Pls Note:If any file is not downloading pls mark mail to nsmfdoon@gmail.com with file name/detail to get the file in your mail box directaly.

Friday, 25 May 2012

SBI CLERKS COMPUTER KNOWLEDGE AWARENESS PRACTICE PAPER MCQs- 22


Dear Reader If U go the VIGYAPANS of this page it will help us  a lot........

 

1) Special effect used to introduce Slides in a presentation are called
1) Effect, 2) Custom Animation, 3) Transition, 4) Animation, 5) Present Animation
Ans. 3

2) Computer send and receive date in the form of ------------- signals
1) Analog, 2) Digital, 3) Modulated, 4) Demodulated, 5) All of these
Ans. 2

3) Most World Wide Web pages contain commands in the language
1) NIH, 2) URL, 3) HTML, 4) IRC, 5) FTP
Ans. 3

4) ---------- are graphical objects used to represent commonly used application
1) GUI, 2) Drivers, 3) Windows, 4) Applications, 5) Icons
Ans. 5

5) Which of the following operating system is not owned and licensed by a company ?
1) Unix, 2) Linux, 3) Windows 2000, 4) Mac, 5) Windows
Ans. 1

6) In any window,the maximize button, the minimize button and the close buttons appear on
1) Title bar, 2) Menu bar, 3) Status bar, 4) Ruler bar, 5) Tool bar
Ans. 1

7) Which is the slowest internet connection services?
1) Digital Subscriber, 3) T1, 3) Cable modem, 4) Leased line, 5) Dial-up services
Ans. 5

8) Every component of your computer is either
1) Software of CPU/RAM, 2) Hardware or Software, 3) Application software or System software
4) Input devices or output devices, 5) None
Ans. 2

9) Checking that a pin code number is valid before it is entered into the system in an example of
1) Error connection, 2) Backup and recovery
3) Data Preparation, 4) Data validation, 5) None
Ans. 4

10) A compiler translates higher level programs in to a machine language program which is called
1) Source code, 2) Object code, 3) Compiled code, 4) Beta code, 5) None
Ans. 2

11) A field that uniquely identifies which person, thing or event the record describes is a
1) File, 2) Data, 3) Key, 4) Field, 5) None
Ans. 5

12) The ability to find an individual item in a file immediately
1) Sequential access, 2) File allocation table, 3) Direct access, 4) Directory, 5) None
Ans. 3

13) Computer Connected to a LAN can
1) Run faster, 2) Go online, 3) Shear information/share peripheral equipment
4) E-mail, 5) None
Ans. 3

14) A CD-RW disk
1) has faster access than an internal disk , 2) is a from of optical disk, so it an only be written once
3) holds less data than a floppy disk, 4) can be erased and rewritten, 5) None
Ans. 4

15) The two major Category of software include
1) Operating system and utility, 2) Personal Productivity and system
3) System and application, 4) System and utility, 5) None
Ans. 3

16) Windows 95, Windows 98 and Windows NT are known as
1) Processors, 2) Domain names, 3) Modems, 4) operating system, 5) None
Ans. 4

17) Information on a computer is stored as
1) Analog data, 2) Digital data, 3) Modem data, 4) Watts data, 5) None
Ans. 2

18) A program that works like a calculator for keeping track of money and making budget
1) calculator, 2) Scholastic, 3) Keyboard, 4) Spreadsheet, 5) None 
Ans. 4

19) To take information from one source and bring it to your computer is refereed as
1) upload, 2) Download, 3) Transfer, 4) De-Link, 5) None
Ans. 2

20) Each box in a spreading sheet is called
1) Cell, 2) Empty Space, 3) Record, 4) Field, 5) None
Ans. 1

21. Selection of command- 
(A) Opens the copy of the document in preview , (B) Prints the copy of displayed document
(C) Brings change in expansion of displayed document. (D) Saves the copy of displayed document
(E) None
Ans: (C)

2
2. You organize files by storing them in-
(A) archives, (B) folders, (C) indexes    , (D) lists, (E) None
Ans: (B)

2
3. How many different documents can you have open at anyone time ?
(A) No more than three, (B) Only one, (C) As many as your computer memory will hold,
(D) No more than you taskbar can display (E) None
Ans: (C)

2
4. What type of resource is most likely to be a shared common resource in a computer network ?
(A) Printers, (B) Speakers, (C) Floppy disk drives, (D) Keyboards, (E) None
Ans: (A)

2
5. Directory in directory is called-
(A) Mini directory, (B) Junior directory, (C) Part directory, (D) Sub-directory, (E) None
Ans: (D)

2
6. Such a pre-made document, which has coordinating font, layout and background, is-
(A) Guide    , (B) Model, (C) Ruler    , (D) Template, (E) None
Ans: (D)

2
7. In order to create columnar data in Word you need to-
(A) Tab consecutively until your cursor reaches the desired place, (B) Set tabs or use the Table menu
(C) You need to use Excel , (D) Press the space bar until your cursor reaches the desired place, (E) None
Ans: (E)

2
8. Saving is a process-
(A) To copy the document from memory to stroage medium, (B) To bring change in present status of the document
(C) To change the face or entire form , (D) To develop the document by recording the text with the use of keyboard
(E) None
Ans: (A)

2
9. To insert a word into the middle of a sentence-
(A) move the cursor to the desired location in the sentence and type the new word
(B) move the cursor to the desired location in the sentence, press Enter key, and type the new word
(C) move the cursor to the beginning of the sentence and start typing
(D) retype the whole sentence, (E) None
Ans: (A)

3
0. A(n) .............. is a combination of hardware and software that facilitates the sharing of information between computing .
(A) network,  (B) peripheral,  (C) expansion board,  (D) digital device,  (E) None
 
Ans: (A)

3
1. In word you can force a page break-
 (A) By positioning your cursor at the appropriate place and pressing the F1 key,
 (B) By using the Insert/Section Break,
 (C) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
 (D) By changing the font size of your document, (E) None
Ans: (C)
32. Junk e-mail is also called-
(A) spam, (B) spoof, (C) sniffer script, (D) spool, (E) NoneAns: (A)
33. Hackers-
(A) all have the same motive, (B) break into other people's computers
(C) may legally break into computers as long as they do not do any damage
(D) are people who are allergic to computers, (E) None
Ans: (B)
34. What type of computers are client computers (most of the time) in a client-server system ?
(A) Mainframe, (B) Mini-computer, (C) Microcomputer, (D) PDA, (E) None Ans: (C)
35. A computer cannot 'boot' if it does not have the-
(A) Compiler, (B) Loader, (C) System, (D) Assembler, (E) None Ans: (C)
36. The amount of vertical space between lines of text in a document is called-
(A) double-space, (B) line spacing, (C) single space, (D) vertical spacing, (E) NoneAns: (B)
37. Example of non-numeric data is-
(A) Employee address, (B) Examination score, (C) Bank balance, (D) All of these, (E) None Ans: (A)
38. What is embedded system ?
(A) The programme which arrives by being wrapped in box.
(B) The programme which is the permanent part of the computer
(C) The computer which is the part of a big computer
(D) The computer and software system that control the machine, (E) None
Ans: (D)
39. First page of Website is termed as-
(A) Homepage, (B) Index, (C) JAVA script, (D) Bookmark, (E) None Ans: (A)
40. ..................... is the appearance of typed characters.
(A) Size    , (B) Format, (C) Point    , (D) Colour, (E) None Ans: (B)
41. When a file is saved for the first time-
(A) a copy is automatically printed, (B) it must be given a name to identify it
(C) it does not need a name , (D) it only needs a name if it is not going to be printed, (E) None
Ans: (B)
42. Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate-
(A) CAN, (B) LAN, (C) DAN, (D) WAN, (E) TAN Ans: (D)
43. Where are data and programme stored when the processor uses them ?
(A) Main memory, (B) Secondary memory, (C) Disk memory, (D) Programme memory, (E) None Ans: (A)
44. ............... represents raw facts, where- as ................. is data made meaningful.
(A) Information, reporting, (B) Data, information, (C) Information, bits, (D) Records, bytes, (E) Bits, bytesAns: (B)
45. Which keystroke will take you at the beginning or the end of a long document ?
(A) Ctrl + PageUp and Ctrl + PageOown
(B) Shift + Home and Shift + End
(C) Ctrl + Home and Ctrl + End
(D) The only way is by using the right scroll bar, (E) None
Ans: (C)
46. What characteristic of read-only memory (ROM) makes it useful ?
 (A) ROM information can be easily updated.
 (B) Data in ROM is nonvolatile, that is, it remains there even without electrical power.
 (C) ROM provides very large amounts of inexpensive data storage.
 (D) ROM chips are easily swapped between different of computers.,  (E) None
 
Ans: (B)
47. In page preview mode-
 (A) You can see all pages of your document,  (B) You can only see the page you are currently working
 (C) You can only see pages that do not contain graphics  (D) You can only see the title page of your document
 (E) None
 
Ans: (A)
48. If the file saved earlier is edited, then-
(A) It is essential to save the file again to store the change
(B) The change will automatically be saved in the file
(C) If the length is more than a page, the file will be needed to be saved 
(D) The name will be needed to be changed , (E) None
 
Ans: (A)
49. When creating a word-processed document, this step involves the user changing how words on the page appear, both on the screen and in printed form-
(A) Editing text, (B) Inserting tables and indexes, (C) Formatting text
(D) Proofing documents (E) None
 
Ans: (C)
50. Aligning of text in column is-
(A) Justified, (B) Right, (C) Centre    , (D) Left, (E) None
 
Ans: (A)

No comments:

Post a Comment