Computer Knowledge 2016 For Banking
Computer Knowledge 2016 For Banking
Computer Knowledge 2016 For Banking
MCQ
1.
2.
3.
A website is__________.
(1) An author of a Web page
(3) A collection of contributors
4.
WAN is a network covering a broad area using leased telecommunication lines. What does the
acronym WAN stand for?
(1) Wider Area Network
(2) Wide Area Network3
(3) Wild Area Network
(4) Wide Area Networking
(5) Widest Area Network
5.
6.
What is a portion of memory that serves as a temporary repository for data as it waits for a given
action?
(1) Processor
(2) Memory pool (3) Processor pool (4) Data pool
(5) Cache3
7.
8.
ALU is part of CPU in many computers. What does the acronym ALC stand for?
(1) Algorithm Logic Unit
(2) Arithmetic Logical Unit
(3) Auxiliary Logic Unit
(4) Algorithmic Logical Unit
(5) Arithmetic Logic Unit3
9.
Java is a__________.
(1) Hardware Digit
(4) low-level language
10.
11.
The right click options of the mouse is NOT used in which of the following?
(2) To rename file
(1) To copy selected text into the clipboard
(3) To cut the selected text
(4) To access properties of an object (5) None of these3
12.
___________is the process of dividing the disk into tracks and sectors?
(1) Tracking
(2) Formatting3 (3) Crashing
(4) Allotting
Ck/Page-1
13.
A Place in a computer system where data and program are temporarily stored is called?
(1) Paste
(2) Open
(3) Memory3
(4) Pocket
(5) None of these
14.
(4) Modifying
15.
Graphic diagrams are used to represent multiple perspectives of a system which includes
(1) Use-case, class and state diagrams.3
(2) State, interaction and derivative diagrams.
(3) Interaction, relationship and class diagrams.
(4) Deployment, relationship and use-case diagrams.
(5) None of these.
16.
Which is the best view for representing your thoughts as presentation on a computer?
(1) Outline view3
(2) Notes page view
(3) Slide sorter view
(4) Slide view
(5) None of these
17.
18.
RSA is
(1) Symmetric cryptosystem
(3) Asymmetric cryptosystem
19.
20.
For each instruction in program memory the CPU goes through a(1) Decode-fetch-execute sequence
(2) Fetch-decode-execute sequence3
(3) Fetch-execute-decode sequence
(4) Execute-store-decode sequence
(5) Fetch-store-decode sequence
21.
22.
23.
(5) Cursor3
(5) Enter
24.
Among the following layers, where does the translation from one character code to other occur?
(1) Transport
(2) Presentation3 (3) Physical
(4) Application
(5) Session
25.
Ck/Page-2
26.
What is the name of the device used to read information encoded into a small plastic card?
(1) Punched card
(2) Light pen
(3) Badge reader3
(4) Magnetic disk
(5) Magnetic tape
27.
Flash is a (n)?
(1) Processor
(2) EEPROM3
(3) Game
(4) Hardware
28.
Maximum number of characters that can be typed in a single cell in Excel sheet?
(1) 32767
(2) 75565
(3) 655353
(4) 256
(5) None of These
29.
30.
31.
The right click option of the mouse is NOT used in which of the following?
(1) To copy selected text into the clipboard
(2) To rename the file
(3) To cut the selected text
(4) To access properties of an object
(5) None of these3
32.
_________is the process of dividing the disk into tracks and sectors?
(1) Tracking
(2) Formatting3 (3) Crashing
(4) Allotting
33.
A place in the computer system where data and programs are temporarily stored is called?
(1) Paste
(2) open
(3) Memory3
(4) pocket
(5) None of these
34.
(4) Modifying
35.
Graphical Diagrams are used to represent multiple perspectives of a system which include
(1) Use-case, class and state diagrams.3
(2) State, interaction and derivation diagrams
(3) Interaction, relationship and class diagrams
(4) Deployment, relationship and use-case diagrams
(5) None of these
36.
Which of the following is the best view for representing your thoughts as a presentation on a
computer?
(1) Outline view3
(2) Notes page view
(3) Slider sorter view
(4) Slider view
(5) None of these
37.
Ck/Page-3
38.
RSA is a?
(1) Symmetric Cryptosystem
(3) Asymmetric Cryptosystem
39.
40.
For each instruction in program memory the CPU goes through a___?
(1) Decode-fetch-execute sequence
(2) Fetch-decode-execute sequence3
(3) Fetch-execute-decode sequence
(4) Execute-store-decode sequence
(5) Fetch-store-decode sequence
41.
42.
A repair for a known software bug, usually available at no charge on the internet, is called as?
(1) Version
(2) Patch3
(3) Tutorials
(4) FAQ
(5) None of these
43.
A modem Performs?
(1) Modulation
(4) All of these3
(2) Demodulation
(5) None of these
44.
Which access method is used for obtained a record from a cassette tape?
(1) Direct
(2) Sequential3 (3) Random
(4) All of these
(5) None of these
45.
A type of failure that occurs in an Oracle program when there is a logical failure in handling of a
statement is called?
(1) Instance failure
(2) Media failure
(3) Process failure
(4) Statement failure3
(5) User error
46.
47.
(5) Ctrl+Shift+*
48.
Among the following device which uses an embossed steel band to form the letters printed on the
paper?
(1) Laser Printer
(2) Dot-matrix Printer
(3) Daisy wheel Printer
(4) Band Printer3
(5) Ink-jet Printer
49.
50.
(4) ALU3
Internet provides?
(1) Online communication
(2) Customer support services
(4) Online journals and magazine (5) All of the above3
(5) Processor
Ck/Page-4
51.
52.
53.
54.
(4) 1008
(5) 10243
(3) software
55.
Which command is used to save an existing file with a new name or to a new location?
(1) Save
(2) Save and Replace
(3) Save As3
(4) New File
(5) None of these
56.
What type of software manages the computers processes, functioning as an interface, connecting
user, the application software, and the hardware?
(1) Integrated software
(2) Utility program
(3) Translated program
(4) Operating system3
(5) None of these
57.
What type of the program that makes the computer easier to use?
(1) Operating system
(2) application
(4) network
(5) None of these
(3) utility3
58.
What is name of the internet connections which done using Phone line and a modem?
(1) digital
(2) dial-up3
(3) broadband
(4) dish
(5) None of these
59.
(5) mbps
60.
Which is the major feature of the World Wide Web which makes it simple to
Learn and use ?
(1) Database interface3
(2) Graphical text interface
(3) Graphical user interface
(4) Point-to-point protocol
(5) None of these
61.
62.
(4) system
(4) Storage
(5) Output3
(4) 2553
(5) 1&24
Ck/Page-5
65.
Two are more computers connected to each other for the purpose of sharing information forms
a?
(1) network3 (2) router
(3) server
(4) tunnel
(5) pipeline
66.
A computer checks the_____ of user names and passwords for a match before granting access?
(1) website
(2) network
(3) backup file
(4) database3
(5) None of these
67.
(4) left
68.
69.
(4) Data
(4) Debugging3
70.
71.
72.
(2) It is a Scheduler
(5) None of these
(3) Shift+Enter
73.
The ability of an OS to run more than one application at a same time is called as?
(1) Multitasking3
(2) Object-Oriented Programming (3) Multi-user computing
(4) Time-sharing
(5) None of these
74.
What is the name of the permanent instructions that a computer uses when it turned on and
which cannot be changed by other instructions?
(1) ROM3
(2) RAM
(3) ALU
(4) REM
(5) None of these
75.
76.
What is the name of the collection of programs that controls how your computer system runs and
processes information?
(1) Operating Systems3
(2) Component
(3) Office
(4) Compiler
(5) Interpreter
77.
78.
79.
(3) Differentiation
80.
A Complete electronic circuit with transistors and other electronic components on a small silicon
chip is called a(n)?
(1) Workstation
(2) CPU
(3) Magnetic Disk
(4) Integrated circuit3
(5) None of these
81.
82.
What is the name of the blinking point that shows your position in the text?
