*

.

G.K. (Computer Fundamental) # 3

          G.K. (Computer Fundamental)

Q-1 The bank use……………. Device to minimize conversion process.

       (a) Keyboard                            (b) MICR
       (c) OCR                                   (d) Scanner

Q-2 ………………can’t be used for source of data automation.

        (a) POS terminal                      (b) OCR
        (c) Keyboard                            (d) UPC

Q-3 Under which case will intranet be an effective networking tool/s?

       (a) In a distributed decision-making environment
       (b) Where heterogeneous applications are involved
       (c) In a centralised organization
       (d) In a decentralized organization

Q-4 When an organization gives contract for development of software; it has to
        give data to the service provider. In Such cases, the ownership of data
         should be_________

       (a) Transferred to the service provider
       (b) With the client/organization that outsource services
       (c) Shared by both parties
       (d) Not transferred

Q-5 A modem performs_________

        (a) Modulation                      (b) Demodulation
        (c) Data compression            (d) All of these

Q-6 Which of the following is NOT done by modem?

        (a) Transmission Speed                      (b) Data Accuracy
        (c) Error detection and Correction     (d) Data Compression

Q-7 A program coded in programming language is____________ .

       (a) Target code                    (b) Source code
       (c) Block                            (d) None of these

Q-8 “Platform” in computer world means___________ .

       (a) Computer hardware used    (b) Operating Systems used
       (c) Both of these                       (d) None of these

Q-9 Which of these biometric tools use thermal sensors along with infrared
        rays for identification?

        (a) Key stroke dynamics          (b) Iris/ Retinal scan
        (c) Speech recognition             (d) Fingerprint scanning

Q-10 what is incorrect about software?

    (a) It can manipulate computer   (b) It has programs, instructions
    (c) It can be touched                   (d) It can be touched

Q-11 Disadvantage of distributed database is..

    (a) Unreliability                      (b) Easy implementation
    (c) Insecurity                           (d) High communication cost

Q-12 which of the following transmission techniques let computer to
        alternatively send and receive data ?

     (a) Simplex                             (b) Half duplex
     (c)Full duplex                         (d) Multiplexing

Q-13 What is NOT a feature of networking?

    (a) Reliability                        (b) Greater storage space
    (c) Connectivity                    (d) All are features of networking

Q-14 Taking back-up of a file against crash is a

    (a) Preventive measure          (b) Curative measure
    (c) Decisive measure             (d) None of these

Q-15 A memory that is referred by its contents instead of physical
        address is called--------------------.

         (a) Associative memory     (b) Content addressable storage
         (c) Both (a) and (b)             (d) None of these

Q-16 Most dangerous risk in leaking of information is :

        (a) ready access to online terminals
        (b) Online processing of data
        (c) Ignorance about the existence of risk
        (d) All of these

Q-17 A camera is an........

       (a) Input device                 (b) Can be either input or output
       (c) Processing machine     (b) Output device

Q-18 Using anti-virus software is----------

      (a) Preventive measure       (b) Detective measure
      (c) Corrective measure       (d) All the above

Q-19 An online transaction is -----------------

      (a) One that is done in real time   
      (b) Transaction done via internet
      (c) One that is done via telephone 
      (d) None of these

Q-20 A clerk in a bank has to access data in customer account. Logical access
         control for these users would be.

       (a) Use of individual passwords
       (b) Use of a Accounts Receivable Section password
       (c) Use of individual passwords plus separate access passwords for
            customer data and product data
       (d) Can’t say

Q-21 To stop unauthorized access to the computer system we should

      (a) Have a trustworthy system administrator
      (b) Have a good passwords policy
      (c) Have a sound encryption policy
      (d) All of the above

Q-22 Which can not assure data accuracy in an application?

     (a) Limit and reasonableness test       (b) Echo checking
     (c) Control total                                  (d) None of these

Q-23 Maximum storage space is available on
     (a) CDs                                               (b) ROM
     (c) Hard disks                                    (d) Floppies

Q-24 Jon Von Neumann developed:

         (a) First electronic chip flip flop    (b) Stored-program concept
         (c) The first electronic computer    (d) None of these

Q-25 Which of the following is single user computer with many features
          and good processing power?

         (a) Minicomputer                            (b) Workstation
         (c) Macintosh                                   (d) None of these


Answers:-

1. b 2. d 3. c 4. b 5. d 6. b 7. b 8. c 9. c 10. d 11. c 12. b 13. d 14. b 15. b
16. c 17. b 18. a 19. b 20. a 21. b 22. a 23. b 24. a 25. b

No comments:

Post a Comment

..