Sei sulla pagina 1di 39

Computer General Knowledge For Bank Examination Computer General Knowledge For Bank PO Exam

1. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. Answer: B 2. A process known as ____________ is used by large retailers to study trends. A. data mining B. data selection C. POS D. data conversion Answer: A 3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. A. Data B. Point-of-sale (POS) C. Sales D. Query Answer: B 4. A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop. A. PSS B. POS C. inventory D. data mining Answer: A 5. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called: A. robotics. B. simulation. C. computer forensics. D. animation. Answer: C 6. Which of the following is NOT one of the four major data processing functions of a computer? A. gathering data B. processing data into information

C. analyzing the data or information D. storing the data or information Answer: C 7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animals movements. A. POS B. RFID C. PPS D. GPS Answer: B 8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as: A. robotics. B. computer forensics. C. simulation. D. forecasting. Answer: A 9. Technology no longer protected by copyright, available to everyone, is considered to be: A. proprietary. B. open. C. experimental. D. in the public domain. Answer: A 10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. A. Nanoscience B. Microelectrodes C. Computer forensics D. Artificial intelligence Answer: A 11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do. A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AI) Answer: D 12. ____________ is data that has been organized or presented in a meaningful fashion. A. A process

B. Software C. Storage D. Information Answer: D 13. The name for the way that computers manipulate data into information is called: A. programming. B. processing. C. storing. D. organizing. Answer: B 14. Computers gather data, which means that they allow users to ____________ data. A. present B. input C. output D. store Answer: B 15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered: A. data. B. output. C. input. D. the process. Answer: B

16. Computers use the ____________ language to process data. A. processing B. kilobyte C. binary D. representational Answer: C 17. Computers process data into information by working exclusively with: A. multimedia. B. words. C. characters. D. numbers. Answer: D 18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:

A. eight bytes. B. eight kilobytes. C. eight characters. D. eight bits. Answer: D 19. The term bit is short for: A. megabyte. B. binary language. C. binary digit. D. binary number. Answer: C

20. A string of eight 0s and 1s is called a: A. megabyte. B. byte. C. kilobyte. D. gigabyte. Answer: B 21. A ____________ is approximately one billion bytes. A. kilobyte B. bit C. gigabyte D. megabyte Answer: C 22. A ____________ is approximately a million bytes. A. gigabyte B. kilobyte C. megabyte D. terabyte Answer: C 23. ____________ is any part of the computer that you can physically touch. A. Hardware B. A device C. A peripheral D. An application Answer: A

24. The components that process data are located in the:

A. input devices. B. output devices. C. system unit. D. storage component. Answer: C 25. All of the following are examples of input devices EXCEPT a: A. scanner. B. mouse. C. keyboard. D. printer. Answer: D 26. Which of the following is an example of an input device? A. scanner B. speaker C. CD D. printer Answer: A 27. All of the following are examples of storage devices EXCEPT: A. hard disk drives. B. printers. C. floppy disk drives. D. CD drives. Answer: B 28. The ____________, also called the brains of the computer, is responsible for processing data. A. motherboard B. memory C. RAM D. central processing unit (CPU) Answer: D 29. The CPU and memory are located on the: A. expansion board. B. motherboard. C. storage device. D. output device. Answer: B 30. Word processing, spreadsheet, and photo-editing are examples of: A. application software.

B. system software. C. operating system software. D. platform software. Answer: A 31. ____________ is a set of computer programs used on a computer to help perform tasks. A. An instruction B. Software C. Memory D. A processor Answer: B 32. System software is the set of programs that enables your computers hardware devices and ____________ software to work together. A. management B. processing C. utility D. application Answer: D 33. The PC (personal computer) and the Apple Macintosh are examples of two different: A. platforms. B. applications. C. programs. D. storage devices. Answer: A 34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems. A. languages B. methods C. CPUs D. storage devices Answer: C 35. Servers are computers that provide resources to other computers connected to a: A. network. B. mainframe. C. supercomputer. D. client. Answer: A 36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses. A. supercomputers

B. clients C. laptops D. mainframes Answer: D 37. ____________ are specially designed computers that perform complex calculations extremely rapidly. A. Servers B. Supercomputers C. Laptops D. Mainframes Answer: B 38. DSL is an example of a(n) ____________ connection. A. network B. wireless C. slow D. broadband Answer: D 39. The difference between people with access to computers and the Internet and those without this access is known as the: A. digital divide. B. Internet divide. C. Web divide. D. broadband divide. Answer: A 40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale. A. Nanotechnology B. Micro-technology C. Computer forensics D. Artificial intelligence Answer: A 41. Which of the following is the correct order of the four major functions of a computer? A. Process Output Input Storage B. Input Output Process Storage C. Process Storage Input Output D. Input Process Output Storage Answer: D 42. ____________ bits equal one byte.