(1) Blinker
(2) Cursor3
(3) Causer
(4) Pointer
(5) Mouse
83.
What is the common name for the physical components that make up your computer?
(1) Operating System
(2) Software
(3) Hardware3
(4) Web Browsers
(5) Mother Components
84.
Which of the below key is used in combination with another key to perform a specific task?
(1) Function
(2) Space bar
(3) Arrow
(4) Control3
(5) Num Lock
85.
86.
87.
88.
89.
90.
91.
What is the name of the program that used to view web pages?
(1) Word Processor
(2) Spreadsheet
(4) Browser3
(5) Database
(5) Dynamic
(3) Protocol
(5) Archived
(5) Output
Which of the following is an operation that cannot be carried out on objects in graphic program?
(1) Spell Check3
(2) Change Size
(3) Rotate
(4) Change Colour
(5) None of these
What is the name of the hardware device that converts data into useful information?
(1) Protector
(2) Output Device (3) Input Device (4) Programme
(5) Processor3
System software is the set of programs that enables your computers hardware devices and which
software to work together?
(1) Management
(2) processing
(3) Utility
(4) Application3
(5) None of these
Ck/Page-7
92.
______ are specially designed computer chips that reside inside other devices, such as your car or
your electronic thermostat?
(1) Servers
(2) Embedded computers3
(3) Robotic computer
(4) Mainframes
(5) None of these
93.
Which layer is used in the following applications SMPT, FTP and DNS?
(1) Data link
(2) Network
(3) transport
(4) Application3 (5) None of these
94.
95.
What is WORM?
(1) Wanted One Read Memory
(3) Write Original Read Many
96.
Which of the following is a separate software layer that acts as glue between the client and the
server parts of an application and provides a programming abstraction?
(1) Freeware
(2) Firmware
(3) Shareware
(4) User-supported software
(5) Middleware3
97.
98.
99.
(4) 12 bits
(5) 32 bits
102. The process of transferring of files from your computer to the computer on the internet is called?
(1) Downloading
(2) Uploading3
(3) FTP
(4) JPEG
(5) downsizing
103. Timing and control unit is a part of an?
(1) ALU
(2) Processor3
(3) Memory
(4) CMOS
(5) BIOS
Ck/Page-8
106. Which of the following services is not provided by internet service provider?
(1) Internet transit
(2) Domain name registration
(3) Hosting
(4) Dial-up access
(5) None of these3
107. Which language is used to write a source program?
(1) High-level3 (2) Low-level
(3) binary
(4) All the above
(5) 1 G bit/s
(4) cluster
(5) LISP
112. What is the name of the memory that was programmed during the manufacturing?
(1) EEPROM
(2) ROM3
(3) PROM
(4) RAM
(5) None of these
113. The Output is?
(1) What the processor takes from the user
(2) What the processor gets from the user
(3) What the user gives to the processor
(4) What the processor gives to the user3
(5) None of these
114. An error is also called as?
(1) bug3
(2) icon
(3) cursor
(4) debug
115. Processing of two or more programs simultaneously by multiple processors is called as?
(1) Multitasking
(2) Multi gaming
(3) Multiprogramming
(4) Multiprocessing3
(5) None of these
116. What is the device the used to communicate with computer?
(1) Input device3
(2) Storage device
(4) Software programming
(5) None of these
117. Which of the following acts as a temporary high speed holding area between the memory and the
CPU thereby improving processing capabilities?
(1) Temporary memory
(2) ROM
(3) RAM
(4) Cache memory3
(5) None of these
118. What is the name of the documents that explains how to use a software program?
(1) User manual3
(2) Software manual
(3) Program manual
(4) System manual
(5) None of these
120. A page in the word document consists of how many margins?
(1) One (right)
(2) Four (top, bottom, right, left)3
(3) Three (top, bottom, right)
(4) Two (top, bottom)
Ck/Page-9
119. Which key is used to move the insertion point to the first cell in a row in Excel?
(1) Esc
(2) Page down
(3) Home3
(4) Page up
(5) None of these
121. A (n) _______ device is any hardware component that allows you to enter data instructions into a
computer?
(1) Interaction
(2) Input3
(3) Communication
(4) Output
(5) terminal
122. What does the acronym BIOS stand for?
(1) Basic Input/Outer System
(2) Basic Internal/Output System
(3) Basic Inner/Output System
(4) Basic Input/ Output Systemization
(5) Basic Input/ Output System3
123. The OS, software and data the computer is currently using are stored in_______?
(1) PCI
(2) AGP
(3) USB
(4) RAM3
(5) Scanner
124. Which of the following is a binary number?
(1) 34
(2) 113
(3) 45
(4) 20
(5) 12
(3) Bookmark3
(3) Abacus3
Ck/Page-10
(3) Multiplexer3
142. Which device is assembles groups of characters into complete messages prior to their entering the
CPU?
(1) An interpreter
(2) A complier
(3) A communications processor3 (4) An editor
(5) A translator
143. What is means by CD-ROM?
(1) Compactable Read Only Memory
(2) Compact Data Read Only Memory
(3) Compactable Disk Read Only Memory
(4) Compact Disk Read Only Memory3
(5) Connected Disk Read Only Memory
144. Which of the following terms refers to the ability of a computer to automatically configure a new
hardware component that is added to it?
(1) Formatting
(2) Multiprocessing
(3) Multiprogramming
(4) Multitasking
(5) Plug and play3
Ck/Page-11
(4) Output
146. A series of instructions that tells a computer what to do and how to do it is called a
(1) Program3 (2) Command
(3) User response (4) Processor
(5) None of these
147. The portion of the CPU that coordinates the activities of all the other computer computer
components is the
(1) Motherboard
(2) Coordination board
(3) Control unit3
(4) Arithmetic logic unit
(5) None of these
148. Something which has easily-understood instructions is said to be
(1) User-friendly3
(2) Information
(4) Icon
(5) None of these
149. To access a mainframe or supercomputer, user often use a
(1) Terminal3 (2) Node
(3) Desktop
(4) Handheld
150. A flaw in a program that causes it to produce incorrect or in appropriate results is called a_____
(1) Bug3
(2) Byte
(3) Attribute
(4) Unit problem (5) None of these
151. When you switch of your computer which memory gets lost?
(1) ROM
(2) RAM3
(3) Cache
(4) Dynamic
152. Name the program that controls the computer?
(1) Operating System3
(2) Application Program
(4) File Manager
(5) Compiler
(5) Static
(3) Browser
(3) cursor
(4) icon
156. Name the device that allows you to communicate with the computer?
(1) input device3
(2) output device
(4) storage device
(5) None of these
Ck/Page-12
(3) Stored on a CD
161. Which among the following is an input device which moved by the user on a flat surface to
causes a pointer on the screen to move accordingly?
(1) keyboard
(2) mouse3
(3) barcode reader
(4) wand reader
(5) scanner
162. A barcode reader is an example of a (n) ___________.
(1) Storage device
(2) Output device
(4) Printer
(5) Processing device
163. From where, you can access the Recycle Bin icon?
(1) On the desktop3
(2) In the properties dialog box
(4) On the hard drive
(5) None of these
(4) Output
(5) Input/output3
167. In travelling, which computers are portable and convenient for users?
(1) minicomputers
(2) laptops3
(4) supercomputers
(5) None of these
(4) Backbone
(5) Spam3
Ck/Page-13
170. Which among the following software applications is used for performing numerical and
statistical calculations?
(1) Document processor
(2) Database
(3) Graphics package
(4) Spreadsheet3
(5) None of these
171. Laptop means?
(1) A computer having voice recognition system
(2) Computers used in Clinical Laboratories
(3) A computer manufactured by Compaq
(4) Lightweight Computers, small enough to fit in a small suitcase3
(5) None of these
172. Who developed the basic architecture of computer?
(1) John Von Neumann3
(2) Blaise Pascal
(4) Charles Babbage
(5) None of these
173. Expansion of CPU is?
(1) Central Processing Unit3
(3) Central Peripheral Unit
(4) 18
(3) Windows3
Ck/Page-14
193. A program designed to destroy data on your computer which can travel to infect other
computers is called a ________.
