Академический Документы
Профессиональный Документы
Культура Документы
COMPUTER
EXCELLENCE
For The Promotion Of Senior Managers
/Chief Managers
Please Contact Me On -
rahulrituraj.centraltrainer@gmail.com
Preface
To Induce You About All Across Bank & Banking Industry !!!!!!!!
Unfortunately We Don’t Have Space Like SBI , PNB And Other Banks
RAHUL RITURAJ
AN ENTHUSIASTIC BANKER
LIKE CT - CENTRAL
TRAINER
INTERIO
https://www.facebook.com/ctrahulrituraj/
LIKE CT - CENTRAL TRAINER
W https://www.facebook.com/ctrahulrituraj/
CONTENTS
INTRODUCTION
1 Basic of Computer
2 Generations of Computer
Practising Questions
3
5 Computer Awareness
Computer Excellence
INTRODUCTION
A Computer is a general purpose device that can be programmed to
carry out a set of arithmetic or logical operations automatically.
Since a sequence of operations can be readily changed, the computer
can solve more than one kind of problem.
BASIC OF COMPUTER :
The data that is fed into a computer processor received into the
computer by a keyboard or other sources is called Input.
A computer is an electronic device that accepts data from the user
Follow us on facebook:
COMPUTER ORGANISATION
(HARDWARE DESCRIPTION)
INPUT DEVICES – ACCESS THE DATA
CENTRAL PROCESSING UNIT (CPU) –
PROCESS THE DATA
OUTPUT DEVICES- PRODUCES THE
RESULT
STORAGE DEVICES (RAM) – STORES
THE RESULT
GENERATIONS OF
COMPUTER
First Generation (1940-1956)
FEATURES:
The main features of First Generation are:
� Vacuum tube technology
� Unreliable
� Supported Machine language only
� Very costly
� Slow Input/Output device
� Huge size
� Need of A.C.
� Non-portable
� Consumed lot of electricity
Second Generation (1956-1963)
The main features of Second Generation are:
� Use of transistors
� Reliable as compared to First generation computers
LIKE CT - CENTRAL � Smaller size as compared to First generation
TRAINER computer
� Consumed less electricity as compared to First
generation computers
HTTPS://WWW.FACEBOOK
� Faster than first generation computers
.COM/CTRAHULRITURAJ/ � Still very costly
� A.C. needed
� Support machine and assembly languages
The maximum and minimum
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRAL unsigned number which can be
TRAINER.OPERATIONS stored in a 8 bit word
ROM KEEPS PERMANENT MEMORY is 0 and 255
COMPUTER
EXCELLENCE
MICROSOFT
MICROSOFT OFFICE POWER
POINT
Microsoft Office is an office suite of desktop applications,
Microsoft PowerPoint
servers and services for the Microsoft Windows and OS X is a slide show
operating systems. presentation program
It was first announced by Bill Gates of Microsoft on August developed by
Microsoft. PowerPoint
1, 1988 at COMDEX in Las Vegas. presentations consist
MS office primarily includes Word, Excel, PowerPoint, of a number of
individual pages or
Access and Outlook. "slides".
It also includes OneNote, Groove, InfoPath and Publisher. Microsoft PowerPoint's
native file formats are
denoted either by a
.ppt or .pptx file
extension.
PowerPoint provides
three types of
movements:
Entrance, emphasis,
and exit of elements
on a slide itself are
controlled by what
PowerPoint calls
Custom Animations.
Transitions, on the
other hand, are
movements between
slides. These can be
animated in a variety
of ways.
Custom animation can
MS WORD MS EXCEL be used to create
small story boards by
animating pictures to
Microsoft Word is a word Microsoft Excel is a enter, exit or move.
processor developed by spreadsheet application
Microsoft. developed by Microsoft.
It is used for creating, It features calculation,
editing, formatting, storing, graphing tools, pivot tables,
retrieving and printing of a and a macro program.
text document. The intersection of a row and
Microsoft Word's native file column is called a Cell.
formats are denoted either The cell in which we are
by a .doc or .docx file currently working is known
extension. as Active Cell.
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS
Practising MCQ
1. In a network, the computer that stores the files and
process the data is named as
a) Server
b) Terminal
c) Modem
d) All of the above
2. Viruses are called that because
a) They are viruses
b) They can copy themselves and spread
c) Both (a) and (b)
