Search your Topic HERE....

September 18, 2012

Computer Awareness Practice Questions


sponsored links

In the URL, what does 's' represent in 'https'?
1) Safe
2) System
3) Start-up
4) Semantic
5) Secured

The process of transforming information using an algorithm to make it unreadable by anyone is usually referred to as: 1) Decryption
2) Encryption
3) Alphabet Coding
4) Encrography
5) Deptography

What symbol is present on the number key '2' on the keyboard? 1) !
2) %

5) @
Which of the following software applications would be most appropriate for performing Statistical and Numerical calculations: 1) Document Processor
2) Graphics Package II
3) Power Point
4) SpreadSheet
5) Meta Processor

Which of the following is not a social networking site? 1) WAYN
2) Hi 5
3) Orkut
4) Yahoo
5) Facebook

Which of the following  powerpoint view displays each slide of the presentation as a thumbnail and is useful for rearranging slides? 1) Slide show
2) Slide master
3) Slide sorter
4) Notes Page
5) Design Slide

A set of rules for telling the computer what operations to perform is / are called:
1) Structures
2) Procedural Language
3) Command Language
4) Natural Language
5) Programming Language

Devices that enter information and let you communicate with the computer are called:
1) Software
2) Hardware
3) Output Devices
4) Input / Output devices
5) Input Devices

 The speed of which of the following memory chips is faster?

1) Not Fixed
4) For smaller chips SRAM is faster
5) For larger chips DRAM is faster

 If you want to upload your profile pics into Facebook, which device will you use?
1) Keyboard
2) Mouse
3) Printer
4) Scanner
5) None of these

Which among the following is the file extension for Word Documents?

1) .xls
2) .ppt
3) .docx
4) .worddoc
5) None 
Linux Operating system is an example of which of the following?
1) Freeware
2) Open Source Software
3) Shareware
4) Complimentary
5) None of these

A device that connects to a network without the use of a cable is said to be:
1) Distributed
2) Non-Wired
3) Centralised
4) Open source
5) Wireless

Removing and replacing devices without turning off the computer is referred to as:
1) Search Engines
2) Operating System
3) Software
4) Resource Locators
5) Plug-n-Play

Saraswathi has a song sung by him on the desktop, in the C drive, and also in the D drive. This scenario in computer language is generally referred to as:
1) Data Redundancy
2) Multiple Data Places
3) Various File Places
4) Data Inconsistency
5) Data Independent

What is a Firewall?
1) A wall to protect against Fire
2) A software to protect from computer hacker intrusions
3) A software to destroy computer
4) A wall to make partitions in computer
5) None of these

Arwind sent a mail to Manohar by putting his email address in 'Cc' and to Santosh by putting his email address in 'Bcc'. Which of the following is true based on the given scenario?
1) Manohar can view the email address of Arwind and Santosh
2) Santosh can view the email address of Manohar & Arwind
3) Manohar can view the email address of Santosh only
4) Both 1 and 2
5) None of them is true

When data changes in multiple lists and all lists are not updated, this causes ______
1) Data Population Problem
2) Data Reduction
3) Data Induction
4) Data Overload
5) Data Inconsistency

The legal right to use software based on specific restrictions is granted via a ________
1) Software privacy policy
2) Software License
3) Software password manager
4) Software log
5) None of these

Which of the following is not an operating system?
1) Windows 2000
2) DOS
3) Windows 7
4) Mac Os X Lion
5) Google

Read more Computer Awareness Questions for SBI Associate Clerical Exam Here

Get Complete Study Materials and Practice Papers for SBI Associate Clerical Exam Here

Computer Knowledge for SBI


  1. its very great..and very usefull...thanks for guide4bankexams

  2. @ admin solution to the question number 8 is not visible please check it.

    1. Corrected it now Aadhar, plz do check

      Thank you so much for the update


Related Posts Plugin for WordPress, Blogger...