Monday, August 08, 2011

Computer General Awareness Question Part-5 For Bank PO/Clerk & IBPS CWE

1. All the information collected during database development is stored in a—

(A)repository(B)data warehouse(C)RAD(D)CASE(E)None of these
Ans. (B)  

2. The……………….component is used by the data analyst to create the queries that access the database.

(A)data extraction(B)end-user query tool(C)end-user presentation tool(D)data store(E)None of these 
Ans. (B)  

3. A(n)…………….allows network users to share a single copy of software, which resides on the network server.

(A)single-user license agreement(B)network site license(C)end-user license agreement(D)business software license(E)None of these
Ans. (B)  

4. A polymorphic virus—

(A)modifies its program code each time it attaches itself to another program or file

(B)is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains

(C)a malicious-logic program that hides within or looks like a legitimate program

(D)infects a program file, but still reports the size and creation date of the original, uninfected program (E)None of these
Ans. (A)  

5. Microwave transmission is used in environments where installing physical transmission media is— (A)difficult or impossible and where line-of-sight transmission is unavailable

(B)easy or promising and where line-of-sight transmission is unavailable

(C)difficult or impossible and where line-of-sight transmission is available

(D)easy or promising and where line-of-sight transmission is available

(E)None of these
Ans. (D)


6. A ……is a unique name that you give to a file of information.(A) device letter(B) folder(C) filename(D) filename extension(E) None of these

Ans : (D)

7. Hardware includes—

(A) all devices used to input data into a computer

(B) sets of instructions that a computer runs or executes

(C) the computer and all the devices connected to it that are used to input and output data

(D) all devices involved in processing information including the central processing unit, memory and storage

(E) None of these

Ans : (D)

8. A ……… contains specific rules and words that express the logical steps of an algorithm.

(A) programming language(B) syntax(C) programming structure(D) logic chart(E) None of these

Ans : (A)

9. All the deleted files go to—(A) Recycle Bin(B) Task Bar(C) Tool Bar(D) My Computer(E) None of these

Ans : (A)
10. A……………..sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(A)system virus(B)trojan horse virus(C)file virus(D)macro virus (E)None of these

Ans. (A)
11. Which of the following is a general-purpose programming language, designed by Sun Microsystems, and well suited for use on the Web? (A)VB Script(B)Java Script(C)CSS(D)Java(E)None of these
Ans. (B)  

12. This.............tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data. (A)Client(B)Applications/Web server(C)Enterprise server(D)DBA(E)None of these
Ans. (A)  

13. RSA is— (A)Symmetric Cryptosystem(B)Asymmetric Cryptosystem(C)Block Cypher(D)Digital Signature(E)None of these
Ans. (D)  

14. A DVD-RAM is similar to a………………except it has storage capacities up to 5.2 GB.

(A)CD-R(B)floppy disk(C)CD-RW(D)hard disk(E)None of these
Ans. (C)  

15. When you are selecting a mouse for a particular computer system, what is the most important consideration?

(A)The type of drivers that come with the mouse (B)The length of the mouse cord (C)The type of connector the mouse is equipped with (D)The number of buttons the mouse has (E)None of these
Ans. (C) 
16. Programs that automatically submit your search request to several search engines simultaneously are called— (A)Metasearch engines(B)Webcrawlers(C)Spiders(D)Hits(E)None of these

Ans. (A)

17. Graphical diagrams used to represent different multiple perspectives of a system include—

(A)use-case, class, and state diagrams (B)state, interaction, derivative diagrams (C)interaction, relationship, and class diagrams (D)deployment, relationship, and use-case diagrams (E)None of these

Ans. (A)

18. Database redesign is not terribly difficult if the— (A)database is structured(B)database is well-designed(C)database has no data(D)database is relatively small (E)database is relatively large

Ans. (A)

19. Which of the following are normally used to initialize a computer system's hardware?

(A)Bootstrap memory(B)Volatile memory(C)Exteranl mass memory(D)Static memory(E)Random access memory

Ans. (E)

20. If you wanted to locate the hardware address of a local device, which protocol would you use?

(A)ARP(B)RARP(C)ICMP(D)PING(E)PONG

Ans. (A)
 21. The person who writes and tests computer programs is called a— (A) programmer(B) computer scientist(C) software engineer(D) project developer(E) None of these
Ans : (A)

22. A set of instructions telling the computer what to do is called— (A) mentor(B) instructor(C) compiler(D) program(E) None of these

Ans : (D)

23. What menu is selected to print ? (A) Edit(B) Special(C) File(D) Tools(E) None of these

Ans : (C)

24. What is backup ?

(A) Adding more components to your network

(B) Protecting data by copying it from the original source to a different destination

(C) Filtering old data from the new data

(D) Accessing data on tape

(E) None of these

Ans : (B)

25. The term bit is short for—(A) Megabyte(B) Binary language(C) Binary digit(D) Binary number(E) None of these

Ans : (C)

No comments:

Post a Comment