Computer Awareness is an important section in bank recruitment’s Mains Examination. Practice with Computer questions for SBI PO and NIACL Assistant 2017 Examination.
Q1. What is ‘Trend Micro’?
(a) virus program
(b) anti-virus software
(c) just a program
(d) All of these
(e) None of the above
Q2. Storage of instructions in computer memory to enables it to perform a variety of tasks in sequence or intermittently. Who introduced the idea of stored program concepts?
(a) Charles Babbage
(b) Dennis Ritchie
(c) Howard Aiken
(d) John Neumann
(e) Anna Lovelace
Q3. DBMS ensures data integrity by managing transactions through ACID test. What does ACID stands for in computer science?
(a) Artistic, collaborative, inference, durability
(b) analytic, consistency, inference, duration
(c) Atomicity, consistency, isolation, durability
(d) Atomicity, collaborative, inference duration
(e) Adherence, consistency, isolation, durability
Q4. Table of contents can be prepared in Word2010 by using:
(a) macros
(b) by mailings
(c) by table of contents in references menu
(d) (b) and (c)
(e) By File menu
Q5. Who developed the basic architecture of Computers?
(a) Charles Babbage
(b) Blaise Pascal
(c) Steve Newton
(d) John Von Neumann
(e) Henery Johns
Q6. Which bar is usually located below the Title Bar in MS Word that provides categorized options?
(a) Menu Bar
(c) Toolbar
(b) Status bar
(d) Scroll Bar
(e) None of the above
Q7. Inheritance is the ability of an object to pass on its characteristics to its _______.
(a) subclasses
(b) off-spring
(c) super classes
(d) parents
(e) none of the above
Q8. What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
(a) CMOS
(b) RAM
(c) DRAM
(d) CPU
(e) None of these
Q9. Which type of system can learn and adjust to new circumstances by themselves?
(a) Database management system
(b) Expert systems
(c) Geographical systems
(d) Neural networks
(e) File based systems
Q10. The default and maximum size of text filed in Access is ______.
(a) 266 characters & 6400 characters
(b) 288 characters & 6880 characters
(c) 299 characters & 6499 characters
(d) 50 and 255 characters
(e) None of these
Q11. Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
(a) Program thievery
(b) Data snatching
(c) Software piracy
(d) Program looting
(e) Data looting
Q12. Type _______to start a numbered list, and then press SPACEBAR or the TAB key.
(a) 1#
(b) 1$
(c) 1.
(d) 1*
(e) None of these
Q13. Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
(a) hacker
(b) analyst
(c) instant messenger
(d) programmer
(e) spammer
Q14. To allow someone else schedule your meetings and appointments, ______ feature of Outlook is used.
(a) Monthly calendar
(b) Event manager
(c) Appointments
(d) Delegate Access
(e) None of these
Q15. Copying a process from memory to disk to allow space for other processes is called _______.
(a) Swapping
(b) Deadlock
(c) Demand Paging
(d) Page Fault
(e) Cloud Computing