-->

Saturday, 27 August 2016

Computer Quiz for IBPS PO and IBPS Clerk Exams (210 Questions with Answers)

Dear Readers. Good News ! Today we are here with most important and expected Multiple choice type objectiove questions and answers for your upcoming IBPS PO Recruitment and IBPS Clerk Recruitment Exam. Because Bank exam today if we analyze IBPS exam paper this complete quiz is must for aspirants. You practice better and prepare for bank exams with these 210 questions and answers. Meritmock reader always tppers because they practice with computer awareness for ibps.

Hi, friend. You are preparng for ibps exam So, computer awareness is most important section for your bank exam preparation. This time you take ibps online test here. Practice well with ibps mock test for computer knowledge provided here.

Today's IBPS online test is much more competitive and required complete knowledge about computer knowledge. We are presenting more quiz related to computer awareness for ibps for your good practice. You also check meritmock gk questions for bank exams.



Topic : Internet

Q1. Internet's Initial development was supported by:
a) ARPANET
b) IBM
c) Microsoft
d) None of These


Q2. World Wide Web was proposed by:
a) Bill Gates
b) Bill Rogers
c) Tim Berners Lee
d) None of These


Q3. What are the uses of the Internet:
a) Communication
b) Information Retrieval
c) Presentation of Information
d) All of the Above

Q4. .net domain is used for:
a) educational institution
b) Internet Infrastructure and Service Providers
c) International Organizations
d) None of These


Q5. URL stands for:
a) Uniform Resource Locator
b) Uniform Resource Library
c) United Resource Locators
d) None of These

Q6. Benefits of Email are:
a) Speed
b) Cost
c) Record Keeping
d) None of These
e) All of the Above
Q7. WWW provides standardized access to:
a) GOPHER
b) TELNET
c) FTP
d) None of These
e) All of the Above
Q8. Which among the following is not an internet browser:
a) Netscape Navigator
b) Chrome
c) Drupal
d) Opera

Q9. What should be minimum requirement of random access memory (RAM) for
internet access:
a) 8 MB
b) 16 MB
c) 32 MB
d) 64 MB


Q10. A modem is not needed when accessing the internet through:
a) LAN
b) Cable
c) Wi - Fi
d) None of These

Q11. In order to use cable for browsing web you will need:
a) A cable modem
b) Network Interface Card (NIC)
c) Both of Above
d) None of These


Q12. ADSL gives:
a) Faster downloading speeds (receiving) than uploading speeds (sending)
b) Slower downloading speeds (receiving) than uploading speeds (sending)
c) Same downloading speeds (receiving) as uploading speeds (sending)
d) None of These


Q13. What is the minimum bandwidth required for broadband connec tion:
a) 128 kbps
b) 256 kbps
c) 512 kbps
d) None of These


Q14. The limit for ASDL service is:
a) 8000 Feet
b) 10,000 Feet
c) 18,000 Feet
d) None of These

Q15. Which of these is a variation of ADSL, but the modem can adjust the speed of
the connection depending on the length and quality of the line:
a) VDSL
b) SDSL
c) RADSL
d) None of These
Internet Protocol

Q16. An IP address is a:
a) binary number that uniquely identifies computers.
b) also identifies other devices on TCP/IP network
c) Both of Above
d) None of These

Q17. TCP stands for:
a) Tools Control Protocol
b) Transmission Control Protocol
c) Transfer Control Protocol
d) None of These


Q18. IP stands for:
a) Internal Protocol
b) Internet Protocol
c) Interior Protocol
d) None of These

Q19. Which among the following is correct:
a) An IP address can be private - for use on Local Area Network (LAN).
b) It can be use on the internet or other wide area network (WAN).
c) IP addresses can e determined statistically (assigned to a computer by a system
administrator) or dynamically (assigned by another device on the network on demand).
d) All of the Above
e) None of These

Q20. An internet protocol address (IP address) is:
a) a numerical label assigned to each device (e.g. computer, printer) participating in a computer
network
b) It working for the communication
c) Both of Above   
d) None of These


Q21. An IP address serves which among the following principal functions:
a) Host or network interface identification
b) Location Addressing
c) Both of Above
d) None of These


Q22. Role of IP addressing is:
a) A name indicates what we seek
b) An address indicates where it is
c) A route indicates how to get there
d) All of the Above
e) None of These

