Computer Questions for Federal Bank Officers Scale 1 & clerks 2018

1.

Using output devices one can ____.

   A.) View or Print Data
   B.) Modify Data
   C.) Store Data
   D.) Replicate Data

Answer: Option 'A'

Output Devices lets users to view or print data, for example: Monitor (screen display), Printer.

2.

__________ ensures secure transfer of data over an unsecured network, such as the Internet.

   A.) Antivirus
   B.) Hacking
   C.) Cracking
   D.) Cryptography

Answer: Option 'D'

In cryptography, data are sent in such a way that they look completely different from the original data. Thus, cryptography ensures secure transfer of data over an unsecured network.

3.

Which of the following statements is not true about cache memory?  

   A.) Cache memory is a form of Read only Memory (ROM)
   B.) It is directly associated with the microprocessor
   C.) Cache memory can be accessed much faster by a microprocessor in comparison to a RAM
   D.) Cache memory is sometimes called CPU memory

Answer: Option 'A'

Cache memory is a form of Random Access Memory (RAM) that is directly associated with the microprocessor.

4.

Which among the following is the most suitable type of network spread over large span that phone lines would use?

   A.) WAN
   B.) WWAN
   C.) PAN
   D.) SAN

Answer: Option 'A'

Wide Area Network (WAN) usually uses telephone lines for connectivity, as WAN is spread over a large area and offers Internet-related services such as browsing, email, chatting, etc.

5.

Which of the following statements is not true about cache memory?  

   A.) Cache memory is a form of Read only Memory (ROM)
   B.) It is directly associated with the microprocessor
   C.) Cache memory can be accessed much faster by a microprocessor in comparison to a RAM
   D.) Cache memory is sometimes called CPU memory

Answer: Option ''

Cache memory is a form of Random Access Memory (RAM) that is directly associated with the microprocessor.

6.

__________ means that the data contained in a database is accurate, consistent and reliable.

   A.) Data redundancy
   B.) Data integrity
   C.) Data reliability
   D.) Data inconsistency

Answer: Option 'B'

Data integrity means that the data contained in a database is accurate, consistent and reliable.

7.

In MS-DOS 6.22, which part identifies that product uniquely?

   A.) MS
   B.) DOS
   C.) MS - DOS
   D.) 6.22

Answer: Option 'D'

MS-DOS 6.22; 6.22 is the version number which identifies it uniquely.

8.

_____ is usually recorded and played, displayed, or accessed by information content processing devices, which as computerized and electronic devices, but can also be part of live performance. 

   A.) Virus
   B.) BIOS software
   C.) Multimedia
   D.) C++

Answer: Option 'C'

Multimedia is the field concerned with the computer-controlled integration of text, graphics, drawings, still and moving images (Video), animation, audio, and any other media where every type of information can be represented, stored, transmitted and processed digitally.

9.

What does the SMTP in an SMTP server stand for?

   A.) Simple Mail Transfer Protocol 
   B.) Serve Message Text Process 
   C.) Short Messaging Text Process 
   D.) Short Messaging Transfer Protocol

Answer: Option 'A'

SMTP stands for Simple Mail Transfer Protocol

10.

A _________ is used to direct and dispatch data packets between different networks.

   A.) Connection
   B.) Router
   C.) Bridge
   D.) Gateway

Answer: Option 'B'

A router is used to route data packets between different networks. It reads the information in each packet to tell where it is going. If it is destined for an immediate network it has access to, it will strip the outer packet (IP packet for example), readdress the packet to the proper Ethernet address, and transmit it on that network.

11.

Which type of system can learn and adjust to new circumstances by themselves?

   A.) Database management system
   B.) Expert systems
   C.) Geographical systems
   D.) Neural networks 

Answer: Option 'D'

Neural Network is a computer system modelled on the human brain and nervous system.

12.

Inheritance is the ability of an object to pass on its characteristics to its :

   A.) subclasses 
   B.) off-spring
   C.) super classes
   D.) parents

Answer: Option 'A'

A superclass passes its characteristics to it's subclass in concept of inheritance in programming languages. 

13.

Which of the following cable types is called cheapernet?  