d) None of the above
3. Which of the can't spread virus
a) An e-mail with attachment
b) A plain text mail
c) Downloading files over the web
d) None of the above
4. There is a new anti-virus software update available, when
it is downloaded to your computer
a) Everyday
b) Only in the night
c) When you next switch on your computer
d) All of the above
5. Numbers are stored and transmitted inside a computer in
a) Binary form
b) ASCII code form
c) Alphabets form
d) Numerical form
6. CPU capacity can be measured in
a) BPS
b) MIPS
c) MHz
d) MPI
7. MPIS stands for
a) Million Instructions Per Second
b) Million Instructions Per Season
c) Monthly Instructions Per Second
d) Million Inputs Per Second
8. LAN speeds are measured in
a) BPS
b) KBPS
c) MBPS
d) MIPS
9. Modem speeds are measured in
a) BPS
b) KBPS
c) MBPS
d) MIPS
10. BPS stands for
a) Bits Per Second
b) Bits Per Season
c) Bytes Per Second
d) Bits Per System
1. a 2. b 3. b 4. c 5. b 6. b 7. a 8. c 9. a 10. a
11. b 12. c 13. c 14. b 15. c 16. b 17. a 18. a 19. a 20. a
21. b 22. c 23. c 24. a 25. c 26. a 27. b 28. b 29. a 30. b
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/
31. a 32. b 33. b 34. d 35. c 36. b 37.a 38. c 39. a 40. a
HARDWARE
1. Where would you find the letters QUERTY?
(1) Mouse (2) Screen
(3) Numeric Keypad (4) Keyboard
(5) None of these
2. How did the computer mouse get its name?
(1) It's cable looks like a tail
(2) Because it squeaks when moved
(3) It has ears
(4) Teeth outside mouth
(5) None of these
3. What are you most likely to use when playing
(1) Touch screen a computer game?
(2) Light pen (3) notepad
(4) Joystick (5) None of these
4. A digitising tablet can be used for?
(1) Tracing diagrams
(2) Printing letters
(3) Reading barcodes
(4) Playing
(5) None of these
5. Which of the following is a pointing device
(1) Hard disk .
(2) CD-ROM drive
(3) Touch screen used for computer input.
(4) RAM
(5) None of these
6. What does a light pen contain?
(1) Refillableink (2) Light sensitive elements
(3) Pencil lead (4) Blue Ink
(5) None of these
7. What would be the best way to move around a 3D
environment?
(1) Use a tracker ball (2) Use a keyboard.
(3) Use a space mouse (4) Use Joystick
(5) None of these
8. What input device can be used for marking
(1) Optical mark reader
(2) Bar code reader
(3) Mouse a multiple choice test?
(4) All of the above
(5) None of these
9. What input device could tell you the price of
(1) Mouse a bar of chocolate?
(2) All of the above
(3) Optical mark reader
(4) Bar code reader
(5) None of these
10. Where would you find a magnetic strip?
(1) Speakers (2) Credit card
(3) Smart card (4) All of the above
(5) None of these
1.(4) 2.(1) 3 -(4) 4.(1) 5-(3) 6-(2) 7-(3) 8.(1) 9-(4) 10.(2)
11. (1) 12.(3) 13.(4) 14.(5) 15.(2) 16.(1) 17-(3) 18.(5) 19.(2) 20.(1)
21. The amount of data that a disk may contain known as the disk's...?
(1) Volume (2) Size
(3) All of the above
(4) Storage capacity (5) None of these
22. You can protect a floppy disk.
(1) Read (2) Read and Write
(3) Write (4) All of the above
(5) None of these
23. Information on a hard disk is usually backed-up using a..?
(1) CD-ROM (2) Magnetic tape
(3) Floppy disk (4) All of the above
(5) None of these
24. Magnetic storage devices can represent binary 0 by the absence of...?
(1) A magnetic field
(2) Magnetic tape
(3) Static electricity
(4) All of the above
(5) None of these
25. Magnetic tape is a..?
(1) Random access medium
(2) A parallel access medium
(3) Serial access medium
(4) All of the above
(5) None of these
26. Hard disks can have a storage capacity in the region of...?
(1) 1Gb (2) 1.44Mb (3) 720K
(4) All of the above (5) None of these
27. Formatting a disk results in all the data being...?
(1) Saved to the disk
(2) Copied from the disk
(3) Deleted from the disk
(4) All of the above
(5) None of these
Upal Ranga
28. Which storage device has the largest capacity in Mb's?
(1) A floppy disk
(2) A CD-ROM
(3) Magnetic tape storage
(4) All of the above
(5) None of these
29. Which storage device cannot be erased?
(1) A CD-ROM
(2) None of these
(3) Magnetic tape storage
(4) All of the above-
(5) A floppy disk
30. Where should floppy disks be stored?
(1) By a sunny window
(2) In a drawer
(3) All of the above
(4) By magnet objects
(5) None of these
21. (4) 22.(3) 23.(1) 24.(2) 25.(3) 26.(1) 27.(3) 28.(2) 29.(5) 30-(2)
31. Who is accredited with developing the architecture of the modern computer?
(1) Sir Clive Sinclair
(2) Bill Gates
(3) All of the above
(4) None of these
(5) John Von Neumann
32. Which bus carries information between processors and peripherals?
(1) Autobus (2) Data bus
(3) Address bus (4) All of the above
(5) None of these
33. Which bus controls the sequencing of read/write operations?
(1) Control bus (2) Address bus
(3) Data bus (4) All of the above
(5) None of these
34. The contents of these chips are lost when the computer is switched off?
(1) RAM chips
(2) ROM chips
(3) DRAM chips
(4) All of the above
(5) None of these
35. What are responsible for storing permanent data and instructions?
(1) RAM chips
(2) All of the above
(3) DRAM chips
(4) ROM chips
(5) None of these
36. Which parts of the computer perform arithmetic calculations?
(1) Registers (2) ALU
(3) Logic bus
(4) All of the above
(5) None of these
37. What are small high speed memory units used for storing temporary results?
(1) All of the above
(2) Registers
(3) Control unit
(4) CPUs
(5) None of these
38. What maintains the status of the last operation carried out by the ALU?
(1) Instruction pointer .
