Search your Topic HERE....

December 03, 2014

Computer Knowledge Practice Test for Bank Clerks - Set 56


sponsored links

  1. The place where the computer stores programs and data is called ___________
    1. memory
    2. storehouse
    3. storage unit
    4. backup
    5. none of these
  2. One puts information into the computer by pressing this key 
    1. caps lock
    2. tab
    3. enter 
    4. esc
    5. putch
  3. Why is the Caps Lock key refereed to as a toggle key ?
    1. because its function goes back and forth every time it is pressed
    2. because it cannot be used for entering numbers
    3. because it cannot be used to delete
    4. because it cannot be used to insert 
    5. because it cannot be used to type
  4. To add or put into your document such as a picture or text you use _______
    1. Tab
    2. Insert
    3. delete
    4. home
    5. impress
  5. A key that must be pressed each time a new command or information is entered _________
    1. esc
    2. new
    3. enter
    4. delete
    5. home
  6. Computers use the _______ system to process data
    1. processing
    2. kilobyte
    3. binary
    4. virtual
    5. representational
  7. These provide expansion capability for a computer system
    1. sockets
    2. slots
    3. bytes
    4. bays
    5. none of these
  8. A (n) _____________ allows sharing of a broadband internet connection 
    1. hub
    2. adapter
    3. router
    4. switch 
    5. plug
  9. The clock rate of a processor is measured in ______________
    1. milliseconds
    2. microhertz
    3. megabytes or gigabytes
    4. nanoseconds
    5. megahertz or gigahertz
  10. A computer virus normally attaches itself to another computer program is known as 
    1. backdoor program 
    2. target program 
    3. trojan horse
    4. host program 
    5. bluetooth
        • Small Story to Remember : This virus is named after the horse of Trojan War. Trojan Horse is a  beautiful and huge wooden hollow horse built by Greeks during the Trojan War against Troy.  Thirty men hid inside it. They left it outside the gate of Troy.  The people of troy saw it and they dragged the horse inside the city gates to keep it on display. That night, while the Trojan people were sleeping, the men hiding inside the wooden horse climbed out and opened the gates. The waiting Greek army entered Troy. That was the end of Troy. The same thing happens to your computer when a trojan horse virus attacks your it.
  11. These devices translate data and programs that humans can understand into a form  that the computer can process
    1. display 
    2. input 
    3. output
    4. pointer 
    5. none of these
  12. The amount of time required by a storage device to retrieve data and programs is its ____________
    1. retrieval speed
    2. capacity 
    3. memory 
    4. storage
    5. access speed
  13. A 32 bit word computer can acess bytes at a time
    1. 4
    2. 8
    3. 16
    4. 32
    5. 30
  14. A megabyte is actually equal to _____________ kilobytes 
    1. 100
    2. 1000
    3. 1024
    4. 1024 x 1024
    5. none of these
  15. The main memory of a computer must be large enough to contain the active parts of ___________
    1. the operating system 
    2. the applications 
    3. input / output storage & working storage 
    4. all of these
    5. none of these
  16. This type of memory improves processing by acting as a temporary high-speed holding area between the memory and the CPU 
    1. RAM
    2. ROM
    3. cache memory 
    4. flash memory 
    5. EPROM
  17. The smallest unit in a digital system is a ______________
    1. byte
    2. kilobyte
    3. word 
    4. character 
    5. bit
  18. ______________ ports connect special types of music instruments to sound cards 
    1. BUS
    2. CPU
    3. USB
    4. MIDI
    5. MINI
  19. Software you can use to create a budget is called ___________
    1. word processing software
    2. graphics software 
    3. utility software 
    4. spreadsheet software 
    5. none of these
  20. The mouse ______ usually appears in the shape of an arrow
    1. indicator 
    2. marker
    3. meter 
    4. pointer 
    5. none of these
Read more Computer Knowledge Practice Tests from below
sponsored links


  1. Thanks a lot gr8ambitionz.....:)

  2. Nice story... Now i never gonna forget the details of Trojan Horse. Please do the same for remaining articles when ever we encounter with difficult names... It will be very helpful for us. Thanks.

  3. hello friends i have a question,i submitted the application for sbh associates on 27th nov and i was unable to pay the fee due to bank strike within 3 working days .so should i submit the application once again freshly and pay the fee or can i pay the fee as of now.plz help me

  4. tel me d diff b/w router and repeater

  5. Thank u gr8 team

  6. how come answer for the first question is data isolation?

  7. SSC CGL 2013 Interview Date OUT

  8. bhai koi cutoff bta do ibpo clerk ka last yr ka.......??
    First day first show hai mera/////..... :(


  10. Not sure but try to get more than 15 in all sections and a total score of 120+ depends on difficulty level... If u r able to get more than 20 in every section then u r safe....getting more marks in easy sections will make your score high so that you all get more chance for selection...

  11. You need not fill the form again,pay the fees before 12th december.

  12. repeater strengthens the weak signal.... it is used at physical layer of OSI.
    router is used to share network between different computers

  13. I attempted only 100 questions in sbi asso.,do i sand a chance?

  14. bhagirathsinh jadejaDecember 3, 2014 at 1:54 PM

    14/17 :(

  15. last yr for gen it was 110

  16. plz provide uiic assistant exam model questions or model papers

  17. bhai har state ka alag alag cutoff nikalta hai lyk rbi assistant ya sbhi states ka same nikalta hai

  18. in 2nd question ? one puts information by pressing entre key ????? plz explain it i think all keys on the key board are used to put information into the computer??~ plz cleared my doubts

  19. Thanks for the Trojan Story. You people are amazing !!

  20. @shivani ...we type information to computer using most of the keys but normally we use enter key to put into some location in computer.. Ex:- while online chatting or Sending information we do use enter key..

  21. Thanks a lot for questions and a short story :)

  22. 101 gen for U. P last year

  23. For Study Materials Tips Tricks Strategies & Preparation Plan On Specialist Officer IT 2015 Exam Visit


Related Posts Plugin for WordPress, Blogger...