(1) hurricane
(2) torpedo
(3) disease
(4) virus3
(5) None of these
194. The commonly available computers/laptops have a keyboard popularly known as ____________.
(1) QWERTY3 (2) ALTER
(3) UCLIF
(4) QOLTY
(5) None of these
195. At which of the storage placement strategies a program is placed in the largest available hole in
the main memory?
(1) Best fit
(2) First fit
(3) buddy
(4) worst fit3
(5) None of these
196. The shut down feature is available at ____.
(1) START menu3
(2) START >> Find
(4) Recycle bin
(5) Internet explorer
203. Which among the following capabilities is required for a system program to execute more than
one program at a time?
(1) Compiling
(2) Virtual memory
(3) Multi-tasking
(4) Word processing
(5) None of these3
204. For the purpose of finding of an individual item in a file immediately,_________ is used.
(1) File allocation table3
(2) Sequential access
(3) directory
(4) direct access
(5) None of these
205. Which contains specific rules and words that express the logical steps of an algorithm?
(1) Programming language
(2) syntax3
(3) programming structure
(4) graph
(5) logic chart
CSB, Ch-17, Ph: 044-24333346
Ck/Page-16
(5) Hacking
(3) user-friendly3
209. The printers and monitors are the peripheral devices, which are considered to be ______.
(1) hardware3 (2) data
(3) information (4) software
(5) source code
210. In a computer, most of the processing takes place in______.
(1) RAM
(2) ALU
(3) CPU3
(4) Memory
(5) Motherboard
211. Computer and communication technology, such as communication links to the Internet, that
provide help and understanding to the end user are known as _______.
(1) program
(2) information technology3
(3) worksheet file
(4) FTP
(5) Presentation file
212. Which among the following is contained on chips connected to the system board and is a holding
area for data instructions and information? (processed data waiting to be output to secondary
storage)
(1) mode
(2) internet
(3) mouse
(4) memory3
(5) program
213. Conference (Netscape) / NetMetting (Internet Explorer) enables (choose the option that best
describes)?
(1) Live audio conferencing
(2) Sharing voice on the net
(3) Live textual conferencing
(4) Live real time conference3
(5) None of these
214. Web casting is defined as_____
(1) Playing of music on the internet
(2) Transmitting the video and audio on the internet3
(3) Searching on the web
(4) Casting a movie/TV star in a role on the www
(5) None of these
215. FTP stands for_______.
(1) File Typing Protocol
(3) File Translate Protocol
(3) Package
Ck/Page-17
(4) mouse
(4) 2563
(5) 512
(3) Memory
225. The subsystem of the Kernel and hardware that cooperates to translate virtual to physical
addresses comprises_______.
(1) Input /Output Management Subsystem
(2) Memory Management Subsystem3
(3) Process Management Subsystem
(4) All the above
(5) None of these
226. If the _______bit in X. 25 standard is set to 1, it means that there is more than one packet.
(1) P
(2) D
(3) M3
(4) Q
(5) None of these
227. A pre designed document that already has coordinating fonts, a layout, and a background is
called as______.
(1) ruler
(2) model
(3) guide
(4) template3
(5) None of these
228. A personal computers connect together to form a ______.
(1) Enterprise
(2) Supercomputer
(4) Network3
(5) None of these
229. Computer language used on the Internet is______.
(1) COBOL
(2) BASIC
(3) Java3
230. You click at B to make the text
(1) Italics and Underlined
(4) Bold3
CSB, Ch-17, Ph: 044-24333346
(2) Underlined
(5) None of these
(4) Pascal
(3) Server
(3) Italics
Ck/Page-18
231. When you save to_______, your data will remain intact even when the computer is turned off?
(1) Primary storage device
(2) RAM
(3) Secondary storage device3
(4) Motherboard
(5) None of these
232. Define Mother Board?
(1) circuit board that house peripheral device
(2) the first chip that is accessed when the computer is turned on
(3) same as the CPU chip
(4) circuit board that contains a CPU and other chips3
(5) None of these
233. Which of the following program enables you to perform calculations involving rows and columns
of numbers?
(1) Spreadsheet program3
(2) Graphics package
(3) Word processor
(4) Window
(5) None of these
234. A record is related to a file as a statement is related to a _______?
(1) data
(2) file
(3) program3
(4) procedure
(5) persistent
(4) optical
236. The codes consisting of lines of varying widths or lengths that are computer-readable are known
as __________.
(1) an OCR scanner
(2) a magnetic tape
(3) a bar code3
(4) an ASC II code
(5) None of these
237. The magnetic tape is not practical for applications where data must be quickly recalled because
tape is _________.
(1) a random access medium
(2) a read-only medium
(3) expensive
(4) fragile and easily damaged
(5) a sequential access medium3
238. What is the reason for deleting unknown e-mail attachments?
(1) It is a bad manners
(2) The person could track you down and hurt you
(3) It can land you in jail
(4) It might contain a virus that could hurt your computer.3
(5) None of these
239. Which of the following is used to read and write information in the storage media such as CD?
(1) a laser beam of red light3
(2) magnetic strips
(3) magnetic dots
(4) All of these
(5) None of these
240. Vendor-created program modifications are called as________.
(1) patches3
(2) overlaps
(3) holes
(4) antiviruses
(5) fixes
241. Programs that automatically submits your search request to several search engines
simultaneously is called __________.
(1) Metasearch engines3
(2) Hits
(3) Spiders
(4) Webcrawlers
(5) None of these
242. You are planning on using a single network that supports 208 users. Which IP address class
would you choose to be the most efficient?
(1) Class D
(2) Class E
(3) Class C3
(4) Class B
(5) Class A
CSB, Ch-17, Ph: 044-24333346
Ck/Page-19
(2) algorithm
(5) None of these
Ck/Page-20
255. Which of the following contains buttons and menus that provide quick access to commonly used
commands?
(1) toolbar3
(2) window
(3) menubar
(4) find
(5) None of these
256. For selecting or highlighting, which of the following is generally used?
(1) Floppy Disk (2) Icon
(3) Mouse3
(4) Keyboard
(5) None of these
257. Which of these is a point-and-draw device?
(1) mouse3
(2) printer
(3) scanner
(4) keyboard
(5) CD-ROM
258. The letter and number of the intersecting column and row is the______.
(1) Cell contents
(2) Cell coordinates
(3) Cell address3
(4) Cell position
(5) Cell location
259. Which among the following used a handheld operating system?
(1) A mainframe
(2) A laptop
(4) A supercomputer
(5) A PDA3
Ck/Page-21
264. ___________ means to enlarge a window to its maximum area so that it will full entire desktop
(1) Maximize3 (2) Extend
(3) Enlarge
(4) Zoom
(5) None of these
265. What is HTML_______.
(1) It is developed for world wide web (www)3
(2) To make formatted web documents with links, those can be viewed in Web Browser.
(3) Used for all the formatted documents.
(4) All of the above
(5) None of these
266. Define icon?
(1) It is small graphical image which is used to represent an application, command, or a tool.
(2) It is some action performed when something like menu or button is clicked
(3) Both a and b3
(4) A folder
(5) None of these
267. ___________ is an area of memory assigned to store any e-mail message for the user
(1) Post Box
(2) Outlook Express
(3) Yahoo.com
(4) Mailbox3
(5) None of these
268. A software to convert a complete HLL Program to machine language in one go _____.
(1) compiler3 (2) loader
(3) assembler
(4) interpreter
(5) None of these
269. Gopher displays a set of resources on the Internet in the form of _______.
(1) Lists and menus3
(2) Icons
(3) Options
(4) Both (2) and (3)
(5) None of these
270. When a language has the capability to produce new data types, it is said to be ___________.
(1) Reprehensible3
(2) Encapsulated
(3) Extensible
(4) Overloaded
(5) None of these
271. Which of the following menu has to be selected to print a document?
(1) Tools
(2) Edit
(3) File3
(4) Special
273. If you need to send letters to the people regularly, which type of program would you use to
create the letters?