(2) Status register
(3) Accumulator
(4) All of the above
(5) None of these
39. How many bits of information can each memory cell in a computer chip
hold?
(1) 8 bits (2) 1 bit
(3) Obits (4) All of the above
(5) None of these
40. What type of computer chips are said to be volatile?
(1) ROM chips (2) RAM chips
(3) DRAM (4) All of the above
(5) None of these
31 .(5) 32.(2) 33.(1) 34.(1) 35-(4) 36.(2) . 37.(4) 38.(3) 39.(1) 40.(2)
31. Who is accredited with developing the architecture of the modern computer?
(1) Sir Clive Sinclair
(2) Bill Gates
(3) All of the above
(4) None of these
(5) John Von Neumann
32. Which bus carries information between processors and peripherals?
(1) Autobus (2) Data bus
(3) Address bus (4) All of the above
(5) None of these
33. Which bus controls the sequencing of read/write operations?
(1) Control bus (2) Address bus
(3) Data bus (4) All of the above
(5) None of these
34. The contents of these chips are lost when the computer is switched off?
(1) RAM chips
(2) ROM chips
(3) DRAM chips
(4) All of the above
(5) None of these
35. What are responsible for storing permanent data and instructions?
(1) RAM chips
(2) ROM chips
(3) DRAM chips
(4) All of the above
(5) None of these
36. Which parts of the computer perform arithmetic calculations?
(1) Registers (2) ALU
(3) Logic bus
(4) All of the above
(5) None of these
37. What are small high speed memory units used for storing temporary results?
(1) CPU
(2) Registers
(3) Control unit
(4) All of the above
(5) None of these
38. What maintains the status of the last operation carried out by the ALU?
(1) Instruction pointer .
(2) Status register
(3) Accumulator
(4) All of the above
(5) None of these
39. How many bits of information can each memory cell in a computer chip
hold?
(1) 8 bits (2) 1 bit
(3) Obits (4) All of the above
(5) None of these
40. What type of computer chips are said to be volatile?
(1) ROM chips (2) RAM chips
(3) DRAM (4) All of the above
(5) None of these
31 .(5) 32.(2) 33.(1) 34.(1) 35-(4) 36.(2) . 37.(4) 38.(3) 39.(1) 40.(2)
41. (3) 42.(4) 43.(3) 44.(1) 45.(5) 46.(3) 47.(1) 48.(5) 49.(3) 50.(4)
51. Imagine that a user has a WORD document open at a workstation and that
workstation is unexpectedly disconnected from the school network and from
the Internet. Where should the user BEST save her work?
(1) USB key (2) P drive
(3) None of these
(4) S drive (5) H drive
52. Computer memory that temporarily stores information is called the ____.
(1) RAM (2) CPU
(3) ROM (4) IBM
(5) None of these
53. The brain of the computer is called the _____.
(1) IBM (2) ROM
(3) RAM (4) CPU
(5) None of these
54. The operating system is also called the ______ between the user and the
computer.
(1) interrelate
(2) interface
(3) interference
(4) intermediate
(5) None of these
55. When installing a peripheral you also usually need to install a _____ .
(1) port (2) server
(3) driver (4) password
(5) None of these
56. Computers use which of the following number systems to store information?
(1) base 4 (2) base 2
(3) base8 (4) base 10
(5) None of these
57. A single binary digit is known as
(1) MB (2) byte
(3) KB (4) bit
(5) None of these
58. Internet Safety relates to__________.
(1) only those who buy products online
(2) only those who sign up for chat rooms
(3) only those who do their banking online
(4) everyone who uses a computer that can conned to the Internet
(5) None of these
59. A file name extension for Word 2007 files is ___.
(1) .gif (2) .txt
(3) .docx (4) .exe
(5) None of these
60. A KB represents____bytes
(1) 8
(2) 1,000,000,000
(3) 1,000,000
(4) 1,000 (5) None of these
51.(5) 52.{1) 53.(4) 54,(2) 55.(3) 56.(2) 57.(4) 58. (2) 59.(3) 60.(4)
61. (2) 62. (3) 63.(1) 64.(4) 65.(1) 66.(5) 67.(1) 68.(2) 69.(4) 70.(2)
71. If an 8-bit integer has a maximum of 256 possible values, what is the highest
possible value of a 16 bit integer?
(1) 512 (2) 257
(3) 65536 (4) 65535
(5) None of these
72. What does BASIC stand for?
(1) Basically, it's just your basic computer language, so
they named it BASIC.