A. Eight B. Two C. One thousand D. One million Answer: A 43. The binary language consists of ____________ digit(s). A. 8 B. 2 C. 1,000 D. 1 Answer: B 44. A byte can hold one ____________ of data. A. bit B. binary digit C. character D. kilobyte Answer: C 45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer. A. The platform B. The operating system C. Application software D. The motherboard Answer: B 46. The operating system is the most common type of ____________ software. A. communication B. application C. system D. word-processing software Answer: C 47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat. A. Servers B. Embedded computers C. Robotic computers D. Mainframes Answer: B 48. The steps and tasks needed to process data, such as responses to questions or clicking an icon,

are called: A. instructions. B. the operating system. C. application software. D. the system unit. Answer: A 49. The two broad categories of software are: A. word processing and spreadsheet. B. transaction and application. C. Windows and Mac OS. D. system and application. Answer: D 50. The metal or plastic case that holds all the physical parts of the computer is the: A. system unit. B. CPU. C. mainframe. D. platform. Answer: A

Fill in the Blank:


51. Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation. Answer: Mac 52. The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices. Answer: operating system 53. The type of operating system software you use depends on your computers ____________. Answer: platform 54. ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet. Answer: Application 55. ____________are the fastest and most expensive computers. Answer: Supercomputers 56. A ____________ is approximately 1,000 bytes. Answer: kilobyte

57. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________. Answer: instructions 58. A computer gathers data, processes it, outputs the data or information, and ____________ the data or information. Answer: stores 59. The binary language consists of two digits: ____________ and ____________. Answer: 0 and 1 60. A string of ____________ 0s and 1s is called a byte. Answer: eight (8) 61. The devices you use to enter data into a computer system are known as ____________ devices. Answer: input 62. The devices on a computer system that let you see the processed information are known as ____________ devices. Answer: output 63. ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks. Answer: Software 64. When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP). Answer: Internet 65. ____________ are computers that excel at executing many different computer programs at the same time. Answer: Mainframes 66. ____________is the application of computer systems and techniques to gather legal evidence. Answer: Computer forensics 67. ____________ is the science that attempts to create machines that will emulate the human thought process. Answer: Artificial intelligence (AI) 68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs

generally run ____________ as an operating system. Answer: Microsoft Windows 69. A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns. Answer: data mining 70. Hard disk drives and CD drives are examples of ____________ devices. Answer: storage 71. You would use ____________ software to create spreadsheets, type documents, and edit photos. Answer: application 72. ____________ are computers that support hundreds or thousands of users simultaneously. Answer: Mainframes 73. ____________ is the term given to the act of stealing someones identity and ruining their credit rating. Answer: Identity theft 74. Surgeons are using ____________ to guide robots to perform delicate surgery. Answer: computers 75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans. Answer: simulators

True and False


76. Currently, the performance of tasks by robots is based on preprogrammed algorithms. Answer: True 77. Data can be a number, a word, a picture, or a sound. Answer: True 78. Strictly defined, a computer is a data processing device. Answer: True 79. The discrepancy between the haves and have-nots with regard to computer technology is commonly referred to as the digital society. Answer: False (digital divide)

80. One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that posethreats to computer security. Answer: True 81. Trend-spotting programs, developed for business, have been used to predict criminal activity. Answer: True 82. Employers do not have the right to monitor e-mail and network traffic on employee systems used at work. Answer: False 83. Clicking on an icon with the mouse is a form of giving an instruction to the computer. Answer: True 84. Output devices store instructions or data that the CPU processes. Answer: False (memory) 85. The CPU and memory are located on a special circuit board in the system unit called the motherboard. Answer: True 86. Nanostructures represent the smallest human-made structures that can be built. Answer: True 87. The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible,whereas mainframes are designed to handle many programs running at the same time (but at a slower pace). Answer: True 88. Being computer fluent means that you should be able to build a computer yourself. Answer: False 89. Embedded computers are self-contained computer devices that have their own programming and do not receive input. Answer: True 90. A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network. Answer: False (network adapter)