(1) Utility software
(2) Hardware
(3) System Software
(4) Application Software3
(5) None of these
274. In a computer mouse and keyboard are used to give ________.
(1) Instructions (2) Insert
(3) Guidance
(4) Input3
276. Among the following statement which is not true about computer files?
(1) Every file has a filename
(2) Files usually contain data
(3) A file extension is established by the user to indicate the files contents3
(4) They are collections of data saved to a storage medium
(5) None of these
CSB, Ch-17, Ph: 044-24333346
Ck/Page-22
277. Which among the following is optional memory to run the computer system?
(1) ROM
(2) RAM
(3) Cache3
(4) Secondary Memory
(5) RAM and ROM
278. __________ is a translator program which was used in Assembly Language.
(1) Interpreter (2) Compiler
(3) Translator
(4) Translation
(5) Assembler3
279. Which program is used to controls the various computer parts and allows the user to interact
with the computer?
(1) Database program
(2) Operating system3
(3) Database program
(4) Word processing software
(5) None of these
280. In Microsoft office Excel document, each cell is referred to by its cell address, which is called
as__________.
(1) Cells column label and worksheet tab name
(2) Cells row and column labels
(3) Cells column label
(4) Cells row and column labels3
(5) None of these
281. What is the Shortcut Key to hide the entire row in the MS Excel?
(1) Ctrl + X
(2) Ctrl + 93
(3) Ctrl + (4) Ctrl + 2
(5) Ctrl + R
282. Which of the following component is used to make Third Generation Computers?
(1) Bio Chips
(2) Vacuum Tubes
(3) Integrated Circuits3
(4) Transistors
(5) Discrete Components
283. Unsolicited email is also called as___________.
(1) Usenet
(2) Spam3
(3) Newsgroup
(4) Backbone
(5) Flaming
284. Which among the following software applications is used for performing numerical and statistical
calculations?
(1) Graphic Package
(2) Document Processor
(3) Data Base
(4) Spread Sheet3
(5) None of these
285. A ________ is approximately a million bytes
(1) Tera byte
(2) Giga byte
(3) Mega byte3
(3) Bookmark3
288. The OS, software and data the computer is currently using are stored in_______?
(1) Scanner
(2) PCI
(3) RAM3
(4) AGP
(5) None of these
289. What is the shortcut key to go to last line in the document?
(1) Ctrl + L
(2) Ctrl + Last
(3) Ctrl + End3 (4) Ctrl + Down Arrow
290. Among the following which is not a computer language?
(1) FORTRAN (2) COBOL
(3) LOTUS3
(4) BASIC
CSB, Ch-17, Ph: 044-24333346
(4) Login
(5) Lock
292. Among the following which is the global address of documents and other resources on the World
Wide Web?
(1) Hyperlink (2) URL3
(3) Anchor
(4) Reference
(5) Header
293. A power management mode in which the current state of the system is saved to the hard drive,
and the system power downs is known as________.
(1) Lock
(2) Log off
(3) Hibernate3 (4) Switch
(5) Green Button
294. Name the malicious computer program that is capable of creating a backdoor on your computer?
(1) Firewall
(2) Worm
(3) Virus
(4) Trojan Horse3 (5) Bug
295. A combination of software and hardware, in which data or programmes are pre-recorded on
them is called______.
(1) Firmware3
(2) Malware
(3) Directory
(4) Anti-spam programme
(5) Webcrawler
296. Where was the icons of the currently running programmes are displayed?
(1) Menu Bar
(2) Title Bar3
(3) Status Bar
(4) Tools Bar
(5) None of these
297. Which of the following command is used to save an existing document with a new name?
(1) Use Rename command
(2) Retype the content and save in the new name
(3) Use Save as command3
(4) Use Convert command
(5) None of these
298. A special, high-speed storage area within the CPU in which all data must be represented before it
can be processed is called?
(1) BIOS
(2) Cache
(3) RAM
(4) Register3
(5) None of these
299. In the windows operating system, the delete command_______.
(1) Transfers the files to a specified folder
(2) Puts the files to the recycle bin3
(3) Deletes the files permanently
(4) Transfers the files from the drive to the removable drive
(5) None of these
300. All the stored information in a computer must be in_______.
(1) A file3
(2) A programme (3) On hard disk (4) On RAM
304. If you begin typing an entry into a cell and then realize that you dont want your entry placed
into a call, you have to _______.
(1) Press Esc3
(2) Press erase key
(3) Press the edit formula button (4) Press enter button
(5) None of these
CSB, Ch-17, Ph: 044-24333346
Ck/Page-24
306. Among the following which will not cut the information?
(1) Selecting edit>cut from the menu
(2) Clicking the cut button on the standard
(3) Pressing Ctrl+c3
(4) Pressing Ctrl+x
(5) None of these
307. Computer connected to the LAN can________.
(1) Run faster
(2) Go online
(4) Share information and / or share peripheral equipment3
(3) Email
(5) None of these
308. A self replicating program, similar to a virus which was taken from a 1970s science fiction novel
by John Bruner entitle the shockwave Rider is_______.
(1) Bug
(2) Vice
(3) Worm3
(4) Lice
(5) None of these
309. Unwanted repetitious messages, such as unsolicited bulk email is known as______.
(1) Spam3
(2) Trash
(3) Courier
(4) Bulk email
(5) None of these
310. COBOL is widely used in_______ applications.
(1) Mathematical
(2) Commercial3
(4) Space
(5) None of these
311. VDU is also called as______
(1) Monitor
(2) Screen
(3) Printer
(3) Scientific
312. Which of the following software is used to track the billing accounts?
(1) Web Authoring
(2) Word Processing
(4) Electronic Publishing
(5) None of these
(3) Spreadsheet3
(5) Microsoft3
318. In MICR Code Line Structure, what does the first three digits represents among the nine digits?
(1) City3
(2) Account Type (3) Branch
(4) Bank
(5) None of these
CSB, Ch-17, Ph: 044-24333346
Ck/Page-25
319. Most of the internet banking sites provides which among the following features to reduce the risk
of keystroke logging for the password entry?
(1) Virtual Keyboard3
(2) Dasher
(3) Touch screen
(4) Finger Touching
(5) None of these
320. For the process of fast data transmission, ADSL data communications technology uses which of
the following features?
(1) Wireless Modem
(2) Sockets
(3) Copper Telephone Lines3
(4) Voice Band Modem
(5) None of these
321. Reusable optical storage will typically have the acronym _________.
(1) DVD
(2) ROM
(3) CD
(4) RW3
Ck/Page-26
331. Every device on the Internet has a unique ___________ address (also called an Internet address)
that identifies it in the same way that a street address identifies the location of a house.
(1) IA
(2) DA
(3) IP3
(4) DH
(5) None of these
332. Storing same date in many places is known as__________.
(1) enumeration (2) concurrency (3) redundancy3 (4) iteration
333. Which among the following is the main folder on a storage device?
(1) Device driver
(2) Interface
(4) Platform
(5) None of these
334. Manipulating data to create information is known as________.
(1) analysis
(2) programming (3) processing3 (4) feedback
335. What is the main circuit board of the system unit id the________.
(1) RAM
(2) control unit
(3) motherboard3(4) computer program
(5) Gigabyte
338. _____________ are a type of inexpensive digital camera that remains tethered to a computer and
are used for videoconferencing, video chatting, and live Web broadcast.
(1) Webcams3 (2) Browserpics (3) Browsercams (4) Webpics
(5) None of these
339. A ________ is an organized collection of data about a single entity?
(1) file3
(2) dictionary
(3) database
(4) library
(4) Modifying
335. Graphic diagrams are used to represent multiple perspectives of a system which includes
(1) Use-case, class and state diagrams.3
(2) State, interaction and derivative diagrams.
(3) Interaction, relationship and class diagrams.
(4) Deployment, relationship and use-case diagrams.
(5) None of these.
