South Malabar Gramin Bank Question Papers


Q1.   Computer can not do anything without a   
    (A) Chip    
    (B) Memory
    (C) Output device    
    (D) Program
    (E) None of these

Q2.  A process known as ____________ is used by large retailers to study trends.   
   (A) data mining    
   (B) data selection
   (C) POS    
   (D) data conversion
  (E) None of these

Q3.Which generation of computers is covered by the period 1964-77?    
    (A) First    
    (B) Second
    (C) Third    
    (D) Forth
    (E) None of these

Q4.  __________ is data that has been organized or presented in a meaningful fashion.    
    (A) A process    
    (B) Software
    (C) Storage    
    (D) Information
    (E) None of these

Q5.   ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.       
     (A) Data   
     (B) Point-of-sale
    (C) Sales   
    (D) Query
     (E) None of these


Q6.  A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.    
   (A) PSS    
   (B) POS
   (C) inventory    
   (D) data mining
   (E) None of these

Q7.  The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:        
    (A) robotics   
   (B) simulation   
    (C) computer forensics   
    (D) animation
    (E) None of these

Q8. Which of the following is not one of the four major data processing functions of a computer?
    (A) gathering data       
    (B) processing data into information
    (C) analyzing the data or information
    (D) storing the data or information
     (E) None of these

Q9.  ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.   
   (A) POS    
    (B) RFID
    (C) PPS    
    (D) GPS
    (E) None of these

Q10. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as        
    (A) robotics    
    (B) computer forensics
    (C) simulation    
    (D) forecasting
    (E) None of these

Q11. Technology no longer protected by copyright, available to everyone, is considered to be:   
        (A) proprietary      
        (B) open   
        (C) experimental   
        (D) in the public domain
        (E) None of these

Q12.  All of the following are examples of real security and privacy risks except   
      (A) hackers    
    (B) spam
     C. viruses            
    (D) identity theft
    (E) None of these

Q13.     ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.       
        (A) Nanoscience   
        (B) Microelectrodes
        (C) Computer forensics   
        (D) Artificial intelligence
        (E) None of these

Q14.  ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.    
        (A) Nanoscience   
        (B) Nanotechnology
        (C) Simulation   
        (D) Artificial intelligence
        (E) None of these

Q15.     The name for the way that computers manipulate data into information is called   
        (A) programming    
        (B) processing            
        (C) storing    
        (D) organizing
        (E) None of these

Q16.    Computers gather data, which means that they allow users to ____________ data.   
        (A) present    
        (B) input
        (C) output    
        (D) store
        (E) None of these

Q17.     After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:    
        (A) data    
        (B) output
        (C) input    
        (D) the process
        (E) None of these

Q18.     A ____ typically connects personal computers within a very limited geographical area, usually within a single building.    
        (A) LAN    
        (B) BAN
        (C) TAN    
        (D) NAN
        (E) None of these

Q19. Computers manipulate data in many ways, and this manipulation is ca1led—    
        (A) utilizing    
        (B) hatching
        (C) upgrading    
        (D) processing
        (E) None of these

Q20.  Programming language     
    1) A accurate notation used to express algorithms understand bycomputers
    2) Instructions written in natural language
    3) An algorithm expressed in a graphical form
    4) All of the above
    5) None of these

Q21. An e-mail address typically consists of a user ID followed by the ____ sign and the name of the e-mail server that manages the user’s electronic post office box.   
        (A) @    
        (B) #
        (C) &   
        (D) *
        (E) None of these

Q22.    Software applies ____ also called algorithms, to process data.       
        (A) arithmetic    
        (B) procedures
        (C) objects    
        (D) rules
        (E) None of these

Q23.     A file extension is separated from    the main file name with a(n) ____ but no spaces.   
        (A) question mark    
        (B) exclamation mark
        (C) underscore    
        (D) period
        (E) None of these

Q24.  An ad hoc query is a—    
        (A) pre-planned question
        (B) pre-scheduled question
        (C) spur-of-the moment question
        (D) question that will not return any results
        (E) None of these

Q25. A Web ……… consists of one or more Web pages located on a Web server.  
        (A) hub    
        (B) site
        (C) story    
        (D) template
        (E) None of these

Q26.    A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
        (A) worm    
        (B) virus                
        (C) trojan horse    
        (D) phishing scam
        (E) None of these

