Computer Questions for Federal Bank Officers Scale 1 & clerks 2018

1.

10BaseT uses which type of cables to connect network devices?  

   A.) twisted-pair
   B.) coaxial
   C.) multi-mode fiber optic
   D.) single-mode fiber optic

Answer: Option 'A'

In 10BaseT, 10 means the transfer rate of this Ethernet is 10 Mbps; Base describes the type of signaling used, that is Baseband; and T denotes that the cable used is twisted -pair cable.

2.

Which of the following statements is not true about cache memory?  

   A.) Cache memory is a form of Read only Memory (ROM)
   B.) It is directly associated with the microprocessor
   C.) Cache memory can be accessed much faster by a microprocessor in comparison to a RAM
   D.) Cache memory is sometimes called CPU memory

Answer: Option ''

Cache memory is a form of Random Access Memory (RAM) that is directly associated with the microprocessor.

3.

Which of the following is true about Page Preview Mode?

   A.) You can see all pages of your document
   B.) You can only see the page you are currently working
   C.) You can only see pages that do not contain graphics
   D.) You can only see the title page of your document

Answer: Option 'A'

In page preview mode you can preview all the pages of the document.

4.

Which of the following computers exhibits the features of both analog the digital computers?  

   A.) Hybrid computer
   B.) Mini computer
   C.) Laptop
   D.) Mainframe computer

Answer: Option 'A'

The computer that exhibits the features of both digital and analog computers is known as a hybrid computer.

5.

What acts as master software that works as a mediator between a computer user and hardware of a computer?  

   A.) Application Program
   B.) Hardware
   C.) Software
   D.) Operating System

Answer: Option 'D'

Operating system provides an interface between a user and computer hardware. It enables a user to utilize hardware resources efficiently.

6.

Which communication mode allows both the sender and the receiver to transmit data at the same time over a single communication channel?  

   A.) Simplex mode
   B.) Half-duplex mode
   C.) Full-duplex mode
   D.) Semi-duplex mode

Answer: Option 'C'

In the simplex mode, communication is always unidirectional, for example television. In the half-duplex mode, communication is bidirectional but one at a time, which means only one of the parties can send data at a time. Walkie-talkie is an example of half duplex communication. In the full-duplex mode, communication is bidirectional, which means both the parties can transmit data simultaneously. Telephone is an example of full-duplex communication. The semi-duplex mode is not and type of communication mode.

7.

OSI model has how many layers?

   A.) Two layers
   B.) Five Layers
   C.) Seven Layers
   D.) Six Layers

Answer: Option 'C'

OSI Model stands for Open Source Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.

8.

_____ is usually recorded and played, displayed, or accessed by information content processing devices, which as computerized and electronic devices, but can also be part of live performance. 

   A.) Virus
   B.) BIOS software
   C.) Multimedia
   D.) C++

Answer: Option 'C'

Multimedia is the field concerned with the computer-controlled integration of text, graphics, drawings, still and moving images (Video), animation, audio, and any other media where every type of information can be represented, stored, transmitted and processed digitally.

9.

Which of the following is not an advantage of wireless networking?  

   A.) Mobility
   B.) Installation
   C.) Cost effectiveness
   D.) Security

Answer: Option 'D'

A wireless network allows a user to connect different computers or devices by using wireless network protocols. It provides mobility by allowing access to a network irrespective of the location. The installation of a wireless network is easy compared to a wired network. Also, a wireless network does not required expensive wires a cables; therefore, this type of network is cost effective. However, this type of network is insecure.

10.

Which of the following statements is true for a piconet?  

   A.) It works on TCP/IP
   B.) It is an adhoc network
   C.) It works on Bluetooth technology
   D.) Option (b) and (c)

Answer: Option 'D'

Piconet is an adhoc network that works on the Bluetooth technology and connects up to eight devices. It is also called personal area network (PAN). A scatternet is a type of ad hoc computer network consisting of two or more piconets.

11.

Which one of the following is a set of one or more attributes taken collectively to uniquely identify a record?

   A.) Candidate key
   B.) Sub key
   C.) Super key
   D.) Foreign key

Answer: Option 'C'

Super key is a set of one or more attributes taken collectively to uniquely identify a record.

12.

What is Disk operating system referred for?

   A.) Memory management system
   B.) Operating system which contains the disk-oriented commands and uses disk devices for permanent storage
   C.) DOS
   D.) Both (b) and (c) 

Answer: Option 'D'

Both (b) and (c) are true about Disk Operating System. A disk operating system (abbreviated DOS) is a computer operating system that can use a disk storage device, such as a floppy disk, hard disk drive, or optical disc. A disk operating system must provide a file system for organizing, reading, and writing files on the storage disk.

13.

What is a motion path?

   A.) A type of animation entrance effect
   B.) A method of advancing slides
   C.) A method of moving items on a slide
   D.) All of the above

Answer: Option 'C'

Motion path is a method of moving items on a slide.

14.

Which of the following is an example of application software? 

   A.) Microsoft Windows
   B.) Linux
   C.) Mac OSX
   D.) MS Word 2007

Answer: Option 'D'

MS Word 2007 is application software.

15.

Which of the following communications modes support two-way traffic but in only one direction of a time?

   A.) simplex
   B.) half-duplex
   C.) three-quarters duplex
   D.) All of the above

Answer: Option 'B'

Half Duplex support two-way traffic but in only one direction of a time. For example, a walkie-talkie is a half-duplex device because only one party can talk at a time. In contrast, a telephone is a full-duplex device because both parties can talk simultaneously. 

16.

Which one of the following is not an e-mail service provider?

   A.) Hotmail
   B.) Gmail
   C.) Bing
   D.) Yahoo mail

Answer: Option 'C'

E-mail service providers allow you to create an e-mail account. Hotmail, Gmail and Yahoo Mail allow you to create a free e-mail account, but Bing doesn’t.

17.

When the computer is already ON, then which of the following term refers to the process to restart it? 

   A.) Cold booting
   B.) Warm booting
   C.) Logging OFF
   D.) Shut down

Answer: Option 'B'

Warm booting is the process of restarting a computer.

18.

Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups? 

   A.) program thievery
   B.) data snatching
   C.) software piracy
   D.) program looting

Answer: Option 'C'

Software piracy is the illegal copying, distribution, or use of software.

19.

Which physical layer devices can be used to enlarge the area covered by a single LAN segment?
1. Switch
2. NIC
3. Hub
4. Repeater
5. RJ45 transceiver

   A.) 1 only
   B.) 1 and 3
   C.) 3 and 4
   D.) 5 only

Answer: Option 'C'

A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted so as to extend the length to which the signal can be transmitted over the same network.  A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches, for example, the connector in star topology which connects different stations.

20.

What is the maximum size of text field in Access?

   A.) 6400 characters 
   B.) 6880 characters 
   C.) 6499 characters 
   D.) 255 characters 

Answer: Option 'D'

The maximum size of text filed in Access is 255 characters.


Computer Questions for Federal Bank Officers Scale 1 & clerks 2018 Download Pdf

Recent Posts