CSB, Ch-17, Ph: 044-24333346
Ck/Page-27
336. Which is the best view for representing your thoughts as presentation on a computer?
(1) Outline view3
(2) Notes page view
(3) Slide sorter view
(4) Slide view
(5) None of these
337. What does SMPS stands for?
(1) Single mode power supply
(3) Simple mode power supply
338. RSA is
(1) Symmetric cryptosystem
(3) Asymmetric cryptosystem
(4) PROM
345. The printer produces output on paper, often called _______ copy.
(1) Readable
(2) Hard3
(3) Soft
(4) Real
346. To perform a computing task, software uses hardware for four basic functions:
(1) Input, storage, alteration and output
(2) Input, processing, storage and analysis
(3) Input, processing, storage and output3
(4) Output, input, analysis and viewing
(5) None of these
347. To boot a computer means to________.
(1) Turn on the sounds
(2) Add extra drives
(4) Turn it on3
(5) None of these
CSB, Ch-17, Ph: 044-24333346
348. A (an) _______ is a set of rules and standards that any two entities use for communication.
(1) Interface
(2) Interaction
(3) Protocol3
(4) Parameter
(5) None of these
349. Windows XP is an example of _________ component of an information system.
(1) Procedure (2) Software3
(3) Hardware
(4) Data
(5) None of these
350. Storage device that can be plugged directly into a computers USB port is________.
(1) Floppy
(2) Plug-in
(3) DVD
(4) Flash drive3 (5) None of these
351. Which of the below mouse technique is used to access the properties of an object?
(1) Shift-clicking
(2) Pulling
(3) Right-clicking3
(4) Dragging
(5) None of these
352. Which of the following displays the contents of the active cell in Excel?
(1) Name box (2) Row Headings (3) Formula bar3 (4) Task pane
(5) None of these
353. ____________ enables you to simultaneously keep multiple Web pages open in one browser
window.
(1) Esc key
(2) Pop-up helper (3) Tab box
(4) Tab row3
(5) Address bar
354. Any letter, number of symbol found on the keyboard that you can type into the computer is
a/an_____
(1) nimble
(2) character3
(3) type
(4) font
(5) output
355. Which of the following lets you leave a screen or program?
(1) Option
(2) Text
(3) Exit3
(4) Boot
356. To change the written work which is already done, _______ options is used.
(1) File
(2) Cut
(3) Edit3
(4) Close
(5) None of these
357. ______________ is a key that will erase information from the computers memory and characters
on the screen.
(1) Enter
(2) Shift
(3) Esc
(4) Backspace3
(5) Spacebar
358. ____________ is used to insert the clipboard content into a document.
(1) Save
(2) Sticky key
(3) Paste3
(4) View
359. Which of the following is a command to get a file you worked on from the memory where it was
stored?
(1) Edit
(2) Save as
(3) Format
(4) Open3
(5) None of these
360. _____________ is used to translate a program written assembly language to machine language.
(1) Firewall
(2) Compiler
(3) Assembler3 (4) Interpreter
(5) None of these
361. Computer Software can be defined as__________.
(1) The interaction between the computer and its database
(2) The instructions that tell the computer what to do.3
(3) An interface between the computer and the network.
(4) The computer and its associated equipment
(5) Computer components that act to accomplish a goal
362. Network routing information distributed among routers is stored in which of the following?
(1) NVRAM
(2) Route table
(3) Metric table (4) Flash memory (5) Route memory3
Ck/Page-29
363. When speaking of computer input and output, input refers to ___________.
(1) Retrieval of data of information than has been entered into the computer
(2) Any data processing that occurs from new data input into computer
(3) Data or information that has been entered into the computer3
(4) The transmission of data that has been entered into the computer
(5) Both (3) and (4)
364. If the destination did not receive a segment, how will the TCP host to resend the information?
(1) The destination host will send a YACK message back to the sending host
(2) The ACK received will include the segment number that was not received3
(3) The ACK received will not include the segment number that was not received
(4) The sending host will send a PACK to verify segment receipt
(5) None of these
365. The process of writing out computer instructions is known as___________.
(1) executing
(2) compiling
(3) assembling
(4) coding3
(5) None of these
366. A Web site address is a unique name that identifies a specific ________on Web.
(1) Web Site
(2) Web browser (3) PDA
(4) Link3
(5) None of these
367. You can __________ a search by providing more information the search engine can use to select a
smaller, more useful set of results.
(1) refine3
(2) slowdown
(3) load
(4) query
(5) expand
368. The contents of ________ are lost when the computer turns off.
(1) output
(2) input
(3) storage
(4) volatile memory3
369. The process of computer receiving information from a server on the Internet is known as ______.
(1) pushing
(2) transferring
(3) downloading3
(4) pulling
(5) None of these
370. When sending an e-mail, the ________line describes the contents of the message.
(1) subject3
(2) cc
(3) contents
(4) to
(5) None of these
371. Forms that are used to organize business data into rows and columns are ___________.
(1) registers
2) sheet-spreads
(3) transaction sheets
(4) business forms
(5) spreadsheets3
372. In PowerPoint, the Header & Footer button can be found on the Insert tab in __________
group.
(1) Object group
(2) Illustrations group
(3) Text group3
(4) Tables group
(5) None of these
373. Word processing, spreadsheet and photo-editing are examples of _________
(1) Application software3
(2) Platform software
(3) Operating system
(4) Operating system software
(5) None of these
374. If you wish to extend the length of the network without having the signal degrade, you would
use a __________
(1) repeater3 (2) gateway
(3) router
(4) switch
(5) None of these
375. The _______ shows all the Web sites and pages that you have visited over a period of time.
(1) toolbar
(2) taskbar
(3) history list3 (4) status bar
(5) None of these
CSB, Ch-17, Ph: 044-24333346
Ck/Page-30
377. The word-processing task associated with changing the appearance of documents is ________.
(1) Editing
(2) Formatting3 (3) Storing
(4) Writing
(5) None of these
378. In order to save an existing document with a different name you need to________.
(1) Copy and paste the original document to a new document and then save
(2) Use the Save As command3
(3) Retype the document and give it a different name
(4) Use Windows Explorer to copy the document to a different location and then rename it
(5) None of these
379. A Field is a related group of________.
(1) Files
(2) Cables
(3) Characters3
(4) Records
(3) Backspaca+Ctrl
381. Editing a document consists of reading through the document youve created, then____________.
(1) Correcting your errors3
(2) Printing it
(3) Saving it
(4) Deleting it
(5) None of these
382. The Internet allows you to________.
(1) Send electronic mail
(3) Connect to servers all around the world
(4) Storage
384. What is the biggest number you can get with 8 bits?
(1) 256
(2) 128
(3) 1000
(4) 2553
385. The disks store information in___________.
(1) Tables
(2) Rows and Columns
(4) Tracks and sectors3
(5) All of these
386. Which file(s) can be executed without mentioning its extension name?
(1) .exe
(2) .bat
(3) .com
(4) .app
(5) Output3
(5) 1024
(3) Blocks
Ck/Page-31
389. Specialized programs that assist users in locating information on the Web are called ____.
(1) Information engines
(2) Locator engines
(3) Web browsers
(4) Resource locators
(5) Search engines3
390. Compiling creates a (n) ___________.
(1) Error-free program
(2) Program specification
(4) algorithm
(5) executable program3
(3) subroutine
391. To insert a copy of the clipboard contents, _____________ whatever was last cut or copied at the
insertion point.
(1) paste3
(2) stick in
(3) fit in
(4) push in
(5) None of these
392. The command used to remove text or graphics from a documents. (The information is then stored
on a clipboard so you can paste it):
(1) chop
(2) cut3
(3) clip
(4) cart away
(5) None of these
393. A group of 8 bits is known as a _________.
(1) byte3
(2) kilobyte
(3) binary digit
(4) megabit
394. The hardware device commonly referred to as the brain of the computer is___________.
(1) RAM chip (2) Data input
(3) CPU3
(4) Secondary storage
(5) None of these
395. A computer cannot boot if it does not have the______.
(1) Compiler
(2) Loader
(4) Assemble
(5) None of these
396. A computer that takes what has been typed into the computer and can be seen on the screen and
sends it to the printer for output on paper is called ___________.
