*

.

Showing posts with label Business etc.. Show all posts
Showing posts with label Business etc.. Show all posts

G.K. (Computer Fundamental) # 3

          G.K. (Computer Fundamental)

Q-1 The bank use……………. Device to minimize conversion process.

       (a) Keyboard                            (b) MICR
       (c) OCR                                   (d) Scanner

Q-2 ………………can’t be used for source of data automation.

        (a) POS terminal                      (b) OCR
        (c) Keyboard                            (d) UPC

Q-3 Under which case will intranet be an effective networking tool/s?

       (a) In a distributed decision-making environment
       (b) Where heterogeneous applications are involved
       (c) In a centralised organization
       (d) In a decentralized organization

Q-4 When an organization gives contract for development of software; it has to
        give data to the service provider. In Such cases, the ownership of data
         should be_________

       (a) Transferred to the service provider
       (b) With the client/organization that outsource services
       (c) Shared by both parties
       (d) Not transferred

Q-5 A modem performs_________

        (a) Modulation                      (b) Demodulation
        (c) Data compression            (d) All of these

Q-6 Which of the following is NOT done by modem?

        (a) Transmission Speed                      (b) Data Accuracy
        (c) Error detection and Correction     (d) Data Compression

Q-7 A program coded in programming language is____________ .

       (a) Target code                    (b) Source code
       (c) Block                            (d) None of these

Q-8 “Platform” in computer world means___________ .

       (a) Computer hardware used    (b) Operating Systems used
       (c) Both of these                       (d) None of these

Q-9 Which of these biometric tools use thermal sensors along with infrared
        rays for identification?

        (a) Key stroke dynamics          (b) Iris/ Retinal scan
        (c) Speech recognition             (d) Fingerprint scanning

Q-10 what is incorrect about software?

    (a) It can manipulate computer   (b) It has programs, instructions
    (c) It can be touched                   (d) It can be touched

Q-11 Disadvantage of distributed database is..

    (a) Unreliability                      (b) Easy implementation
    (c) Insecurity                           (d) High communication cost

Q-12 which of the following transmission techniques let computer to
        alternatively send and receive data ?

     (a) Simplex                             (b) Half duplex
     (c)Full duplex                         (d) Multiplexing

Q-13 What is NOT a feature of networking?

    (a) Reliability                        (b) Greater storage space
    (c) Connectivity                    (d) All are features of networking

Q-14 Taking back-up of a file against crash is a

    (a) Preventive measure          (b) Curative measure
    (c) Decisive measure             (d) None of these

Q-15 A memory that is referred by its contents instead of physical
        address is called--------------------.

         (a) Associative memory     (b) Content addressable storage
         (c) Both (a) and (b)             (d) None of these

Q-16 Most dangerous risk in leaking of information is :

        (a) ready access to online terminals
        (b) Online processing of data
        (c) Ignorance about the existence of risk
        (d) All of these

Q-17 A camera is an........

       (a) Input device                 (b) Can be either input or output
       (c) Processing machine     (b) Output device

Q-18 Using anti-virus software is----------

      (a) Preventive measure       (b) Detective measure
      (c) Corrective measure       (d) All the above

Q-19 An online transaction is -----------------

      (a) One that is done in real time   
      (b) Transaction done via internet
      (c) One that is done via telephone 
      (d) None of these

Q-20 A clerk in a bank has to access data in customer account. Logical access
         control for these users would be.

       (a) Use of individual passwords
       (b) Use of a Accounts Receivable Section password
       (c) Use of individual passwords plus separate access passwords for
            customer data and product data
       (d) Can’t say

Q-21 To stop unauthorized access to the computer system we should

      (a) Have a trustworthy system administrator
      (b) Have a good passwords policy
      (c) Have a sound encryption policy
      (d) All of the above

Q-22 Which can not assure data accuracy in an application?

     (a) Limit and reasonableness test       (b) Echo checking
     (c) Control total                                  (d) None of these

Q-23 Maximum storage space is available on
     (a) CDs                                               (b) ROM
     (c) Hard disks                                    (d) Floppies

Q-24 Jon Von Neumann developed:

         (a) First electronic chip flip flop    (b) Stored-program concept
         (c) The first electronic computer    (d) None of these

Q-25 Which of the following is single user computer with many features
          and good processing power?