Q23. The designers of the Internet Protocol defined an IP address as a
____number:
a) 32 Bit
b) 34 Bit
c) 31 Bit
d) None of These

Q24. 32 Bit system was known as Internet protocol version ____which is still in
use today:
a) 4
b) 5
c) 3
d) None of These

Q25. Due to the growth of the internet and the predicted depletion of available
addresses, a new version of IP version 6 using _____for the address was
developed in 1995:
a) 128 Bits   
b) 129 Bits
c) 130 Bits
d) None of These

Q26. Two versions of the internet protocol (IP) are in use such as IP version 4 and
IP version 6 each version defines an IP address ____:
a) Same
b) Unique
c) Different
d) None of These

Q27. In the early stages of development of the internet protocol, network
administrators interpreted an IP address in ____parts:
a) Network Number Portion
b) Host Number Portions
c) Both of Above
d) None of These

Q28. High levels of demand have decreased the supply of un-allocated internet
protocol version 4 addresses available for assignment to internet service providers
and end user organization since the _____:
a) 1980s
b) 1990s
c) 2000s
d) None of These

Q29. Which among the following definitions is correct:
a) Address - The unique number ID assigned to one host or interface in a network
b) Subnet - A portion of a network sharing a particular subnet address
c) Subnet mask - A 32 bit combination used to describe which portion of an address refers to the
subset and which part refers to the host
d) Interface - A network connection
e) None of These
f) All of the Above

Q30. NAT stands for:   
a) Network Address Translator
b) Network Access Translator
c) Network Acquired Translator
d) None of These

Cryptography

Q31. Cryptography is derived from the ____word:
a) Greek
b) French
c) Latin
d) None of These

Q32. Cryptography is the study of information______:
a) Hiding
b) Verification
c) Both of Above
d) None of These

Q33. Cryptography includes the __________to securely and consistently prevent
or delay unauthorized access to sensitive information and enable verifiability of
every component in a communication:
a) Protocols
b) Algorithms
c) Strategies
d) All of the Above
e) None of These

Q34. Cryptography and Cryptanalysis are sometimes grouped together under the
____term cryptology, encompassing the entire subject. In practice,

"cryptography" is also often used to refer to the field as a whole, especially as an
applied science:
a) Umbrella
b) Shield   
c) Veil
d) None of These

Q35. Cryptography is an interdisciplinary subject, drawing from several fields.
Before the time of computers, it was closely related to linguistic. Nowadays the
emphasis has shifted, and cryptography makes extensive use of technical ares of
mathematics, especially those areas collectively known as _______mathematics:
a) Increte
b) Discrete
c) Both of Above
d) None of These


Q36. An example of the sub - fields of cryptography is:
a) Steganography
b) Traffic Analysis
c) Both of Above
d) None of These


Q37. Which among the following is correct:
a) Traffic Analysis is the analysis of patterns of communication in order to learn secret
information.
b) Steganography is the study of hiding the very existence of a message, and not necessarily the
contents of the message itself like microdots or invisible ink.
c) Both of Above
d) None of These

Q38. When information is transformed from a useful form of understanding to an
opaque form of understanding, this is called:
a) Encryption
b) Decryption
c) Both of Above
d) None of These

Q39. When the information is reverted back into a useful form it is called:
a) Standard encryption   
b) Plain text encryption
c) Decryption
d) None of These
Q40. Symmetric - key cryptography refers to ______methods in which both the
sender and receiver share the same key ( or , less commonly, in which their keys
are different but related in an easily computable way):
a) Encryption
b) Decryption
c) Both of above
d) None of These

Q41. Symmetric key cryptography was the only kind of encryption publicly known
until:
a) July 195
b) June, 1976
c) June 1988
d) None of These

Q42. Which among the following is correct about goals in cryptography:
a) Confidentiality - Only an authorized recipient should be able to extract the contents of the
message from its encrypted form. Resulting from steps to hide, stop or delay free access to the
encrypted information.
b) Message Integrity - The recipient should be able to determine if the message has been altered.
c) Sender Authentication - The recipient should be able to verify from the message, the identity
of the sender, the origin or the path it traveled (or combinations) so to validate claims from
emitter or to validated the recipient expectations.
d) Sender Non repudiation - The emitter should not be able to deny sending the message
e) None of These
f) All of the Above

