Saturday, August 06, 2011

Computer General Awareness Question Part-3 For Bank PO/Clerk & IBPS CWE

1. The code that relational database management systems use to perform their database task is referred to as ..... (A) QBE(B) SQL(C) OLAP(D) Sequel Server(E) None of these
Ans : (B)
2. Chip is a common nickname for a (n): (A) transistor(B) resistor(C) integrated circuit(D) semiconductor(E) None of these
Ans : (C)
3. The purpose of the primary key in a database is to: (A) unlock the database(B) provide a map of the data(C) uniquely identify a record(D) establish constraints on database operations.(E) None of these
Ans : (B)
4. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
(E) None of these
Ans : (D)
5. The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM. (A) BIOS(B) API(C) device driver(D) supervisor program(E) None of these
Ans : (A)
6. The basic input/output system (BIOS) is stored in: (A) RAM.(B) ROM.(C) the CPU.(D) the hard drive. (E) None of these
Ans : (B)
7. Personal logs or journal entries posted on the Web are known as: (A) listservs(B) Webcasts(C) blogs(D) subject directories(E) None of these
Ans : (C)
8. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
(A) command - based user interface(B) GUI(C) system utility(D) API(E) None of these
Ans : (B)
9. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
(E) None of these
Ans : (A)
10. All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
(E) None of these
Ans : (A)

11. The secret code that restricts entry to some programs— (A) Password(B) Passport(C) Entry-code(D) Access-code(E) None of these
Ans : (A)
12. Computers use the ……… number system to store data and perform calculations. (A) binary(B) octal(C) decimal(D) hexadecimal(E) None of these
Ans : (A)
13. The main function of the ALU is to—
(A) Perform arithmetic and logical operations
(B) Store data and information for future use
(C) Control computer output, such as printing
(D) Monitor all computer activities
(E) None of these
Ans : (A)
14. ……is the process of carrying out commands.
(A) Fetching(B) Storing(C) Executing(D) Decoding(E) None of these
Ans : (C)
15. Softcopy is the intangible output, so then what is hardcopy ?
(A) The physical parts of the computer (B) The printed parts of the computer (C) The printed output (D) The physical output devices (E) None of these
Ans : (C)
16. The internet is ......
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) All of these
(E) None of these
Ans : (D)
17. ____________ are lists of commands that appear on the screen. (A) GUIs(B) Icons(C) Menus(D) Windows(E) None of these
Ans : (C)
18. Which of the following statements is FALSE concerning file names?
(A) Files may share the same name or the same extension but not both
(B) Every file in the same folder must have a unique name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.) followed by the file name
(E) None of these
Ans : (D)
19. The combination of the operating system and the processor is referred to as the computer’s:
(A) CPU.(B) platform.(C) BIOS.(D) CMOS. (E) None of these
Ans : (B)
20. The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
(E) None of these
Ans : (A)
21. Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
(E) None of these
Ans : (B)
22. The design of the network is called the network: (A) architecture(B) server(C) transmission(D) type(E) None of these
Ans : (A)
23. The most frequently used instructions of a computer program are likely to be fetched from:
(A) the hard disk(B) cache memory(C) RAM(D) registers (E) None of these
Ans : (B)
24. The ____________ contains data descriptions and defines the name, data type, and length of each field in the database. (A) data dictionary(B) data table(C) data record(D) data field(E) None of these
Ans : (A)
25. Ensuring that the essential peripheral devices are attached and operational is the____________ process. (A) configuration(B) CMOS(C) POST(D) ROM(E) None of these
Ans : (C)

No comments:

Post a Comment