(2) Beginner's All-purpose Symbolic Instruction Code
(3) Binary Analysis System Interpretation Commandset
(4) Byte Arranging Software for Improved Coding
(5) None of these
73. What does ASCII stand for? '
(1) Array of Simple Character Iteration Indices
(2) Another Stupid Character Identification Idea
(3) Alternate Source Code Image Improvement
(4) None of these
(5) American Standard Code for Information Interchange
74. The access method used for magnetic tape is_____
(1) Direct
(2) Random
(3) All of the above
(4)Sequential
(5) None of these
75. By .Processing we understand ____
(1) String manipulation only
(2) None of the above
(3) Processing string of only words
(4) Processing string of numbers and special symbols
(5) None of these
76. The difference between memory and storage is that the memory is ___ and
storage is ____
(1) Slow, fast
(2) Temporary, permanent
(3) Permanent, temporary
(4) All of the above
(5) None of these
77. Which of the Following holds the ROM, CPU, RAM and expansion cards "
(1) Hard disk (2) Floppy disk
(3) All of the above
(4) Mother board
(5) None of these
(78) The language that the computer can understand and execute is called ____
(1) System program (2) Application software
(3) Machine language (4) All of the above
(5) None of these
79. Which of the following devices can be used to directly input printed text
(1) MICR (2) OMR
(3) OCR
(4) All of the above
(5) None of these
80. A floppy disk contains
(1) Circular tracks only
(2) Both circular tracks and sectors
(3) Sectors only
(4) All of the above
(5) None of these
71 .(4) 72.(2) 73.(5) 74.(4) 75,(3) 76.(2) 77.(4) 78.(3) 79.(1) 80.(2)
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/
81. The errors that can be pointed out by the compiler are
(1) All of the above
(2) Semantic errors
(3) Logical errors
(4) Syntax errors
(5) None of these
82. C is
(1) An assembly language
(2) A machine language
(3) A third generation high level language
(4) All of the above
(5) None of these
83. Third generation computers
(1) Were the first to use built-in error detecting device
(2) Used transistors instead of vaccum tubes
(3) Were the first to use neural network
(4) Integrated circuits
(5) All of the above
84. Which of the following does not represent on I/O device
(1) speaker which beeps
(2) ALU
(3) plotter
(4) joystick
(5) None of these
85. The communication line between the CPU, memory and peripherals is called
(1) all of these (2) line
(3) media (4) Bus
(5) None of these
86. Memories which can be read only are called..............memories
(1) ROM (2) RAM
(3) PROM (4) EPROM
(5) None of these
87. Example of non-numerical data is
(1) All of the above
(2) Examination score
(3) Bank balance
(4) Employee address
(5) None of these
88. One thousand byte is equal to
(1) Megabyte
(2) Gigabyte
(3) None of these
(4) All of the above
(5) Kilobyte89. The language that the computer . can understand and execute is
called
(1) Application software
(2) Machine language
(3) System program
(4) All of the above
(5) None of these
90. A step by step procedure used to solve a problem is called
(1) Operating system
(2) None of these
(3) Application Program
(4) All of the above
(5) Algorithm
81- (4) 82.(3) 83.(4) 84,{2) 85.(4) 86.(1) 87.(4) 88.(5) 89.(2) 90.(5)
91. CD-ROM is a
(1) Semiconductor memory
(2) None of these
(3) Magnetic memory
(4) All of the above
(5) Memory register
92. Actual execution of instructions in a computer takes place in ,
(1) Control Unit
(2) ALU
(3) Storage unit
(4) All of the above
(5) None of these
93. Which of the following is used as a primary storage device
(1) Magnetic tape (2) PROM
(3) Floppy disk
(4) None of these
(5) All of the above
94. Information retrieval is faster from
(1) Floppy disk (2) Hard disk
(3) Magnetic tape
(4) All of the above
(5) None of these
95. Operating system is
(1) A collection of software routines
(2) A collection of input-output devices
(3) A collection of hardware components
(4) All of the above
(5) None of these
96. Operating system
(1) Provides a layered, user-friendly interface .
(2) Link a program with the subroutines it references
(3) Enables a programmer to draw a flowchart
(4) All of the above
(5) None of these
97. Execution of two or more programs by a single CPU is known as:
(1) Multiprocessing
(2) Time sharing
(3) Multiprogramming
(4) None of these
(5) All of these
98. Modem stands for
(1) A type of secondary memory
(2) Mainframe operating device memory
(3) Modulator demodulator
(4) All of the above
(5) None of these
99. Typical data transfer rate in LAN are of the order of
(1) Kilo bits per sec
(2) Bits per sec
(3) Mega bits per sec
(4) All of the above
(5) None of these
100. Ethernet uses
(1) Ring topology
(2) Bus topology
(3) Mesh topology
(4) All of the above
(5) None of these
91 .(5) 92.(1) 93.(4) 94.(2) 95.(1) 96.(2) 97.(4) 98.(3) 99.(1) 100.(2)
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/
Computer Networks
1. _____terminals (formerly known as cash registers) are often connected to
complex inventory and sales computer systems.
(1) Point-of-sale (POS)
(2) Data (3) Sales
(4) Query
(5) None of these
2. Smaller and less expensive PC-based servers are replacing ____ in many
businesses.
(1) supercomputers
(2) mainframes
(3) laptops (4) clients
(5) None of these
3. DSL is an example of a(n) _____ connection.
(1) network (2) wireless
(3) slow(4) None of these
(5) broadband
4. A term used to describe interconnected computer configuration is
(1) Micro program sequence
(2) Modulation
(3) Multiprocessing
(4) Multiprogramming
(5) None of these
5. What is required when more than one person uses a central computer at the
same time?