91. With a wireless network, it is easier to relocate devices. Answer: True 92. The most common type of memory that the computer uses to process data is ROM. Answer: False (RAM)

Matching:
93. Match the following terms with their approximate size: I. kilobyte A. one million bytes II. byte B. eight bits III. gigabyte C. one thousand bytes IV. megabyte D. one billion bytes V. terabyte E. one trillion bytes Answer: C, B, D, A, E 94. Match the following terms with their meanings: I. printer A. storage device II. scanner B. output device III. RAM C. input device IV. CPU D. a type of memory V. CD drive E. processor Answer: B, C, D, E, A 95. Match the following terms with their meanings: I. mainframe A. the most expensive computers that perform complex calculations extremely rapidly II. supercomputer B. a computer that provides resources to other computers connected to a network III. embedded computer C. a large, expensive computer that supports hundreds or thousands of users simultaneously IV. PDA D. a self-contained computer device that usually performs preprogrammed functions such as temperature control V. server E. a small mobile computing device Answer: C, A, D, E, B 96. Match the following terms with their meanings: I. software A. transforming data into information II. hardware B. data that has been organized or presented in a meaningful fashion III. operating system C. any part of the computer that you can physically touch IV. processing D. a set of computer programs that enables hardware to perform different tasks V. information E. the most common type of system software, it controls the way in which the computer system functions Answer: D, C, E, A, B

97. Match the following terms with their meanings: I. system software A. the set of programs that enables computer hardware devices and application software to work together II. application software B. the kind of operating system software you will use depends on this III. platform C. operating system software generally used on PCs IV. Microsoft Windows D. a set of programs used to accomplish a specific task V. Mac OS E. operating system software used on the Apple Macintosh Answer: A, D, B, C, E 98. Match the following terms with their meanings: I. data A. the main circuit board in the system unit II. memory B. the representation of a fact or idea (unprocessed information) III. output C. processed data or information IV. storage D. holds instructions or data that the CPU processes V. motherboard E. data or information that can be accessed again Answer: B, D, C, E, A 99. Match the following terms with their meanings: I. bit A. the science revolving around the use of nanostructures to build devices on an extremely small scale II. binary language B. the case that contains the system components III. instructions C. consists of 0s and 1s IV. system unit D. short for binary digit V. nanotechnology E. steps and tasks necessary to process data into usable information Answer: D, C, E, B, A

100. Match the following fields to the related computer technology: I. medicine A. Internet research and virtual tours II. business B. data mining III. law enforcement C. robotics and simulation IV. education D. computer forensics V. archeology E. digital recreations of ruins Answer: C, B, D, A, E 1. IC chips used in computers are usually made of (a) Lead (b) Silicon (c) Chromium (d) Gold The Correct option is (b) Silicon

2. One kilobyte is equal to (a) 1000 bytes (b) 100 bytes (c) 1024 bytes (d) 1023 bytes The Correct option is (c) 1024 bytes 3. Which of the following is not an example of Operating System? (a) Windows 98 (b) BSD Unix (c) Microsoft Office XP (d) Red Hat Linux The Correct option is (c) Microsoft Office XP 4. Which supercomputer is developed by the Indian Scientists? (a) Param (b) Super 301 (c) Compaq Presario (d) CRAY YMP The Correct option is (a) Param 5. One Gigabyte is Approximately equal is (a) 1000,000 bytes (b) 1000,000,000 bytes (c) 1000,000,000,000 bytes (d) None of these The Correct option is (b) 1000,000,000 bytes 6. Check the odd term out (a) Internet (b) Linux (c) Unix (d) Windows The Correct option is (a) Internet 7. The errors that can be pointed out by the compiler are (a) Syntax error

