Thursday, March 19, 2015

G.K. (Computer Fundamental)

G.K. (Computer Fundamental)

Q-1 The bank use……………. Device to minimize conversion process.

(a) Keyboard (b) MICR
(c) OCR (d) Scanner

Q-2 ………………can’t be used for source of data automation.

(a) POS terminal (b) OCR
(c) Keyboard (d) UPC

Q-3 Under which case will intranet be aneffective networking tool/s?

(a) In a distributed decision-making environment
(b) Where heterogeneous applications are involved
(c) In a centralised organization
(d) In a decentralisad organization

Q-4 When an organization gives contract for development of software; it has to give data to the service provider. In Such cases, the ownership of data should be_________

(a) Transferred to the service provider
(b) With the client/organization that outsource services
(c) Shared by both parties
(d) Not transferred

Q-5 A modem performs_________

(a) Modulation (b) Demodulation
(c) Data compression (d) All of these

Q-6 Which of the following is NOT done by modem?

(a) Transmission Speed (b) Data Accuracy
(b) Error detection and Correction (d) Data Compression

Q-7 A program coded in programming language is____________ .

(a) Target code (b) Source code
(c) Block (d) None of these

Q-8 “Platform” in computer world means___________ .

(a) Computer hardware used (b) Operating Systems used
(c) Both of these (d) None of these

Q-9 Which of these biometric tools use thermal sensors along with infrared rays for identification?

(a) Key stroke dynamics (b) Lris\ Retinal scan
(c) Speech recognition (d) Fingerprint scanning

Q-10 what is incorrect about software?

(a) It can manipulate computer (b) It has programs, instructions
(c) It can be touched (d)It can be touched

Q-11 Disadvantage of distributed database is.

(a) Unreliability (b) Easy implementation
(c) Insecurity (d) High communication cost

Q-12 which of the following transmission techniques let computer to alternatively send and receive data ?

(a) Simplex (b) Half duplex
(c)Full duplex (d) Multiplexing

Q-13 What is NOT a feature of networking?

(a) Reliability (b) Greater storage space
(c) Connectivity (d) All are features of networking

Q-14 Taking back-up of a file against crash is a

(a)Preventive measure (b) Curative measure
(c) Decisive measure (d) None of these

Q-15 A memory that is referred by its contents instead of physical address is called___________

(a) Associative memory (b) Content addressable storage
(c) Both (a) and (b) (d) None of these

Q-16 Most dangerous risk in leaking of information is :

(a) ready access to online terminals (b) Online processing of data
(c) Ignorance about the existence of risk (d) All of these
Q-17 A camera is an
(a) Input device (b) Can be either input or output
(c) Processing machine (b) Output device

Q-18 Using anti-virus software is

(a) Preventive measure (b) Detective measure
(c) Corrective measure (d) All the above

Q-19 An online transaction is

(a) One that is done in real time (b) Transaction done via internet
(c) One that is done via telephone (d) None of these

Q-20 A clerk in a bank has to access data n customer account. Logical access control for these users would be.
(a) Use of individual passwords
(b) Use of a Accounts Receivable Section password
(c) Use of individual passwords plus separate access passwords for customer data and product data
(d) Can’t say

Q-21 To stop unauthorized access to the computer system we should

(a) Have a trustworthy system administrator (b) Have a good passwords policy
(c) Have a sound encryption policy (d) All of the above

Q-22 Which can not assure data accuracy in an application?

(a) Limit and reasonableness test (b) Echo checking
(c) Control total (d) None of these

Q-23 Maximum storage space is available on
(a) CDs (b) ROM
(c) Hard disks (d) Floppies

Q-24 Jon Von Neumann developed:

(a) First electronic chip flip flop (b) Stored-program concept
(c) The first electronic computer (d) None of these

Q-25 Which of the following is single user computer with many features and good processing power?

(a) Minicomputer (b) Workstation
(c) Macintosh (d) None of these


1. b 2. d 3. c 4. b 5. d 6. b 7. b 8. c 9. c 10. d 11. c 12. b 13. d 14. b 15. b
16. c 17. b 18. a 19. b 20. a 21. b 22. a 23. b 24. a 25. b

No comments:

Post a Comment