Custom Search
Showing posts with label COMPUTER KNOWLEDGE. Show all posts
Showing posts with label COMPUTER KNOWLEDGE. Show all posts

Saturday, November 12, 2011

COMPUTER KNOWLEDGE MCQs

1. A passive threat to computer security is—
(1) Malicious Intent
(2) Sabotage
(3) Accident Errors
(4) Espionage Agents
(5) None of these

2. The Secure Electronic Transaction (SET) specification—
(1) is a notice, issued and verified by a certificate authority, that guarantees a user      or Web site is legitimate
(2) provides private-key encryption of all data that passes between a client and a      server
(3) allows users to choose an encryption scheme for the data that passes between      a client and a server
(4) uses a public-key encryption to secure credit-card transaction systems
(5) None of these

3. ……………allows wireless mobile devices to access the Internet and its services such as the Web and e-mail—
(1) TCP/IP
(2) Ethernet
(3)WAP
(4) Token ring
(5) None of these

4. 'DOS' floppy disk does not have—
(1) A Boot Record
(2) A File Allocation Table
(3) A Root Directory
(4) Virtual Memory
(5) BIOS

5. 'MICR' technology used for clearance of cheques by banks refers to—
(1) Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition
(5) None of these

6. All the information collected during database development is stored in a—
(1) repository
(2) data warehouse
(3) RAD
(4) CASE
(5) None of these

7. The……………….component is used by the data analyst to create the queries that access the database.
(1) data extraction
(2) end-user query tool
(3) end-user presentation tool
(4) data store
(5) None of these

8. A (n)…………….allows network users to share a single copy of software, which resides on the network server.
(1) single-user license agreement
(2) network site license
(3) end-user license agreement
(4) business software license
(5) None of these

9. A polymorphic virus—
(1) modifies its program code each time it attaches itself to another program or file
(2) is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains
(3) a malicious-logic program that hides within or looks like a legitimate program
(4) infects a program file, but still reports the size and creation date of the original, uninfected program
(5) None of these

10. Microwave transmission is used in environments where installing physical transmission media is—
(1) difficult or impossible and where line-of-sight transmission is unavailable
(2) easy or promising and where line-of-sight transmission is unavailable
(3) difficult or impossible and where line-of-sight transmission is available
(4) easy or promising and where line-of-sight transmission is available
(5) None of these

11. Which is NOT a good Web security strategy?
(1) Restrict access to the Web server; keep a minimum number of ports open
(2) Limit the users who can load software, edit or add files.
(3) Add demo programs, so users can test system without accessing production data.
(4) Remove unnecessary compilers and interpreters.
(5) None of these

12. The altering of data so that it is not usable unless the changes are undone is—
(1) Biometrics
(2) Compression
(3) Encryption
(4) Ergonomics
(5) None of these

13. The word FIP stands for—
(1) File Translate Protocol
(2) File Transit Protocol
(3) File Typing Protocol
(4) File Transfer Protocol
(5) None of these

14. Voice mail—
(1) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet
(2) permits users to converse in real time with each other via the computer while connected to the Internet
(3) functions much like an answering machine, allowing callers to leave a voice message for the called party
(4) involves using video and computer technology to conduct a meeting between participants at geographically separate locations
(5) None of these

15. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is—
(1) Bridge
(2) Gateway
(3) Router
(4) Modem
(5) All of these

16. Which of the following is a general-purpose programming language, designed by Sun Microsystems, and well suited for use on the Web?
(1) VB Script
(2) Java Script
(3) CSS
(4) Java
(5) None of these

17. This.............tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
(1) Client
(2) Applications/Web server
(3) Enterprise server
(4) DBA
(5) None of these

18. RSA is—
(1) Symmetric Cryptosystem
(2) Asymmetric Cryptosystem
(3) Block Cypher
(4) Digital Signature
(5) None of these

19. A DVD-RAM is similar to a………………except it has storage capacities up to 5.2 GB.
(1) CD-R
(2) floppy disk
(3) CD-RW
(4) hard disk
(5) None of these

20. When you are selecting a mouse for a particular computer system, what is the most important consideration?
(1) The type of drivers that come with the mouse
(2) The length of the mouse cord
(3) The type of connector the mouse is equipped with
(4) The number of buttons the mouse has
(5) None of these

21. How is power supplied to a low-power USB device?
(1) Through a power cable
(2) From an external power supply
(3) Directly from the computer's power supply
(4) Through the USB cable
(5) None of these

22. All of the following are basic principles of net works,except—
(1) each computer must have a network card
(2) there must be communications media connecting the network hardware devices
(3) there must be at least one connecting device
(4) each computer must have software that supports the movement of information
(5) None of these

23. The………….data mining technique derives rules from real-world case examples.
(1) Rule discover
(2) Signal processing
(3) Neural nets
(4) Case-based reasoning
(5) None of these

