Showing posts with label Computer General Awareness Questions. Show all posts
Showing posts with label Computer General Awareness Questions. Show all posts

Thursday, 19 January 2012

Computer Awareness Question Paper 5


1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A


Computer G K One Liner



Questions on Computer Awareness have recently been introduced in most Bank Recruitment exams. To help you prepare better for the Bank exams we present to you the revision notes on Computer Awareness.

The earlier computers, which were massive in size, were based on vacuum tubes.

Early computing machines, like the ENIAC, were actually meant to assist the armed forces.

Computer Awareness Question Paper 4



1)   1)   What does that acronym VGA stand for?
a) Extended Graphics Adapter
b) Enhanced Graphics Array
c) Video Graphics Array
d) Color Graphics Array

ComputerAwareness Question Paper 3



1. If a word is typed that is not in Word’s dictionary, a ___ wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans (A)



2. The _____ button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans (D)


ComputerAwareness Question Paper 2



1.      Which of the following is NOT a necessary characteristic of computer fluency?
A. Understanding the capabilities and limitations of computers
B. Being able to write computer programs
C. Becoming comfortable with the use of computers
D. Understanding the legal, ethical, and societal implications of computing
Answer: B
2. According to the U.S. Department of Labor, approximately ____________ % of American workers used computers on the job as of 2001.
A. 20
B. 40
C. 50

D. 70
Answer: C

Wednesday, 18 January 2012

Indian Bank Computer Officers' Exam, 2008 General Awareness : Solved Paper


1. A passive threat to computer security is—
(1) Malicious Intent
(2) Sabotage
(3) Accident Errors
(4) Espionage Agents
(5) None of these
2. The Secure Electronic Transaction (SET) specification—
(1) is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is
legitimate
(2) provides private-key encryption of all data that passes between a client and a server
(3) allows users to choose an encryption scheme for the data that passes between a client and a server
(4) uses a public-key encryption to secure credit-card transaction systems
(5) None of these

Allahabank Bank Probationary Officers Exam , 2008 Computer General Awareness : Solved Paper (Held on 17-08-2008)



1. Programs from the same developer , sold bundled together , that provide better
integration and share common features , toolbars and menus are known as ....
(A) software suites
(B) integrated software packages
(C) software processing packages
(D) personal information managers
(E) none of these
Ans : (A)
2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these
Ans : (C)

Allahabad Bank Clerk Exam., 2008 Computer General Knowledge : Solved Paper (Held on 30-08-2008)


1. If a word is typed that is not in Word’s dictionary, a____________wavy underline
appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)
2. The____________button on the quick access Toolbar allows you to cancel your recent
commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)

UA-28469353-1 - http://examibps.blogspot.com/