Q27. The desktop contains small graphics called
        (A) windows    
        (B) logos            
        (C) icons    
        (D) pictures
        (E) None of these

Q28.  C, BASIC, COBOL, and Java are examples of ______ languages.       
        (A) low-level   
        (B) computer
        (C) system programming
        (D) high-level
        (E) None of these

Q29.     A(n) _______ camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
        (A) digital    
        (B) analog    
        (C) classic    
        (D) film
        (E) None of these

Q30.  _____ makes it possible for shoppers to make purchases using their computers.    
        (A) E-world    
        (B) Ecommerce
        (C) E-spend    
        (D) E-business
        (E) None of these

Q31.  Networks are monitored by security personnel and super vised by _____who set(s) up accounts and passwords for authorized network users.    
        (A) IT managers
        (B) the government
        (C) network administrators
        (D) password administrators
        (E) None of these

Q32. Application software is designed to accomplish—        
        (A) real world tasks
        (B) computer-centric tasks
        (C) gaming tasks
        (D) operating system tasks
        (E) None of these

Q33. A telephone number, a birth date, and a customer name are all examples of   
        (A) a record    
        (B) data
        (C) a file    
        (D) a database
        (E) None of these

Q34. The human-readable version of a program is called—       
        (A) source code    
        (B) program code
        (C) human code    
        (D) system code
        (E) None of these

Q35. A ……… computer is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.    
        (A) notebook    
        (B) journal
        (C) diary    
        (D) briefcase
        (E) None of these

Q36. ....... is the result produced by a computer.
        (A) Data    
        (B) Memory    
        (C) Output    
        (D) Input
        (E) None of these

Q37. Programs such as Internet Explorer that serve as navigable windows into the Web are
        called......       
    (A) Hypertext    
    (B) Networks
    (C) Internet    
    (D) Web browsers
    (E) None of these

Q38. Which is an another name for functional language
        (A) Machine   
        (B) Application        
        (C) Low-level language        
        (D) High-level language
        (E) None of these

Q39.  The first computer made available for commercial use was        
        (A) Mark-I        
        (B) ENIAC
        (C) EDSAC    
        (D) UNIVAC
        (E) None of these

Q40.Who is called the “grand father” of the computer?        
        (A) Blaise Pascal            
        (B) Charles Babbage   
        (C) Joseph Jacquard            
        (D) Dr. Herman Hollerith
        (E) None of these

Q41. The first mechanical computer designed by Charles Babbage was called    
        (A) Abacus    
        (B) Processor
        (C) Calculator    
        (D) Analytical Engine
        (E) None of these

Q42. The motherboard is the—    
        (A) circuit board that houses peripheral devices
        (B) same as the CPU chip
        (C) the first dup that is accessed when the computer is turned on
        (D) circuit board that contains a CPU and other chips
        (E) None of these

Q43. The transformation of a message into an encoded form is known as   
        (A) Mnemonics    
        (B) Encoding
        (C) Encryption    
        (D) Decoding
        (E) None of these

Q44.  Which is device that interconnect two or more network, enabling data transfer to be made between them        
        (A) Plotter    
        (B) Joystick
        (C) Gateway    
        (D) Path
        (E) None of these

Q45.     Which of the following is directory controlled from a keyboard.     
        (A) Card punch   
        (B) punched paper tape
        (C) Magnetic disk           
        (D) Magnetic tape
        (E) None of these

Q46. Which of the following is a part of the Central Processing Unit       
        (A) Printer            
        (B) Keyboard
        (C) Mouse            
        (D) Arithmetic Logic Unit
        (E) None of these

Q47.     Control Unit of a digital computer is often called the        
        (A) Clock    
        (B) Nerve center   
        (C) ICs   
        (D) All of the above
        (E) None of these

Q48.  A typical modern computer uses    
        (A) LSI chips    
        (B) Vacuum tubes
        (C) Valves    
        (D) All the above
        (E) None of these

Q49. A is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.        
        (A) surge strip    
        (B) USB
        (C) UPS    
        (D) battery strip
        (E) None of these

Q50. When you save to _____ your data will remain intact even when the computer is turned off.
        (A) RAM      
        (B) motherboard   
        (C) secondary storage device
        (D) primary storage device
        (E) None of these
South Malabar Gramin Bank Question Papers