Saturday, October 11, 2014

COMPUTER QUIZ For SBI Exam 2014

1.    . …..aim at the boot sector of a hard drive by infecting a very crucial component of the boot process?
(1) File infection virus                   (2) Boot virus 
(3) Network virus                          (4) E-mail virus          
(5) None of these


2.    One of the more recent e-mail scams, which lures internet users into revealing personal information is referred to as :
(1) phishing                                   (2) flaming      
(3) blogging                                   (4) pop- ups    
(5) None of these  
3.    Malicious software is known as :
(1) Badware                                  (2) Malware    
(3) Malicious ware                        (4) Illigalware  
(5) None of these   

4.    Hardware or software designed to guard against authorized access to computer network is known as …
(1) Hacker proof program                          (2) Firewall
(3) Hacker resistant server                       (4) Encryption safe wall
(5) None of these   
        
5.    The fastest and quietest type of printer is a(n):
(1)  dot-matrix printer.                   (2)  inkjet printer.        
(3)  laser printer.                            (4)  plotter.
(5) None of these                            

6.    The type of large printer that can most accurately produce images requiring precise, continuous lines is a(n):
(1)  plotter.                                     (2)  inkjet printer.        
(3)  laser printer.                            (4)  dot-matrix printer.
(5) none of these

7.    MICR stands for?
(1)  Magnetic Ink Character Recognition
(2)  Magnetic Ink Code Reader
(3)  Magnetic Ink Cases Reader             
(4)  None of the above
(5) All of the above

8.    The main difference between application and system software is that:
(1)  Application software is composed of program instructions but system software is not.
(2) Application software is stored in memory whereas system software is only in the CPU.
(3) System software is unnecessary whereas application software must be present on the computer.
(4) System software manages hardware whereas application software performs user tasks.
(5) None of these

9.    ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(1) Trojan horse                            (2) Boot sector
(3) Script                                       (4) Logic bomb
(5) None of these             

10.  Servers are computers that provide resources to other computers connected to a ___________
(1) mainframe                                (2) network
(3) supercomputer                        (4) client
(5) None of these
         
11.  A goal of data mining includes which of the following?
(1) To explain some observed event or condition
(2) To confirm that data exists
(3) To analyze data for expected relationships
(4) To create a new data warehouse
(5) None of these 
    

12.  A Proxy server is used for which of the following?
(1) To provide security against unauthorized users
(2) To process client requests for web pages
(3) To process client requests for database access
(4) To provide TCP/IP
(5) None of these

13.  When data changes in multiple lists and all lists are not updated, this causes:
(1) data redundancy                     (2) information overload
(3) duplicate data                          (4) data inconsistency
(5) None of these    
        
14.  _____________ are words that a programming language has set aside for its own use.
(1) Control worlds                         (2) Reserved words
(3) Control structures                    (4) Reserved keys
(5) None of these 

15.  You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
(1) router                                       (2) modem     
(3) node                                         (4) cable         
(5) None of these 

16.  Which term identifies a specific computer on the web and the main page of the entire site
(1) URL                                         (2) Web site address  
(3) Hyperlink                                 (4) Domain name       
(5) None of these

17.  The code that relational database management systems use to perform their database task is referred to as …..
(1) QBE                             (2) SQL                      
(3) OLAP                           (4) Sequel Server      
(5) None of these      

18.  The purpose of the primary key in a database is to:
(1) unlock the database     
(2) provide a map of the data
(3) uniquely identify a record
(4) establish constraints on database operations.
(5) None of these             

19.  A _________ contains specific rules and words that express the logical steps of an algorithm.
(1) programming language                       (2) syntax
(3) programming structure                        (4) logic chart
(5) None of these             

20.  The most frequently used instructions of a computer program are likely to be fetched from:
(1) the hard disk                (2) cache memory
(3) RAM                            (4) registers
(5) None of these             


Answers

1
2
11
3
2
1
12
2
3
2
13
4
4
2
14
2
5
3
15
1
6
1
16
1
7
1
17
2
8
4
18
3
9
2
19
2
10
2
20
2


No comments: