Computer Questions for Federal Bank Officers Scale 1 & clerks 2018

1.

__________ means that the data contained in a database is accurate, consistent and reliable.

   A.) Data redundancy
   B.) Data integrity
   C.) Data reliability
   D.) Data inconsistency

Answer: Option 'B'

Data integrity means that the data contained in a database is accurate, consistent and reliable.

2.

Which of the following statements is true for a piconet?  

   A.) It works on TCP/IP
   B.) It is an adhoc network
   C.) It works on Bluetooth technology
   D.) Option (b) and (c)

Answer: Option 'D'

Piconet is an adhoc network that works on the Bluetooth technology and connects up to eight devices. It is also called personal area network (PAN). A scatternet is a type of ad hoc computer network consisting of two or more piconets.

3.

Which of the following is an expansion card which generates a feed of output images to a display?

   A.) Bus
   B.) Motherboard
   C.) Video Card
   D.) Ultra High Definition

Answer: Option 'C'

Video Card is an expansion card which generates a feed of output images to a display.

4.

Which of the following is contained at the end of the file name and helps to determine the type of file?

   A.) File property
   B.) The nomenclature
   C.) File extension
   D.) File subname

Answer: Option 'C'

A filename extension is an identifier specified as a suffix to the name of a computer file

5.

Which number system is used by computers to store data and perform calculations?

   A.) binary 
   B.) octal
   C.) decimal 
   D.) hexadecimal

Answer: Option 'A'

Computers generally use binary number system.

6.

What is JDBC?

   A.) Utility Software
   B.) Application Software
   C.) Application Programming Interface (API)
   D.) Programming Language

Answer: Option 'C'

Java Database Connectivity (JDBC) is an application programming interface (API) for the programming language Java, which defines how a client may access a database. It is part of the Java Standard Edition platform, from Oracle Corporation.

7.

Which of the following is not a hardware device?

   A.) Storage Devices
   B.) Output Devices
   C.) MS DOS
   D.) CPU

Answer: Option 'C'

MS DOS is acronym for Microsoft Disk operating system.

8.

Which of the following is a programming language for creating special programs like applets?

   A.) Java
   B.) domain name
   C.) COBOL
   D.) Net

Answer: Option 'A'

Java can be used to create applets. Applet is a very small application, especially a utility program performing one or a few simple functions.

9.

Walkie-talkie is an example of which of the following?

   A.) simplex communication
   B.) half-duplex communication
   C.) full-duplex communication
   D.) semi-duplex communication

Answer: Option 'B'

In the case of walkie-talkie, the person at one end sends signals, while the other on the receiving end receives these signals. The person at the receiving end cannot communicate until the person at the first end stops.

10.

Which one of the following is not an e-mail service provider?

   A.) Hotmail
   B.) Gmail
   C.) Bing
   D.) Yahoo mail

Answer: Option 'C'

E-mail service providers allow you to create an e-mail account. Hotmail, Gmail and Yahoo Mail allow you to create a free e-mail account, but Bing doesn’t.

11.

Select the odd one out:

   A.) TFT
   B.) OLED
   C.) CRT
   D.) XML

Answer: Option 'D'

Except XML all others are types of screen display.

12.

Which of the following terms is associated with Internet?

   A.) Plotter
   B.) Slide presentation
   C.) Bookmark
   D.) Pie Chart

Answer: Option 'C'

A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the title, URL, and favicon of the corresponding page.

13.

Which of the following is an expansion card which generates a feed of output images to a display?

   A.) Bus
   B.) Motherboard
   C.) Ultra High Definition
   D.) Video Card

Answer: Option 'D'

Video Card is an expansion card which generates a feed of output images to a display

14.

__________ ensures secure transfer of data over an unsecured network, such as the Internet.

   A.) Antivirus
   B.) Hacking
   C.) Cracking
   D.) Cryptography

Answer: Option 'D'

In cryptography, data are sent in such a way that they look completely different from the original data. Thus, cryptography ensures secure transfer of data over an unsecured network.

15.

What is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication?

   A.) Phishing
   B.) Keylogging
   C.) Identity theft
   D.) Authentication

Answer: Option 'A'

Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Computer Questions for Federal Bank Officers Scale 1 & clerks 2018 Download Pdf

Recent Posts