(b) Symantic error (c) Logical error (d) Internal error The Correct option is- (a) Syntax error 8. What is the control unit's function in the CPU (a) To transfer data to primary storage . (b) To store program instructions. (c) To perform logic functions. (d) To decode program instructions. The Correct option is (c) To perform logic functions. 9. What is the best way to have a data and the slide number appear on every slide? (a) choose Tools, Header and Footer, click Slide tab, select the desired options, click Apply to All. (b) choose Insert, Header and Footer, click Slide tab, select the desired options, click Apply to All. (c) choose View, Header and Footer, click Slide tab, select the desired options, click Apply to All. (d) choose File, Header and Footer, click Slide tab, select the desired options, click Apply to All. The Correct option is (b) choose Insert, Header and Footer, click Slide tab, select the desired options, click Apply to All. 10. What do you use to create a chart? (a) Pie Wizard (b) Excel Wizard (c) Data Wizard (d) Chart Wizard The Correct option is (d) Chart Wizard
Q. The term 'PC-XT' refers to 1 Personal Computer External Technology 2 Personal Computer Embedded Technology 3 Personal Computer Extended Technology 4 Personal Computer Expanded Technology Ans: 4 Q. A parallel port is most often used by a 1 2 3 4 Mouse Monitor Printer External storage device Ans: 3

Q. Computer follows a simple principle called GIGO which means: 1 2 3 4 Garbage in garbage out Garbage input good output Good input good output Greater instructions greater output Ans: 1 Q. Arrange the following devices in ascending order of the speed: A. RAM B. Hard disk C. Cache D. Floppy 1 2 3 4 ABDC BDAC DBAC BADC Ans: 3 Q. What is the commonly used unit for measuring the sped of data transmission? 1 2 3 4 Bits per second Nano seconds Characters per second Mega Hertz Ans: 1 Q. Which one among the following is not included in the basic functions of operating system? 1 2 3 4 Job Control Job Scheduling Memory Management Data Management Ans: 1 Q. 'Blue tooth' technology allows 1 Landline phone to mobile phone communication 2 Signal transmission on mobile phones only 3 Wireless communication between equipments 4 Satellite television communication Ans: 3 Q. Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct? 1. It will facilitate real time access of classified criminal data to the law enforcement authorities. 2. National Crime Record Bureau is the nodal agency mandated to implement the network in all the states. Select the correct answer using the code given below1 2 3 4 1 only 2 only Both 1 and 2 Neither 1 nor 2 Ans: 1

Q. One byte consists of 1 2 3 4 four bits one bit ten bit eight bits Ans: 4 Q. ENIAC was 1 an electronic computer 2 an engine 3 a memory device 4 an electronic calculator 1

Q. The operating system called UNIX is typically used for 1 2 3 4 Desktop computers Laptop computers Supercomputers All of these Ans: 4 Q. There are several primary categories of procedures. Which of the following is not a primary category of procedures? 1 2 3 4 Testing Backup and recovery Firewall development Design Ans: 3 Q. All of the logic and mathematical calculations done by the computer happen in/on the 1 2 3 4 Central processing unit Mother board Memory Central control unit Ans: 1 Q. The connection between your computer at home and your local ISP is called 1 2 3 4 The last mile The home Stretch The home page The backbone Ans: 3 Q. When speaking of computer input and output, input refers to 1 any data processing that occurs from new data input into the computer 2 data or information that has been entered into the computer 3 the transmission of data that has been input into the computer 4 Both (C) and (D) above.

Ans: 4 Q. Computer software can be defined as-1 the computer and its associated equipment 2 the instructions that tell the computer what to do 3 computer components that act to accomplish a goal 4 an interface between the computer and the network Ans: 2 Q. The main memory of a computer can also be called 1 2 3 4 Primary storage Internal memory Primary memory All of these Ans: 3 Q. Which of the following is not a type of computer software which can be thought? 1 2 3 4 Off-the-shelf Tailor-made Custom-developed Off-the-shelf with alterations Ans: 4 Q. .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1 2 3 4 Phishing trips Computer viruses Spyware scams Phishing Scams Ans: 4 Q. The main job of CPU is to 1 carry out program instructions 2 Store data/information for future use 3 Process data and information 4 Both (A) and (C) 4 Which of the following is an example of an optical disk? 1 2 3 4 Magnetic disks Memory disks Data bus disks Digital versatile disks Ans: 4 Q. Which of the following is an example of storage devices? 1 2 3 Magnetic disks Tapes DVDs