24. …………….are used to identify a user who returns to a Website.
(1) Cookies
(2) Plug-ins
(3) Scripts
(4) ASPs
(5) None of these

25. Which one of the following objects is passed to a Java Bean when one of its properties is set via a JSP action?
(1) Servlet Request
(2) Http Servlet Request
(3) Servlet Response
(4) Http Servlet Response
(5) None of these

26. _ _ _ _ _ _ _ _ _ translates and executes program at run time line by line
1) Compiler
2) Interpreter
3) Linker
4) Loader
5) None

27. _ _ _ _ _ _ _ _ is an OOP principle
1) Structured programming
2) Procedural programming
3) Inheritance
4) Linking
5) None

28. COBOL is widely used in _ _ _ _ _ _ _ applications
1) Commercial
2) Scientific
3) Space
4) Mathematical
5) None

29. RAM stands for
1) Random origin money
2) Random only memory
3) Read only memory
4) Random access memory
5) None

30. 1 Byte = ?
1) 8 bits
2) 4 bits
3) 2 bits
4) 9 bits
5) None

31. SMPS stands for
1) Switched mode power supply
2) Start mode power supply
3) Store mode power supply
4) Single mode power supply
5) None

32. The device used to carry digital data on analog lines is called as
1) Modem
2) Multiplexer
3) Modulator
4) Demodulator
5) None

33. VDU is also called
1) Screen
2) Monitor
3) Both 1 & 2
4) printer
5) None

34. BIOS stands for
1) Basic Input Output system
2) Binary Input output system
3) Basic Input Off system
4) all the above
5) None

35. Father of ‘C’ programming language
1) Dennis Ritchie
2) Prof Jhon Kemeny
3) Thomas Kurtz
4) Bill Gates
5) None

36. The 16 bit Microprocessor means that it has
1) 16 address lines
2) 16 Buses
3) 16 Data lines
4) 16 routes
5) None

37. Data going into the computer is called
1) Output
2) algorithm
3) Input
4) Calculations
5) flow chart

38. Which of the following refers to a small, single-site network?
1) LAN
2) DSL
3) RAM
4) USB
5) CPU

39. Microsoft Office is
1) Shareware
2)Public domain software
3) Open-sourse software
4) A vertical market application
5) An application suite

40. How many options does a BINARY choice offer
1) None
2) One
3) Two
4) it depends on the amount of memory on the computer
5) It depends on the speed of the computer’s processor

41. A collection of program that controls how your computer system runs and processes information is called
1) Operating System
2) Computer
3) Office
4) Compiler
5) Interpreter

42. Computer connected to a LAN (Local Area Network) can
1) run faster
2) go on line
3) share information and /or share peripheral equipment
4) E-mail
5) None

43. Information travels between components on the mother board through
1) Flash memory
2) CMOS
3) Bays
4) Buses
5) Peripherals

44. How are data organized in a spreadsheet?
1) Lines & spaces
2) Layers & Planes
3) Height & Width
4) Rows & Columns
5) None

45. The blinking symbol on the computer screen is called the
1) mouse
2) logo
3) hand
4) palm
5) cursor


ANSWERS :


1. (1) 2. (4) 3. (3) 4. (4) 5. (1) 6. (2) 7. (2) 8. (2) 9. (1) 10. (4) 11. (4) 12. (3) 13. (1) 14. (3) 15. (2) 16. (2) 17. (1) 18. (4) 19. (3) 20. (3) 21. (4) 22. (2) 23. (3) 24. (1) 25. (3) 26. (2) 27. (1) 28. (3) 29. (1) 30. (3) 31. (1) 32. (3) 33. (3) 34. (1) 35. (3) 36. (1) 37. (3) 38. (4) 39. (1) 40. (5) 41. (4) 42. (1) 43. (1) 44. (3) 45. (5)

