Sie sind auf Seite 1von 7

www.go4bankexam.blogspot.

com
Model Paper 5 (Computer Knowledge) for Bank Exam 1. When a CD (Compact Disc used in audio and Video system) is seen in sunlight, rainbow like colours are seen. This can be explained on the basis of phenomenon of (a) reflection and diffraction (b) reflection and transmission (c) diffraction and transmission (d) refraction, diffraction and transmission (e) none of these Ans (d) Internet is an inter-networking of information from one part of the network to any other provided the information is packed according to certain conventions 2. For reproducing sound, a CD (Compact Disc) audio player uses a (a) quartz crystal (b) titanium needle (c) laser beam (d) barium titanium ceramic (e) none of these Ans (c) LASER stands for Light Amplification by Stimulated Emission of Radiation 3. The memory of a computer is commonly expressed in terms of Kilobytes or Megabytes. A byte is made up of (a) eight decimal digits (b) eight binary digits (c) two binary digits (d) two decimal digits (e) none of these Ans (b) A byte consists of 8 bits8 binary digits 4. Which of the following circuit is used as a Memory device in computers? (a) Rectifier (b) Flip-Flop (c) Comparator (d) Attenuator (e) none of these Ans (b) Flip-flop refers to an electronic component which can adopt one of two possible states -0 or 1. It acts as an electronic switch which gets changed its state when input signals are received 5. Computers can be classified in which of the following hierarchical orders? (a) PC, Large, Super Micro, Super Computer (b) Super Micro, PC, Large, Super Computer (c) PC, Super Micro, Large, Super Computer (d) Large, Super Micro, Super Computer, PC Ans (c) 6. Which one of the following is a stored program machine? (a) Micro-processor (b) Calculator (c) Analog-computer (d) Micro-computer Ans (d) 7. First generation computer systems used (a) Transistors (b) Vacuum tubes (c) Magnetic cores (d) Silicon chips Ans (b) 8. Transistors are associated with which computer system? (a) First generation (b) Fifth generation

www.go4bankexam.blogspot.com
(c) Second generation (d) None of these Ans (c) 9. Charles Babbage invented (a) ENIAC (b) Difference engine (c) Electronic computer (d) Punched card Ans (b) 10. Who wrote the book Computer Liberation and Dream Machine, the first book on personal computers? (a) John McCarthy (b) Ted Nelson (c) Niklaus Wirth (d) Karl Capek Ans (b) 11. Who was the inventor of mechanical calculator for adding numbers? (a) Charles Babbage (b) Peano (c) Newton (d) Pascal Ans (D) 12. The most widely used commercial programming computer language is (a) BASIC (b) COBOL (c) FORTRAN (d) PASCAL Ans (b) Cobol is abbreviated term for Common Business Oriented Language. It is high level programme language designed to assist the task of programs by enabling them to write programme in more simple manner 13.The retrieval of information from the computer is defined as (a) collection of data (b) data retrieval operations (c) output (d) data output collection Ans (c) 14. Which of the following terms could be used to describe the concurrent processing of computer programs via CRTs, on one computer system? (a) Time sharing (b) On-line processing (c) Interactive processing (d) All of these Ans (d) 15.The daily processing of corrections to customer accounts best exemplifies the processing mode of (a) batch processing (b) real-time processing (c) time-sharing (d) off-line processing Ans (a) 16. A characteristic of card system is (a) slowness in processing data (b) using cards as records of transactions (c) needing a larger data staff (d) All of these Ans (d) 17. Which of the following floppy sizes exists? (a) 5.25 inches (b) 4.75 inches (c) 6 inches (d) 8 inches Ans (a) 18. MS-DOS is the name of a/an (a) Application software (b) Hardware (c) System software (d) None of these Ans (c)