(1) print3
(2) return
(3) jump
(4) attention
(5) None of these
397. The most common storage device for the personal computer is __________.
(1) Floppy disk
(2) USB thumb drive
(3) Zip disk
(4) Hard disk drive3
(5) Pen drive
398. Which device uses a hand-held operating system?
(1) A PDA3
(2) A personal computer
(4) A mainframe
(5) None of these
399. To print an individual item in a file immediately use __________.
(1) SHIFT+P
(2) CTRL+P3
(3) ALT+P
(4) ESC+P
(3) A laptop
400. The ability to find an individual item in a file immediately is called ___________.
(1) File allocation table
(2) directory
(3) sequential access
(4) direct access3
(5) None of these
401. Use the _______________ to choose a slide layout.
(1) Quick Styles gallery
(2) Format gallery
(4) Layout collection
(5) None of these
402. A saved document is referred to as a _________.
(1) file3
(2) word
(3) folder
(4) project
Ck/Page-32
(5) cursor3
410. When cutting and pasting, the item cut is temporarily stored in _________.
(1) ROM
(2) Had drive
(3) Diskette
(4) Dashboard
(5) Clipboard3
411. Passwords enables users to_________.
(1) Get into the system quickly
(2) Make efficient use of time
(3) Retain confidentiality of files3 (4) Simplify file structures
412. When sending an e-mail, the ________ line describes the contents of the message.
(1) subject3
(2) to
(3) contents
(4) cc
(5) None of these
413. When we run a program in HTML coding,___________ is used as back end and _________ works
as front-end.
(1) Notepad, Internet, Explorer3 (2) Notepad, MSN, Messenger
(3) MS-Word, Internet Explorer
(4) Both 1 and 2
(5) None of these
414. In DOS, the Label command is used to ____________.
(1) Display the label of disk
(2) Change the label of disk3
(3) Remove the label of disk
(4) Both (1) and (2)
415. A central computer that holds collections of data and programs for many PCs, workstations, and
other computer is a ____________.
(1) Supercomputer
(2) minicomputer
(3) laptop
(4) server3
(5) None of these
416. A Websites main page is called its___________.
(1) Home page3(2) Browser page (3) Search Page
CSB, Ch-17, Ph: 044-24333346
(4) Bookmark
(2) Write
(5) None of these
421. When you insert an Excel file into a Word document, the data are_______.
(1) Linked
(2) Placed in a word table3
(3) Embedded
(4) Hyperlinked
(5) None of these
422. Which of the following structures involves repeating a sequence until a certain condition remains
true?
(1) Loop3
(2) Sequence
(3) Conditional (4) Selection
(5) None of these
423. Eliminating errors in a program is also called________.
(1) Debugging3 (2) Modifying
(3) Coding
(4) Clarifying
424. In which of the following topologies, one main cable is used to which all nodes are directly
connected?
(1) Bus3
(2) Star
(3) Mesh
(4) Ring
(5) None of these
425. A ________ is a program that visits Web sites and reads their pages and other information in
order to create entries for a search engine index.
(1) Filter
(2) Cookie
(3) Extensions
(4) Spider3
(5) None of these
426. You can copy files to your computer from specially configured servers on the Internet using file
transfer utility software. This process is called__________.
(1) Downloading3
(2) Browsing
(3) Surfing
(4) Downsizing
(5) None of these
427. Tim Berners-Lee celebrated his birthday on 8th June. He is associated with which of the following
important discoveries in the field of computer?
(1) Mouse
(2) USD
(3) World Wide Web3
(4) Browser
(5) None of these
428. A Search Tool that uses another search engines data to produce their own results from the
Internet is called __________.
(1) Microsearch engine
(2) Metasearch engine3
(3) Betasearch engine
(4) Mastersearch engine
(5) None of these
429. What will happen if you right-click on the desktop itself?
(1) All the open application will be closed
(2) All the open application will be minimized
(3) The control panel will open
(4) Display properties dialogue box will open3
(5) None of these
CSB, Ch-17, Ph: 044-24333346
Ck/Page-34
430. Any data or instruction entered into the memory of a computer is called________.
(1) Output
(2) Input3
(3) Storage
(4) Process
(5) None of these
431. Which key combination will you opt for to align the line or selected text to the centre of the screen
in MS Word?
(1) Ctrl +E3
(2) Ctrl +P
(3) Ctrl +S
(4) Ctrl +H
(5) None of these
432. All formulas in Excel start with
(1) %
(2) #
(3) =3
(4) &
(4) 1985
(3) 0 or 13
444. Word processing, Spread sheet and Photo editing are examples of_______
(1) Application software3
(2) System software
(3) Operating system software
(4) Platform software
(5) None of these
CSB, Ch-17, Ph: 044-24333346
Ck/Page-35
451. Specialized programs that assist user in location information on the web are called
(1) Data engines
(2) Information engines
(3) Web browsers
(4) Resource locators
(5) Search engines3
452. Which one of the following is NOT a computer programming language?
(1) BASIC
(2) C++
(3) JAVA
(4) COBOL
(5) MS-Excel3
453. Workbook in MS-Excel is a collection of
(1) Page Setup (2) Charts
(3) Buttons
(4) Documents
(5) Worksheets3
(4) malware3
455. Computer program that converts assembly language into machine language is
(1) Complicate (2) Computer
(3) Intersection (4) Converter
(5) Assembler3
456. While editing an MS Word document you accidentally losts text. You should then use
(1) Copy
(2) Undo3
(3) Insert
(4) Replace
(5) Add
457. HTTP refers to __________.
(1) Hyper Text Transmission Protocol
(2) Hyper Text Transfer Protocol3
(3) Home Text Transmission Protocol
(4) Hyper Text Tie Protocol
(5) Home Text Transmission Protocol
458. To move to the bottom of a document, press __________.
(1) Home Key (2) Insert Key
(3) Ctrl + End3 (4) End Key
(5) URL3
Ck/Page-36
(4) 1008
(5) 10243
(3) software
465. Which command is used to save an existing file with a new name or to a new location?
(1) Save
(2) Save and Replace
(3) Save As3
(4) New File
(5) None of these
466. What type of software manages the computers processes, functioning as an interface, connecting
user, the application software, and the hardware?
(1) Integrated software
(2) Utility program
(3) Translated program
(4) Operating system3
(5) None of these
467. What type of the program that makes the computer easier to use?
(1) Operating system
(2) application
(4) network
(5) None of these
(3) utility3
468. What is name of the internet connections which done using Phone line and a modem?
(1) digital
(2) dial-up3
(3) broadband
(4) dish
(5) None of these
469. Which is the fastest data transmission speed given below?
(1) bandwidth (2) bps
(3) gbps3
(4) kbps
(5) mbps
470. Which is the major feature of the World Wide Web which makes it simple to
Learn and use ?
(1) Database interface3
(2) Graphical text interface
(3) Graphical user interface
(4) Point-to-point protocol
(5) None of these
471. A(n) ________ camera is a peripheral device used to capture still images in a digital format that
can be easily transferred into a computer and manipulated using graphics software.
(1) digital3
(2) analog
(3) classic
(4) film
(5) None of these
472. Compatibility in regard to computer refers to
(1) The software doing the right job for the user
(2) Their being versatile enough to handle the job
(3) The software being able to run on the computer
(4) Software running with other previously installed software3
(5) None of these
CSB, Ch-17, Ph: 044-24333346
Ck/Page-37
473. _____ makes it possible for shoppers to make purchases using their computers.
(1) E-world
(2) E-commerce3 (3) E-spend
(4) E-business
(5) None of these
474. How is it possible that both programs and data can be stored on the same floppy disk?
(1) A floppy disk has two sides one for data and one for programs.
(2) Programs and data are both software, and both can be stored on any memory device.3
(3) A floppy disk has to be formatted for one or the other.
(4) Floppy disks can only store data, not programs.
(5) None of these
475. Physical security is concerned with protecting computer hardware from human tampering and
natural disasters and _______ security is concerned with protecting software from unauthorized
tampering or damage.
