information—
(A) floppy diskette
(B) hard disk
(C) permanent disk
(D) optical disk
(E) None of these
Ans : (B)

28. Microsoft Office is an example of a—
(A) closed-source software
(B) open-source software
(C) horizontal-market software
(D) vertical-market software
(E) compiler
Ans : (A)

29. A popular way to learn about computers without ever going to a classroom is called—
(A) i-learning
(B) isolated learning
(C) e-learning
(D) close learning
(E) Distance Learning
Ans : (C)

30. A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a—
(A) spammer
(B) hacker
(C) instant messenger
(D) programmer
(E) analyst
Ans : (B)

31. Which of the following is an example of storage devices ?
(A) Magnetic disks
(B) Tapes
(C) DVDs
(D) All of these
(E) None of these
Ans : (D)

32. The………folder retains copies of messages that you have started but are not yet ready to send.
(A) Inbox
(B) Outbox
(C) Drafts
(D) Sent Items
(E) Address Book
Ans : (C)

33. Which of the following is an example of an optical disk ?
(A) Digital versatile disks
(B) Magnetic disks
(C) Memory disks
(D) Data bus disks
(E) None of these
Ans : (A)

34. The main job of a CPU is to—
(A) carry out program instructions
(B) store data/information for future use
(C) process data and information
(D) Both (A) and (C)
(E) None of these
Ans : (D)

35. ……are attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing trips
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) Phishing scams
Ans : (E)

36. An example of a processing device would be—
(A) a magnetic ink reader
(B) a tablet PC
(C) special function cards
(D) scanners
(E) keyboards
Ans : (B)

37. Which of the following is not a type of computer software which can be bought ?
(A) Off-the-shelf
(B) Tailor-made
(C) Custom-developed
(D) Off-the-shelf with alterations
(E) All of these can be purchased
Ans : (D)

38. You can use………to copy selected text, and ……… to paste it in a document.
(A) CTRL + C, CTRL + V
(B) CTRL + C, CTRL + P
(C) CTRL + S, CTRL + S
(D) SHIFT + C, ALT + P
(E) CTRL + D, CTRL + A
Ans : (A)

39. Video processors consist of ……… and ……, which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) VGA and VGI
Ans : (C)

40. The main memory of a computer can also be called—
(A) primary storage
(B) internal memory
(C) primary memory
(D) All of these
(E) None of these
Ans : (C)

41. Computer software can be defined as—
(A) the computer and its associated equipment
(B) the instructions that tell the computer what to do
(C) computer components that act to accomplish a goal
(D) an interface between the computer and the network
(E) the interaction between the computer and its database
Ans : (B)

42. When speaking of computer input and output, input refers to—
(A) any data processing that occurs from new data input into the computer
(B) retrieval of data or information that has been input into the computer
(C) data or information that has been entered into the computer
(D) the transmission of data that has been input into the computer
(E) Both (C) and (D) above
Ans : (E)

43. A ……… is a set of rules.
(A) resource locator
(B) domain
(C) hypertext
(D) URL
(E) protocol
Ans : (E)

44. The connection between your computer at home and your local ISP is called—
(A) the last mile
(B) the home stretch
(C) the home page
(D) the backbone
(E) the vital mile
Ans : (C)

45. All of the logic and mathematical calculations done by the computer happen in/on the—
(A) system board
(B) central control unit
(C) central processing unit
(D) mother board
(E) memory
Ans : (C)

46. There are several primary categories of procedures. Which of the following is not a primary category of procedures ?
(A) Testing
(B) Backup and recovery
(C) Firewall development
(D) Design
(E) None of these
Ans : (C)

47. The operating system called UNIX is typically used for—
(A) desktop computers
(B) laptop computers
(C) supercomputers
(D) Web servers
(E) All of these
Ans : (E)

48. The………file format is a method of encoding pictures on a computer.
(A) HTML
(B) JPEG
(C) FTP
(D) URL
(E) DOC
Ans : (B)

49. Press………to move the insertion point to the Address box, or to highlight the URL in the Address box.
(A) ALT + D
(B) ALT + A
(C) SHIFT + TAB
(D) TAB + CTRL
(E) CTRL + S
Ans : (A)

50. Computer systems are comprised of—
(A) hardware, programs, information, people and networks
(B) hardware, software, procedures, networks and people
(C) hardware, programs, information, people and procedures
(D) hardware, programs, processors, procedures, networks and people
(E) hardware, programs, processors, procedures and people
Ans : (A)

கருத்துகள் இல்லை:

கருத்துரையிடுக

Ads Inside Post