Вы находитесь на странице: 1из 6

COMPUTER QUIZ FOR S.B.I.

PO - 2013
1. ..aim at the boot sector of a hard drive by infecting a very crucial component of the boot process? (1) File infection virus (2) Boot virus (3) Network virus (4) E-mail virus (5) None of these 2. One of the more recent e-mail scams, which lures internet users into revealing personal information is referred to as : (1) phishing (2) flaming (3) blogging (4) pop- ups (5) None of these 3. Malicious software is known as : (1) Badware (2) Malware (3) Malicious ware (4) Iiigalware (5) None of these 4. Hardware or software designed to guard against authorized access to computer network is known as (1) Hacker proof program (2) Firewall (3) Hacker resistant server (4) Encryption safe wall (5) None of these 5. The fastest and quietest type of printer is a(n): (1) dot-matrix printer. (2) inkjet printer. (3) laser printer. (4) plotter. (5) None of these 6. The type of large printer that can most accurately produce images requiring precise, continuous lines is a(n): (1) plotter. (2) inkjet printer. (3) laser printer. (4) dot-matrix printer. (5) none of these 7. MICR stands for? (1) Magnetic Ink Character Recognition (2) Magnetic Ink Code Reader (3) Magnetic Ink Cases Reader (4) None of the above (5) All of the above 8. The main difference between application and system software is that: (1) Application software is composed of program instructions but system software is not. (2) Application software is stored in memory whereas system software is only in the CPU. (3) System software is unnecessary whereas application software must be present on the computer. (4) System software manages hardware whereas application software performs user tasks. (5) None of these

9. ________ Viruses are often transmitted by a floppy disk left in the floppy drive (1) Trojan horse (2) Boot sector (3) Script (4) Logic bomb (5) None of these 10. Servers are computers that provide resources to other computers connected to a ___________ (1) mainframe (2) network (3) supercomputer (4) client

(5) None of these 11. A goal of data mining includes which of the following? (1) To explain some observed event or condition (2) To confirm that data exists (3) To analyze data for expected relationships (4) To create a new data warehouse (5) None of these 12. A Proxy server is used for which of the following? (1) To provide security against unauthorized users (2) To process client requests for web pages (3) To process client requests for database access (4) To provide TCP/IP (5) None of these 13. When data changes in multiple lists and all lists are not updated, this causes: (1) data redundancy (2) information overload (3) duplicate data (4) data inconsistency (5) None of these 14. _____________ are words that a programming language has set aside for its own use. (1) Control worlds (2) Reserved words (3) Control structures (4) Reserved keys (5) None of these 15. You must install a (n) ____________ on a network if you want to share a broadband Internet connection. (1) router (2) modem (3) node (4) cable (5) None of these 16. Which term identifies a specific computer on the web and the main page of the entire site (1) URL (2) Web site address (3) Hyperlink (4) Domain name (5) None of these

17. The code that relational database management systems use to perform their database task is referred to as .. (1) QBE (2) SQL (3) OLAP (4) Sequel Server (5) None of these 18. The purpose of the primary key in a database is to: (1) unlock the database (2) provide a map of the data (3) uniquely identify a record (4) establish constraints on database operations. (5) None of these 19. A _________ contains specific rules and words that express the logical steps of an algorithm. (1) programming language (2) syntax (3) programming structure (4) logic chart (5) None of these 20. The most frequently used instructions of a computer program are likely to be fetched from: (1) the hard disk (2) cache memory (3) RAM (4) registers (5) None of these

21. A (n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system. (1) command based user interface (2) GUI (3) system utility (4) API (5) None of these 22. Which of the following is NOT a type of broadband Internet connection? (1) Cable (2) DSL (3) Dial-up (4) Satellite (5) None of these 23. In Power Point Animation Schemes can be applied to ___ in the presentation? (1) All Slides (2) Selected Slides (3) Current Slides (4) All of the above (5) None of these 24. The arrangements of elements such as Title and Subtitle text, pictures, tables etc. (1) Layout (2) Presentation (3) Design (4) Scheme (5) None of these 25. In Power Point from where we can set the timing for each object? (1) Slide show, custom transition (2) Slide show, Slide transition (3) Slide show, custom animation (4) View, slide sorter (5) None of these 26. After choosing a predefined template, which option has to be chosen change the background colour? (1) Design Template (2) Colour Scheme (3) Animation Scheme (4) Colour Effects (5) None of these 27. The shortcut key to switch between different application is (1) Alt+F1 (2) Alt+Tab (3)Shift +Tab (4) Ctrl + Tab (5) None of these 28. Which of following terms is associated with high speed (1) TCP/IP (2) Dial-up access (3) Ethernet (4) Broadband (5) None of these connection?

