COMPUTER APPTITUDE

1. A keyboard is this kind of device² (A) black (B) input (C) output (D) word Processing (E) None of these Ans : (B) 2. IT stands for² (A) information Technology (B) integrated Technology (C) intelligent Technology (D) interesting Technology (E) None of these Ans : (A) 3. Which of the following refers to the fastest, biggest and most expensive computers ? (A) Personal Computers (B) Supercomputers (C) Laptops (D) Notebooks (E) None of these Ans : (B) 4. A collection of related information sorted and dealt with as a unit is a² (A) disk (B) data (C) file (D) floppy (E) None of these Ans : (C) 5. The process of a computer receiving information from a server on the Internet is known as² (A) pulling (B) pushing (C) downloading (D) transferring (E) None of these Ans : (C) 6. Which part of the computer helps to store information ? (A) Disk drive (B) Keyboard (C) Monitor (D) Printer (E) None of these Ans : (A)

Which of the following groups consist of only output devices ? (A) Scanner.7. Monitor (B) Keyboard. (A) pointer (B) menu (C) icon (D) button (E) None of these Ans : (B) 12. ««««««is the process of carrying out commands. Monitor (C) Mouse. The rectangular area of the screen that displays a program. (A) computer Scientist (B) computer sales representative (C) computer consultant (D) corporate trainer (E) None of these Ans : (B) 9. (A) Fetching (B) Storing (C) Executing (D) Decoding (E) None of these Ans : (C) 8. An error is also known as² (A) bug (B) debug (C) cursor (D) icon (E) None of these Ans : (A) . Printer. Monitor (E) None of these Ans : (D) 10. data. and/or information is a² (A) title bar (B) button (C) dialog box (D) window (E) None of these Ans : (D) 11. Printer. A(n)«««contains commands that can be selected. The role of a«««generally is to determine a buyer¶s needs and match it to the correct hardware and software. Printer. Printer. Monitor (D) Plotter.

equal to. OR and NOT (D) include addition. or less than the other item (B) sort data items according to standard. Arithmetic Operations² (A) involve matching one data item to another to determine if the first item is greater than. predefined criteria in ascending order or descending order (C) use conditions with operators such as AND. Any data or instruction entered into the memory of a computer is considered as² (A) storage (B) output (C) input (D) information (E) None of these Ans : (A) . Promotion in Marketing means² (A) passing an examination (B) elevation from one grade to another (C) selling the products through various means (D) selling the product in specific areas (E) None of these Ans : (C) 16.13. Microsoft Word is an example of² (A) an operating system (B) a processing device (C) application software (D) an input device (E) None of these Ans : (B) 17. Sending an e-mail is similar to² (A) picturing an event (B) narrating a story (C) writing a letter (D) creating a drawing (E) None of these Ans : (C) 15. Sources of Sales Leads are² (A) Data Mining (B) Market Research (C) Media Outlets (D) Promotional Programs (E) All of these Ans : (E) 18. subtraction. multiplication and division (E) None of these Ans : (D) 14.

Effective marketing helps in² (A) developing new products (B) creating a competitive environment (C) building demand for products (D) All of these (E) None of these Ans : (D) 24. One of the methods for Market Monitoring is² (A) to watch TV serials (B) to discuss with other sales persons (C) to monitor media outlets (D) All of these (E) None of these Ans : (C) 21. A series of instructions that tells a computer what to do and how to do it is called a² (A) program (B) command (C) user response (D) processor (E) None of these Ans : (A) 23. A Call in Marketing means² (A) to phone the customers . Which is the part of a computer that one can touch and feel ? (A) Hardware (B) Software (C) Programs (D) Output (E) None of these Ans : (A) 25.19. Market Expansion means² (A) hiring more staff (B) firing more staff (C) buying more products (D) buying more companies (E) None of these Ans : (E) 22. Which part of the computer displays the work done ? (A) RAM (B) printer (C) monitor (D) ROM (E) None of these Ans : (C) 20.

Processing involves² (A) inputting data into a computer system (B) transforming input into output (C) displaying output in a useful manner (D) providing relevant answers (E) None of these Ans : (B) 28.(B) to visit the customers (C) to visit the marketing site (D) to call on prospective customers (E) None of these Ans : (D) 26. One of the following is a target group for the marketing of Internet Banking. Innovation mean² (A) Product Designing (B) New ideas (C) Impulse (D) Both (A) and (B) (E) None of these Ans : (D) 30. (A) All the customers (B) All the educated customers (C) All the computer educated customers (D) Only creditors (E) All of these Ans : (C) 29. Delivery Channel means² (A) maternity wards (B) handing over the products to the buyers (C) places where products are made available to the buyers (D) All of these (E) None of these Ans : (C) 27. One of the following is a target group for the marketing of educational loan. (A) All the customers (B) Students (C) Only poor students (D) Students having promising educational track record (E) All of these Ans : (B) 31. Service after sale is not the function of² (A) Marketing staff (B) Seller (C) Director of the company .