www.go4bankexam.blogspot.com
19. A peripheral device used in a word processing system is (a) Floppy disk (b) Magnetic card reader (c) CRT (d) All of these Ans (d) 20. A term used interchangeably with diskette is (a) Disk cartridge (b) Disk pack (c) Floppy disk (d) Packette disk Ans (c) 21. An I/O device which provides photographic outputs for printing galleys, is the (a) Camera printer (b) Automatic typesetter (c) Radix printer (d) All of these Ans (d) 22. Which one of the following a file? (a) Floppy disk (b) Magnetic drum (c) magnetic tape (d) None of these Ans (d) 23.A decimal equivalent of m second is (a) 0.000001 sec (b) 1000000 sec (c) 0.001 sec (d) 1000 sec Ans (a) 24. A dot-matrix printer (a) is an input-output device (b) is an output device only (c) is an input device only (d) None of these Ans (b) 25.An octal number 237 is equal to the binary number (a) 010 011 111 (b) 010 111 011 (c) 011 101 101 (d) 011 000 001 Ans (c) 26. A term associated with the comparison of processing speed is (a) FFTS (b) MPG (c) MIPS (d) CPS Ans (c) 27. The maximum size of a memory addressed by 12 bits is (a) 1 K bytes (b) 16 K bytes (c) 32 K bytes (d) 4 K bytes Ans (d) 28. The father of Modern Computer is a. Charles Babbage b. Von-nuumann c. Danies Ritchel d. Blaise Pascal e. None of these Ans: a 29. The Word FTP stands for a. File Translate Protocol b. File Transit Protocol c. File Transfer protocol

www.go4bankexam.blogspot.com
d. file typing protocol e. None of these Ans: c 30. The lowest form of Computer language is called a. BASIC b. FORTRAN c. Machine Language d. COBOL e. None of these Ans: c 31. Best Quality graphics is produced by a. Dot Matix b. Laser Printer c. Inkjet Printer d. Plotter e. None of these Ans: d 32. Memory which forgets every thing when you switch off the power is known as a. Corrupted b. Volatile c. Non-Volatile d. Non-Corrupted e.None of these Ans: b 33. The blinking symbol on the computer screen is called the a. mouse b. logo c. hand d. palm e. cursor Ans: c 34. A fault in a computer program which prevents it from working correctly is known as a. Boot b. Bug c. Biff d. Strap e. None of these Ans:b 35. A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is _________ a. Bug b. Vice c. Lice d. Worm e. None of these Ans: d 36. A _______ is a bi-stable electronic circuit that has two stable states.

www.go4bankexam.blogspot.com
a. Multivibrator b. Flip-flop c. Logic gates d. laten e. None of these Ans: b 37. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as a. Spam b. Trash c. Calibri d. Courier e. None of these Ans: a 38.DOS stands for a. Disk Operating System b. Disk operating session c. Digital Operating System d. Digital Open system e. None of these Ans: a 39. Who is the chief of Miocrosoft a. Babbage b. Bill Gates c. Bill Clinton d. Bush e. None of these Ans: b 40. COBOL is widely used in _________ applications a. Commercial b. Scientific c. Space d. Mathematical e. None of these Ans: a 41. RAM stands for a. Random origin money b. Random only memory c. Read only memory d. Random access memory e. None of these Ans: d 42. 1 Byte = ? a. 8 bits b. 4 bits c. 2 bits d. 9 bits e. None of these Ans: a

www.go4bankexam.blogspot.com
43. SMPS stands for a. Switched mode Power Suply b. Start mode power supply c. Store mode power supply d. Single mode power supply e. None of these Ans: a 44. Collecting personal information and effectively posing as another individual is known as the crime of: A. spooling. B. identity theft. C. spoofing. D. hacking. Answer: B 45. Malicious software is known as: A. badware. B. malware. C. maliciousware. D. illegalware. Answer: B 46. A program that performs a useful task while simultaneously allowing destructive acts is a: A. worm. B. Trojan horse. C. virus. D. macro virus. Answer: B Moderate 47. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a: A. Trojan horse. B. virus. C. time bomb. D. time-related bomb sequence. Answer: B 48. Software programs that close potential security breaches in an operating system are known as: A. security breach fixes. B. refresh patches. C. security repairs. D. security patches. Answer: D 49. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as: A. a virus. B. a Trojan horse. C. cracking. D. a denial of service attack. Answer: D

www.go4bankexam.blogspot.com
50. ___________ is the measurement of things such as fingerprints and retinal scans used for security access. A. Biometrics B. Biomeasurement C. Computer security D. Smart weapon machinery Answer: A

Das könnte Ihnen auch gefallen