Q1. Computer can not do anything without a
(A) Chip
(B) Memory
(C) Output device
(D) Program
(E) None of these
Q2. A process known as ____________ is used by large retailers to study trends.
(A) data mining
(B) data selection
(C) POS
(D) data conversion
(E) None of these
Q3.Which generation of computers is covered by the period 1964-77?
(A) First
(B) Second
(C) Third
(D) Forth
(E) None of these
Q4. __________ is data that has been organized or presented in a meaningful fashion.
(A) A process
(B) Software
(C) Storage
(D) Information
(E) None of these
Q5. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
(A) Data
(B) Point-of-sale
(C) Sales
(D) Query
(E) None of these
Q6. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
(A) PSS
(B) POS
(C) inventory
(D) data mining
(E) None of these
Q7. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
(A) robotics
(B) simulation
(C) computer forensics
(D) animation
(E) None of these
Q8. Which of the following is not one of the four major data processing functions of a computer?
(A) gathering data
(B) processing data into information
(C) analyzing the data or information
(D) storing the data or information
(E) None of these
Q9. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
(A) POS
(B) RFID
(C) PPS
(D) GPS
(E) None of these
Q10. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as
(A) robotics
(B) computer forensics
(C) simulation
(D) forecasting
(E) None of these
Q11. Technology no longer protected by copyright, available to everyone, is considered to be:
(A) proprietary
(B) open
(C) experimental
(D) in the public domain
(E) None of these
Q12. All of the following are examples of real security and privacy risks except
(A) hackers
(B) spam
C. viruses
(D) identity theft
(E) None of these
Q13. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
(A) Nanoscience
(B) Microelectrodes
(C) Computer forensics
(D) Artificial intelligence
(E) None of these
Q14. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
(A) Nanoscience
(B) Nanotechnology
(C) Simulation
(D) Artificial intelligence
(E) None of these
Q15. The name for the way that computers manipulate data into information is called
(A) programming
(B) processing
(C) storing
(D) organizing
(E) None of these
Q16. Computers gather data, which means that they allow users to ____________ data.
(A) present
(B) input
(C) output
(D) store
(E) None of these
Q17. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
(A) data
(B) output
(C) input
(D) the process
(E) None of these
Q18. A ____ typically connects personal computers within a very limited geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Q19. Computers manipulate data in many ways, and this manipulation is ca1led—
(A) utilizing
(B) hatching
(C) upgrading
(D) processing
(E) None of these
Q20. Programming language
1) A accurate notation used to express algorithms understand bycomputers
2) Instructions written in natural language
3) An algorithm expressed in a graphical form
4) All of the above
5) None of these
Q21. An e-mail address typically consists of a user ID followed by the ____ sign and the name of the e-mail server that manages the user’s electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Q22. Software applies ____ also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Q23. A file extension is separated from the main file name with a(n) ____ but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Q24. An ad hoc query is a—
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the moment question
(D) question that will not return any results
(E) None of these
Q25. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Q26. A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Q27. The desktop contains small graphics called
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Q28. C, BASIC, COBOL, and Java are examples of ______ languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Q29. A(n) _______ camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Q30. _____ makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) Ecommerce
(C) E-spend
(D) E-business
(E) None of these
Q31. Networks are monitored by security personnel and super vised by _____who set(s) up accounts and passwords for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Q32. Application software is designed to accomplish—
(A) real world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Q33. A telephone number, a birth date, and a customer name are all examples of
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Q34. The human-readable version of a program is called—
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Q35. A ……… computer is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
Q36. ....... is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Q37. Programs such as Internet Explorer that serve as navigable windows into the Web are
called......
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Q38. Which is an another name for functional language
(A) Machine
(B) Application
(C) Low-level language
(D) High-level language
(E) None of these
Q39. The first computer made available for commercial use was
(A) Mark-I
(B) ENIAC
(C) EDSAC
(D) UNIVAC
(E) None of these
Q40.Who is called the “grand father” of the computer?
(A) Blaise Pascal
(B) Charles Babbage
(C) Joseph Jacquard
(D) Dr. Herman Hollerith
(E) None of these
Q41. The first mechanical computer designed by Charles Babbage was called
(A) Abacus
(B) Processor
(C) Calculator
(D) Analytical Engine
(E) None of these
Q42. The motherboard is the—
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first dup that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Q43. The transformation of a message into an encoded form is known as
(A) Mnemonics
(B) Encoding
(C) Encryption
(D) Decoding
(E) None of these
Q44. Which is device that interconnect two or more network, enabling data transfer to be made between them
(A) Plotter
(B) Joystick
(C) Gateway
(D) Path
(E) None of these
Q45. Which of the following is directory controlled from a keyboard.
(A) Card punch
(B) punched paper tape
(C) Magnetic disk
(D) Magnetic tape
(E) None of these
Q46. Which of the following is a part of the Central Processing Unit
(A) Printer
(B) Keyboard
(C) Mouse
(D) Arithmetic Logic Unit
(E) None of these
Q47. Control Unit of a digital computer is often called the
(A) Clock
(B) Nerve center
(C) ICs
(D) All of the above
(E) None of these
Q48. A typical modern computer uses
(A) LSI chips
(B) Vacuum tubes
(C) Valves
(D) All the above
(E) None of these
Q49. A is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Q50. When you save to _____ your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
South Malabar Gramin Bank Question Papers