Wednesday, November 2, 2011

COMPUTER TERMINOLOGY


access time - The performance of a hard drive or other storage device - how long it takes to locate a file.
active program or window - The application or window at the front (foreground) on the monitor.
alert (alert box) - a message that appears on screen, usually to tell you something went wrong.
alias - an icon that points to a file, folder or application (System 7).
apple menu - on the left side of the screen header. System 6 = desk accessories System 7 = up to 50 items.
application - a program in which you do your work.
application menu - on the right side of the screen header. Lists running applications.
ASCII (pronounced ask-key ) - American Standard Code for Information Interchange. a commonly used data format for exchanging information between computers or programs.
background - part of the multitasking capability. A program can run and perform tasks in the background while another program is being used in the foreground.
bit - the smallest piece of information used by the computer. Derived from "binary digit". In computer language, either a one (1) or a zero (0).
backup - a copy of a file or disk you make for archiving purposes.
boot - to start up a computer.
bug - a programming error that causes a program to behave in an unexpected way.
bus - an electronic pathway through which data is transmitted between components in a computer.
byte - a piece of computer information made up of eight bits.
card - a printed circuit board that adds some feature to a computer.
cartridge drive - a storage device, like a hard drive, in which the medium is a cartridge that can be removed.
CD-ROM - an acronym for Compact Disc Read-Only Memory.
Chooser - A desk accessory used to select a printer, or other external device, or to log onto a network.
Clipboard - A portion of memory where the Mac temporarily stores information. Called a Copy Buffer in many PC applications because it is used to hold information which is to be moved, as in word processing where text is "cut" and then "pasted".
Clock Rate (MHz) - The instruction processing speed of a computer measured in millions of cycles per second (i.e., 200 MHz).
command - the act of giving an instruction to your Mac either by menu choice or keystroke.
command (apple) key - a modifier key, the Command key used in conjunction with another keystroke to active some function on the Mac.
compiler - a program the converts programming code into a form that can be used by a computer.
compression - a technique that reduces the size of a saved file by elimination or encoding redundancies (i.e., JPEG, MPEG, LZW, etc.)
control key - seldom used modifier key on the Mac.
control panel - a program that allows you to change settings in a program or change the way a Mac looks and/or behaves.
CPU - the Central Processing Unit. The processing chip that is the "brains" of a computer.
crash - a system malfunction in which the computer stops working and has to be restarted.
cursor - The pointer, usually arrow or cross shaped, which is controlled by the mouse.
daisy chaining - the act of stringing devices together in a series (such as SCSI).
database - an electronic list of information that can be sorted and/or searched.
data - (the plural of datum) information processed by a computer.
defragment - (also - optimize) to concatenate fragments of data into contiguous blocks in memory or on a hard drive.
desktop - 1. the finder. 2. the shaded or colored backdrop of the screen.
desktop file - an invisible file in which the Finder stores a database of information about files and icons.
dialog box - an on-screen message box that appears when the Mac requires additional information before completing a command.
digitize - to convert linear, or analog, data into digital data which can be used by the computer.
disk - a spinning platter made of magnetic or optically etched material on which data can be stored.
disk drive - the machinery that writes the data from a disk and/or writes data to a disk.
disk window - the window that displays the contents or directory of a disk.
document - a file you create, as opposed to the application which created it.
DOS - acronym for Disk Operating System - used in IBM PCs.
DPI - acronym for Dots Per Inch - a gauge of visual clarity on the printed page or on the computer screen.
download - to transfer data from one computer to another. (If you are on the receiving end, you are downloading. If you are on the sending end, you are uploading ).
drag - to move the mouse while its button is being depressed.
drag and drop - a feature on the Mac which allows one to drag the icon for a document on top of the icon for an application, thereby launching the application and opening the document.
driver - a file on a computer which tells it how to communicate with an add-on piece of equipment (like a printer).
Ethernet - a protocol for fast communication and file transfer across a network.
expansion slot - a connector inside the computer which allows one to plug in a printed circuit board that provides new or enhanced features.
extension - a startup program that runs when you start the Mac and then enhances its function.
fibre channel - as applied to data storage and network topology
file - the generic word for an application, document, control panel or other computer data.
finder - The cornerstone or home-base application in the Mac environment. The finder regulates the file management functions of the Mac (copying, renaming, deleting...)
floppy - a 3.5 inch square rigid disk which holds data. (so named for the earlier 5.25 and 8 inch disks that were flexible).
folder - an electronic subdirectory which contains files.
font - a typeface that contains the characters of an alphabet or some other letterforms.
footprint - The surface area of a desk or table which is occupied by a piece of equipment.
fragmentation - The breaking up of a file into many separate locations in memory or on a disk.
freeze - a system error which causes the cursor to lock in place.
get info - a Finder File menu command that presents an information window for a selected file icon.
gig - a gigabyte = 1024 megabytes.
hard drive - a large capacity storage device made of multiple disks housed in a rigid case.
head crash - a hard disk crash caused by the heads coming in contact with the spinning disk(s).
high density disk - a 1.4 MB floppy disk.
highlight - to select by clicking once on an icon or by highlighting text in a document.
icon - a graphic symbol for an application, file or folder.
initialize - to format a disk for use in the computer; creates a new directory and arranges the tracks for the recording of data.
insertion point - in word processing, the short flashing marker which indicates where your next typing will begin.
installer - software used to install a program on your hard drive.
interrupt button - a tool used by programmers to enter the debugging mode. The button is usually next to the reset button.
K - short for kilobyte.
keyboard shortcut - a combination of keystrokes that performs some function otherwise found in a pulldown menu.
kilobyte - 1024 bytes.
landscape - in printing from a computer, to print sideways on the page.
launch - start an application.
Measurements (summary) -
*a bit = one binary digit (1 or 0) *"bit" is derived from the contraction b'it (binary digit) -> 8 bits = one byte
*1024 bytes = one kilobyte
*K = kilobyte
*Kb = kilobit
*MB = megabyte
*Mb = megabit
*MB/s = megabytes per second
*Mb/s = megabits per second
*bps = bits per second
i.e., 155 Mb/s = 19.38 MB/s