Q43. License is still required to use cryptography in which among the following
countries:
a) Iran and China
b) China and India    
c) India and Pakistan
d) None of These


Q44. NSA stands for:
a) National Security Agency
b) Norway Security Agency
c) National Security Assessment
d) None of These


Q45. In the United Kingdom, the Regulation of Investigatory Powers Act gives UK
police the powers to force suspects to _____that protect encryption keys:
a) Hand over passwords
b) Decrypt Files
c) Both of Above
d) None of These

Artificial Intelligence

Q46. Which among the following is correct about the 'Artificial Intelligence':
a) It is the science and engineering of making intelligent machines, especially intelligent
computer programs.
b) Artificial Intelligence is the intelligence exhibited by machines or software.
c) Artificial Intelligence is the branch of computer science concerned with making computers
behave like humans.
d) All of the Above
e) None of These


Q47. The term 'Artificial Intelligence' was first coined in ______:
a) 1960
b) 1950
c) 1955
d) None of These
 
Q48. The term Artificial Intelligence was coined in 1955 by_____:
a) James Gosling
b) John Mc Carthy
c) Charles Babbage
d) None of These


Q49. Which among the following includes the areas of Artificial Intelligence
specialization:
a) Games (Programming computers to play games against human opponents)
b) Natural Languages (Programming computers to understand natural human languages)
c) Neutral Networks (Systems that simulate intelligence by attempting to reproduce the types of
physical connections that occur in animal brains)
d) All of the Above
e) None of These


Q50. In May 1997 an IBM super computer called ______defeated world chess
champion Gary Kasparov in a chess match:
a) Syntax Blue
b) Deep Blue
c) Blue Stan
d) None of These


Q51. Which among the following is necessary for General Intelligence (in
computer language):
a) Artificial Consciousness
b) Artificial Brain
c) Both of Above
d) None of These
Q52. Computers Contains IQ???
a) Yes
b) No
c) None of These   
Q53. Which among the following definitions are correct:
a) Epistemology - It is a study of the kinds of knowledge that are required for solving problems
in the world
b) Ontology - It is the study of the kinds of things that exist. In AI, the programs and sentences
deal with various kinds of objects, and we study what these kinds are and what their basic
properties are. Emphasis on ontology begins in the 1990s.
c) Both of Above
d) None of These


Q54. A _____is defined as "some sort of hardware architecture or software
framework (including application frameworks), that allows software to run:
a) Antalogy
b) Platforms
c) Toylogy
d) None of These

Q55. ______argues that "artificial intelligence is the next stage in evolution":
a) Edward Fredkin
b) George Dyson
c) Nikeal Dyano
d) None of These

Q56. Which among the following is correct about ''Intelligent Agent":
a) It is a system that perceives its environment and takes actions which maximize its chances of
success.
b) The simplest intelligent agents are programs that solve specific problems
c) More complicated agents include human beings and organizations of human beings (such as
firms)
d) None of These
e) All of the Above


Q57. The intelligent agent paradigm became widely acceptable during the period of
_____:
a) 1980s
b) 1990s   
c) 1960s
d) None of These

Q58. Artificial Intelligence consists of:
a) Theoretical Side
b) Experimental Side
c) Both of Above
d) None of These
Q59. The number of atomic facts that are average person knows is astronomical.
Research projects that attempt to build a complete knowledge base of ______:
a) Commonsense Knowledge
b) General Awareness
c) Static Knowlege
d) None of These

Q60. Long term goals for Artificial Intelligence is:
a) Social Intelligence
b) Creativity
c) General Intelligence
d) None of These
e) All of the Above

Network Architecture

Q61. Network Architecture refers to the layout of the network consisting of the
hardware, software, connectivity, communication protocols and mode of
transmission, such as ____:
a) Wired
b) Wireless
c) Wired or Wireless
d) None of These

Q62. Which among the following is used to access the network:
a) Application Layer   
b) Presentation Layer
c) Session Layer
d) None of These

Q63. Which among the following layer' main function is data formats, data
encryption/decryption, data compression/decompression etc:
a) Session Layer
b) Transport Layer
c) Presentation Layer
d) None of These

Q64. Which layer has access to particular network services, billing functions etc:
a) Session Layer
b) Presentation Layer
c) Transport Layer
d) None of These

