Banking Pathway 2019 Exam Computer Quiz 2019

  • 1. Which of the following controls the way in which the computer system functions and provides a means by which users can interact with the computer?
   A.) O/S
   B.) Motherboard
   C.) Platform
   D.) I/O gateway

Answer: Option 'A'

O/S

  • 2. To change selected text to all capital letters, click the change case button, then click
   A.) Uppercase
   B.) Upper all
   C.) Capslock
   D.) Lock Upper

Answer: Option 'A'

Uppercase

  • 3. Which of the following is the process of transferring software programme from a secondary storage media into the hard disc? 
   A.) Storage 
   B.) Updating 
   C.) Upload 
   D.) installation

Answer: Option 'D'

installation

  • 4. For large network which topology is used?
   A.) Star
   B.) Ring 
   C.) Bus 
   D.) Mesh 

Answer: Option 'D'

Mesh 

  • 5. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a
   A.) hacker
   B.) analyst
   C.) instant messenger
   D.) programmer

Answer: Option 'A'

hacker

  • 6. The time consumed by a piece of equipment’s operation is called   
   A.) Access time
   B.) Real time
   C.) Live time
   D.) Effective tim

Answer: Option 'D'

Effective tim

  • 7. A device that connects to a network without the use of cables is said to be
   A.) distributed
   B.) free
   C.) centralized
   D.) None of these

Answer: Option 'D'

None of these

  • 8. The operating system is the most common type of ____________ software. 
   A.) Communication 
   B.) System software
   C.) Word-processing software
   D.) Spreadsheet software 

Answer: Option 'B'

System software

  • 9. Reusable optical storage will typically have the acronym
   A.) CD
   B.) DVD
   C.) ROM
   D.) RW

Answer: Option 'D'

RW

  • 10. A VDU is used as 
   A.) Input device only
   B.) Output device only
   C.) Both (a) & (b)
   D.) Neither (a) nor (b)

Answer: Option 'B'

Output device only

  • 11. The most common type of storage devices are
   A.) persistent
   B.) optical
   C.) magnetic
   D.) flash

Answer: Option 'C'

magnetic

  • 12. Codes consisting of lines of varying widths or lengths that are computer readable are known as
   A.) an ASCII code
   B.) a magnetic tape
   C.) a bar code
   D.) an OCR scanner

Answer: Option 'C'

a bar code

  • 13. Which of the following is specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat etc.?  
   A.) Robotic computers
   B.) Mainframe computers
   C.) Embedded computers
   D.) Peripheral computers

Answer: Option 'C'

Embedded computers

  • 14. A Web site’s main page is called its
   A.) Homepage
   B.) Browser page
   C.) Search Page
   D.) Bookmark

Answer: Option 'A'

Homepage

  • 15. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called __________.  
   A.) The O/S 
   B.) Instructions 
   C.) Data flow 
   D.) Application software 

Answer: Option 'B'

Instructions 

  • 16. Part number, part description, and number of parts ordered are examples of
   A.) control
   B.) output
   C.) input
   D.) processing

Answer: Option 'C'

input

  • 17. Which of the following storage medium stores instructions or data temporarily during processing?
   A.) Cache 
   B.) EPROM 
   C.) ROM 
   D.) RAM 

Answer: Option 'A'

Cache 

  • 18. To access properties of an object, the mouse technique to use is
   A.) dragging
   B.) dropping
   C.) right-clicking
   D.) shift-clicking

Answer: Option 'C'

right-clicking

  • 19. Which of the following is not a database object?
   A.) Table
   B.) Queries 
   C.) Reports 
   D.) Relationship 

Answer: Option 'D'

Relationship 

  • 20. Computers use the ________ number system to store data and perform calculations.
   A.) binary
   B.) octal
   C.) decimal
   D.) hexadecimal

Answer: Option 'A'

binary

  • 21. ________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
   A.) Computer viruses
   B.) Phishing trips
   C.) Spyware scams
   D.) Viruses

Answer: Option 'B'

​Phishing trips

  • 22. The type of input includes
   A.) Programme 
   B.) Data 
   C.) Commands
   D.) All of the above 

Answer: Option 'D'

All of the above 

  • 23. Why is it unethical to share copyrighted files with your friends?
   A.) It is not unethical, because it is legal.
   B.) It is unethical because the files are being given for free.
   C.) Sharing copyrighted files without permission breaks copyright laws.
   D.) It is not unethical because the files are being given for free.

Answer: Option 'C'

​Sharing copyrighted files without permission breaks copyright laws.

  • 24. The first layer in OSI reference model is  
   A.) Network 
   B.) Physical
   C.) Application 
   D.) Data link 

Answer: Option 'B'

Physical

  • 25. Which of the following can be used to select the entire document?
   A.) CTRL + A
   B.) ALT + F5
   C.) SHIFT + A
   D.) CTRL + H

Answer: Option 'A'

CTRL + A

Banking Pathway 2019 Exam Computer Quiz 2019 Download Pdf