All of these Ans: 4

Q. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a 1 2 3 4 Hacker Spammer Analyst Programmer Ans: 1 Q. A popular way to learn about computers without ever going to a classroom is called 1 2 3 4 i-learning isolated learning e-learning close learning Ans: 3 Q. Which of the following is a storage device permanently installed magneticdisks to store data/information 1 2 3 4 Floppy diskette Hard disk Permanent disk None of these Ans: 2 Q. A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using 1 2 3 4 Input automation Item data automation Scanning automation Source data automation Ans: 3 Q. Main memory works in conjunction with 1 2 3 4 RAM Special function cards CPU Intel Ans: 3 Q. The collection of links throughout the Internet creates an interconnected network called the 1 2 3 4 WWW Web World Wide Web All of the above Ans: 4 that uses rigid,

Q. Cache and main memory will lose their contents when the power is off. They are-1 2 3 4 Dynamic Faulty Volatile Static Ans: 3 Q. Vendor-created program modifications are called-1 2 3 4 Patches Fixes Holes Overlaps Ans: 2 Storage media such as a CD read and write information using -1 2 3 4 Magnetic strips Magnetic dots A laser beam of red light All of these Ans: 4 Q. To reload a Web page, press the.... button. 1 2 3 4 Redo Reload Ctrl Refresh Ans: 4 Q. The.... controls a client computer's resources. 1 2 3 4 Application program Instruction set Operating System Server application Ans: 4 Q. The process of transferring files from a computer on the Internet to your computer is called-1 2 3 4 Downloading Uploading FTP JPEG Ans: 1 Q. Which media have the ability to have data/information stored (written) on them by users more than once? 1 2 CD-R disks CD-RW disks

3 4

Zip disks Optical Disks Ans: 2

Q. What are the four things needed to connect to the Internet? 1 Telephone line, modem, computer, and an ISP 2 Modem, computer, PDA and ISP 3 Telephone line, PDA, modem and computer 4 monitor, keyboard, mouse, modem Ans: 1 Q. What is e-commerce? 1 Buying and selling products and services over the Internet 2 Buying and selling international goods 3 Buying and selling products and services not found in stores 4 Buying and selling products having to do with computers Ans: 1 Q. Storage and memory differ with respect to which of the following characteristics? 1 2 3 4 Reliability Speed Price All of these Ans: 4 Q. The ---- is the term used to describe the window that is currently being used. 1 2 3 4 Web Window Display Area Active Window Monitor Ans: 3 Q. 1024 bytes equals: 1 2 3 4 1 KB 2 MB 1 GB 1TB Ans: 1 1 2 3 4 5 6 7 8 9 10 ... Q. The term 'PC-XT' refers to 1 Personal Computer External Technology 2 Personal Computer Extended Technology 3 Personal Computer Embedded Technology 4 Personal Computer Expanded Technology Ans: 2

Q. Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1 2 3 4 Transport Network Presentation Session Ans: 2 Q. Which of the following will help you to improve your LAN security? 1 2 3 4 Change your passwords frequently Install a firewall program Use a proxy All of the above Ans: 3 Q. Which of the following devices discriminates between multicast and unicast packets? 1 2 3 4 Multicast switch Bicast switch Bicast router Mulicast Router Ans: 4 Q. Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 2 3 4 Application layer Firewall Packet Filtering Firewall Router enhanced firewall IP enabled firewall Ans: 2 Q. Which of the following systems run an application layer firewall using proxy software? 1 2 3 4 Proxy NAT Proxy client Client 32 Proxy server Ans: 4 Q. A packet filtering firewall operates at which of the following OSI layer? 1 2 3 4 At the Application layer At the Transport Layer At the Network Layer Both 2 and 3 Ans: 4 Q. Which of the following are true about firewalls? 1 Filters network traffic 2 Can be either a hardware or software device

3 Follows a set of rules 4 All the above Ans: 4 Q. What are some of the benefits of using a firewall for your LAN? 1 2 3 4 Increased access to Instant Messaging Stricter access control to critical resources Greater security to your LAN Both 2 and 3 Ans: 4 Q. Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1 2 3 4 DSL modem A multi-homed firewall VLAN A brouter that acts both as a bridge and a router Ans: 2 Q. Which of the following devices is specially designed to forward packets to specific ports based on the packet's address? 1 2 3 4 Specialty hub Switching hub Port hub Filtering hub Ans: 2