(1) Light pen (2) Mouse
(3) Terminal (4) Digitizer
(5) None of these
6. Multi user systems provided cost savings for small
business because they use a single processing unit to link several
(1) Personal computers
(2) Dumb terminals
(3) Workstations
(4) Mainframes
(5) None of these
7. A dumb terminal has
(1) An embedded micro-proces-
(2) Extensive memory
(3) A keyboard and screen
(4) Independeh I processing
(5) None of these
8. What is the full form of USB as used in computer related activities ?
(1) Universal Serial Bus
(2) Ultra Serial Block
(3) United Service Block
(4) Universal Security Block
(5) None of these
9. A device that connects to a network without the use of cables is said to be—
(1) distributed (2) open source
(3) centralized
(4) wireless
(5) None of these
10. A ___ is a collection of computers and device connected together.
(1) network (2) memory card
(3) protocol
(4) central processing unit
(5) None of these
1.(1) 2.(2) 3.{5) 4.(4) 5.(3) 6.(2) 7-{3) 8-(1) 9-(4) 10-(1)
1.(3) 2.(4) 3.(2) 4. (2) 5.(3) 6.(4) 7.(4) 8.(4) 9.(3) 10.(1)
LIKE CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/CTRAHULRITURAJ/
JOIN CT - CENTRAL TRAINER
HTTPS://WWW.FACEBOOK.COM/GROUPS/CENTRALTRAINER.OPERATIONS/
21) You can use the tab key to move a cursor across the screen,
indent a paragraph.
22) A collection of related files is called record.
23) Storage that retains its data after the power is turned off is
referred to as non-volatile storage.
24) Internet is an example of connectivity.
25) Testing is the process of finding errors in software code.
26) A syntax contains specific rules and words that express the
logical steps of an algorithm.
27) Changing an existing document is called the editing
documentation
28) Virtual memory is memory on the hard disk that the CPU uses
as an extended RAM.
29) Computers use the binary number system to store data and
perform calculations.
30) The windows key will launch the start buttons.
31) When sending an e-mail, the subject lines describe the contents
of the message.
32) Tables, paragraphs and indexes work with when formatting text
in word.
33) TB is the largest unit of storage.
34) The operating system tells the computer how to use its
components.
35) When cutting and pasting, the item cut is temporarily stored in
clipboard.
36) The blinking symbol on the computer screen is called the
cursor.
37) Magnetic tape is not practical for applications where data must
be quickly recalled because
tape is a sequential because tape is a sequential access medium.
38) Rows and columns are used to organise data in a spread sheet.
39) When you are working on documentation on PC, the document
temporarily stored in flash memory.
40) One megabyte equals approximately 1 million bytes
.
359) The memory address sent from the CPU to the main
memory over a set of wires is called address bus
360) MODEM is an electronic device required the computer
to connect to the INTERNET
361) A source program is a program which is to be Tran
scripted in machine language
362) Virus in computer relates to program
363) Floppy is not a storage medium in the computer related
hardware
364) DOS floppy disk does not have a boot record
365) The CPU in a computer comprises of Store, arithmetic
and logical unit and control unit
366) In computer parlor a mouse is a screen saver
367) UNIVAC is the name of the computer which was first
used for programming and playing of music
368) The IC chips for computer is prepared from silicon
369) Database management systems are comprised of tables
that made up of rows called records and columns called
fields
370) Nano is equal to 10(to the power of -9)
371) In computers RAM is a non-volatile memory
372) Disk and tape drives are commonly used as hard copy
373) When computer is connected to LAN and data is sent
across it for storage/processing is online processing
374) The primary storage unit is also referred to as internal
storage
375) Oracle is not an operating system
376) Data are raw facts and figures
377) Holding of all data and instructions to be processed is
one of the functions of storage unit
378) To select the entire row in Excel, click mouse at row
heading
379) Database is known as structured data
432)A frame can include text & graphics, tables & graphics,
graphics
433) All the formatting data for the paragraph is stored in
the paragraph mark
434) The abbreviation CAD stands for computer aided
design
435) We can define hypertext definition in notebooks using
Macsyma 2.0
436) The addressing mode(s) that can be used in a formula
is/are- absolute, relative and mixed
437) WINDOWS can work in enhanced and standard modes
438) The part of a machine level instruction which tells the
central processor what has to be done is an operation code
O-Matrix software packages do not have animation
capabilities
439) In order to paste text form the clipboard in the
document being edited, press the Ctrl-A key
440) A program that converts a high level language program
to a set of instructions that can run on
a computer is called a compiler
441) Faster execution of programs is not an advantage of a
subroutine
442) First generation of computer period is 1945-1950
443) IBM built first PC in the year 1981
444) A small computer program embedded within an HTML
document when a user retrieves
the web page from a web server is called an applet
445) Another name for systems implementation is
transformation
446) The central host computer or file server in a star
network maintains control with its
connecting devices through polling
447) C++ does not check whether the index value is within
scope
448) The browser uses uniform resource locator to connect
to the location or address of internet resources
449) In the centralized computing architecture, the entire
file is downloaded from the host computer to the user‘s
computer in response to a request for data
450) An expert system enables one or more users to move
and react to what their senses perceive in a computer
simulated environment
451) Popping or removing an element from an empty stack
is called underflow
452) The ability to combine data and operations on that data
in a single unit is known as polymorphism
453) A router is a device that sites between your internal
network and the internet and limits access into and out of
your network based on your organization‘s access policy
454) In C++, private, protected, and public are reserved
words and are called member access specifiers
455) The integration of all kinds of media such as audio,
video, voice, graphics and text into one coherent
presentation combined is called multimedia
456) The derived class can redefine the public member
functions of the base class
457) A technique for searching special databases, called
data warehouses, looking for related information and