   A.) Thicknet
   B.) UTP
   C.) SMF
   D.) Thinnet

Answer: Option 'D'

As the installation cost of thinnet coaxial cable is less, it is also known as cheapernet.

14.

What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?

   A.) DRAM
   B.) RAM
   C.) CMOS
   D.) CPU

Answer: Option 'C'

The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the onboard battery. The CMOS is reset and loses all custom settings in case the battery runs out of energy, additionally, the system clock resets when the CMOS loses power.

15.

What type of technology allows you to use your finger, eye, or voice print to secure your information resources?

   A.) Haptics
   B.) Biometrics     
   C.) RFID
   D.) All of above

Answer: Option 'B'

Biometrics is the measurement and statistical analysis of people's physical and behavioral characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance. 

16.

Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.

   A.) BIOS
   B.) VAIO
   C.) VMware
   D.) AVG

Answer: Option 'A'

BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on. It also manages data flow between the computer's operating system and attached devices such as the hard disk, video adapter, keyboard, mouse and printer.

17.

What is Disk operating system referred for?

   A.) Memory management system
   B.) Operating system which contains the disk-oriented commands and uses disk devices for permanent storage
   C.) DOS
   D.) Both (b) and (c) 

Answer: Option 'D'

Both (b) and (c) are true about Disk Operating System. A disk operating system (abbreviated DOS) is a computer operating system that can use a disk storage device, such as a floppy disk, hard disk drive, or optical disc. A disk operating system must provide a file system for organizing, reading, and writing files on the storage disk.

18.

Which of the following is correct acronym of VGA?

   A.) Video Graphics Adapter
   B.) Visual Graphics Array
   C.) Volatile Graphics Array
   D.) Video Graphics Array

Answer: Option 'D'

Video Graphics Array (VGA) refers specifically to the display hardware first introduced with the IBM PS/2 line of computers, but through its widespread adoption has also come to mean either an analog computer display standard, the 15-pin D-subminiature VGA connector or the 640x480 resolution itself.

19.

_____ is usually recorded and played, displayed, or accessed by information content processing devices, which as computerized and electronic devices, but can also be part of live performance. 

   A.) Virus
   B.) BIOS software
   C.) Multimedia
   D.) C++

Answer: Option 'C'

Multimedia is the field concerned with the computer-controlled integration of text, graphics, drawings, still and moving images (Video), animation, audio, and any other media where every type of information can be represented, stored, transmitted and processed digitally.

20.

The SubSeven is an example of :

   A.) antivirus
   B.) Spyware
   C.) Trojan horse
   D.) Adware

Answer: Option 'C'

SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.

21.

Which of the following is an example of application software? 

   A.) Microsoft Windows
   B.) Linux
   C.) Mac OSX
   D.) MS Word 2007

Answer: Option 'D'

MS Word 2007 is application software.

22.

Which of the following topologies does not use switches?  

   A.) Bus
   B.) Star
   C.) Ring
   D.) Hybrid

Answer: Option 'A'

In the Bus topology, all the nodes and peripherals are connected to a single cable that acts as the backbone of the network. Therefore, there is no need for a hub, switch or router for connecting nodes in this topology.

23.

What is included in an e-mail address?

   A.) Domain name followed by user’s name
   B.) User’s name followed by domain name
   C.) User’s name followed by postal address
   D.) User’s name followed by street address

Answer: Option 'B'

An email address consists of two parts, a local-part or user name and a domain-part separated by an “@” – in steve@example.com, steve is the local-part or user name and example.com is the domain-part.

24.

Which of the following is not a hardware device?

   A.) Storage Devices
   B.) Output Devices
   C.) MS DOS
   D.) CPU

Answer: Option 'C'

MS DOS is acronym for Microsoft Disk operating system.

25.

Which of the following appropriately relates with starting up an operating system? 

   A.) Starting
   B.) Entering
   C.) Formatting
   D.) Booting

Answer: Option 'D'

Booting is a startup sequence that starts the operating system of a computer when it is turned on. A boot sequence is the initial set of operations that the computer performs when it is switched on. Every computer has a boot sequence.


Computer Questions for Federal Bank Officers Scale 1 & clerks 2018 Download Pdf

Recent Posts