Q65. In OSI Model, OSI stands for:
a) Open Systems Interconnection
b) Operational System Interconnection
c) Occur System Interconnection
d) None of These
Q66. OSI model is a product of the Open Systems Interconnection effort at the
____:
a) IBM
b) ISO (International Organization for Standardization)
c) WTO (World Trade Organziation)
d) None of These


Q67. Which among the following is incorrect about PAN (Personal Area Network):
a) PAN is for one person only. .
b) Example of PAN is wireless communication network.
c) Some of the PAN applications include mobile commerce
d) None of These

Q68. Which among the following is correct features about LAN (Local Area
Network):
a) LANs are small size networks which only covers a few buildings or a campus up to few
kilometers.
b) LANs are widely used to connect personal computers and workstations in company
offices,factories and universities to share resources and exchange information.
c) Example of LAN is to share printers in a Lab or in a department.
d) None of These
e) All of the Above

Q69. The size of a ______can cover a city whose scope is less than 100 kilometer
such as cable TV networks etc:
a) MAN
b) LAN
c) WAN
d) None of These

Q70. The fundamental approaches to build a point - to - point network is:
a) Circuit Switching
b) Packet Switching
c) Both of Above
d) None of These

Q71. The _____layer defines the electrical and physical specifications for devices:
a) Data Link Layer
b) Presentation Layer
c) Physical Layer
d) None of These

Q72. HBA stands for:
a) Host Bus Adapters
b) Host Base Adapters
c) Hedged Base Adapters
d) None of These    

Q73. HBA is used in ______:
a) Storage Area Networks
b) Software Based Networks Only
c) Both of Above
d) None o f These

Q74. FDM stands for:
a) Frequency Division Multiplexing
b) Fidelty Division Multiplexing
c) Fast Division Multiplexing
d) None of These

Q75. TDM stands for:
a) Task Division Multiplexing
b) Time Division Multiplexing
c) Testing Division Multiplexing
d) None of These

Q76. In cable modem internet access, cable modem terminations system (CMTS) is at:
a) cable provider's end
b) customer end
c) Both of Above
d) None of The Above

Q77. What type of internet technology sends information to you without you requesting that information:
a) Infoware
b) F2b2C
c) Push
d) None of The Above

Q78. What is the second generation of the Web called:
a) Second Life
b) Web 2.0
c) Emerging Space
d) None of The Above

Q79. What type of web technology allows its community members to continuously
change the contents on a web site:
a) Intelligent Bots
b) Social Networks
c) Wiki
d) None of The Above

Q80. Which of the following is not a primitive data type:
a) String
b) Double
c) Boolean
d) None of The Above


Q81. The finally block is executed:
a) Only when a checked exception is thrown
b) Only when a unchecked exception is thrown
c) Only when an exception is thrown
d) Irrespective of whether an exception is thrown or not
e) None of The Above

Q82. The Statement - System.out.print ( (double) 7/4 ); prints:
a)1.75
b) 1
c) 2.0
d) None of The Above

Q83. What is the environment variable that contains a list of directions where Java    looks for classes referenced in a program:
a) CLASSPATH
b) PATHDIR
c) SEARCHPATH
d) PATHCLASS
e) None of The Above


Q84. Consider the statement - System.out.print (Math.round(Math.random 0)); Above statement can print:
a) Only 0
b) Only 1
c) Only 0 or 1
d) None of The Above


Q85. Subclass is also called:
a) Base Class
b) Child Class
c) Derived Class and Super Class
d) Child Class and Derived Class
e) None of The Above


Q86. Which of the class definition has/have initialization bock:
a) First
b) My Class
c) Second
d) Third
e) None of The Above


Q87. The Keywords - try, catch, and finally are typically used in the sequence:
a) Finally, Try and Catch
b) Try, Finally and Catch
c) Try, Catch and Finally
d) Catch, Try and Finally
e) None of The Above   

Q88. Automatic conversion from primitive type to an object of the corresponding
wrapper class is called:
a) Coercing
b) Casting
c) Boxing
d) Widening
e) None of The Above


Q89. Which of the following does not have a  super class:
a) System
b) Lang
c) Exception
d) Object
e) None of The Above


Q90. A class is a variable of variable that is declared inside a class as:
a) Final
b) Static
c) Abstract
d) Extends
e) None of The Above

