Banking Pathway 2019 Exam Computer Quiz 2019

1.

What is the full form of SDRM?

   A.) Shift Dynamic random access memory
   B.) Synchronous Dynamic random access memory
   C.) System Dynamic random access memory
   D.) Serial Dynamic random access memory

Answer: Option 'B'

Synchronous Dynamic random access memory

2.

The errors that can be pointed out by the compiler are:

   A.) Syntax error
   B.) Symantic error
   C.) Logical error
   D.) Internal error

Answer: Option 'A'

Syntax error

3.

To access properties of an object, the mouse technique to use is

   A.) dragging
   B.) dropping
   C.) right-clicking
   D.) shift-clicking

Answer: Option 'C'

right-clicking

4.

A file which has not been alerted, compressed, or manipulated in any way by the computer is called?

   A.) temp file
   B.) raw file
   C.) permanent file
   D.) distort file

Answer: Option 'B'

raw file

5.

Why is it unethical to share copyrighted files with your friends?

   A.) It is not unethical, because it is legal.
   B.) It is unethical because the files are being given for free.
   C.) Sharing copyrighted files without permission breaks copyright laws.
   D.) It is not unethical because the files are being given for free.

Answer: Option 'C'

​Sharing copyrighted files without permission breaks copyright laws.

6.

What maintains the status of the last operation carried out by the ALU?

   A.) Instruction pointer .   
   B.) Status register
   C.) Accumulator
   D.) All of the above

Answer: Option 'C'

​Accumulator

7.

To change selected text to all capital letters, click the change case button, then click

   A.) Uppercase
   B.) Upper all
   C.) Capslock
   D.) Lock Upper

Answer: Option 'A'

Uppercase

8.

SMTP, FTP and DNS are applications of the ____ layer.

   A.) data link 
   B.) network 
   C.) transport 
   D.) application 

Answer: Option 'D'

application 

9.

A packet switching network that was sponsored by the Commission of the EEC and became operational in 1979 is

   A.) LAN
   B.) Broadband network
   C.) Star network
   D.) Euronet

Answer: Option 'D'

Euronet

10.

A device that connects to a network without the use of cables is said to be

   A.) distributed
   B.) free
   C.) centralized
   D.) None of these

Answer: Option 'D'

None of these

11.

Which computers are connected to many terminals and can multitask?

   A.) Minicomputers
   B.) LEO 1 computers
   C.) All of the above
   D.) None of these

Answer: Option 'D'

None of these

12.

The central processing unit contains which of the following as a component?

   A.) Memory Regulation Unit
   B.) Flow Control Unit
   C.) Arithmetic Logic Unit 
   D.) Instruction Manipulation Unit

Answer: Option 'C'

​Arithmetic Logic Unit 

13.

What does 'C' stand for in the abbreviation MICR?

   A.) Character
   B.) Common 
   C.) Casual
   D.) Cumulative

Answer: Option 'A'

Character

14.

What is used in most programs that is a part of a program and guides the user’s through certain steps?

   A.) Software
   B.) Wizard
   C.) Wiki
   D.) operating

Answer: Option 'B'

Wizard

15.

The performance of a hard drive or other storage device, meaning how long it takes to locate a file is called?

   A.) Response time
   B.) Access Time
   C.) Quick time
   D.) Processing time

Answer: Option 'B'

​Access Time

16.

The type of input includes

   A.) Programme 
   B.) Data 
   C.) Commands
   D.) All of the above 

Answer: Option 'D'

All of the above 

17.

Which among the following is correct about 4GL?

   A.) A computer brand
   B.) A software brand
   C.) A software program
   D.) A programming language

Answer: Option 'D'

A programming language

18.

Which of the following is not a factor affecting the processing capability or performance of a PC system?

   A.) The clock sped of the microprocessor
   B.) The revolutions per minute of the printer disk
   C.) The primary storage capacity of the processor
   D.) The built-in instruction set available to the microprocessor

Answer: Option 'B'

​The revolutions per minute of the printer disk

19.

Data that is copied from an application is stored in the _____ .

   A.) driver
   B.) clipboard
   C.) terminal
   D.) prompt

Answer: Option 'B'

​clipboard

20.

The first layer in OSI reference model is  

   A.) Network 
   B.) Physical
   C.) Application 
   D.) Data link 

Answer: Option 'B'

Physical

21.

_________ is a primary key of one file that also appears in another file.

   A.) Physical key 
   B.) Primary key 
   C.) Foreign key
   D.) Logical key 

Answer: Option 'C'

Foreign key

22.

Customers, facilities, knowledge workers, business information, communication infrastructure and computer equipment are all considerations in a good _______ plan.

   A.) Hacker 
   B.) Disaster recovery 
   C.) Security
   D.) Risk management 

Answer: Option 'D'

Risk management 

23.

_______ is an access method in which collisions are entirely avoided.

   A.) CSMA 
   B.) CSMA/CA
   C.) CSMA/CD
   D.) None of these

Answer: Option 'D'

None of these

24.

One kilobyte is equal to:

   A.) 1000 bytes
   B.) 100 bytes
   C.) 1024 bytes
   D.) 1023 bytes

Answer: Option 'C'

1024 bytes

25.

Which among the following is not a security/ private risk?

   A.) Spam
   B.) Hacking
   C.) Virus
   D.) Phishing

Answer: Option 'A'

Spam


Banking Pathway 2019 Exam Computer Quiz 2019 Download Pdf

Recent Posts