Q. After booting process which file executes automatically 1 2 3 4 config.sys command.com autoexec.bat io.sys Ans: 3 Q. A System in which a transaction access and updates a file quickly enough to affect the original decision making is called

1 2 3 4

Real time system time sharing system both of above None of above Ans: 1

Q. In time sharing system, the user carried a conversation with the central system called 1 2 3 4 interacting computer conversation computing Both of above None of above Ans: 3 Q. The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none Ans: 1 Q. Allocation of a resources in a time dependent fashion to several program simultaneously called 1 2 3 4 multi tasking multi user time sharing None Ans: 3

Q. Batch processing is also known as 1 2 3 4 serial sequential off line processing all of above Ans: 4 Q. Operating System for Microcomputer system is1 2 3 4 Unix Linux Windows all Ans: 1 Q. Data are accumulated and processed in group called 1 2 3 4 Batch Processing Group processing Time sharing None Ans: 1

Q. Unix Operating System use _________ Multitasking 1 2 3 4 Preemptive Cooperative multiprogramming None

Ans: 1 Objective General Knowledge Q. Macintosh computer use_____ Multitasking 1 2 3 4 Preemtive cooperative multiprogramming none Ans: 2 Q. Preemptive and cooperative both are type of 1 2 3 4 Multiprogramming Multitasking Multi-user None Ans: 2

Q. Multiprocessing supports more then one_____ at the same time 1 2 3 4 Process User Hardware None Ans: 1

Q. Which one allow two or more users to run programs at the same time 1 2 Multiuser Multitasking

3 4

Multiprocessing None Ans: 1

Q. DMA stands for ________ 1 Direct Memory Access 2 Distinct Memory Access 3 Direct Module Access 4 Direct Memory Allocation Ans: 1

Q. Which of the following is a read only memory storage device. 1 2 3 4 Floppy Disk Hard Disk CDROM None of these Ans: 3 Q. _________ is a semi conductor memory. 1 2 3 4 Dynamic Static Bubble Both a & b Ans: 4 Q. Separate Read/Write heads are required in which of these memory access schemes. 1 Random Access

2 3 4

Sequential Access Direct Access None of these Ans: 4

Q.

Which of the following are the best units of data on an external storage device? 1 2 3 4 Bits Bytes Hertz Clock cycles Ans: 2

Q. _____ transforms one interface into another interface 1 2 3 4 Program Software Data None Ans: 2 Q. The primary purpose of an operating system is.... 1 To make the most efficient use of the computer hardware 2 To allow people to use the computer 3 To keep systems programmers employed 4 To make computers easier to use Ans: 1

Q. ............ runs on computer hardware and serve as platform for other software's to run on 1 2 3 4 Operting System Application Software System Software All Ans: 1 Q. Integrated circuits contained 1 10 to 20 components 2 20 to 30 components 3 25 to 25 components 4 35 to 25 components Ans: 1 Q. How many vaccum tubes was used in first analytical engine1 2 3 4 10000 12000 90000 14000 Ans: 1

Q. EDVAC is 1 Electronic Detected Variable Automatic Computer 2 Electronic Discrete Variable Automatic Computer 3 Electronic Discrete Valuable Automatic Computer 4 Electronic Developed Valuable Automatic Computer

Ans: 2 Q. ENIAC was the computer of1 Storage program concept 2 Processing concept 3 Electronic change concept 4 All Ans: 1

Q. IC chips was used in1 First generation 2 Second generation 3 Third Generation 4 Fourth generation Ans: 3

Q. VLIC (Very Large Integration Circuit) technology was used in which generation ? 1 2 3 4 First generation Second generation Third generation Fourth generation Ans: 4

Q. Which electronic component was use in first generation? 1 2 3 Vacuum tubes transistors IC chips

all above Ans: 1

1 2 3 4 5 6 7 8 9 10 ...

