Bank Paper Computer Aptitude

Computer Aptitude

 

1. A …………. contains commands that can be selected.

(1)  pointer

(2)  menu

(3)  icon

(4)  button

(5)  None of these

Answer: (2)

2. F2 key use to change the ………. of file/folder.

(1)  colour

(2)  size

(3)  name

(4)  style

(5)  None of these

Answer: (3)

3. Arithmetic operations

(1)  involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item

(2)  sort data items according to standard, predefined criteria in ascending order or descending order

(3)  use conditions with operators such as AND, OR and NOT

(4)  include addition subtraction, multiplication and division

(5)  None of the above

Answer: (4)

4. Sending an e-mail is similar to a/an

(1)  picturing an event

(2)  narrating a story

(3)  writing a letter

(4)  creating a drawing

(5)  None of these

Answer: (3)

5. Microsoft Word is an example of a/an

(1)  operating system

(2)  processing device

(3)  application software

(4)  input device

(5)  None of these

Answer: (3)

6. In application software (MS Excel), there is ………. immediately below the title bar.

(1)  text area

(2)  menu bar

(3)  standards tool bar

(4)  scroll bar

(5)  None of these

Answer: (4)

7. Just below the formatting bar, there is

(1)  task bar

(2)  tool bar

(3)  formula bar

(4)  scroll bar

(5)  None of these

Answer: (2)

8. In HTML language, which tag is used to give background colour?

(1)  <Bg>

(2)  <Bg colour>

(3)  <Bg>

(4)  <Bgc>

(5)  <Background>

Answer: (2)

9. What is the full form of PPP?

(1)  Power to Process Point

(2)  Point to Point Protocol

(3)  Point to Power Protocol

(4)  Protocol for powerpoint

(5)  None of the above

Answer: (2)

10. By ………., text can be made more attractive in different colours, shapes and sizes.

(1)  word art

(2)  picture

(3)  word art text book

(4)  mail merge

(5)  None of these

Answer: (1)

11. ……… is a folder where the virus suspected files are kept.

(1)  Junk mail

(2)  Span mail

(3)  (1) and (2)

(4)  Delete

(5)  Virus affected folder

Answer: (3)

12. ………. is a type of input machine.

(1)  Monitor

(2)  Printer

(3)  Plotter

(4)  Keyboard

(5)  None of these

Answer: (4)

13. Wizard is an ………. programme.

(1)  active

(2)  inactive

(3)  interactive

(4)  unable

(5)  None of these

Answer: (3)

14. Drop cap option found in which menu?

(1)  Insert

(2)  Format

(3)  Edit

(4)  Tools

(5)  None of these

Answer: (2)

15. Which of the following has been made by research facility of digital electronic corporation of USA?

(1)  Yahoo

(2)  Web cranler

(3)  Altavista

(4)  Google

(5)  All of these

Answer: (3)

16. To hyperlink on the web page through HTML language, which tag is used?

(1)  <ahref>

(2)  <a>

(3)  <link>

(4)  <hlink>

(5)  <href>

Answer: (1)

17. Which of the following function is used to come out (quit) from e-mail account?

(1)  Sign in

(2)  Sign up

(3)  Sign out

(4)  Sign down

(5)  Sign X

Answer: (3)

18. What tag is given to invoke from HTML language?

(1)  < Form>

(2)  <From method post>

(3)  <Form invoke>

(4)  <Form><invoke>

(5)  None of these

Answer: (3)

19. Where is your files save by default when works with any computer programme?

(1)  My Computer

(2)  My Folder

(3)  My Shortcut

(4)  My Document

(5)  None of these

Answer: (4)

20. ………. does works related to exchange of data between the computers.

(1)  Sound card

(2)  Network card

(3)  Expansion slot

(4)  Modem

(5)  None of these

Answer: (2)

21. C++ is a/an ……… language.

(1)  unnecessary

(2)  object oriented

(3)  developed

(4)  machine

(5)  Assembly

Answer: (2)

22. Which of the following is not an input unit?

(1)  Touch pad

(2)  Mouse

(3)  Scanner

(4)  Monitor

(5)  Microphone

Answer: (4)

23. Apple microprocessor was developed in

(1)  1977

(2)  1978

(3)  1979

(4)  1980

(5)  1981

Answer: (1)

24. “Comic Sans Ms” is example of

(1)  font type

(2)  font face

(3)  font layout

(4)  font structure

(5)  font design

Answer: (2)

25. There are …….. type of system software.

(1)  1

(2)  2

(3)  3

(4)  4

(5)  5

Answer: (5)