patterns is called data mining
458) Like the quick sort the merge sort uses the divide and
conquer technique to sort a list
459) The use of expert systems technology can greatly
reduce the number of calls routed to a customer service
department
460) Building a list in the backward manner, a new node is
always inserted at the beginning of the list
461) Creating a web site is also called web authoring
462) Using the optimization analysis approach, the expert
system starts with a conclusion and tries to verify that the
rules, facts, and conclusion all match. If not, the expert
system chooses another conclusion
463) Both the application program and operating system
program only describes the software
464) Root is one of the items given below is not an item of
the menu bar
465) BACKUP is not an internal command
466) In a disk, each block of data is written into one sector
467) Hard copy is a printed copy of machine output
468) A boot strap is a small utilization computer program to
start up in inactive computer
469) CAD is oriented towards software
470) Icons are picture commands
471) IBM company for the first time launched pocket
computers
472) PROM is a computer part
473) Algorithms can handle most system functions that
aren‘t handled directly by the operating system
474) Device drivers are small, special-purpose programs
747) Virtual memory is memory on the hard disk that the CPU uses as
an extended RAM
748) To move to the beginning of a line of text, press the home key
749) When sending and e-mail, the subject line describes the contents
of the message
750) Microsoft is an application suite
751) Information travels between components on the motherboard
through bays
752) One advantage of dial-up internet access is it utilizes existing
telephone security
753) Network components are connected to the same cable in the star
topology
754) Booting checks to ensure the components of the computer are
operating and connected properly
755) Control key is used in combination with another key to perform a
specific task
756) Scanner will translate images of text, drawings, and photos into
digital form
757) Information on a computer is stored as digital data
758) The programs and data kept in main memory while the processor is
using them
759) Storage unit provide storage for information and instruction
760) Help menu button exist at start
761) Microsoft company developed MS Office 2000
762) Charles Babbage is called the father of modern computing
763) Data link layer of OSI reference model provides the service of error
detection and control to the highest layer
764) Optical fiber is not a network
765) OMR is used to read choice filled up by the student in common
entrance test
766) A network that spreads over cities is WAN
767) File Manager is not a part of a standard office suite
768) A topology of computer network means cabling between PCs
788) Format menu in MS Word can be use to change page size and
typeface
789) Assembly language programs are written using Mnemonics
790) DMA module can communicate with CPU through cycle stealing
791) A stored link to a web page, in order to have a quick and easy
access to it later, is called bookmark
792) B2B type of commerce is characterized by low volume and high
value transactions in banking
793) Advanced is not a standard MS Office edition
794) Workstation is single user computer with many features and good
processing power
795) History list is the name of list that stores the URL‘s of web pages
and links visited in past few days
796) FDDI access mechanism is similar to that of IEEE 802.5
797) MS Office 2000 included a full-fledged web designing software are
called FrontPage 2000
798) Macintosh is IBM‘s microcomputer
799) X.21 is physical level standard for X.25
800) Enter key should be pressed to start a new paragraph in MS Word
801) Main frame is most reliable, robust and has a very high processing
power.
802) Formatting of these toolbars allows changing of Fonts and their
sizes
803) The ZZ command is used to quit editor after saving
804) The program supplied by VSNL when you ask for internet
connection for the e-mail access is pine
805) The convenient place to store contact information for quick,
retrieval is address book
806) Digital cash is not a component of an e-wanet
807) For electronic banking, we should ensure the existence and
procedures with regard to identification of customers who become
members electronically
808) Jon Von Neumann developed stored-program concept
801) Tour the server room is to be done by the auditor while internet
banking services audit
802) Documentation while developing a software for a Bank is required
for auditing
803) Water supply has not become computerized
804) Concurrency control in distributed database supports multi-user
access
805) Fifth generation computers are knowledge processors
806) Transistors were first used in 2nd generation computers
807) Intelligence is not a characteristic of a computer
808) A camera is an processing machine
809) To protect organization from virus or attacks all mails sent and
received should be monitored, all messages should be encrypted, E-
mails should be used only for official purpose
810) Internet collects millions of people all over the world
811) A computer based information system is a system in which a
computer is used to process data to get information
812) The time between program input and outputs is called execution
time
813) Third generations of computers have On-line real time systems
814) MIME is a compressor that packages different formats into SMTP
compatible type
815) The earliest software was developed using the waterfall model
816) EDI e- commerce system can handle non monetary documents
817) Collection to tracks on a disk forms spindle
818) A disk where number of sectors are fixed is called hard sectored
819) Half duplex transmission techniques let computer to alternatively
send and receive data
820) Multiplexing combines signals from different sources into one and
sends on a faster channel
821) Message switcher chooses correct data path for an incoming
message and forwards it to relevant line
822) Trojan horse are self replicating malicious code independent of the
action of the user, but slow down the processor on entering a network
823) Generation of PIN in bank ATM would require PIN entered is
encrypted
824) Availability, integrity, confidentiality is most necessary for data to
be useful
825) Grid is a supercomputer created by networking many small
computers
826) A character that changes its value throughout the program is called
variables
827) A program coded in programming is done by assembling
828) In write mode of file existing text is replaced by new one
829) When an organization gives contract for development of a software,