If done through«««the rural marketing would be more effective. «««can be done through digital Banking ? (A) Mobile phone (B) Internet (C) Telephone (D) All of these (E) None of these Ans : (A) 35. A good seller should have the following quality/qualities ? (A) Devotion to the work (B) Submissive (C) Sympathy (D) All of these (E) None of these Ans : (D) 36. (A) fairs (B) village fairs (C) door to door campaign (D) All of these (E) None of these Ans : (B) 33. Planned-cost service means² (A) Costly products (B) Extra profit on the same cost (C) Extra work by seller (D) All of these (E) None of these .(D) Employees of the company (E) All of the above are wrong Ans : (A) 32. The rural marketing is not required because² (A) rural people do not understand marketing (B) its not practical from the cost point of view (C) it is sheer wastage of time (D) All are wrong (E) All are correct Ans : (D) 37. Market Survey means² (A) Market Research (B) Market Planning (C) Marketing Strategies (D) Market Monitering (E) All of these Ans : (A) 34.

B. The majority of computer crimes are committed by: A. . hackers. five employees each D. In a survey of more than 500 companies and government agencies. The aim of successful marketing is² (A) to increase the sale (B) to increase the profit (C) to increase the output of sellers (D) All of these (E) None of these Ans : (D) 40. Answer: B 4. 85 D. $1 million Answer: B 3. The survey showed that these businesses lost more than ____________ due to security breaches. $100. 99 Answer: C 2. A. trusted employee with a long. Internet marketing means² (A) Self-marketing (B) Core Groups monitering (C) Employees marketing (D) All of these (E) None of these Ans : (E) 39. young hacker. but unknown criminal record. The typical computer criminal is a(n): A.Ans : (B) 38. 20 B. trusted employee with no criminal record. 75 C. (A) very difficult (B) dull (C) easy (D) has no role in marketing (E) None of these Ans : (C) Computer General Awareness For Bank PO 2010 1. overseas young cracker. ____________ percent detected computer security breaches. The networking becomes««through networking.000 each B. C. $377 million C. D. A.

What type of virus uses computer hosts to reproduce itself? A. Answer: C Reference: Theft by Computer 6. e-mail virus. D. A program that performs a useful task while simultaneously allowing destructive acts is a: A. virus. malware. B. D. illegalware. Trojan horse. D. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a: A. overseas criminals. worm. Answer: B 10. D. macro virus. C. Melissa virus D. B. C.B. C. B. B. In 1999. C. Time bomb. B. Answer: A 11. D. Trojan horse. B. young teenage computer geniuses. D. The common name for the crime of stealing passwords is: A. Time bomb B. Collecting personal information and effectively posing as another individual is known as the crime of: A. maliciousware. hacking. Malicious software is known as: A. time bomb. D. Answer: B 7. C. spooling. identity theft. spoofing. the Melissa virus was a widely publicized: A. spooling. C. Macro virus Answer: B . Answer: B 5. C. badware. Trojan horse. identity theft. Answer: B 8. virus. macro virus. insiders. hacking. spoofing. Worm C. time-related bomb sequence. Answer: B Moderate 9.

Spybot C. B. more difficult. C. Logic bomb D. B. D. Answer: A 13. C. it is known as a: A. B. security repairs. C. it is known as: A. The thing that eventually terminates a worm virus is a lack of: A. D. easier. C. HTML viruses infect: A. virus. Answer: C 15. virus. C. Software programs that close potential security breaches in an operating system are known as: A. a Web page in the HTML code. D. CD-RW. time bomb. D. No 18. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses: A. C. both a Web page and the computer that is viewing it. your computer. Security patch Answer: B 16. security breach fixes. C. more complicated. Trojan horse. time-related bomb sequence. refresh patches. What is the name of an application program that gathers user information and sends it to someone through the Internet? A. A virus B. memory or disk space. cracking. A logic bomb that was created to erupt on Michelangelo¶s birthday is an example of a: A. a virus. Answer: D 19. slower. time. When customers of a Web site are unable to access it due to a bombardment of fake traffic. time bomb. time-related bomb sequence. CD drive space.12. B. . Answer: C 17. a Trojan horse. B. B. D. Trojan horse. D. B. security patches. When a logic bomb is activated by a time-related event. Answer: C 14.

D.2 Cryptography 26. surge protector. Biometrics B. B. B. God. hacker-resistant server. If you want to secure a message. a denial of service attack. Access-control software Answer: B 22. ___________ is the measurement of things such as fingerprints and retinal scans used for security access. Answer: D 23. Answer: D 27. encryption program. password-proofing. Fred. C. surge protector C. A. or Britain include all EXCEPT: A. Biomeasurement C. hacker-proof program. UPS. B. User logins B. Computer keys D. cryptosystem. Answer: D Reference: How It Works: 10. firewall . encryption. The scrambling of code is known as: A. use a(n): A. A. cryptology source. What is the most common tool used to restrict access to a computer system? A. Smart weapon machinery Answer: A 21. a firewall. The most common passwords in the U. encryption program B. D. Answer: D 20. firewall. use a(n): A. C. Answer: A 25. Passwords C. love. encryption safe wall. Answer: B 24. scrambling. D. A(n) ____________ can shield electronic equipment from power spikes. Computer security D. To prevent the loss of data during power failures. C. B. 123. firewall. D. D.D. encryption key.S. encryption software package. C. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n): A. B. C.

