You are on page 1of 63

Computer General Knowledge for Bank P.O.

& Clerk Exams

1. All of the following are examples of real security and privacy risks EXCEPT: A. hackers.
C. PPS D. GPS Ans : B 8. Surgeons can perform delicate operations by manipulating devices t
C. output D. store Ans : B 15. After a picture has been taken with a digital camera and pro
C. gigabyte D. megabyte Ans : C 22. A ____________ is approximately a million bytes. A. gig
Ans : D 29. The CPU and memory are located on the: A. expansion board. B. motherboard. C. s
Ans : A 36. Smaller and less expensive PC-based servers are replacing ____________ in many
Ans : A 43. The binary language consists of ____________ digit(s). A. 8 B. 2 C. 1,000 D. 1
50. The metal or plastic case that holds all the physical parts of the computer is the: A.
A going or being beyond what is needed, desired, or appropriate. overmuch, overmuchness, su
Allahabad Bank Probationary Officers Exam, 2008 Computer General Awareness : Solved (Held o
1. Programs from the same developer , sold bundled together , that provide better integrati
2. A data warehouse is which of the following ? (A) Can be updated by the end users (B) Con
(B) six (C) seven (D) eight (E) None of these Ans : (C) 7. System software is the set of pr
(C) Script (D) Logic bomb (E) None of these Ans : (B) 13. ________ controls the way in whic
Ans : () 19. A Proxy server is used for which of the following? (A) To provide security aga
25. A goal of normalization is to __________ (A) minimize the number of relationships (B) m
(B) syntax (C) programming structure (D) logic chart (E) None of these Ans : () 32. The des
(D) user (E) None of these Ans : () 38. Which of the following is NOT a type of broadband I
44. What is a backup? (A) Restoring the information backup (B) An exact copy of a system's
(C) The Web browser opens to an unusual home page. (D) Odd messages or images are displayed
Indian Bank Computer Officers' Exam, 2008 General Awareness : Solved Paper
1. A passive threat to computer security is— (1) Malicious Intent (2) Sabotage (3) Accident
(3) end-user presentation tool (4) data store (5) None of these 8. A(n)…………….allows network
(2) permits users to converse in real time with each other via the computer while connected
(1) (2) (3) (4) (5)
Through a power cable From an external power supply Directly from the computer's power supp
22. All of the following are basic principles of net works, except— (1) each computer must
(3) 4. (4) 5. (1) (2) 9. (1) 10. (4) 13. (1) 14. (3) 15. (2) 18. (4) 19. (3) 20. (3) 23. (3
1. All of the following are examples of real security and privacy risks EXCEPT: A. hackers.
8. Surgeons can perform delicate operations by manipulating devices through computers inste
D. the process. Answer: B 16. Computers use the ____________ language to process data. A. p
D. An application Answer: A 24. The components that process data are located in the: A. inp
Answer: B 32. System software is the set of programs that enables your computer’s hardware
D. broadband divide. Answer: A 40. ____________ is the science revolving around the use of
C. Robotic computers D. Mainframes Answer: B 48. The steps and tasks needed to process data
Answer: input 62. The devices on a computer system that let you see the processed informati
80. One of the benefits of becoming computer fluent is being a savvy computer user and cons
Answer: B, C, D, E, A 95. Match the following terms with their meanings: I. mainframe A. th
II. business B. data mining III. law enforcement C. robotics and simulation IV. education D
1. Register is a (a) Set of capacitors used to register input instructions in a digital com
8. The memory of a computer is commonly expressed in terms of Kilobytes or Megabytes. A byt
19. Who wrote the book ‘Computer Liberation and Dream Machine’, the first book on personal
Ans (a) 33. A characteristic of card system is (a) slowness in processing data (b) using ca
(b) Micro-computer are not programmed like conventional computers (c) Mini-computers are ta
1. Compiler is the (a) name given to the computer operator (b) part of the digital machine
(a) Chromium (b) Iron oxide (c) Silica (d) Silicon Ans (d) 15. Name the first general purpo
Ans (D) 28. A monitor’s …… is the distance between the holes in the mask behind the screen.
Ans (c) 42. Viruses, Trojan horses and Worms are (a) able to harm computer system (b) unabl
1. What is the name of the series of Laptop computers manufactured by IBM called? 1.LapPad
2.W3C 3.IEEE 4.IETE Ans : 2 10. What is the other name for a LAN Card? 1.NIC 2.Network Conn
4.Services Ans : 2 18. What is the address given to a computer connected to a network calle
SBI clerk Computer knowledge solved Paper 1. A Compiler is ____ (A) A combination of comput
(C) 16 (D) 32 Ans : A 6. Which of the following is not an output device? (A)Scanner (B) Pri
(D) All of these Ans : C 14. Primary memory stores (A) Data alone (B) Programs alone (C) Re
(E) It depends on the speed of the computer’s processor 182. Data going into the computer i
(A) Vertical-market applications (B) Utilities (C) Algorithms (D) Integrated software (E) C
(E) An expensive storage medium 199. The blinking symbol on the computer screen is called t
35. The————shows all the websites and pages that you have visited over a period of time. (A
(A) lable (B) table of information (C) group of related records (D) category of information
(A) The platform (B) The operating system (C) Application software (D) The motherboard (E)