(1) Data
(2) Cyber3
(3) Internet
(4) Metaphysical (5) Publicity
476. Hackers
(1) All have the same motive
(2) Are people who maintain computers
(3) May legally break into computers as long as they do not do any damage
(4) Are people who are allergic to computers
(5) Break into other peoples computers3
477. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to
store data/ information?
(1) Floppy diskette
(2) Hard disk3
(3) Permanent disk
(4) Optical disk
(5) None of these
478. Microsoft Office is an example of a
(1) Closed-source software
(2) Open- source software
(3) Horizontal- market software3 (4) Vertical- market software
(5) compiler
483. From where, you can access the Recycle Bin icon?
(1) On the desktop3
(2) In the properties dialog box
(4) On the hard drive
(5) None of these
Ck/Page-38
(4) Output
(5) Input/output3
487. In travelling, which computers are portable and convenient for users?
(1) minicomputers
(2) laptops3
(4) supercomputers
(5) None of these
(4) Backbone
(5) Spam3
(4) utilities
(5) userware
(5) websites
Ck/Page-39
496. The _______ database is the most widely used database structure.
(1) hierarchical (2) general
(3) standard
(4) table
(5) relational3
(4) 10000003
(5) 5000000
499. For a browser to connect to other resources, the location or address of the resources must be
specified. These addresses are called ___________.
(1) MSN
(2) E-mail forms (3) packets
(4) Ids
(5) URLs3
500. The extensions .gov, .edu, .mil, and .net are called ________.
(1) Mail to addresses
(2) Add-ons
(4) DNSs3
(5) E-mail targets
501. Computers process data into information by working exclusively with _______
(1) multimedia (2) words
(3) characters
(4) numbers3
(5) None of these
502. Which of the following memory chip is programmed during the manufacturing process?
(1) RAM
(2) ROM3
(3) PROM
(4) EEPROM
(5) None of these
503. The output is _____
(1) What the processor takes from the user
(2) What the user gives to the processor
(3) What the processor gets from the user
(4) What the processor gives to the user3
(5) None of these
504. An error is also known as ________.
(1) bug3
(2) debug
(3) cursor
(4) icon
505. The simultaneous processing of two or more programs by multiple processors is called
_________.
(1) multiprogramming
(2) multitasking
(3) time-sharing
(4) multiprocessing3
(5) None of these
506. The device which helps you communicate with computer is called _______.
(1) Input device3
(2) Output device
(3) Software device
(4) Storage device
(5) None of these
507. ______ acts as temporary high speed holding area between the memory and the CPU thereby
improving processing capabilities.
(1) ROM
(2) RAM
(3) Temporary memory
(4) Cache memory3
(5) Flash memory
508. A document that explains how to use a software program is called ____ manual.
(1) user3
(2) system
(3) software
(4) program
(5) technical
509. Press the ____ key to move the insertion point to the first cell in a row in Excel.
(1) Page Up
(2) Page Down
(3) Home3
(4) Tab
(5) None of these
CSB, Ch-17, Ph: 044-24333346
Ck/Page-40
Ck/Page-41
Ck/Page-42
533. A Website address is a unique name that identifies a specific ________ on the Web.
(1) Web browser
(2) Web site
(3) PDA
(4) Link3
(5) None of these
534. ______ are specially designed computer chips that reside inside other devices, such as your car or
your electronic thermostat.
(1) Servers
(2) Embedded computers3
(3) Robotic computers
(4) Mainframes
(5) None of these
535. A USB communication device that supports data encryption for secure wireless communication
for notebook users is called a ______.
(1) USB wireless network adapter3 (2) Wireless switch
(3) Wireless hub
(4) Router
(5) None of these
536. A(n) _____ language reflects the way people think mathematically.
(1) Cross- platform programming (2) 3GL business programming
(3) Event-driven programming
(4) Functional3
537. What is the permanent memory built into your computer called?
(1) RAM
(2) Floppy
(3) CPU
(4) CD-ROM
(5) ROM3
(4) Roman
539. Which method is used most by the Indian banks to send amount from one city to the other?
(1) Internet
(2) EDI3
(3) TT
(4) Fax
(5) None of these
540. Following is not included in bio-metric identification:
(1) Finger print and palm print
(2 Geometry of hand and typing style3
(3 Height and weight
(4 Voice print and retina of the eye (5) All the above
541. Outlook Express is a (n) __________.
(1) E-Mail Client3
(2) Address Book
(4) All of these
(5) None of these
(3) Scheduler
543. The ability of an OS to run more than one application at a time is known as _______.
(1) multitasking3
(2) time-sharing
(3) multi-user computing
(4) object oriented programming (5) None of these
544. Permanent instructions that a computer uses when it is turned on and that cannot be changed by
other instructions are contained in _________.
(1) ROM3
(2) RAM
(3) ALU
(4) REM
(5) None of these
545. Device drivers are _________.
(1) Experts who know to maximize the performance of devices3
(2) The innermost part of the operating system
(3) Small, special-purpose programs
(4) Tiny power cords for external storage devices
(5) Substitutes for operating systems
CSB, Ch-17, Ph: 044-24333346
Ck/Page-43
546. A collection of programs that controls how your computer system runs and processes
information is called ________.
(1) Operating system3
(2) compiler
(3) computing
(4) office
(5) interpreter
547. A device operating at the physical layer is called a _________.
(1) Router
(2) Bridge
(3) Repeater3
(4) All of these
548. For separating channels in FDM, it is necessary to use _________.
(1) Differentiation
(2) Bandpass filters3
(4) All the above
(5) None of these
549. Which of the following elements in the word document can be displayed in colour?
(1) All elements, but only if you have a colour printer
(2) Only graphics
(3) All elements3
(4) Only text
(5) None of these
550. A complete electronic circuit with transistors and other electronic components on a small silicon
chip is called ________.
(1) CPU
(2) Magnetic disk (3) Workstation (4) Integrated circuit3
(5) None of these
551. Which hardware device acts as both a switching and connecting unit?
(1) RS-232 C Port
(2) Concentrator
(4) Communication processor
(5) None of these
(3) Multiplexer3
552. Which device is assembles groups of characters into complete messages prior to their entering the
CPU?
(1) An interpreter
(2) A complier
(3) A communications processor3 (4) An editor
(5) A translator
553. What is means by CD-ROM?
(1) Compactable Read Only Memory
(2) Compact Data Read Only Memory
(3) Compactable Disk Read Only Memory
(4) Compact Disk Read Only Memory3
(5) Connected Disk Read Only Memory
554. Which of the following terms refers to the ability of a computer to automatically configure a new
hardware component that is added to it?