Basics of Computer
Q91. Punched Cards were first introduced by:
a) Powers
b) Jacquard
c) Pascal
d) Herman Hollerith
e) None of The Above

Q92. Word Length of a Personal Computer is ______:
 a) 4 Bits
b) 8 Bits
c) 16 Bits
d) None of The Above


Q93. Operating Systems, editors and debuggers comes under:
a) System Software
b) Application Software
c) Utilities
d) None of The Above


Q94. Which among the following device is required for the Internet Connection:
a) Joystick
b) Modem
c) CD Drive
d) None of The Above

Q95. DMA stands for:
a) Direct Memory Access
b) Direct Module Access
c) Direct Memory Access
d) None of The Above


Q96. When did John Napier develop logarithm:
a) 1614
b) 1416
c) 1641
d) None of The Above

Q97. The Second Generation computer was based on:
a) Vacuum Chips
b) Silicon Chips
c) Transistor
d) Bio Chips    
d) None of The Above

Q98. BIOS stands for:
a) Basic Input Output Software
b) Basic Input Output System
c) Basic Input Output Standards
d) None of The Above

Q99. What do you call a single point on a computer screen:
a) Cell
b) Element
c) Pixel
d) None of The Above

Q109. How was the generation of computer classified:
a) by the speed of the computer
b) by the model of the computer
c) by the device used in memory & processor
d) by the accuracy of the computer
e) None of The Above

Q101.Through which device the main components of the computer communicates
with each other:
a) System Bus
b) Keyboard
c) Monitor
d) None of The Above

Q102. Which is a valid program to access the internet:
a) Access
b) Front Page
c) Netscape
d) None of The Above


Q103. Which one is the Low Level Language:
a) Assembly
b) Visual Basic
c) Java
d) C++
e) None of The Above

Q104. Which is a volatile memory:
a) ROM
b) BIOS
c) PROM
d) RAM
e) None of The Above

Q105. The digital signals can be represented by:
a) Binary Codes
b) 0 and 1
c) High and Low
d) All of The Above
e) None of The Above


Q106. ______is used for scanning the pictures and putting them in digitized form
in the computer:
a) CD-ROM
b) Plotter
c) Scanner
d) None of The Above


Q107. Which among the following is correct:
a) 1 KB = 8 Bytes
b) 1 MB = 8 KB
c) 1 KB = 1024 Bytes
d) None of The Above

Q108. Who is known as the father of Computer Science:
a) Charles Babbage
b) Herman Hollerith
c) James Gosling
d) None of The Above

Q109. A personal computer (PC) is a ________computer:
a) Super
b) Main Frame
c) Micro
d) None of The Above

Q110. Full Form of RAM:
a) Random Access Memory
b) Read Access Memory
c) Rapid Access Memory
d) None of The Above

Q111. A Page Fault occurs:
a) When the Page is not in Memory
b) When the Page is in the Memory
c) When the process is in the ready state
d) None of The Above

Q112. What is a shell:
a) It is a hardware component
b) It is a command Interpreter
c) It is a part in computer
d) None of The Above

Q113. Multi-programming systems________:
a) Are easier to develop than single programming systems
b) Execute each job faster
c) Execute more jobs in the same time
d) None of The Above

Q114. PCB stands for:
a) Process Control Block    
b) Printed Circuit Board
c) Both of The Above
d) None of The Above

Q115. FIFO scheduling is:
a) Preemptive Scheduling
b) Non Preemptive Scheduling
c) Deadline Scheduling
d) None of The Above


Q116. A thread is a______:
a) lightweight process where the context switching is low
b) lightweight process where the context switching is high
c) is used to speed up paging
d) None of The Above

Q117._______sent data or instructions to the computer:
a) Digital
b) Output
c) Input
d) None of The Above

Q118. The input device most commonly used to enter text would be the:
a) Bar Code Reader
b) Microphone
c) Keyboard
d) None of The Above

Q119. Most Keyboards use an arrangement of keys given the name:
a) Dvork
b) QWERTY
c) CISC
d) None of The Above

Q120. A key that tuns a function on or off is called a ______key:
a) Power   
b) Toggle
c) Control
d) None of The Above


History of Computer

Q121. Computer was invented by:
a) John Vincent
b) Mark Steven
c) Charles Babbage
d) None of These

Q122. Word "COMPUTER" was first used in:
a) 1749
b) 1592
c) 1613
d) None of These


Q123. Which was first computer company:
a) Digital Electronics
b) Com-Techno Limited
c) Electronic Controls Company
d) None of These

Q124. Memory:
a) is an device that performs a sequence of operations specified by instructions in memory
b) is a sequence of instructions
c) is the device where information is stored
d) None of The Above


Q125. A program:
 
a) is a device that performs a sequence of operations specified by instructions in memory
b) is a sequence of instructions
c) is the device where information is stored
d) None of The Above


Q126. Which is the Brain of the Computer:
a) CPU
b) Software
c) Both
d) None of These


Q127. Which of the following is not a hardware:
a) Microprocessor
b) Monitor
c) Microsoft Word
d) None of These


Q128. Who among the following is father of 'C' Language:
a) Ericsson
b) Dennis Ritchie
c) A.S.Douglas
d) None of These


Q129. Founder of E-Mail:
a) James Gosling
b) Shiva Ayyadurai
c) Ajay V. Bhatt
d) None of These

Q130. What is Output:
a) What the processor takes from the user
 
b) What the processor gives to the user
c) What the processor gets from the user
d) None of These


Q131. An error in a computer program is:
a) Crash
b) Bug
c) Power Failure
d) None of These

Q132. Microsoft Word was first released in:
a) 1984
b) 1983
c) 1985
d) None of These


Q133. First time after establishment, MS - Word was known as:
a) Multi Work Word
b) Multi Tool Word
c) Multi Task Word
d) None of These


Q134. MS Word is written in:
a) Java
b) C++
c) C
d) None of These

Q135. What is an Excel:
a) A Graphic Program
b) A Spreadsheet
c) A Presentation Software
d) None of The Above

Input/Output Devices

Q136. Microfilm reader is a:
a) COM Device
b) MICR Device
c) OCR Device
d) None of The Above


Q137. Offline device is:
a) A device which is not connected to CPU
b) A device which is connected to CPU
c) A direct access storage device
d) None of The Above

Q138. In which of the following terminals the screen is regarded as an array of
pixels, where each pixel is either on or off:
a) Character Map Terminal
b) Bit Map Terminal
c) RS 232 C Terminal
d) None of The Above


Q139. The stack pointer in the 8085 microprocessor is a:
a) 16 bit register that points to stack memory locations
b) 16 bit accumulator
c) Memory location in the stack
d) None of The Above
 
Q140. Who launched IBM's first PC in 1981:
a) Dean Cline
b) C.B. Rogers Jr.
c) David Swenson
d) None of The Above


Q141. Which of the following company is called Big Blue:
a) Microsoft Corporation
b) Compaq Corporation
c) IBM
d) None of The Above

Q142. The first IBM PC did not have any:
a) RAM
b) Disk Drive
c) Port
d) None of The Above


Q143. Today's computer giant IBM was earlier known by a different name which
was changed in 1924. What was that name:
a) Tabulator Machine Corp.
b) Computer Tabulating Recording Corp.
c) International Computer Limited
d) None of The Above

Q144. In computer, wetware means:
a) Human Intelligence
b) An organic Intelligence
c) Artificial Intelligence
d) None of The Above

Q145. If a computer is on but does not respond to a system reset, what is it said to
be:
a) Dead   
b) Hang
c) Insensitive
d) None of The Above


Q146. What is the term which represents the use of links between information of
all sorts:
a) Hypertext
b) Hypermedia
c) Hyper Card
d) None of The Above

Q147. A term associated with the comparison of processing speeds of different
computer systems is:
a) EFTS
b) MPG
c) MIPS
d) None of The Above

Q148. The process of starting or restarting a computer system by loading
instructions from a secondary storage device into the computer memory is called:
a) Duping
b) Booting
c) Padding
d) None of The Above

Q149. A high speed device used in CPU for temporary storage during processing is
called:
a) A register
b) A Data Bus
c) All of The Above
d) None of The Above

Q150. RATS stands for:
a) Regression Analysis Time Series
b) Real Analysis Time Sharing
c) Regression Analysis Series    
d) None of The Above

Q151. Which of the following functions most like a copy machine:
a) Portable Scanner
b) Flatbed Scanner
c) Touch Screen
d) None of The Above


Q152. A universal product code is read by what type of scanner:
a) Bar - Code
b) Flatbed
c) OCR/MICR
d) None of The Above