MB - short for megabyte.
megabyte - 1024 kilobytes.
memory - the temporary holding area where data is stored while it is being used or changed; the amount of RAM a computer has installed.
menu - a list of program commands listed by topic.
menu bar - the horizontal bar across the top of the Mac¹s screen that lists the menus.
multi finder - a component of System 6 that allows the Mac to multi task.
multi tasking - running more than one application in memory at the same time.
nanosecond - one billionth of a second. ( or, the time between the theatrical release of a Dudley Moore film and the moment it begins to play on airplanes).
native mode - using the computers original operating system; most commonly used when talking about the PowerPC can run software written for either the 80x0 systems, or the PowerPC¹s RISC code.
NuBus - expansion slots on the Mac which accept intelligent, self-configuring boards. NuBus is a different bus achitecture than the newer PCI bus and the boards are not interchangable.
operating system - the system software that controls the computer.
optical disk - a high-capacity storage medium that is read by a laser light.
palette - a small floating window that contains tools used in a given application.
partition - a subdivision of a hard drives surface that is defined and used as a separate drive.
paste - to insert text, or other material, from the clipboard or copy buffer.
PC - acronym for personal computer, commonly used to refer to an IBM or IBM clone computer which uses DOS.
PCI - acronym for Peripheral Component Interchange - the newer, faster bus achitecture.
peripheral - an add-on component to your computer.
point - (1/72") 12 points = one pica in printing.
pop-up menu - any menu that does not appear at the top of the screen in the menu bar. (may pop up or down)
port - a connection socket, or jack on the Mac.
Power PC - a processing chip designed by Apple, IBM and Motorola (RISC based).
Power Mac - a family of Macs built around the PowerPC chip.
print spooler - a program that stores documents to be printed on the hard drive, thereby freeing the memory up and allowing other functions to be performed while printing goes on in the background.
QuickTime - the Apple system extension that gives one the ability to compress, edit and play animation, movies and sound on the Mac.
RAM - acronym for Random-Access Memory.
reset switch - a switch on the Mac that restarts the computer in the event of a crash or freeze.
resize box - the small square at the lower right corner of a window which, when dragged, resizes the window.
RISC - acronym for Reduced Instruction Set Computing; the smaller set of commands used by the PowerPC and Power Mac.
ROM - acronym for Read Only Memory; memory that can only be read from and not written to.
root directory - the main hard drive window.
save - to write a file onto a disk.
save as - (a File menu item) to save a previously saved file in a new location and/or with a new name.
scroll - to shift the contents of a window to bring hidden items into view.
scroll bar - a bar at the bottom or right side of a window that contains the scroll box and allows scrolling.
scroll box - the box in a scroll bar that is used to navigate through a window.
SCSI - acronym for Small Computer System Interface.
SCSI address - a number between zero and seven that must be unique to each device in a SCSI chain. Fast and Wide SCSI devices will allow up to 15 SCSI Ids (hexidecimal); however, the length restriction (3 meters) is such that it is virtually impossible to link 15 devices together.
SCSI port - a 25 pin connector on the back of a Mac (native SCSI port); used to connect SCSI devices to the CPU. Some SCSI cards (like the ATTO) have a 68 pin connector.
SCSI terminator - a device placed at the end of a SCSI chain to complete the circuit. (some SCSI devices are self-terminating, or have active termination and do not require this plug).
serial port - a port that allows data to be transmitted in a series (one after the other), such as the printer and modem ports on a Mac.
server - a central computer dedicated to sending and receiving data from other computers (on a network).
shut down - the command from the Special menu that shuts down the Mac safely.
software - files on disk that contain instructions for a computer.
spreadsheet - a program designed to look like an electronic ledger.
start up disk - the disk containing system software and is designated to be used to start the computer.
surge suppressor - a power strip that has circuits designed to reduce the effects of surge in electrical power. (not the same as a UPS)
System file - a file in the System folder that allows your Mac to start and run.
System folder - an all-important folder that contains at least the System file and the Finder.
32 bit addressing - a feature that allows the Mac to recognize and use more than 8MB of memory.
title bar - the horizontal bar at the top of a window which has the name of the file or folder it represents.
upload - to send a file from one computer to another through a network.
Uninterruptible Power Source (UPS)- a constantly charging battery pack which powers the computer. A UPS should have enough charge to power your computer for several minutes in the event of a total power failure, giving you time to save your work and safely shut down.
UPS - acronym for Uninterruptible Power Source.
vaporware - "software" advertised, and sometimes sold, that does not yet exist in a releasable for.
virtual memory - using part of your hard drive as though it were "RAM".
WORM - acronym for Write Once-Read Many; an optical disk that can only be written to once (like a CD-ROM).
zoom box - a small square in the upper right corner of a window which, when clicked, will expand the window to fill the whole screen.

