Computer Questions for Indian Bank Probationary Officers 2018

  • 1. What type of computers are client computers (most of the time) in a client-server system? 
   A.) Mainframe
   B.) Supercomputer
   C.) Microcomputer
   D.) PDA

Answer: Option 'C'

In the client-server system, microcomputers are commonly treated as client computers due to their limited hardware configuration to handle and process multiple tasks. 

  • 2. Digital computers use a ________ system to encode data and programs.  
   A.) Semiconductor 
   B.) Decimal 
   C.) Binary 
   D.) RAM

Answer: Option 'C'

Digital Computers use Binary System.

  • 3. Which of the following is the foray introduced by Microsoft into the gaming console market? 
   A.) X-box
   B.) Set-up
   C.) Multi play
   D.) I-phone

Answer: Option 'A'

In the gaming console market, Microsoft launched its first foray named X-box that is actually a video game console. 

  • 4. Which of the following characteristic attributes to the fact that computers can perform different types of tasks at the same time? 
   A.) Diligence 
   B.) Versatility 
   C.) Accuracy 
   D.) Speed 

Answer: Option 'B'

Versatility is the characteristic of a computer that attributes to its multitasking and multiprogramming capabilities.

  • 5. Which of the following statements is correct about EPROM? 
   A.) It is a type of ROM from which the stored data cannot be erased
   B.) In this memory, data can be erased by electronic emission
   C.) It is a type of RAM
   D.) Ultraviolet rays are used to erase the data stored in the memory

Answer: Option 'D'

Erasable Programmable Read-Only Memory (EPROM) is a type of ROM from which the stored data can be erased using ultraviolet rays. 

  • 6. Something which has easily-understood instructions is said to be: 
   A.) Information 
   B.) Word processing 
   C.) Icon
   D.) User friendly 

Answer: Option 'D'

User friendly instructions are easy to understand by the user.

  • 7. Computers were based on transistors in the _______ generation. 
   A.) First
   B.) Second
   C.) Third
   D.) Fourth

Answer: Option 'B'

Second generation computers designed in 1960s were based on transistors. These computers were more reliable and faster than first generation computers that were based on vacuum tubes.

  • 8. Information that comes from external source and fed into computer software is called _______.
   A.) Output 
   B.) Input 
   C.) Throughout 
   D.) Reports  

Answer: Option 'B'

Input is fed into computers.

  • 9. Which of the following statements is true for Solid State Drives (SSDs)? 
   A.) They do not contain spinning platters
   B.) They use vacuum tubes for storing data
   C.) They require latency time at the time of transferring data
   D.) All of the above

Answer: Option 'A'

SSD is a storage device that does not contain any moving parts, such as spinning platters and heads; therefore, it is faster than hard disk drive. An SSD uses transistors to store data. In SSD, the information can be accessed immediately, because there is no latency time when data is transferred.

  • 10. The control unit initiates a series of sequential steps of :
   A.) Macro instruction 
   B.) Minicode 
   C.) micro operations 
   D.) Micro circuit 

Answer: Option 'C'

The control unit initiates a series of sequential steps of micro operations.

  • 11. Specialised program(s) designed to allow particular input or output device(s) to communicate with the rest of the computer system is called  _______.
   A.) Computer
   B.) Device drivers
   C.) Interpreters
   D.) Operating system

Answer: Option 'B'

A device driver is a program that controls a particular type of device that is attached to your computer. There are device drivers for printers, displays, CD-ROM readers, diskette drives, and so on. When you buy an operating system, many device drivers are built into the product.

  • 12. The Internet is a system of ______.
   A.) Bugs
   B.) Interconnected networks
   C.) System software
   D.) Operating systems

Answer: Option 'B'

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide.

  • 13. Which of the following is a Web browser?
   A.) PowerPoint 
   B.) Paint 
   C.) Firefox
   D.) Word 

Answer: Option 'C'

Paint, PowerPoint and Word are application software.

  • 14. Setting fonts for the text in your document is an example of:
   A.) Formatting
   B.) Formulas
   C.) Tracking changes
   D.) Tools

Answer: Option 'A'

Formatting refers to changing font, font-size, indentation, appearance of the text.

  • 15. Different components on the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called?
   A.) Conductors 
   B.) Buses
   C.) Connectors 
   D.) Consecutives

Answer: Option 'B'

In computer architecture, a bus is a communication system that transfers data between components inside a computer, or between computers. Early computer buses were parallel electrical wires with multiple connections, but the term is now used for any physical arrangement that provides the same logical function as a parallel electrical bus. Modern computer buses can use both parallel and bit serial connections.

  • 16. What is Window Explorer?
   A.) Personal Computer
   B.) Network
   C.) Drive
   D.) File Manager

Answer: Option 'D'

Windows Explorer displays the hierarchical structure of files, folders, and drives on your computer.

  • 17. Which type of system can learn and adjust to new circumstances by themselves?
   A.) Database management system
   B.) Neural networks 
   C.) File based systems
   D.) Expert systems

Answer: Option 'B'

Neural Networks can learn and adjust to new circumstances.

  • 18. What does JAR stand for?
   A.) JQuerry Application Rapid-development
   B.) Java Application Resolution
   C.) Java Archive
   D.) JQuerry Application Resolution

Answer: Option 'C'

In software, JAR (Java Archive) is a package file format typically used to aggregate many Java class files and associated metadata and resources (text, images, etc.) into one file to distribute application software or libraries on the Java platform

  • 19. In PROM, P stands for?
   A.) Plausible
   B.) Program
   C.) Programmable
   D.) Proper

Answer: Option 'C'

PROM is an acronym for Programmable Read Only Memory.

  • 20. Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
   A.) program thievery
   B.) data snatching
   C.) software piracy
   D.) data looting

Answer: Option 'C'

Software piracy is the illegal copying, distribution, or use of software.

  • 21. Which among the following is a text margin treatment in which all lines begin hard against the left-hand margin but are allowed to end short of the right-hand margin?
   A.) Gutter Margin 
   B.) Ragged right 
   C.) Word wrap 
   D.) Right justified  

Answer: Option 'B'

Ragged right is a text margin treatment in which all lines begin hard against the left-hand margin but are allowed to end short of the right-hand margin. On lines that do not fully fill the measure (nearly all of them), any leftover space is deposited along the right-hand margin. This creates an irregular margin along the right side of the text column.

  • 22. In first generation of computers, they used which among the following?
   A.) batch processing
   B.) multithreading
   C.) multiprogramming
   D.) networking

Answer: Option 'A'

In First Generation mainly batch processing operating system were used.

  • 23. Which command should be used to display all files within the specified subordinate directory of the subdirectory? 
   A.) Dir/pathname 
   B.) Dir/pathname/pathname 
   C.) Dir/ch 
   D.) Dir/pathname/filename 

Answer: Option 'B'

'Dir/pathname/pathname' can be used to display all files within the specified subordinate directory of the subdirectory.

  • 24. A/(n) ___________ is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.
   A.) email
   B.) virus
   C.) web beacon
   D.) spam

Answer: Option 'C'

Common uses of web beacon are email tracking and page tagging for web analytics. Its alternative names are web bug, tracking bug, tag, or page tag.

  • 25. Which of the following key combination can be used to print a document?  
   A.) Ctrl + P
   B.) Tab + P
   C.) Alt + P
   D.) Windows logo key + P

Answer: Option 'A'

Ctrl + P is used to print document(s).

Computer Questions for Indian Bank Probationary Officers 2018 Download Pdf