Q153. Which of the following types of character recognition systems requires the
use of magnetic ink:
a) OCR
b) MICR
c) OMR
d) None of The Above

Q154. This reading device is readily used in banks to read the numbers on the
bottom of checks and deposit slips:
a) MICR
b) OCR
c) GRE
d) None of The Above


Q155. A (n) ______camera records images on a disk instead of on films:
a) video
b) digital
c) traditional
d) None of The Above

Q156. Which of the following refers to a special type of video camera used for   
broadcasting images on the internet:
a) WebCam
b) icam
c) eCamera
d) None of The Above

Q157. ______devices convert a sketch or a figure into a form that the computer
can understand:
a) Digitizing
b) Plotting
c) UPC
d) None of The Above

Q158. Which of the following devices would require the use of a stylus:
a) graphics tablet
b) digital notebook
c) bar-code reader
d) None of The Above

Q159. A (n) _______records the movements of the user's pen over a piece o f
paper:
a) digital notepad
b) graphics tablet
c) touch screen
d) None of The Above

Q160. The most important characteristic of a monitor is its:
a) dot pitch
b) clarity
c)resolution
d) None of The Above

Q161. The individual dots that form the image on a monitor are called:
a) picas
b) pixels
c) particles   
d) None of The Above


Q162. Which of the following monitor types most closely resembles a television:
a) flat panel
b) cathode ray tube
c) e - book reader
d) data projector
e) None of The Above


Q163. A (n) ______printer works by spraying tiny droplets of ink onto the paper:
a) ink - jet
b) laser
c) thermal
d) None of The Above

Q164. Which of the following printer types requires special paper:
a) chain
b) thermal
c) laser
d) None of The Above

Q165. Which of the following can create the largest printouts:
a) chain
b) plotter
c) thermal
d) None of The Above

Hardware Devices

Q166. What is required when more than one persons use a central computer at the
same time:
a) Light Pen
b) Mouse
c) Terminal
d) None of The Above


Q167. Which kind of terminal is entirely dependent for all its capabilities on the
computer system to which it is connected:
a) Smart Terminal
b) Dumb Terminal
c) Micro Computer
d) None of The Above

Q168. Hard Disks and Diskettes are:
a) Direct Access Storage Devices
b) Sequential Access Storage Devices
c) Rarely used Microcomputers
d) None of The Above

Q169. The Computer code for interchange of information between terminals is:
a) ASCII
b) BCD
c) All of The Above
d) None of The Above


Q170. A character is represented in EBCDIC by:
a) One bit
b) Four bits
c) Eight bits
d) None of The Above

Q171. The metals disks which are permanently housed in salad and contamination
free containers are called:
a) Hard Disk

b) Winchester Disk
c) Flexible Disk
d) None of The Above
 
Q172. Which among the following memory is capable of operating at "electronics
speed":
a) Semiconductor memory
b) Magnetic Disks
c) Magnetic Drums
d) None of The Above

Q173. Which of the following is not an advantage of storied programs:
a) Reliability
b) Reduction in Operational Costs
c) The Computers becoming general purpose
d) None of The Above

Q174. Which of the Following is not true of immediate processing:
a) It is often used in real time applications
b) It can be used in an airline reservation system
c) It can occur with either sequential or direct access files
d) None of The Above

Q175. _____is the product of data processing:
a) Data
b) Information
c) A Computer
d) None of The Above

Q176. A transaction file is a type of:
a) Master File
b) Data File
c) Access Method
d) None of The Above

Q177. Which of the following is a computer code:
a) EPROM
b) FAT
c) EBCDIC
d) None of The Above   
Q178. A Winchester disk is a:
a) Disk Stack
b) Removable Disk
c) Flexible Disk
d) None of The Above

Q179. The register which keeps track of the execution of a program and which
contains the memory address of the instruction currently being executed is known
as:
a) Index Register
b) Memory Address Register
c) Program Counter
d) None of The Above

Q180. The register which contains the data to be written into or readout of the
addressed location is called:
a) Index Register
b) Memory Address Register
c) Memory Data Register
d) None of The Above


Q181. Where does a computer add and compare data:
a) Floppy Disk
b) CPU Chip
c) Memory Chip
d) None of The Above


Q182. The word "Computer" usually refers to the Central Processing Unit plus:
a) Input Devices
b) External Memory
c) Internal Memory
d) None of The Above
 
Q183. What hardware was used by the initial generations of computers:
a) ICs
b) VLSI
c) Valves
d) None of The Above

Q184. A computer program consists of:
a) System Flowchart
b) Program Flowchart
c) Algorithm's written in any computer language
d) None of The Above

Q185. Which device can produce the final product of machine processing into a
form usable by humans:
a) Storage
b) Input Device
c) Output Device
d) None of The Above


Q186. Which is not true for primary storage:
a) Information must be transferred to primary storage
b) It is relatively more expensive
c) It allows very fast access to data
d) It is part of processor
e) None of The Above

Q187. Which is not a factor when categorizing a computer:
a) Speed of the output device
b) where it was purchased
c) cost of the system
d) None of The Above

Q188. The ascending order of a data hierarchy is:
a) Bit - Bytes - Field - Record - File - Database
b) Bit - Bytes - Record - Field - File - Database
c) Bytes - Bit - Record - Field - File - Database   
d) None of The Above

Q189. Where was the India's first computer installed and when:
a) Institute of Social Science, Agra, 1955
b) Indian Statistical Institute, Calcutta 1955
c) Indian Institute of Science, Bangalore 1971
d) None of The Above

Q190. The first computer made available for commercial use was:
a) ENIAC
b) EDSAC
c) UNIVAC
d) None of The Above

Q191. Who is called the "Grandfather" of the computer:
a) Blaise Pascal
b) Charles Babbage
c) Joseph Jacquard
d) None of The Above

Q192. The first mechanical computer designed by Charles Babbage was called:
a) Abacus
b) Analytical Engine
c) Calculator
d) None of The Above

Q193. Father of the punch card processing:
a) Charles Babbage
b) Dr. Herman Hollerith
c) Blaise Pascal
d) None of The Above

Q194. Which is true for Digital Computer:
a) It is less accurate than analog computer
b) It is used primarily in scientific applications
c) It represents the decimal numbers through a string of binary digits   
d) None of The Above

Q195. Which is considered a direct entry device:
a) Optical Scanner
b) Light Pen
c) Digitizer
d) All of The Above
e) None of The Above


Computer Languages

Q196. Binary means:
a) Three
b) Four
c) Two
d) None of The Above

Q197. The digits used in binary number system are ____and____:
a) 1 and 2
b) 0 and 1
c) 0 and 9
d) None of The Above


Q198. Names, numbers and other information needed to solve a problem are
called:
a) Program
b) Data
c) Controls
d) None of The Above

Q199. The ______is a sequence of instructions that tells the computer how to
process the data:
a) program
b) data    
c) controls
d) None of The Above

Q200. Computer ICs work reliably because they are based on _______design:
a) top - bottom
b) two stage
c) two states
d) None of The Above


Q201. When a transistor is cut off or saturated, transitory ______have almost no
effect:
a) wave
b) variations
c) stage
d) None of The Above


Q202. A ____is a group of devices that store digital data:
a) circuits
b) register
c) bit
d) None of The Above

Q203. _____is an abbreviation for binary digit:
a) bingit
b) base
c) bit
d) None of The Above

Q204. A byte is a string of _____bits:
a) two
b) ten
c) eight
d) None of The Above

Q205. The control and arithmetic-logic sections are called:
a) block diagram
b) control unit
c) central processing unit
d) None of The Above


Q206. The hexadecimal digits are 0 to 9 and A to _____:
a) E
b) G
c) F
d) None of The Above

Q207. The main advantage of hexadecimal numbers is the case of conversion from
hexadecimal to ____and vice versa:
a) binary
b) decimal
c) BCD
d) None of The Above

Q208. BCD stands for:
a) Base Coded Decimal
b) Bilateral Coded Decimal
c) Binary Coded Decimal
d) None of The Above

Q209. ASCII stands for:
a) Asian Standard Code for Information Interchange
b) American Standard Code for Information Interchange
c) Associate Standard Code for Information Interchange
d) None of The Above

Q210. The ASCII code is a 7 bit code for:
a) Letters
b) Numbers
c) Other Symbols
d) All of The Above   
e) None of The Above

Download Printable format PDF File Click here
Share:

0 comments:

Post a Comment

Advt.

Advertisement

SBI New Rules for FD