Wednesday, October 12, 2011

IBPS CLERKS EXAM COMPUTER KNOWLEDGE QUESTIONS

1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D

12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D

13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B

14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B


16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C

17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D

19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C


20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B

21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C

22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C

23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A


24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C

25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D

26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A

27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B

28. The ____________, also called the “brains” of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D

29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B

30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A

31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B

32. System software is the set of programs that enables your computers hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C

35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B

38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D

39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A

40. ____________ is the science revolving around the use of nano structures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A

41. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Answer: D

42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A

43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B

44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B

46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A

49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D

50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A

IBPS CLERKS EXAM COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. A word in a web page that, when clicked, opens another document is called ?
  • 01. URL
  • 02. anchor
  • 03. hyperlink
  • 04. None of these

2. Tunk e-mail is also called ?
  • 01. Spool
  • 02. Spoof
  • 03. sniffer script
  • 04. spam

3. What is the full form of USB as used in the computer related activities ?
  • 01. Universal Service Block
  • 02. Universal Security Block
  • 03. Universal Serial Bus
  • 04. None of these

4. Microprocessor can be used to make ?
  • 01. Digital Systems
  • 02. Calculators
  • 03. Computer
  • 04. All of the above

5. When did arch rivals IBM and Apple computers Inc. decide to join hands ?
  • 01. 1992
  • 02. 1991
  • 03. 1980
  • 04. 1993

6. Which of the following is the correct order of the four major functions of a computer ?
  • 01. Process --> Output --> Process --> Storage
  • 02. Process --> Storage --> Process --> Output
  • 03. Input --> Output -- > Process --> Storage
  • 04. Input --> Process --> Output a Storage

7. Which of the following is a Web browser ?
  • 01. Fire fox
  • 02. Power Point
  • 03. Word
  • 04. All are Web browsers

8. Which out of the following is not a DBMS software ?
  • 01. SyBase
  • 02. ORACLE
  • 03. Data base 200
  • 04. FOXPRO

9. Which of the following refers to a small, single-site network ?
  • 01. CPU
  • 02. RAM
  • 03. USB
  • 04. LAN

10. A Web site address is unique name that identifies a specific _____ on the web ?
  • 01. Web site
  • 02. Link
  • 03. Web browser
  • 04. None of these

Sunday, October 9, 2011

Indian Bank Computer Officers' Exam Solved Paper






Computer General Awareness
1. A passive threat to computer security is—
(1) Malicious Intent
(2) Sabotage
(3) Accident Errors
(4) Espionage Agents
(5) None of these

2. The Secure Electronic Transaction (SET) specification—
(1) is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate
(2) provides private-key encryption of all data that passes between a client and a server
(3) allows users to choose an encryption scheme for the data that passes between a client and a server
(4) uses a public-key encryption to secure credit-card transaction systems
(5) None of these

3. ……………allows wireless mobile devices to access the Internet and its services such as the Web and e-mail—
(1) TCP/IP
(2) Ethernet
(3)WAP
(4) Token ring
(5) None of these

4. 'DOS' floppy disk does not have—
(1) A Boot Record
(2) A File Allocation Table
(3) A Root Directory
(4) Virtual Memory
(5) BIOS

5. 'MICR' technology used for clearance of cheques by banks refers to—
(1) Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition
(5) None of these

6. All the information collected during database development is stored in a—
(1) repository
(2) data warehouse
(3) RAD
(4) CASE
(5) None of these

7. The……………….component is used by the data analyst to create the queries that access the database.
(1) data extraction
(2) end-user query tool
(3) end-user presentation tool
(4) data store
(5) None of these

8. A(n)…………….allows network users to share a single copy of software, which resides on the network server.
(1) single-user license agreement
(2) network site license
(3) end-user license agreement
(4) business software license
(5) None of these

9. A polymorphic virus—
(1) modifies its program code each time it attaches itself to another program or file
(2) is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains
(3) a malicious-logic program that hides within or looks like a legitimate program
(4) infects a program file, but still reports the size and creation date of the original, uninfected program
(5) None of these

10. Microwave transmission is used in environments where installing physical transmission media is—
(1) difficult or impossible and where line-of-sight transmission is unavailable
(2) easy or promising and where line-of-sight transmission is unavailable
(3) difficult or impossible and where line-of-sight transmission is available
(4) easy or promising and where line-of-sight transmission is available
(5) None of these

11. Which is NOT a good Web security strategy?
(1) Restrict access to the Web server; keep a minimum number of ports open
(2) Limit the users who can load software, edit or add files.
(3) Add demo programs, so users can test system without accessing production data.
(4) Remove unnecessary compilers and interpreters.
(5) None of these

