Adsense

Tuesday, 4 October 2011

Currentaffairsquiz



On Sun, Oct 2, 2011 at 3:42 AM, satheesh kumar <satheeshkumarmsc@gmail.com> wrote:
Hi Can u send me the link which u r mention in the below question paper......
Thx


On Sat, Oct 1, 2011 at 1:18 PM, puja kumari <anil.kumar26041987@gmail.com> wrote:
Free Exam Material
All Free Sample Papers, Solved Model Papers, Solved Question Papers,
Bank Sample Papers, UPSC Sample Paper, B.Ed Solved Papers, General
Awareness Solved Papers, Indian Competitive Exams, Railway Recruitment
Board Exams Paper, SSC Sample Paper , CBSE Sample Paper , Employment
News , Results etc.


Latest News




Allahabad Bank PO Exam Solved Paper
Allahabad Bank Probationary Officers Exam., 2010
(Held on 21-2-2010)
Computer Knowledge : Solved Paper

1. A………typically connects personal computers within a very limited
geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)

2. Computers manipulate data in many ways, and this manipulation is called—
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)

3. An e-mail address typically consists of a user ID followed by the
……… sign and the name of the e-mail server that manages the user's
electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)

4. Software applies……, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)

5. A file extension is separated from the main file name with a(n) ……,
but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)


6. An ad hoc query is a—
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)

7. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)

8. A computer ……… is a set of program instructions that can attach
itself to a file, reproduce itself, and spread to other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Ans : (B)

9. The desktop contains small graphics called—
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Ans : (C)

10. C, BASIC, COBOL, and Java are examples of ……… languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)

11. A(n)………camera is a peripheral device used to capture still images
in a digital format that can be easily transferred into a computer and
manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Ans : (A)

12. ……makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) E-commerce
(C) E-spend
(D) E-business
(E) None of these
Ans : (D)

13. Networks are monitored by security personnel and supervised by
………who set(s) up accounts and passwords for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Ans : (C)

14. Application software is designed to accomplish—
(A) real-world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Ans : (D)

15. A telephone number, a birth date, and a customer name are all examples of—
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Ans : (D)

16. The human-readable version of a program is called—
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Ans : (D)

17. A ……… computer (also referred to as a laptop), is a small,
lightweight personal computer that incorporates the screen, the
keyboard, storage, and processing components into a single portable
unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
Ans : (A)

18. ……… is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Ans : (C)

19. Programs such as Internet Explorer that serve as navigable windows
into the Web are called—
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Ans : (D)

20. A ……… is a device that not only provides surge protection, but
also furnishes your computer with battery backup power during a power
outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Ans : (C)

21. When you save to ………, your data will remain intact even when the
computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
Ans : (C)

22. The motherboard is the—
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Ans : (D)

23. A computer-intensive problemruns on a—
(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these
Ans : (C)

24. A(n)……converts and executesone statement at a time.
(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these
Ans : (B)

25. The term ……… designates equipment that might be added to a
computer system to enhance its functionality.
(A) digital device
(B) system add-on
(C) disk pack
(D) peripheral device
(E) None of these
Ans : (D)

26. Approximately how many bytes make one megabyte ?
(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these
Ans : (D)

27. What is MP3 ?
(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these
Ans : (C)

28. All the deleted files go to—
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)

29. ……… this is the act of copying or downloading a program from a
network and making multiple copies of it.
(A) Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site-license piracy
(E) None of these
Ans : (C)

30. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)

31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as
word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
Ans : (B)

32. In MICR, C stands for ……….
(A) Code
(B) Colour
(C) Computer
(D) Character
(E) None of these
Ans : (D)

33. Fax machines and imaging systems are examples of—
(A) bar-code readers
(B) imaging systems
(C) scanning devices
(D) pen-based systems
(E) None of these
Ans : (B)

34. When writing a document, you can use the ……… feature to find an
appropriate word or an alternative word if you find yourself stuck for
the right word.
(A) dictionary
(B) word finder
(C) encyclopedia
(D) thesaurus
(E) None of these
Ans : (A)

35. Which key is used in combination with another key to perform a
specific task ?
(A) Function
(B) Control
(C) Arrow
(D) Space bar
(E) None of these
Ans : (B)

36. A disk's content that is recorded at the time of manufacture and
that cannot be changed or erased by the user is—
(A) read-only
(B) memory-only
(C) run-only
(D) write-only
(E) None of these
Ans : (A)

37. In an information system, alphanumeric data normally takes the form of—
(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these
Ans : (B)

38. A Website's main page is called its—
(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these
Ans : (A)

39. When installing ………, the user must copy and usually decompress
program files from a CDROM or other medium to the hard disk.
(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these
Ans : (A)

40. A collection of interrelated files in a computer is a—
(A) file manager
(B) field
(C) record
(D) database
(E) None of these
Ans : (D)

41. A ……… computer is a large and expensive computer capable of
simultaneously processing data for hundreds or thousands of users.
(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these
Ans : (B)

42. The trend in computer systems is toward the use of graphical user
interfaces (GUIs). In these operating systems, a trackball is
described as—
(A) a roller ball which moves the cursor
(B) a pen-shaped device which allows data to be entered through the CRT screen
(C) a figure which resembles a familiar office device
(D) an outdated input device
(E) None of these
Ans : (A)

43. Various applications and documents are represented on the Windows
desktop by—
(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these
Ans : (D)

44. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these
Ans : (D)

45. The real business and competitive value of information technology lies in—
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a
business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities
that are commonly used by many companies
(D) The capabilities of the hardware and the speed at which it
processes information
(E) None of these
Ans : (B)

46. Companies use which of the following vendors to provide access to
software and services rather than purchasing the applications and
maintaining the applications themselves ?
(A) Open source vendors
(B) Alliances
(C) Application service providers
(D) All of the above
(E) None of these
Ans : (C)

47. Which one of the following would be considered as a way that a
computer virus can enter a computer system ?
(A) Opening an application previously installed on the computer
(B) Borrowed copies of software
(C) Viewing a website without causing any additional transactions
(D) Running antivirus programs
(E) None of these
Ans : (B)

48. Collecting personal information and effectively posing as another
individual is known as the crime of—
(A) spooling
(B) dentity theft
(C) spoofing
(D) hacking
(E) None of these
Ans : (B)

49. The first step in the transaction processing cycle is—
(A) database operations
(B) audit
(C) data entry
(D) user inquiry
(E) None of these
Ans : (C)

50. In the information systems concept, the output function involves—
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation
process to their ultimate destination
(D) Monitoring and evaluating feedback to determine whether a system
is moving toward the achievement of its goal
(E) None of these
Ans : (A)
Labels: Bank Exam Papers, Computer General Awareness Questions
2 comments:
Anonymous said...
REALLY HELPFUL STUFF THANKS :)
June 18, 2010 12:14 PM
Anonymous said...
thanks for the question
March 28, 2011 9:20 AM
Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)




