Sunday, 20 November 2011

Allahabad Bank Probationary Officers Exam., 2010 (Held on 21-2-2010) Computer Knowledge : Solved Paper


14. Application software is designed to accomplish—
(D) operating system tasks
Ans : (D)

15. A telephone number, a birth date, and a customer name are all examples of—
(D) a database
(Ans : (D)

16. The human-readable version of a program is called—
(D) system code
Ans : (D)

17. A ……… computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
Ans : (A)

18. ……… is the result produced by a computer.
(C) Output
Ans : (C)

19. Programs such as Internet Explorer that serve as navigable windows into the Web are called—
(D) Web browsers
(E) None of these
Ans : (D)

20. A ……… is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(C) UPS
Ans : (C)

21. When you save to ………, your data will remain intact even when the computer is turned off.
(C) secondary storage device
Ans : (C)

22. The motherboard is the—
(D) circuit board that contains a CPU and other chips
Ans : (D)

23. A computer-intensive problemruns on a—
(C) supercomputer
Ans : (C)

24. A(n)……converts and executesone statement at a time.
(B) interpreter
Ans : (B)

25. The term ……… designates equipment that might be added to a computer system to enhance its functionality.
(D) peripheral device
Ans : (D)

26. Approximately how many bytes make one megabyte ?
(D) One million
Ans : (D)

27. What is MP3 ?
(C) A Sound format
Ans : (C)
28. All the deleted files go to—
(A) Recycle Bin
Ans : (A)
29. ……… this is the act of copying or downloading a program from a network and making multiple copies of it.
(C) Software piracy
Ans : (C)
30. A directory within a directory is called—
(D) Sub Directory

Ans : (D)

31. Which is the best definition of a software package ?
(B) A set of computer programs used for a certain function such as word processing
Ans : (B)

32. In MICR, C stands for ……….
(D) Character
Ans : (D)

33. Fax machines and imaging systems are examples of—
(B) imaging systems
Ans : (B)

34. When writing a document, you can use the ……… feature to find an appropriate word or an alternative word if you find yourself stuck for the right word.
(A) dictionary
Ans : (A)

35. Which key is used in combination with another key to perform a specific task ?
(B) Control
Ans : (B)

36. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—
(A) read-only
Ans : (A)

37. In an information system, alphanumeric data normally takes the form of—
(B) Numbers and alphabetical characters
Ans : (B)
38. A Website’s main page is called its—
(A) home page
Ans : (A)
39. When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
(A) programming software
Ans : (A)
40. A collection of interrelated files in a computer is a—
(D) database
Ans : (D)
41. A ……… computer is a large and expensive computer capable of simultaneously
processing data for hundreds or thousands of users.
(B) mainframe

Ans : (B)

42. The trend in computer systems is toward the use of
graphical user interfaces (GUIs). In these operating systems, a trackball is described as—
(A) a roller ball which moves the cursor
Ans : (A)

43. Various applications and documents are represented on the Windows desktop by—
(D) Icons
Ans : (D)

44. What is usually used for displaying information at public places ?
(D) Touch Screen Kiosks
Ans : (D)

45. The real business and competitive value of information technology lies in—
(B) The capabilities of the software and value of the information a business acquires and uses
Ans : (B)

46. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
(C) Application service providers
Ans : (C)

47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(B) Borrowed copies of software
Ans : (B)

48. Collecting personal information and effectively posing as another individual is known as the crime of—
(B) dentity theft
Ans : (B)

49. The first step in the transaction processing cycle is—
(C)
data entry
Ans : (C)

50. In the information systems concept, the output function involves—
(A) Capturing and assembling elements that enter the system to be processed
Ans : (A)

No comments:

Post a Comment