12. The altering of data so that it is not usable unless the changes are undone is—
(1) Biometrics
(2) Compression
(3) Encryption
(4) Ergonomics
(5) None of these

13. The word FIP stands for—
(1) File Translate Protocol
(2) File Transit Protocol
(3) File Typing Protocol
(4) File Transfer Protocol
(5) None of these

14. Voice mail—
(1) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet
(2) permits users to converse in real time with each other via the computer while connected to the Internet
(3) functions much like an answering machine, allowing callers to leave a voice message for the called party
(4) involves using video and computer technology to conduct a meeting between participants at geographically separate locations
(5) None of these

15. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is—
(1) Bridge
(2) Gateway
(3) Router
(4) Modem
(5) All of these

16. Which of the following is a general-purpose programming language, designed by Sun Microsystems, and well suited for use on the Web?
(1) VB Script
(2) Java Script
(3) CSS
(4) Java
(5) None of these

17. This.............tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
(1) Client
(2) Applications/Web server
(3) Enterprise server
(4) DBA
(5) None of these

18. RSA is—
(1) Symmetric Cryptosystem
(2) Asymmetric Cryptosystem
(3) Block Cypher
(4) Digital Signature
(5) None of these

19. A DVD-RAM is similar to a………………except it has storage capacities up to 5.2 GB.
(1) CD-R
(2) floppy disk
(3) CD-RW
(4) hard disk
(5) None of these

20. When you are selecting a mouse for a particular computer system, what is the most important consideration?
(1) The type of drivers that come with the mouse
(2) The length of the mouse cord
(3) The type of connector the mouse is equipped with
(4) The number of buttons the mouse has
(5) None of these

21. How is power supplied to a low-power USB device?
(1) Through a power cable
(2) From an external power supply
(3) Directly from the computer's power supply
(4) Through the USB cable
(5) None of these

22. All of the following are basic principles of net works, except—
(1) each computer must have a network card
(2) there must be communications media connecting the network hardware devices
(3) there must be at least one connecting device
(4) each computer must have software that supports the movement of information
(5) None of these

23. The………….data mining technique derives rules from real-world case examples.
(1) Rule discover
(2) Signal processing
(3) Neural nets
(4) Case-based reasoning
(5) None of these

24. …………….are used to identify a user who returns to a Website.
(1) Cookies
(2) Plug-ins
(3) Scripts
(4) ASPs
(5) None of these

25. Which one of the following objects is passed to a Java Bean when one of its properties is set via a JSP action?
(1) Servlet Request
(2) Http Servlet Request
(3) Servlet Response
(4) Http Servlet Response
(5) None of these

Answers :
1. (1) 2. (4) 3. (3) 4. (4) 5. (1)
6. (2) 7. (2) 8. (2) 9. (1) 10. (4)
11. (4) 12. (3) 13. (1) 14. (3) 15. (2)
16. (2) 17. (1) 18. (4) 19. (3) 20. (3)
21. (4) 22. (2) 23. (3) 24. (1) 25. (3)

Friday, October 7, 2011

Union Bank of India Probationary Officers Exam., 2011



Computer Knowledge 
(Held on 9-1-2011)


1. You can keep your personal files/folders in—
(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Ans : (B)

2. The primary purpose of software is to turn data into—
(A) Web sites
(B) Information
(C) Programs
(D) Objects
(E) None of these
Ans : (B)

3. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)


4. A compiler translates a program written in a high-level language into—
(A) Machine language
(B) An algorithm
(C) A debugged program
(D) Java
(E) None of these
Ans : (A)

5. When you turn on the computer, the boot routine will perform this test—
(A) RAM test
(B) Disk drive test
(C) Memory test
(D) Power-on self-test
(E) None of these
Ans : (B)

6. A ……is a unique name that you give to a file of information.
(A) device letter
(B) folder
(C) filename
(D) filename extension
(E) None of these
Ans : (D)

7. Hardware includes—
(A) all devices used to input data into a computer
(B) sets of instructions that a computer runs or executes
(C) the computer and all the devices connected to it that are used to input and output data
(D) all devices involved in processing information including the central processing unit, memory and storage
(E) None of these
Ans : (D)

8. A ……… contains specific rules and words that express the logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
Ans : (A)

9. All the deleted files go to—
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)

10. The simultaneous processing of two or more programs by multiple processors is—
(A) Multiprogramming
(B) Multitasking
(C) Time-sharing
(D) Multiprocessing
(E) None of these
Ans : (D)

11. The secret code that restricts entry to some programs—
(A) Password
(B) Passport
(C) Entry-code
(D) Access-code
(E) None of these
Ans : (A)

12. Computers use the ……… number system to store data and perform calculations.
(A) binary
(B) octal
(C) decimal
(D) hexadecimal
(E) None of these
Ans : (A)