26. In which grouping, the formatting of text is done in Word?

(1)  Tables, Paragraphs and Indexes

(2)  Paragraphs, Indexes and Sections

(3)  Characters, Sections and Paragraphs

(4)  Indexes, Characters and Tables

(5)  None of the above

Answer: (1)

27. Device drivers are that

(1)  tiny power card for external storage devices

(2)  specialists knowing how to maximize the performance of devices

(3)  short, special purpose programs

(4)  internal part of operating system

(5)  substitutes for operating system

Answer: (3)

28. The item but during cutting and pasting process is stored temporarily in

(1)  ROM

(2)  Hard drive

(3)  Diskette

(4)  Dashboard

(5)  Clipboard

Answer: (5)

29. All parts of computer are operated by CPU and the system through which it happens is known as

(1)  CU

(2)  Mouse

(3)  Operating system

(4)  Keyboard

(5)  None of these

Answer: (3)

30. When power is supplied to the system then to maintain data with the life of battery, computer BIOS contains the following.

(1)  CMOS

(2)  RAM

(3)  DRAM

(4)  CPU

(5)  None of these

Answer: (1)

31. Which of the following operating system is beyond the ownership of any company?

(1)  UNIX

(2)  LINEX

(3)  Windows 2000

(4)  Mac

(5)  Windows

Answer: (1)

32. Program or instructions are included in ………. of the system.

(1)  hardware

(2)  icon

(3)  information

(4)  software

(5)  None of these

Answer: (4)

33. It displays the result given by computer after processing data.

(1)  Input

(2)  Output

(3)  Input/Output

(4)  Program

(5)  None of these

Answer: (2)

34. Telephone number, date of birth, name of customer are the example of

(1)  record

(2)  data

(3)  file

(4)  database

(5)  None of these

Answer: (2)

35. In MICR, C stands for

(1)  code

(2)  colour

(3)  computer

(4)  character

(5)  None of these

Answer: (4)

36. During installation of which of the following, the program files should be copied into the hard disk from CD-ROM or other medium.

(1)  Programming software

(2)  System hardware

(3)  Application hardware

(4)  Application software

(5)  None of these

Answer: (4)

37. The capacity of memory of measured in terms of

(1)  bit

(2)  byte

(3)  megabyte

(4)  nibble

(5)  All of these

Answer: (3)

38. The place where data or program goes is known as

(1)  mouse

(2)  keyboard

(3)  CPU

(4)  CU

(5)  None of these

Answer: (3)

39. All of the following are examples of real security and privacy risks except

(1)  hackers

(2)  spam

(3)  viruses

(4)  identity theft

(5)  None of these

Answer: (2)

40. This process is used by large retailers to study trends

(1)  data mining

(2)  data selection

(3)  POS

(4)  data conversion

(5)  None of these

Answer: (1)

41. These terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

(1)  Data

(2)  Point-of-Sale (POS)

(3)  Sales

(4)  Query

(5)  None of these

Answer: (2)

42. This system is a small, wireless handheld computer that scans an items tag and pulls up the current price {and any special offers) as you shop.

(1)  PSS

(2)  POS

(3)  Inventory

(4)  Data mining

(5)  None of these

Answer: (1)

43. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called

(1)  Robotics

(2)  Simulation

(3)  Computer forensics

(4)  Animation

(5)  None of these

Answer: (3)

44. Which of the following is not one of the four major data processing functions of a computer?

(1)  Gathering data

(2)  Processing data into information

(3)  Analysing the data or information

(4)  Storing the data or information

(5)  None of the above

Answer: (3)

45. This tags, when placed on an animal, can be used to record and track in an a database all of the animals movements.

(1)  POS

(2)  RFID

(3)  PPS

(4)  GPS

(5)  None of these

Answer: (2)

46. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as

(1)  robotics

(2)  computer forensics

(3)  simulation

(4)  forecasting

(5)  None of these

Answer: (1)

47. Technology no longer protected by copyright, available to everyone, is considered to be

(1)  proprietary

(2)  open

(3)  experimental

(4)  in the public domain

(5)  None of these

Answer: (1)

48. It is the study of molecules and structures whose size ranges from 1 to 100 nanometres.

(1)  Nanoscience

(2)  Microelectrodes

(3)  Computer forensics

(4)  Artificial intelligence

(5)  None of these

Answer: (1)

49. It is the science that attempts to produce machines that display the same type of intelligence that humans do.

(1)  Nanoscience

(2)  Nanotechnology

(3)  Simulation

(4)  Artificial intelligence [AI]

(5)  None of the above

Answer: (4)