         (a) Minicomputer                            (b) Workstation
         (c) Macintosh                                   (d) None of these


Answers:-

1. b 2. d 3. c 4. b 5. d 6. b 7. b 8. c 9. c 10. d 11. c 12. b 13. d 14. b 15. b
16. c 17. b 18. a 19. b 20. a 21. b 22. a 23. b 24. a 25. b

GK (Computer Fundamental) # 2

          GK (Computer Fundamental)

Q-1 The executable file for Windows Explorer is ----------.

        (a) Expol.EXE                    (b) Explorer.EXE
        (c) Explorer.TXT                (d) Explorer. EXT

Q-2 ----------------is a tool to browse all disks connected to the computer.

       (a) Internet Explorer            (b) Windows Explorer
       (c) Windows Navigator       (d)  None of these

Q-3 The menu option to delete all the files present in the Recycle Bin is -----------.
       (a) Empty Recycle  Bin        (b) Full Recycle Bin
       (c) Half Empty Recycle Bin (d) None of these

Q-4 The facility to reduce the Taskbar to thin line when the taskbar or Start button
        is not in use is called as ----------------------

        (a) Auto hide                         (b) Hide
        (c) Automatic                        (d) None of these

Q-5 The extension for a created shortcut is------------.

         (a) .KLN                              (b) .NLK
         (c) .LNK                              (d) .LKN

Q-6 The shortcut key to switch between different applications is ----------.

        (a) Alt + Tab                         (b) Alt + Shift
        (c) Shift + Tab                       (d) Alt + Ctrl

Q-7 The Taskbar can be moved to ------------ of the screen.

         (a) Right corner                   (b) Left corner
         (c) Any corner                     (d) Top corner

Q-8 It is not possible to add items to the ---------------------.

         (a) Program menu                 (b) Start menu
         (c) Accessories menu            (d) None

Q-9 Files can be deleted from Windows with or without confirmation.

          (a) True                                  (b) False

Q-10 Shortcuts can be created on the desktop.

          (a) True                                  (b) False

Q-11 Unix is an example for :

          (a) Input Device                     (b) Output

          (c) Operating system              (d) Terminal

Q-12 Virus is a:........

          (a) OS                                      (b) Destructive Program

          (c) Useful Hardware                (d) Useful Software

Q-13 Loading Operating System onto RAM is called:

          (a) Booting                                (b) Saving
          (c) Printing                               (d) Opening

Q-14 An example for Virus:

         (a) Virus Rx                               (b) Nashot
         (c) Raindrops                             (d) Undelete

Q-15 Multiple CPUs help processing multiple instructions simultaneously:

         (a) Multiprogramming               (b) Memory Management
         (c) Multiprocessing                    (d) None of these

Q-16 DOS Command to view the contents of the file -------EDUCATION.BAT is :

        (a) TYPE EDUCATION.BAT   (b) DEL EDUCATION.BAT

        (c) View EDUCATION.BAT    (d) REN EDUCATION.BAT

Q-17 Start button of windows 98 is available in :

       (a) Control Panel                        (b) MS-Paint
       (c) Taskbar                                 (d) WordPad

Q-18 In Web Style, a single click on a program icon on desktop will:

       (a) Copy the program               (b) Delete the program
       (c) Open the program               (d) Close the program

Q-19 In Unix, mv command is used to :

        (a) View the contents of a file (b) Change the name of a file
        (c) Delete a file                        (d) None of these

Q-20 Windows 98 supports:

        (a) Plug & Play                (b) Creating Web pages
        (c) Multitasking                       (d) All of these

Q-21 Memory Management is performed by ------------------------.

       (a) Operating System               (b) Application
       (c) Software                              (d) None

Q-22 A wall paper effect can be created by using ---------------picture.

       (a) JPEG                                   (b) GIF
       (c) Bitmap                                 (d) JPG

Q-23 Deleted files can be recalled in windows 98 using ----------.

       (a) Recycle                                (b) Recycle Bin
       (c) Bin Recycle                         (d)  None

Q-24 To edit a scanner image, in Windows 98, use -----------.

       (a) Image                                   (b) Images
       (c) Imaging                               (d) None

Q-25 The two files used by Web View is ------------& -----------.

       (a) Desktop,INI, Folder,HTT     (b) Desktop,INS, Folder,HTP
       (c) Desktop,SNI, Folder,HST    (d) None


Answers:-

1. b 2. b 3. a 4. a 5. c 6. a 7. c 8. c 9. a 10. a 11. b 12 c 13. d 14. c
15. b 16. c 17. b 18. b 19. c 20. d 21. a 22. c 23. b 24. c 25. a

Some Important Expected Questions of Computer Fundamentals

                                                           




..