13. The main function of the ALU is to—
(A) Perform arithmetic and logical operations
(B) Store data and information for future use
(C) Control computer output, such as printing
(D) Monitor all computer activities
(E) None of these
Ans : (A)

14. ……is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)

15. Softcopy is the intangible output, so then what is hardcopy ?
(A) The physical parts of the computer
(B) The printed parts of the computer
(C) The printed output
(D) The physical output devices
(E) None of these
Ans : (C)

16. A(n) ……… is a program that makes the computer easier to use.
(A) utility
(B) application
(C) operating system
(D) network
(E) None of these
Ans : (A)

17. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)—
(A) Workstation
(B) CPU
(C) Magnetic disk
(D) Integrated circuit
(E) None of these
Ans : (D)

18. Computer systems are comprised of—
(A) Hardware, programs, processors, procedures and people
(B) Hardware, programs, information, people and procedures
(C) Hardware, programs, information, people and networks
(D) Hardware, software, procedures, networks and people
(E) None of these
Ans : (D)

19. An error in a computer program—
(A) Crash
(B) Power Failure
(C) Bug
(D) Virus
(E) None of these
Ans : (C)

20. What is output ?
(A) What the processor takes from the user
(B) What the user gives to the processor
(C) What the processor gets from the user
(D) What the processor gives to the user
(E) None of these
Ans : (D)

21. The person who writes and tests computer programs is called a—
(A) programmer
(B) computer scientist
(C) software engineer
(D) project developer
(E) None of these
Ans : (A)

22. A set of instructions telling the computer what to do is called—
(A) mentor
(B) instructor
(C) compiler
(D) program
(E) None of these
Ans : (D)

23. What menu is selected to print ?
(A) Edit
(B) Special
(C) File
(D) Tools
(E) None of these
Ans : (C)

24. What is backup ?
(A) Adding more components to your network
(B) Protecting data by copying it from the original source to a different destination
(C) Filtering old data from the new data
(D) Accessing data on tape
(E) None of these
Ans : (B)

25. The term bit is short for—
(A) Megabyte
(B) Binary language
(C) Binary digit
(D) Binary number
(E) None of these
Ans : (C)

26. A saved document is referred to as a—
(A) file
(B) word
(C) folder
(D) project
(E) None of these
Ans : (A)

27. Specialized programs that assist users in locating information on the Web are called—
(A) Information engines
(B) Search engines
(C) Web browsers
(D) Resource locators
(E) None of these
Ans : (B)

28. An application program has which one of the following functions ?
(A) It specifies the informationprocessing procedures required by a particular informationprocessing job
(B) It controls the input/output and storage functions of the computer system
(C) It provides various support services for the computer system
(D) It supervises the operations of the CPU
(E) None of these
Ans : (A)

29. In page preview mode—
(A) You can see all pages of your document
(B) You can only see the page you are currently working
(C) You can only see pages that do not contain graphics
(D) You can only see the title page of your document
(E) None of these
Ans : (A)

30. An operating system that can do multitasking means that—
(A) The operating system can divide up work between several CPUs
(B) Several programs can be operated concurrently
(C) Multiple people can use the computer concurrently
(D) All of the above
(E) None of these
Ans : (B)

31. The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ……… command.
(A) Replace
(B) Find
(C) Lookup
(D) Search
(E) None of these
Ans : (B)

32. What is the default file extension for all Word documents ?
(A) WRD
(B) TXT
(C) DOC
(D) FIL
(E) None of these
Ans : (C)

33. With a CD you can—
(A) Read
(B) Write
(C) Read and Write
(D) Either Read or Write
(E) None of these
Ans : (C)

34. A collection of interrelated records is called a—
(A) Utility file
(B) Management information system
(C) Database
(D) Spreadsheet
(E) None of these
Ans : (C)

35. To move to the beginning of a line of text, press the ……… key.
(A) PageUp
(B) A
(C) Home
(D) Enter
(E) None of these
Ans : (C)

36. The term ‘user interface’ refers to—
(A) What the user sees on the screen and how they can interact with it
(B) How the operating system responds to user commands
(C) the means by which the user interacts with the peripheral devices on the computer
(D) The monitor that is available for the computer
(E) None of these
Ans : (A)

37. The background of any Word document—
(A) Is always white colour
(B) Is the colour you preset under the Options menu
(C) Is always the same for the entire document
(D) Can have any colour you choose
(E) None of these
Ans : (D)

38. Reusable optical storage will typically have the acronym—
(A) CD
(B) DVD
(C) ROM
(D) RW
(E) None of these
Ans : (D)

39. For creating a document, you use ……… command at File Menu.
(A) Open
(B) Close
(C) New
(D) Save
(E) None of these
Ans : (C)