Computer crime C. open all e-mail messages but open them slowly. verification. lock and key Answer: B 32. firewall software C.D. 100 billion dollars Answer: D 34. 20 million dollars B. Smart weapon D. C. encryption B. Computer forensics B. disinfect your system. or decision making? A. . Missile defense auto-system C. Autonomous system B. logins B. C. privacy rights. download shareware and freeware with caution. Over ___________ was spent by businesses and government to repair problems in regard to Y2K. 1 billion dollars D. personal ethics. D. A. 100 million dollars C. Cracking Answer: B 31. Independent system Answer: D 35. Answer: B 29. Answer: A 33. B. don¶t borrow disks from other people. the number of cookies downloaded to your personal computer. ____________ is defined as any crime completed through the use of computer technology. Security procedures can: A. A. Creating strong computer security to prevent computer crime usually simultaneously helps protect : A. What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people. D. Hacking D. will eliminate all computer security risk. personal space. encryption D. Freeware ___________ encrypts data. private and public keys Answer: C 30. A. B. Most computer systems rely solely on ___________ for authentication. All of these are suggestions for safe computing EXCEPT: A. A. PGP D. UPS Answer: B 28. passwords C.

Answer: B Fill in the Blank: 36. ____________ hijack Web pages and redirect users to other sites. Answer: Webjackers 52. A(n) ____________ attaches itself to documents that contain embedded programs that automate tasks. Answer: Internet 39. DoS stands for ___________. ___________ software monitors and records computer transactions. D. Answer: nothing or free 47. Answer: crime 38. Answer: worms 45. Computer ____________ often goes unreported because businesses fear negative publicity. Answer: Antivirus 46. Theft of computers is most common for PDAs and ____________ computers. The cost to the consumer is ____________. When you use a disk in several different computers within the same day. Answer: Theft 40. PGP stands for ___________. Answer: notebook 42. Answer: Audit-control 53. Answer: denial of service 50. Answer: Hackers or hacking 48. ____________ was once the wor d used for malicious computer wizardry. Answer: online auctions Reference: Identity Theft 41. Answer: Cracking 49. C.com found that ____________ are the most often cited online fraud cases. ____________ connections are the most frequent point of attack for I nternet commerce. ____________ refers to electronic trespassing or criminal hacking. Answer: two Reference: How It Works: 10. Answer: virus Reference: Viruses Difficulty: Easy 43. A security patch is a software program that closes possible security breaches in the operating system. A survey by eMarketer. The field of computer ____________ uses special software to scan hard drives of potential criminal suspects. reduce but not eliminate risks. DDoS stands for ___________. ____________ is the most common form of computer crime. ____________ programs search for and eliminate viruses. Answer: macro virus 44. Answer: Pretty Good Privacy .B.2 Cryptography 54. Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging 37. Each individual who uses a public key cryptosystem has ___________ keys. Answer: distributed denial of service 51. you are taking the chance of contracting a(n) ____________. are inaccessible for the average home user. Both viruses and ____________ use computer hosts to replicate. are prohibitively expensive.

F. A. copy. declared unconstitutional by the Supreme Court VI. handle e-mail carefully B. created as a result of the first headlinemaking worm VII. copy. Match the acts and centers with their purposes: I. B. share with care A. C. Most operating systems. National Crime Information Center G. encrypt VI. created in 2001 as a response to the terrorist attacks of September 11. Communications Decency Act E. B. assign each user a unique ___________. disinfect regularly C. be aware of e-mail from what appear to be legitimate companies II. created by Attorney General Janet Reno in 1998 II. Match the following rules of thumb about safe computing with the proper descriptions: I. Answer: attachments Matching: 57. Computer Fraud and Abuse Act A.55. don¶t choose a dictionary word III. Answer: user identifier or user ID 56. E . use antivirus software Answers: C. keep your disks in your own computer IV. including Windows XP. 2001 IV. Telecommunications Act of 1996 D. if it¶s important. used to arrest a student for writing to crack an Adobe product Answers: F. take your password seriously D. back it up E. National Infrastructure Protection Center F. defines what kinds of communications are legal online III. It should now be common knowledge that users should not open ___________ from e mail recipients that the user does not know. G. provides instant information on crimes and criminals V. D 58. copy V. A. Digital Millennium Copyright Act C. D. USA Patriot Act B. E. sensitive info over the Internet? F.

Sign up to vote on this title
UsefulNot useful