Friday, August 05, 2011

Computer General Awareness Question Part-2 For Bank PO/Clerk & IBPS CWE


1. Programs from the same developer , sold bundled together , that provide better integration and share common features , toolbars and menus are known as ....
(A) software suites(B) integrated software packages(C) software processing packages(D) personal information managers(E) none of these
Ans : (A)
2. A data warehouse is which of the following ?
(A) Can be updated by the end users(B) Contains numerous naming conventions and formats(C) Organized around important subject areas(D) Contains only current data(E) None of these
Ans : (C)
3. ______________ servers store and manages files for network users.
(A) Authentication(B) Main(C) Web(D) File(E) None of these
Ans : (D)
4. All of the following are examples of real security and privacy risks Except _____
(A) hackers(B) spam(C) viruses(D) identify theft(E) None of these
Ans : (B)
5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
(A) Data(B) Sales(C) Query(D) (Point-of-sale (POS)(E) None of these
Ans : (B)
6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting (B) Merging (C) Embedding (D) Splitting (E) None of these
Ans : (B)
7. The operating system is the most common type of____________software.
(A) communication(B) application(C) system(D) word-processing(E) None of these
Ans : (C)
8. When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking(B) pointing(C) Double-clicking(D) Secondary-clicking(E) None of these
Ans : (C)
9. The horizontal and vertical lines on a worksheet are called—
(A) cells(B) sheets(C) block lines(D) gridlines(E) None of these
Ans : (D)
10. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.(A) press the left mouse key(B) double-click the right mouse key(C) press the BACKSPACE key
(D) press the delete key(E) None of these
Ans : (D)
11. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports ____
(A) basic input/output system(B) secondary input/output system(C) peripheral input/output system(D) marginal input/output system(E) None of these
Ans : (A)
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse(B) Boot sector(C) Script(D) Logic bomb(E) None of these
Ans : (B)
13. ________ controls the way in which the computer system functions and provides a means  by which users can interact with the computer
(A) The platform(B) Application software(C) Operating system(D) The motherboard(E) None of these
Ans : (C)
14. Servers are computers that provide resources to other computers connected to a__________
(A) mainframe(B) network(C) supercomputer(D) client(E) None of these
Ans : (B)
15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition(B) To confirm that data exists(C) To analyze data for expected relationships(D) To create a new data warehouse(E) None of these
Ans : (A)
16. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
(A) CPU(B) slice of time(C) stack(D) event(E) None of these
Ans : (B)
17. The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs). (B) complimentary metal-oxide conductors (CMOS). (C) device drivers.(D) bootstrap loaders. (E) None of these
Ans : (A)
18. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
Ans : (B)
19. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy(B) information overload(C) duplicate data(D) data inconsistency(E) None of these
Ans : (D)
20. _____________ are words that a programming language has set aside for its own use.
 (A) Control worlds(B) Reserved words(C) Control structures(D) Reserved keys(E) None of these
Ans : (B)
21. The definition of thrashing is:
 (A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
(E) None of these
Ans : (A)
22. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
(E) None of these
Ans : (B)
23. Verification of a login name and password is known as:
(A) configuration.(B) accessibility.(C) authentication.(D) logging in. (E) None of these
Ans : (C)
24. Granting an outside organization access to internet web pages is often implemented using a (n) ____
(A) extranet(B) intranet(C) internet(D) hacker(E) None of these
Ans : (A)
25. Which term identifies a specific computer on the web and the main page of the entire site
(A) URL(B) Web site address(C) Hyperlink(D) Domain name(E) None of these
Ans : (A)

No comments:

Post a Comment