Loading

Wednesday, June 13, 2012

Computer Awareness for Upcoming Banking Exams 2012 ( Computer Quiz - 13)

1. If you wish to extend the length of the network without having the signal degrade you would use a –
[A]Gateway
[B]Repeater
[C]Resonance
[D]Router


2. A repair for a known software bug usually available for no charge on the internet is called a-
[A]Tutorial
[B]Rectifier
[C]Version
[D]Patch


3. URL stands for-
[A]Uniform Resource Locater
[B]Uniform Research locater
[C]Universal Research List
[D]Uniform Research List


4. When data changes in multiple lists and all lists are not updated this causes,
[A]Duplicate data
[B]Data inconsistency
[C]Data redundancy
[D]Information overload


5. What is a backup?
[A]The ability to get a system up and running in the event of system failure or crash
[B]None of these
[C]Restoring the information backup
[D]An exact copy of a system’s information


6. The internet is-
[A]A communication system for a country
[B]A communication system for some states
[C]A large network of networks
[D]An internal communication system for a business


7. Computers that are portable and convenient for users who travel are known as-
[A]Fileservers
[B]Laptops
[C]Planners
[D]Minicomputers


8. What is the storage area of e-mail called?
[A]Directory
[B]Hard disk
[C]Folder
[D]Mail box


9. One advantage of dial up internet access is
[A]Modem speeds are very fast
[B]It utilises existing telephone services
[C]It uses broadband technology
[D]It uses a router for security


10. What is the process of copying software program from secondary storage medium to the hard disk called?
[A]Upload
[B]Installation
[C]Downloads
[D]Storage


11. Which process checks to ensure that the components of the computer are properly connected and operating properly?
[A]Saving
[B]Editing
[C]Booting
[D]Processing


12. A means of capturing an image (drawing a photo) so that it can be stored on a computer is______
[A]Scanner
[B]Keyboard
[C]Modem
[D]Software


13. An error in a computer program is_________
[A]Crash
[B]Power failure
[C]Virus
[D]Bug


14. Access control based on a person’s finger prints is an example of _________
[A]Characteristic security
[B]Finger print security
[C]Biometric identification
[D]Characteristic identification


15. The patterns of printed lines on the most products are called_________
[A]Barcodes
[B]Scanners
[C]Prices
[D]Scanner


0 comments: