G.K. (Computer Fundamental)
Q-1 The bank use……………. Device to minimize conversion process.(a) Keyboard (b) MICR
(c) OCR (d) Scanner
Q-2 ………………can’t be used for source of data automation.
(a) POS terminal (b) OCR
(c) Keyboard (d) UPC
Q-3 Under which case will intranet be an effective networking tool/s?
(a) In a distributed decision-making environment
(b) Where heterogeneous applications are involved
(c) In a centralised organization
(d) In a decentralized organization
Q-4 When an organization gives contract for development of software; it has to
give data to the service provider. In Such cases, the ownership of data
should be_________
(a) Transferred to the service provider
(b) With the client/organization that outsource services
(c) Shared by both parties
(d) Not transferred
Q-5 A modem performs_________
(a) Modulation (b) Demodulation
(c) Data compression (d) All of these
Q-6 Which of the following is NOT done by modem?
(a) Transmission Speed (b) Data Accuracy
(c) Error detection and Correction (d) Data Compression
Q-7 A program coded in programming language is____________ .
(a) Target code (b) Source code
(c) Block (d) None of these
Q-8 “Platform” in computer world means___________ .
(a) Computer hardware used (b) Operating Systems used
(c) Both of these (d) None of these
Q-9 Which of these biometric tools use thermal sensors along with infrared
rays for identification?
(a) Key stroke dynamics (b) Iris/ Retinal scan
(c) Speech recognition (d) Fingerprint scanning
Q-10 what is incorrect about software?
(a) It can manipulate computer (b) It has programs, instructions
(c) It can be touched (d) It can be touched
Q-11 Disadvantage of distributed database is..
(a) Unreliability (b) Easy implementation
(c) Insecurity (d) High communication cost
Q-12 which of the following transmission techniques let computer to
alternatively send and receive data ?
(a) Simplex (b) Half duplex
(c)Full duplex (d) Multiplexing
Q-13 What is NOT a feature of networking?
(a) Reliability (b) Greater storage space
(c) Connectivity (d) All are features of networking
Q-14 Taking back-up of a file against crash is a
(a) Preventive measure (b) Curative measure
(c) Decisive measure (d) None of these
Q-15 A memory that is referred by its contents instead of physical
address is called--------------------.
(a) Associative memory (b) Content addressable storage
(c) Both (a) and (b) (d) None of these
Q-16 Most dangerous risk in leaking of information is :
(a) ready access to online terminals
(b) Online processing of data
(c) Ignorance about the existence of risk
(d) All of these
Q-17 A camera is an........
(a) Input device (b) Can be either input or output
(c) Processing machine (b) Output device
Q-18 Using anti-virus software is----------
(a) Preventive measure (b) Detective measure
(c) Corrective measure (d) All the above
Q-19 An online transaction is -----------------
(a) One that is done in real time
(b) Transaction done via internet
(c) One that is done via telephone
(d) None of these
Q-20 A clerk in a bank has to access data in customer account. Logical access
control for these users would be.
(a) Use of individual passwords
(b) Use of a Accounts Receivable Section password
(c) Use of individual passwords plus separate access passwords for
customer data and product data
(d) Can’t say
Q-21 To stop unauthorized access to the computer system we should
(a) Have a trustworthy system administrator
(b) Have a good passwords policy
(c) Have a sound encryption policy
(d) All of the above
Q-22 Which can not assure data accuracy in an application?
(a) Limit and reasonableness test (b) Echo checking
(c) Control total (d) None of these
Q-23 Maximum storage space is available on
(a) CDs (b) ROM
(c) Hard disks (d) Floppies
Q-24 Jon Von Neumann developed:
(a) First electronic chip flip flop (b) Stored-program concept
(c) The first electronic computer (d) None of these
Q-25 Which of the following is single user computer with many features
and good processing power?
(a) Minicomputer (b) Workstation
(c) Macintosh (d) None of these
Answers:-
1. b 2. d 3. c 4. b 5. d 6. b 7. b 8. c 9. c 10. d 11. c 12. b 13. d 14. b 15. b16. c 17. b 18. a 19. b 20. a 21. b 22. a 23. b 24. a 25. b