50. Which type of data has been organized or presented in a meaningful fashion?

(1)  A process

(2)  Software

(3)  Storage

(4)  Information

(5)  None of these

Answer: (4)

51. The name for the way that computers manipulate data into information is called

(1)  Programming

(2)  Processing

(3)  Storing

(4)  Organising

(5)  None of these

Answer: (2)

52. Computers gather data, which means that they allow users to

(1)  present data

(2)  input data

(3)  output data

(4)  store data

(5)  None of these

Answer: (2)

53. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered

(1)  data

(2)  output

(3)  input

(4)  the process

(5)  None of these

Answer: (2)

54. Computers use which language to process data?

(1)  Processing

(2)  Kilobyte

(3)  Binary

(4)  Representational

(5)  None of these

Answer: (3)

55. Computers process data into information by working exclusively with

(1)  multimedia

(2)  words

(3)  characters

(4)  numbers

(5)  None of these

Answer: (4)

56. In the binary language, each letter of the alphabets, each number and each special character is made up of a unique combination of

(1)  eight bytes

(2)  eight kilobytes

(3)  eight characters

(4)  eight bits

(5)  None of these

Answer: (4)

57. The term bit is short for

(1)  megabyte

(2)  binary language

(3)  binary digit

(4)  binary number

(5)  None of these

Answer: (3)

58. A string of eight 0s and 1s is called a

(1)  megabyte

(2)  byte

(3)  kilobyte

(4)  gigabyte

(5)  None of these

Answer: (2)

59. It is approximately one billion bytes.

(1)  Kilobyte

(2)  Bit

(3)  Gigabyte

(4)  Megabyte

(5)  None of these

Answer: (3)

60. It is approximately a million bytes.

(1)  Gigabyte

(2)  Tilobyte

(3)  Megabyte

(4)  Terabyte

(5)  None of these

Answer: (3)

61. It is any part of the computer that you can physically touch.

(1)  Hardware

(2)  A device

(3)  A peripheral

(4)  An application

(5)  None of these

Answer: (1)

62. The components that process data are located in the

(1)  input devices

(2)  output devices

(3)  system unit

(4)  storage component

(5)  None of these

Answer: (3)

63. The chip, used in computers, is made of

(1)  chromium

(2)  iron oxide

(3)  silica

(4)  silicon

(5)  None of these

Answer: (4)

64. Which of the following is an example of an input device?

(1)  Scanner

(2)  Speaker

(3)  CD

(4)  Printer

(5)  None of these

Answer: (1)

65. All of the following are examples of storage devices except

(1)  hard disk drives

(2)  printers

(3)  floppy disk drives

(4)  CD drives

(5)  None of these

Answer: (2)

66. It is also called the brain of the computer, is responsible for processing data.

(1)  Motherboard

(2)  Memory

(3)  RAM

(4)  Central Processing (CPU)

(5)  None of the above

Answer: (4)

67. The CPU and memory are located on the

(1)  expansion board

(2)  motherboard

(3)  storage device

(4)  output device

(5)  None of these

Answer: (2)

68. Word processing, spreadsheet and photo-editing are examples of

(1)  application software

(2)  system software

(3)  operating system software

(4)  platform software

(5)  None of the above

Answer: (1)

69. It is a set of computer programs used on a computer to help perform tasks

(1)  and instruction

(2)  software

(3)  memory

(4)  a processor

(5)  None of these

Answer: (2)

70. It is the set of programs that enables your computer hardware devices and application software to work together

(1)  management

(2)  processing

(3)  utility software

(4)  system software

(5)  None of these

Answer: (4)

71. The PC (Personal Computer) and the Apple Macintosh are examples of two different

(1)  platforms

(2)  applications

(3)  programs

(4)  storage device

(5)  None of these

Answer: (1)

72. Apple Macintoshes (Macs) and PCs use different CPU’s to process data and different

(1)  languages

(2)  methods

(3)  operating system

(4)  storage devices

(5)  None of these

Answer: (3)

73. Servers are computers that provide resources to other computers connected to a

(1)  network

(2)  mainframe

(3)  super computer

(4)  client

(5)  None of these

Answer: (1)

74. Smaller and less expensive PC based servers are replacing today in many business

(1)  super computers

(2)  clients

(3)  laptops

(4)  mainframes

(5)  None of the above

Answer: (4)

75. These are specially designed computers that perform complex calculations extremely rapidly

(1)  servers

(2)  super computers

(3)  laptops

(4)  mainframes

(5)  None of these

Answer: (2)

Latest Govt Job & Exam Updates:

View Full List ...

© Copyright Entrance India - Engineering and Medical Entrance Exams in India | Website Maintained by Firewall Firm - IT Monteur