Tuesday 24 January 2012

BANK PO COMPUTER NOWLEDGE



1. Lotus Organizer and Corel Central are examples of ____________ software.
D. PIM(personal information manager software)

2. For which of the following tasks would PIM software be most useful?
B. Maintaining a schedule


3. The smallest unit of information in a database is called a:
C. field.

4. In a database of employees, all the information about a particular person would constitute a:
B. record.

5. A table is a collection of:
D. records.

6. A ____________ is a small program that helps to automate a frequently used series of commands in most productivity software tools.
B. macro

7. Software providers who develop many productivity tools may also provide stripped-down versions that combine the simpler features of these tools bundled together into a(n):
C. integrated software application.

8. Microsoft Office is an example of a(n):
A. software suite.

9. When talking to a speech recognition program, the program divides each second of your speech into 100 separate:
C. samples.

10. Small business owners who want software to assist in managing accounts payable and receivable will likely use which of the following software products?
A. QuickBooks

11. The category of software most appropriate for controlling the design and layout of complex documents like newsletters and brochures is:
D. desktop publishing.

12. Which of the following software products would you use in order to enhance the quality of a photograph that you have recently imported from your digital camera, and would likely have been included with the digital camera when you bought it?
A. ArcSoft

13. Drawing flow charts, block diagrams, and other technical graphics is best accomplished using which of the following software products?
B. Microsoft Visio

14. CAD software is most likely to be used by:
B. engineers.

15. The category of operating system that you most likely have running on your desktop or laptop computer at home is a ____________ operating system.
C. single-user, multi-task

16. The category of operating system that you most likely have running on your PDA computer is a ____________ operating system.
B. single-user, single-task

17. Which of the following is an example of a real-time operating system?
A. Lynx

18. A real-time operating system is most likely to be used for which of the following tasks?
D. Controlling the fuel injection system of an automobile engine

19. An essential difference between the operating system that runs a typical desktop computer and the operating system that runs a typical PDA is that:
B. the desktop OS can run several programs simultaneously whereas the PDA OS cannot.

20. The MS-DOS operating system is a:
C. command-driven interface, single-tasking operating system.

21. Which of the following was an early desktop operating system that included an integrated graphic user interface with point-and-click features?
B. Mac OS

22. The most recent version of the Mac OS is based on the ____________ operating system.
C. Unix

23. The essential difference between an operating system like Linux and one like Windows is that:
C. any programmer can modify Linux code, which is not permitted with Windows.

24. Use of icons and windows are characteristic of a ____________ interface.
C. graphical-user

25. The ability of an operating system to control the activities of multiple programs at the same time is called:
A. multitasking.

26. The operating system controls access to the CPU by assigning a(n) ____________ to each task requiring CPU utilization.
B. slices of time

27. When a peripheral device needs immediate attention from the operating system, it generates a(n):
A. interrupt.

28. User actions such as keystrokes or mouse clicks are referred to as:
C. events.

29. An interrupt handler is a:
D. special numeric code that indicates the priority of an interrupt.

30. Virtual memory is typically located:
D. on the hard disk.

31. Thrashing is caused by:
A. over-reliance on swapping to virtual memory.
32. Communication between the operating system and a peripheral device such as a CD-ROM drive or a printer is facilitated by a(n):
C. device driver.

33. Common functions and routines that need to be executed by many computer programs can be made available via a(n) ____________, which prevents the necessity for programmers to duplicate the effort of writing the same type of code.
D. application program interface

34. Which of the following is the correct sequence of actions that take place during the boot-up process?
B. Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings

35. The program that is responsible for loading the operating system into RAM is the:
A. BIOS.

36. The Basic Input/Output system resides in:
B. ROM.

37. When you start up the computer, the boot-up stage at which the BIOS version, manufacturer, and data are displayed on the monitor is called:
B. power-on self test.

38. A process known as ____________ is used by large retailers to study trends.
A. data mining

39. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
B. Point-of-sale (POS)

40. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS

41. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
C. computer forensics.

42. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
B. RFID

43. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.

44. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.

45. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience

46. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
D. Artificial intelligence (AI)

47. ____________ is data that has been organized or presented in a meaningful fashion.
D. Information

48. The name for the way that computers manipulate data into information is called:
B. processing.

49. Computers gather data, which means that they allow users to ____________ data.
B. input

50. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
B. output.

51. Computers use the ____________ language to process data.
C. binary

52. Computers process data into information by working exclusively with:
D. numbers.

53. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
D. eight bits.

54. The term bit is short for:
C. binary digit.

55. A string of eight 0s and 1s is called a:
B. byte.

56. A ____________ is approximately one billion bytes.
C. gigabyte

57. A ____________ is approximately a million bytes.
C. megabyte

58. ____________ is any part of the computer that you can physically touch.
A. Hardware

59. The components that process data are located in the:
C. system unit.

60. The ____________, also called the “brains” of the computer, is responsible for processing data.
D. central processing unit (CPU)

61. The CPU and memory are located on the:
B. motherboard.

62. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.