29. ____is the keyboard shortcut for opening the Excel Formula Window. (1) Shift + F3 (2) Shift + F1 (3) Ctrl + F3 (4) Ctrl + F1 (4) Ctrl + F1 + 1 30. To move the previous work sheet, we press: (1) Alt + PgUp (2) Ctrl + PgUp (3) Ctrl + PgDn (4) Shift + Tab (5) None of these 31. To add two cells (A1 and A2) together you use which of the formula? (1) = A1+ A2 (2) = Add (A1 + A2) (3) = together (A1:A2) (4) A1 + A2 (5) None of these

32. Find the correct set of three types of data found on a spreadsheet. (1) Data, words, numbers (2) Equation, data, numbers (3) Words, numbers, labels (4) Number, formulas, labels (5) None of these 33. Which of the following displays buttons for changing text style, alignment and size? (1) Standard tool bar (2) Status bar (3) Drawing tool bar (4) Formulating tool bar (5) None of these 34. What is a cookie? (1)Executable File (2)Boot device (3)Hacker File (4)Internet Information File (5) None of these 35. What was the first ARPANET message? (1)"Hello World" (2)"Arpanet" (3)"Lo" (4)"My first message" (5) None of these 36. The windows registry consists of which two files? (1)Win.reg and User.dat (2)Win.dat and System.dat (3)User.Dat And System.Dat (4)System.reg and User.reg (5) None of these 37. Which of the following is not an option in the spelling dialog box? (1) Edit (2) Ignore (3) Ignore all (4) Change (5) None of these 38. To copy cell contents using drag and drop, press the: (1) End key (2) Shift key (3) Esc key (4) All of above (5) None of these 39. What is the keyboard shortcut (button or buttons to be pressed) for creating a chart from the selected cells? (1) F3 (2) F5 (3) F7 (4) F11 (5) None of these 40. You can use the formula palette to: (1) format cells containing numbers (2) create and edit formulas containing functions (3) entered assumptions data (4) copy a range of cells (5) None of these 41. Ctrl, Shift and Alt are called __ keys. (1) modifier (2) function (3) alphanumeric (4) adjustment

(5)None of these 42. The pattern of printed lines on most products are called(1) prices (2)OCR (3) scanners (4) barcodes (5)None of these 43. What is the permanent memory built into your computer called? (1) RAM (2) ROM (3) CPU (4) CD-ROM (5) None of these 44. Various applications and documents are represented on the Windows desktop by __. (1) symbols (2)labels (3) graphs (4) icons (5) None of these 45. E-mail addresses separate the user name from the ISP using the __ symbol. (1) & (2) @ (3) % (4) * (5) None of these 46. The __ of a system includes the program s or instructions. (1) hardware (2) icon (3) information (4) software (5) None of these 47. The main advantage of magnetic disk compared to magnetic tape is (1) low cost (2) rigidity (3) direct access (4) high packet density (5) sequential access 48. The memory card which is conceptually related to the smart card but is similar to the video disk, is (1) Master card (2) Visa card (3) Optical card (4) Laser card (5) Data card 49. process rearranges file fragments into contiguous files. (1) folder folding (2)Defragmentation (3) Unflagging (4) Disk scanning (5) File filling 50. Which view is not available in Microsoft Word 2007? (1) Outline (2) Full Screen (3) Page Break (4) Draft (5)Print Layout

Answers:

1 2 3 4 5 6 7

2 1 2 2 3 1 1

11 12 13 14 15 16 17

3 2 4 2 1 1 2

21 22 23 24 25 26 27

2 3 4 1 3 2 2

31 32 33 34 35 36 37

1 4 4 4 3 3 1

41 42 43 44 45 46 47

1 4 2 4 2 4 3

8 4 18 3 28 4 38 5 48 4 9 2 19 2 29 1 39 4 49 2 10 2 20 2 30 2 40 2 50 4

Вам также может понравиться