(1) Formatting
(2) Multiprocessing
(3) Multiprogramming
(4) Multitasking
(5) Plug and play3
555. Which part of computer can touch and feel?
(1) Hardware3 (2) Software
(3) Programs
(4) Output
556. A series of instructions that tells a computer what to do and how to do it is called a
(1) Program3 (2) Command
(3) User response (4) Processor
(5) None of these
557. The portion of the CPU that coordinates the activities of all the other computer computer
components is the
(1) Motherboard
(2) Coordination board
(3) Control unit3
(4) Arithmetic logic unit
(5) None of these
558 To access a mainframe or supercomputer, user often use a
(1) Terminal3 (2) Node
(3) Desktop
(4) Handheld
CSB, Ch-17, Ph: 044-24333346
560. A flaw in a program that causes it to produce incorrect or in appropriate results is called a_____
(1) Bug3
(2) Byte
(3) Attribute
(4) Unit problem (5) None of these
561. Acronym- WWW stands for __________.
(1) World Web is Widening
(2) World Wide Web3
(3) Wonderful World Web
(4) World Word in Wonder
Ck/Page-45
(2) IP Address3
(5) None of these
(3) LAN3
574. The Storage that supplements that primary internal storage of a computer is known as _________.
(1) Secondary storage 3
(2) Primary storage
(3) Back-end storage
(4) Back ground storage
(5) None of these
575. A browser is a ________
(1) Line that delineates the edge of a program window
(2) Software program especially designed for viewing web pages on the internet3
(3) Tool for resizing the window
(4) Device used for modifying the window
(5) All of these
576. A folder _______
I. is an organizational tool used to store files
II. is synonymous with directory, but folder is the newer preferred term
III. Contains data
(1) I only
(2) II only
(3) III only
(4) I & III only
(5) None of these3
577. The part of a computer system containing the circuitry that does the adding, subtracting,
multiplying, dividing and comparing, is called as _______
(1) Arithmetic-logic unit3
(2) Control
(3) Memory
(4) CPU
(5) None of these
578. A browser is a ________
(1) Line that delineates the edge of a program window
(2) Software program especially designed for viewing web pages on the internet3
(3) Tool for resizing the window
(4) Device used for modifying the window
(5) All of these
CSB, Ch-17, Ph: 044-24333346
Ck/Page-46
579. The storage that supplements the primary internal storage of a computer is known as _______
(1) Secondary storage3
(2) Primary storage
(3) Back-end storage
(4) Background storage
(5) None of these
580. The storage device used to compensate for the difference in rates of flow of data from one device
to another is termed as ________
(1) Chip
(2) Channel
(3) Floppy
(4) Call
(5) Buffer3
581. ALU stands for ________
(1) Arithmetic Long Unit
(4) Around Logical Unit
(4) VDU3
583. A light-sensitive device that converts drawings, printed text or other images into digital from is__
(1) Keyboard
(2) Plotter
(3) Scanner3
(4) OMR
(5) None of these
584. What are the units used to count the speed of a printer?
(1) PPM
(2) CPM
(3) DPI
(4) BIT3
(2) Scheduler
(5) None of these
590. What will happen when a text was selected and copied?
(1) Text would copied from the documents and placed in the clipboard3
(2) Text would be removed from the document and placed in the clipboard
(3) Text from the clipboard would be placed in the documents at the place where the cursor is
blinking
(4) Only (2) and (3)
(5) None of these
CSB, Ch-17, Ph: 044-24333346
Ck/Page-47
591. Group of letters, numbers, and symbols with a common typeface is called as ________.
(1) File
(2) Font3
(3) Style
(4) GUI
(5) None of these
592. What is the name of the blinking point that shows your position in the text?
(1) Blinker
(2) Cursor3
(3) Causer
(4) Pointer
(5) Mouse
593. What is the common name for the physical components that make up your computer?
(1) Operating System
(2) Software
(3) Hardware3
(4) Web Browsers
(5) Mother Components
594. Which of the below key is used in combination with another key to perform a specific task?
(1) Function
(2) Space bar
(3) Arrow
(4) Control3
(5) Num Lock
595. Which type of memory holds the program to start up the computer?
(1) ROM3
(2) RAM
(3) Cache
(4) Static
596. What is the name of the program that used to view web pages?
(1) Word Processor
(2) Spreadsheet
(4) Browser3
(5) Database
(5) Dynamic
(3) Protocol
(5) Archived
(5) Output
599. Which of the following is an operation that cannot be carried out on objects in graphic program?
(1) Spell Check3
(2) Change Size
(3) Rotate
(4) Change Colour
(5) None of these
600. What is the name of the hardware device that converts data into useful information?
(1) Protector
(2) Output Device (3) Input Device (4) Programme
(5) Processor3
601. The SCANDISK program _______.
(1) is a disk analysis and repair tool3
(3) scans disk and eliminate .BAK files
Ck/Page-48
605. Which option in Power Point allows carrying slides from one computer to another?
(1) Save as
(2) Save and Go (3) Pack and Go3 (4) Web and Go (5) None of these
606. The ground station in VSAT communication is called ___________.
(1) HTTP
(2) Multiplexer3 (3) Hub
(4) Repeater
607. For a small website, one needs to buy space from the __________.
(1) Network administrator
(2) Telephone exchange
(4) Internet Society
(5) None of these
(3) ISP3
608. The Web server can be addressed by either its domain name or by the address in numerical _____.
(1) Network Host3
(2) IRC Network
(3) Archie
(4) Gopher
(5) None of these
609. Capability of computer to perform more than one tasks at the same time is ________.
(1) Real Time Processing
(2) Batch Processing
(3) Multitasking3
(4) Scheduled Processing
(5) None of these
610. ____________ computer applications are those which involve some other media, together with
ordinary text and images and computer capabilities. Common other media types are audio and
video.
(1) Visual
(2) Multimedia3 (3) MP3 Songs
(4) Computer Game
(5) None of these
611. Magnifier button is available on
(1) Print Preview toolbar3
(4) Both on a arid c
614. Name an advanced language with which you can create new report and screens
(1) VATL
(2) TDL
(3) DLR3
(4) Any of the above
(5) None of the above
615. Name the accounts related with intangible and invisible things which do not have a specified
shape
(1) Personal Accounts
(2) Nominal Accounts3
(3) Real Accounts
(4) Any of the above
(5) None of the above
616. We often use ____________ for World Wide Web.
(1) Network
(2) Server
(3) Web3
(4) E-Resources
(4) Bridge
619. The first page that you normally view at a Web site is its:
(1) Home page3(2) Master page (3) First page
(4) Banner page
CSB, Ch-17, Ph: 044-24333346
(3) Sealed
625. Which of the following companies is a leader in manufacturing of Hard Disk Drives?
(1) Samsung
(2) Seagate3
(3) Fujitsu
(4) IBM
(5) Panasonic
626. A Browser is a ________.
(1) Tool for creating a database
(2) Software program to view web pages on the internet3
(3) Printing device
(4) Software program to delete a folder
(5) None of the above
627. The first UNIX operating system was written in the _________.
(1) Assembly Language3
(2) C Language
(4) B Language
(5) None of these
(3) Java
(3) Social
(4) Edit
632. Programs or a set of electronic instructions that tell a computer what to do are called
(1) Menu
(2) Monitor
(3) Hardware
(4) Software3
(5) None of these
CSB, Ch-17, Ph: 044-24333346
Ck/Page-50
636. If a processer has a word size of 32 bits, compared to a processor with a word size of 16 bits, it can
process _______ at a time.
(1) Thrice as much
(2) Half as much
(3) A fourth as much
(4) The same amount
(5) Twice as much3
637. To access the properties of an object, the mouse technique used is called
(1) Dragging
(2) Dropping
(3) Right-clicking3
(4) Shift-clicking
(5) None of these
638. The ________ becomes of different shapes depending on the task you are performing.
(1) Active tab
(2) Insertion point
(3) Mouse pointer3
(4) Ribbon
(5) None of these
639. To print a document, press _______, then press ENTER.
(1) SHIFT+P
(2) CTRL+P3
(3) ALT+P
(4) ESC+P
642. __________ are distinct items that dont have much meaning to you in a given context.
(1) fields
(2) Data3
(3) Queries
(4) Properties
(5) None of these
643. A Website address is a unique name that identifies a specific_________ on the web.
(1) Web Browser
(2) PDA
(3) PDF
(4) Link3
(5) None of these
644. An Example of a telecommunications device is a _________.
(1) Keyboard
(2) mouse
(3) printer
(4) modern3
645. A ________ contains buttons and menus that provide quick access to commonly used commands.
(1) toolbar3
(2) menu bar
(3) window
(4) Find
(5) None of these
646. The particular field of a record that uniquely identifies each record is called the_____.
(1) Key field
(2) Primary field3 (3) Master field (4) Order field
(5) None of these
647. A ___________ is an example of an input device.
(1) Keyboard3
(2) Monitor
(4) Central Processing Unit
(5) None of these
CSB, Ch-17, Ph: 044-24333346
(3) plotter
Ck/Page-51
(4) 16
654. Which access method is used for obtaining a record from a cassette tape?
(1) Direct
(2) Sequential3 (3) Random
(4) All of the above
658. An optical input device that interprets pencil marks on paper media is
(1) OMR3
(2) Punch card reader
(3) Optical Scanner
(4) Magnetic tape
(5) None of these
659. Who is known as the father of supercomputing?
(1) Charles Babbage
(2) Bill Gates
(4) Ada Augusta
(5) None of these
------
Ck/Page-52