63. ____________ is a set of computer programs used on a computer to help perform tasks.
B. Software

64.
System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
D. application

65. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.

66. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
C. CPUs

67. Servers are computers that provide resources to other computers connected to a:
A. network.

68. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
D. mainframes

69. ____________ are specially designed computers that perform complex calculations extremely rapidly.
B. Supercomputers

70. DSL is an example of a(n) ____________ connection.
D. broadband

71. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.

72. Which of the following is the correct order of the four major functions of a computer?
D. Input → Process → Output → Storage

73. The binary language consists of ____________ digit(s).
B. 2

74. A byte can hold one ____________ of data.
C. character

75. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
B. The operating system

76. The operating system is the most common type of ____________ software.
C. system

77. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
B. Embedded computers
78. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.

79. The two broad categories of software are:
D. system and application.

80. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.

Fill in the Blank:

81. Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation.
Answer: Mac
82. The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices.
Answer: operating system

83. The type of operating system software you use depends on your computer’s ____________.
Answer: platform
84. ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet.
Answer: Application
85. A ____________ is approximately 1,000 bytes.
Answer: kilobyte
86. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________.
Answer: instructions
87. ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks.
Answer: Software
88. When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP).
Answer: Internet
89. ____________ are computers that excel at executing many different computer programs at the same time.
Answer: Mainframes
90. ____________is the application of computer systems and techniques to gather legal evidence.
Answer: Computer forensics
91. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system.
Answer: Microsoft Windows

92. Hard disk drives and CD drives are examples of ____________ devices.
Answer: storage

93. ____________ are computers that support hundreds or thousands of users simultaneously.
Answer: Mainframes
94. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating.
Answer: Identity theft
95. Surgeons are using ____________ to guide robots to perform delicate surgery.
Answer: computers
96. A passive threat to computer security is—
(1) Malicious Intent

97. The Secure Electronic Transaction (SET) specification—
(4) uses a public-key encryption to secure credit-card transaction systems

98. ……………allows wireless mobile devices to access the Internet and its services such as the Web and e-mail—
(3)WAP

99. 'DOS' floppy disk does not have—
(4) Virtual Memory

100. 'MICR' technology used for clearance of cheques by banks refers to—
(1) Magnetic Ink Character Recognition

101. All the information collected during database development is stored in a—
(2) data warehouse

102. A(n)…………….allows network users to share a single copy of software, which resides on the network server.
(2) network site license

103. A polymorphic virus—
(1) modifies its program code each time it attaches itself to another program or file

104. Which is NOT a good Web security strategy?
(4) Remove unnecessary compilers and interpreters.

105. The word FIP stands for—
(1) File Translate Protocol

106. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is—
(2) Gateway

107. Which of the following is a general-purpose programming language, designed by
Sun Microsystems, and well suited for use on the Web?
(2) Java Script

108. RSA is—
(4) Digital Signature

109. A DVD-RAM is similar to a………………except it has storage capacities up to 5.2 GB.
(3) CD-RW

110. How is power supplied to a low-power USB device?
(4) Through the USB cable

111. The………….data mining technique derives rules from real-world case examples.
(3) Neural nets

112. …………….are used to identify a user who returns to a Website.
(1) Cookies

113. Which of the following is a part of the Central Processing Unit?
d. Arithmetic & Logic unit
114. CAD stands for
a. Computer aided design

115. A program written in machine language is called?
a. Assembler

116. The father of Modern Computer is
a. Charles Babbage

117. The lowest form of Computer language is called
c. Machine Language
118. Best Quality graphics is produced by
d. Plotter

119. Memory which forgets every thing when you switch off the power is known as
b. Volatile

120. The linking of computers with a communication system is called
a. Networking

121. The 16 bit Microprocessor means that it has
c. 16 Data lines

122. Which of the following refers to a small, single-site network?
a. LAN

123. Microsoft Office is
e. An application suite

124. How many options does a BINARY choice offer
c. Two

125. A collection of program that controls how your computer system runs and processes information is called
a. Operating System

126. Computer connected to a LAN (Local Area Network) can
c. share information and /or share peripheral equipment

127. Information travels between components on the mother board through
c. Bays

128. How are data organized in a spreadsheet?
d. Rows & Columns

129. The blinking symbol on the computer screen is called the
e. cursor

130. A fault in a computer program which prevents it from working correctly is known as
b. Bug

131. A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is _________
d. Worm

132. A _______ is a bi-stable electronic circuit that has two stable states.
b. Flip-flop
133. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as
a. Spam

134. DOS stands for
a. Disk Operating System

135. IBM stands for
c. International Business Machines

136.___________ translates and executes program at run time line by line
b. Interpreter

137. ___________ is an OOP principle
c. Inheritance

138. COBOL is widely used in _________ applications
a. Commercial

139. SMPS stands for
a. Switched mode power supply

140. The device used to carry digital data on analog lines is called as
a. Modem

141. VDU is also called
a. Screen and/or Monitor

142. BIOS stand for
a. Basic Input Output system

No comments:

Post a Comment

UA-28469353-1 - http://examibps.blogspot.com/