Labels
Abbreviations (8)
Ability Test (2)
Arithmetic Questions (1)
B.Ed. Exams Solved Papers (5)
Bank Exam Papers (76)
Best Interview Tips (1)
Biology (1)
Books and Authors (20)
Civil Services Exams (2)
Combined Defence Service Examinations (1)
Commerce (2)
Competitive Preparation Magazines (3)
Computer General Awareness Questions (7)
English Language (46)
Facts About India (4)
First in... (3)
Forthcoming Competitive Exams 2011-12 (2)
Fun Time (3)
General Awareness Questions (23)
General Awareness Solved Papers (28)
General Insurance Corporation of India (GIC) Exams (1)
General Knowledge (9)
General Studies Questions (6)
Geography Objective Questions (7)
Glossary (2)
Indian Economy (10)
Indian History Questions (10)
Indian Polity Objective Questions (1)
Interview Question Bank (3)
Jammu and Kashmir Common Entrance Test (1)
Latest General Knowledge (1)
Latest Who's Who (3)
Model Papers (Fully Solved) (1)
MP PSC State Service Exams (4)
National Defence Academy Exams (3)
Objective General Knowledge Questions (17)
Political Science (2)
Popular Quotations (1)
Public Administration (3)
Quantitative Aptitude Questions (1)
Quizzes (36)
Railway Recruitment Board Examinations (5)
RAS/RTS Exams (5)
Reasoning Questions (8)
Results (2)
Sarkari Naukri-Employment News (5)
Solved Papers (52)
Solved Papers 2009 (35)
Solved Papers 2010 (29)
SSC Exams (3)
Staff Selection Commission Exams (7)
State General Knowledge (1)
Syllabus (7)
Test Your Knowledge (1)
Top Colleges and Institutes in India (1)
Top Colleges in India (1)
Travel and Tourism Examinations (2)
United Nations (UNO) Objective Questions (2)
Upcoming Recruitment Exams (1)
UPSC Exams (1)
Uttar Pradesh P.C.S. Exams (6)
Uttarakhand P.C.S. Exams (2)
West Bengal P.C.S. Exams (3)


Followers

Word of the Day

catnap discuss
Definition:     (noun) A short sleep or doze.
Synonyms:       forty winks, snooze
Usage:  After making sure that my office door was locked and that I
would not be caught, I settled in for a quick catnap at my desk.
Word of the Day provided by The Free Dictionary

This Day in History

Mozart's The Magic Flute Premiers (1791)
In the final year of his life, prolific composer Wolfgang Amadeus
Mozart produced the opera Die Zauberflöte—The Magic Flute—featuring a
libretto by the actor Emmanuel Schikaneder. The work is considered a
singspiel—an opera in German that contains spoken dialogue and is
usually comic in tone. Mozart brought this form of light musical
entertainment to a height of lyrical and symbolic art. The Magic Flute
is said to contain what prominent Masonic elements and symbolism?
More... Discuss
This Day in History provided by The Free Dictionary

Today's Birthday

Hans Geiger (1882)
After receiving a doctorate in physics in Germany in 1906, Geiger
traveled to England, where he assisted chemist Ernest Rutherford. In
1908, they designed an instrument to detect and count alpha particles,
positively charged ionizing particles produced by radioactive decay.
Two decades later, Geiger developed the sensitive, portable radiation
counter that now bears his name. During World War II, he was a member
of the Uranium Club, a group of German scientists who attempted to
develop what? More... Discuss
Today's Birthday provided by The Free Dictionary

In the News

Neutrinos Reach Record Speed, Faster than Light
An international team of scientists says it has recorded subatomic
particles known as neutrinos travelling faster than the speed of
light. If their findings prove to be correct, the discovery would
undermine a key part of Albert Einstein's theory of special
relativity, which asserts that nothing in the universe can travel
faster than light. If something actually can travel faster than the
speed of light, then it could mean that time travel is possible. More
... Discuss
In the News provided by The Free Dictionary

Quote of the Day
Now, here you see, it takes all the running you can do, to keep in the
same place. If you want to get somewhere else, you must run at least
twice as fast as that!
Lewis Carroll
(1832-1898)
Quote of the Day provided by The Free Library



Successful Career Thoughts and Free General Knowldege | Free Exam tips

--
-
www.currentaffairsquiz.com


You received this message because you are subscribed to the Google
Groups "Current Affairs Quiz" group.

To reply to daily quiz, mail to currentaffairsquiz@googlegroups.com




--
-
www.currentaffairsquiz.com
 
 
You received this message because you are subscribed to the Google
Groups "Current Affairs Quiz" group.
 
To reply to daily quiz, mail to currentaffairsquiz@googlegroups.com

No comments:

Post a Comment

Note: only a member of this blog may post a comment.