Which of the following commands displays names of files in sorted order? 1 2 3 4 DIR/N DIR/SO DIR/AN DIR/AH Ans: 3 Q. VIRUS stands for 1 Very Important Resource Under Search 2 Virtual Information Resource Under Resize 3 Verify Interchange Result Until Source 4 Very Important Record User Searched Ans: 2 Q. FAT stands for 1 File Accomdation Table 2 File Access Tape 3 File Allocation Table 4 File Activity Table Ans: 3

Q. Which command can be used to recreate the disk's tracks and sectors ?

1 2 3 4

FDISK FORMAT CHKDSK ATTRIB Ans: 2

Q. What is the switch that is used to make sure that the COPY command copied files correctly 1 2 3 4 /A /C /S /V Ans: 4 Q. Which switch should be used in the DIR command to view files in all directories ? 1 2 3 4 /P /W /S /L Ans: 3 Q. Which among the following are the best tools for Fixing errors on disks? 1 2 3 4 FDISK SCANDISK CHKDSK FIXDSK Ans: 2

Q. Which type of commands in DOS needs additional files for their execution? 1 2 3 4 Internal Commands External Commands Batch Commands Redirectors Ans: 2 Q. What is the name of the batch file that is automatically run when MSDOS is booted ? 1 2 3 4 RUN.BAT CONFIG.SYS CONFIG.BAT AUTORUN.BAT Ans: 4

Which was the last version of MS-DOS that was released separately? 1 2 3 4 5.0 6.0 6.11 6.22 Ans: 4 Q. Who was the programmer of Ms-Dos operating system 1 2 3 4 R Jhon Bill Gates Dennis Ritchi none

Ans: 2 Q. The Operating System Manages 1 2 3 4 Memeory Processes Disks and I/O devices All of the above Ans: 4 Q. Page stealing 1 Is a sign of an efficient system 2 Is taking page frames from other working sets 3 Should be the tuning goal 4 Is taking larger disk spaces for pages paged out Ans: 2 Q. Which of the following Operating Systems do you choose to implement a client Server Network 1 2 3 4 MS DOS Windows 7 Windows XP Windows 2003 Ans: 4 Q. Poor response times are usually caused by 1 2 3 Process busy High I/O rates High paging rates

Any of the above Ans: 4

Q. When a computer is first turned on or restarted, a special type of absolute loader called____ is executed 1 2 3 4 Compile and Go loader Boot loader Bootstrap loader Relating loader Ans: 3 Q. Which of the following Operatings does not implement multitaskings truly 1 2 3 4 Windows 98 Windows NT Windows XP MS DOS Ans: 4 Q. _________ is the first program run on a computer when computer boots up 1 2 3 4 System Software Operating Software Systems Operations None Ans: 2 Q. Multiprogramming systems 1 Are easier to develop than single programming systems 2 Execute each job faster

3 Execute more jobs in the same time period 4 Are used only one large mainframe computers

Q.

Which file in MS-DOS contains internal commands that are loaded during Booting process? 1 2 3 4 IO.SYS MSDOS.SYS COMMAND.COM CONFIG.SYS Ans: 4

Which was the last version of MS-DOS that was released separately? 1 2 3 4 5.0 6.0 6.11 6.22 Ans: 4 Q. Who was the programmer of Ms-Dos operating system 1 2 3 4 R Jhon Bill Gates Dennis Ritchi none Ans: 2 Q. The Operating System Manages 1 2 3 4 Memeory Processes Disks and I/O devices All of the above Ans: 4 Q. Page stealing 1 Is a sign of an efficient system 2 Is taking page frames from other working sets 3 Should be the tuning goal 4 Is taking larger disk spaces for pages paged out Ans: 2

Q. Which of the following Operating Systems do you choose to implement a client Server Network 1 2 3 4 MS DOS Windows 7 Windows XP Windows 2003 Ans: 4 Q. Poor response times are usually caused by 1 2 3 4 Process busy High I/O rates High paging rates Any of the above Ans: 4 Q. When a computer is first turned on or restarted, a special type of absolute loader called____ is executed 1 2 3 4 Compile and Go loader Boot loader Bootstrap loader Relating loader Ans: 3 Q. Which of the following Operatings does not implement multitaskings truly 1 2 3 4 Windows 98 Windows NT Windows XP MS DOS Ans: 4 Q. _________ is the first program run on a computer when computer boots up 1 2 3 4 System Software Operating Software Systems Operations None Ans: 2 Q. Multiprogramming systems 1 Are easier to develop than single programming systems 2 Execute each job faster 3 Execute more jobs in the same time period 4 Are used only one large mainframe computers

Q. In a Computer_________ is capable to store single binary bit. 1 2 3 4 Capacitor Flip Flop Register Inductor Ans: 2 1 2 3 4 5 6 7 8 9 10 ...

Potrebbero piacerti anche