it has to give data to the service provider. In such cases, the ownership
of data should be with the client/organization that outsource services
830) Under a centralized organization Intranet be an effective
networking tools
831) For optical fiber used in point to point transmission, the repeater
spacing is 10-100 km
832) Favorites are accessible from the start menu
833) Task pre-emption, task priority and semaphores are not needed by
server program from an operation system
834) The objective of multiprogramming operating system is to maximize
CPU utilization
835) The environment provided to ASP is based on Client/server
836) HUB is layer1 device, central device, dumb device
837) The UNIX, echi command is used to display the message or value
of any variable on the screen
838) The first network that initiated the internet was ARPANET
839) In MODEMS a digital signal changes some characteristic of a
carrier wave
840) The binary values are represented by two different frequencies in
frequency shift keying
841) Messenger mailbox is present in Netscape communicator
842) Switching is a method in which multiple communication devices are
connected to one another efficiently
843) A bridge recognizes addresses of layer 3
844) EPROM is permanent storage device
845) ―.TIF‖ extension name stands for tagged image format
846) The overhead using BRI is 10 percent of the total data rate
847) In programming languages the key word ―Void‖ means it does not
return any value when finished
848) The keyboard shortcut to restart your computer is Ctrl + Alt + Del
849) FORTRAN is not a programming language
850) The instruction LOAD A is a one address instruction
851) MS-Excel is also known as spread sheet
852) Manchester encoding is used in Ethernet technology
853) QAM is used in high speed modem
854) Frame Relay technique uses connection oriented
855) Bipolar always has a non-zero average amplitude
856) In a SONET system, an add/drop multipliers can remove signals
from a path
857) The server on the internet is also known as Host
858) For multiple branching in ‗C‘ we use switch statement
859) Web site is a collection of HTML documents, graphic files, audio
and video files
Sybase SQL server and Microsoft SQL server 7.0 is not an example of
RDBMS
860) In programming language, Null point is used to tell end of linked list
861) A technique which collects all deleted space onto free storage list
is called garbage collection
862) Insulating material is the major factor that makes co axial cable
less susceptible to noise than twisted pair cable
863) A data communication system covering an area the size of a town
or city is MAN
864) Virtual memory system allows the employment of the full address
space
865) The basic circuit of ECL supports the OR-NOR logic
866) Micro instructions are kept in control store
867) In HTML coding no shade attribute of HR tag suppresses the
shading effect and fields a solid line
868) Internet domains are classified by their functions. In that regard
―.com‖ represents commercial
869) HTTP in URL stands for hyper text transfer protocol
870) The ―Nyquist theorem‖ specifies the minimum sampling rate to be
twice the bandwidth of a signal
871) Memory allocation at the routine is known as dynamic memory
allocation
872) In HTML loading, <BR> tag is used for displaying a new line
873) HTTP protocols are used by internet mail
874) A policy on firewalls needs not ensure that it is logically secured
875) The script which is designed to receive value from the web users is
java script
876) GET method and HEAD method is the C91 method of involving a
C91 program
877) Analog switched line telephone service is least expensive
878) A toll used to find a synonym or antonym for a particular word is
thesaurus
879) In C++ coding, Cout<<‖tent‖; is used to display character or strings
or numeric screen
880) In this processing, a number of jobs are put together and executed
as a group batch processing
881) The process of finding and correcting errors in a program is a
process called debugging
882) New group that enable you to communicate with other Microsoft
windows user about issues and concerns with your computer
883) Analog-digital conversion type needs sampling of a signal
884) In an optical fiber, the inner core is less dense than the cladding
885) Six types of heading are available in HTML
886) RDBMS is an acronym for relational database management system
887) In MS-Word, page layout view is also known as true WYS/WYG
888) In HTML coding, <UL> (Unordered list) is used to give bullets in
your document
889) Transmission media are usually categorized as guided or unguided
890) A virtual circuit is the physical connection between an end point
and a switch or between two switches
891) Passing of the frame to next station can happen at a token ring
station
892) R-C coupling method is suitable for voltage amplification
893) Normal is not a type of HTML pages
894) In HTML coding <LI> tag is used for denoting items in a list of type
<UL>
895) In MS-Word the keyboard shortcut F7 used for spelling and
grammar check
896) DBMS is not an operating system
897) HTML is basically used to design web-site
898) In HTML coding, Dynamic web-pages are created in advance of the
user‘s request
899) HTML code is always starts with <html> </html>
900) If there are 5 routers and b networks in an internet work using link
state routing, there will be 5 routing tables
901) A scripting language similar to HTML and which runs only on a
browser is java script
902) By RAID technique, data is stored in several disk units by breaking
them into smaller pieces and storing each piece in separate disk
921) when the text automatically goes onto the next line this is called
word wrap
922) WYSIWYG is short for what you see is what you get
923) Left justify is the same as align left
933) To put text on the right of the page use the align right button
934) Lotus 1-2-3 is a popular DOS based spreadsheet package
935) 65,535 characters can be typed in a single cell in excel
936) Comments put in cells are called cell tip
937) Getting data from a cell located in a different sheet is called
referencing
938) A numeric value can be treated as a label value if it precedes with
apostrophe
939) Data can be arranged in a worksheet in an easy to understand
manner using auto formatting, applying styles, changing fonts
940) An excel workbook is a collection of worksheets and charts
941) Most manufacturers setup their BIOS to load into upper memory
during the boot process
942) Device drivers loaded in the config.sys file is loaded into the
following memory area: Conventional memory
943) 40ns memory speeds is the fastest
944) System software often uses the ROM BIOS
945) In CMOS setup, if you enable shadowing ROM is copied to RAM
946) Static variables are local to the block in which they are declared.
947) During the normal PC boot process, ROM BIOS is active first
948) During boot-up, the memory test checks and verifies that
contiguous memory is installed
949) 601 error code identifies a floppy drive problem
950) If you get frequent general protection faults, this could indicate
poor quality of memory chips
951) You are looking at a memory module thought to be a DIMM module.
168 pins would be on a DIMM module
Computer Awareness
List of Commonly used Computer Abbreviations
ALGOL- Algorithmic Language
ALU- Arithmetic and Logical Unit
AMD- Advanced Micro Devices
ANSI- American National Standard Institute
BASIC- Beginner's All purpose Symbolic Instruction Code
BCR- Bar Code Reader
BIOS- Basic Input Output System
CD- Compact Disc
CDROM -Compact Disc Read Only Memory
DBMS- Database Management System
DVD- Digital Versatile Disc
DVD- Digital Video Disc
DVDR- DVD-Recordable
DVDROM-DVD-Read Only Memory
DVD- RW DVD-Re Writable
EEPROM- Electronically Erasable Programmable Read only Memory
E-Mail- Electronic Mail
ENIAC- Electronic Numerical Integrated And Computer
EPROM- Erasable Programmable Read Only Memory
FAT- File Allocation Table
FDD- Floppy Disk Drive
FTP- File Transfer Protocol
FORTRAN- Formula Translation
GB- Gigabyte
GUI- Graphical User Interface
GIF- Graphics Interchange Format
HDD- Hard Disk Drive
HTML- Hypertext Markup Language
HTTP- Hypertext Transfer Protocol
IP- Internet Protocol
� The device that prints information from the computer onto the paper is
Printer.
� Pages Per Minute (PPM) is the unit used to count the speed of the
printer.
� On the basis of technology, printers are categorised into Impact and
Non- Impact Printers.
� Impact printers create an image by using some mechanism to
physically press an inked ribbon against the page, causing the ink to be
deposited on the page in the shape desired.
Examples of Impact Printers are Character Printers and Dot Matrix
Printers.
� Non – Impact Printers do not touch the paper when creating an
image.
Examples of Non - Impact Printers are Inkjet printers, Laser printers,
Solid ink printers, Dye-sublimation, Thermal wax printers, Thermal
autochrome printers.
� A pen based output device, attached to a computer for making vector
graphics, that is, images created by a series of many straight lines is
known as Plotters.
� The number of pixels displayed on a screen is known as Resolution.
� A Monitor is a TV-like display attached to the computer on which the
output can be displayed and viewed. It can either be a monochrome
display or a colour display.
HARDWARE AND SOFTWARE BASICS
� The set of instructions, which control the sequence of operations, are
known as Program. It is a sequence of instructions, written to perform a
specified task with a computer.
� A Software instructs the computer what to do and how to do it. It is a
set of instructions that tells the computer about the tasks to be
performed and how these tasks are to performed.
One or more defects or problems that prevent the software from working
as intended of working at all is a Bug.
� Software that contributes to the control and performance of the
computer system and permits the user to use the system more
conveniently is termed as System Software.
� Antivirus Software is used to scan the hard disk to remove the virus
from them.
� The assembly language program is translated into machine code by a
separate program known as an Assembler.
� A Backup, or the process of backing up, refers to the copying and
archiving of computer data so it may be used to restore the original after
a data loss event. It contains a copy of every program data and system
file on a computer.
� An Operating System controls the way in which the computer system
functions and provides a means by which users can interact with the
computer.
� Loading of the Operating System is known as Booting. Restarting a
computer that is already on, is referred to as Warm Booting.
� Basic Input – Output System (BIOS) is the part of operating system
that manages the essential peripherals such as the keyboard, screen,
disk drives and parallel and serial ports.
� An Integrated Software is a single application that combines major
features of several types of application.
� An Application Software is the program that makes the computer
useful to the users.
� Computer hardware is the collection of physical elements that
constitutes a computer system.
� Computer hardware refers to the physical parts or components of a
computer such as the monitor, mouse, keyboard, computer data storage,
hard drive disk (HDD), system unit (graphic cards, sound cards,
memory, motherboard and chips), etc. all of which are physical objects
that can be touched.