40. The contents of ……… are lost when the computer turns off.
(A) storage
(B) input
(C) output
(D) memory
(E) None of these
Ans : (D)

41. Grouping and processing all of a firm’s transactions at one time is called—
(A) A database management system
(B) Batch processing
(C) A real-time system
(D) An on-line system
(E) None of these
Ans : (C)

42. A printer is this kind of device—
(A) Input
(B) Word processing
(C) Processing
(D) Output
(E) None of these
Ans : (D)

43. Text in a column is generally aligned—
(A) Justified
(B) Right
(C) Center
(D) Left
(E) None of these
Ans : (D)

44. What type of device is a computer mouse ?
(A) Input
(B) Output
(C) Software
(D) Storage
(E) None of these
Ans : (A)

45. In Excel, Charts are created using which option ?
(A) Chart Wizard
(B) Pivot Table
(C) Pie Chart
(D) Bar Chart
(E) None of these
Ans : (A)

46. What is the permanent memory built into your computer called ?
(A) RAM
(B) ROM
(C) CPU
(D) CD-ROM
(E) None of these
Ans : (B)

47. If text was highlighted and ‘Edit’ ‘Copy’ was clicked, what would happen ?
(A) Text would be copied from the document and placed in the clipboard
(B) Text would be removed from the document and placed in the clipboard
(C) Text from the clipboard would be placed in the document at the place where the cursor is blinking
(D) (B) and (C) above
(E) None of these
Ans : (A)

48. You can start Microsoft Word by using ……… button.
(A) New
(B) Start
(C) Program
(D) Control Panel
(E) None of these
Ans : (C)

49. You click at B to make the text—
(A) Italics
(B) Underlined
(C) Italics and Underlined
(D) Bold
(E) None of these
Ans : (D)

50. The……becomes different shapes depending on the task you are performing.
(A) Active tab
(B) Insertion point
(C) Mouse pointer
(D) Ribbon
(E) None of these
Ans : (C)

Punjab and Sind Bank Clerk Exam., 2010


Computer Knowledge (Held on 23-5-2010)

1. Memory, also called random access memory, or RAM……….
(A) contains the electronic circuits that cause processing to occur
(B) makes the information resulting from processing available for use
(C) allows data, programs, commands, and user responses to be entered into a computer
(D) consists of electronic components that store data
(E) None of these
Ans : (D)

2. Correcting errors in a program is referred to as………
(A) debugging
(B) bugging
(C) rectifying
(D) modifying
(E) None of these
Ans : (A)

3. An assembler is used to translate a program written in………
(A) a low level language
(B) machine language
(C) a high level language
(D) assembly language
(E) None of these
Ans : (D)


4. The capability of the operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is………
(A) Multiprocessing
(B) Multitasking
(C) Multiprogramming
(D) Multiexecution
(E) None of these
Ans : (B)

5. The basic goal of computer process is to convert data into……
(A) information
(B) tables
(C) files
(D) graphs
(E) None of these
Ans : (A)

6. A hard copy of a document is …
(A) stored in the hard disk
(B) stored on a floppy
(C) stored on a CD
(D) printed on the printer
(E) None of these
Ans : (D)

7. Which of the following is not an output device ?
(A) Plotter
(B) Printer
(C) Scanner
(D) Monitor
(E) None of these
Ans : (C)

8. Which keys can be used together with other keys for special tasks ?
(A) Insert, Delete
(B) Ctrl, Shift
(C) Left Arrow, Right Arrow
(D) Page up, Page Down
(E) None of these
Ans : (B)

9. Which is the part of a computer that one can touch and feel ?
(A) Programs
(B) Software
(C) Hardware
(D) Output
(E) None of these
Ans : (C)

10. Computers gather data, which means they allow users to…… data.
(A) present
(B) store
(C) output
(D) input
(E) None of these
Ans : (D)

11. CPU stands for……
(A) CD-run on memory
(B) central processing unit
(C) call powers up
(D) create programs user
(E) None of these
Ans : (B)

12. Moves the cursor one space to the right to puts spaces in between words……
(A) control key
(B) space bar
(C) printer
(D) mouse
(E) None of these
Ans : (B)

13. Use this when you want to make all letters capital without having to use the shift key for each character………
(A) shifter
(B) upper case
(C) caps lock key
(D) icon
(E) None of these
Ans : (C)

14. A device that reads the information contained on a disk and transfers it to the computer’s memory……
(A) monitor
(B) screen
(C) keyboard
(D) disk drive
(E) None of these
Ans : (D)

15. Which of the following is not the major function of a computer ?
(A) Processing data into information
(B) Storing data or information
(C) Gathering data
(D) Analysing data or information
(E) None of these
Ans : (D)

16. A disk on which you store information………
(A) plate
(B) data disk
(C) paper disk
(D) TV disk
(E) None of these
Ans : (B)

17. Allows you to print……
(A) ribbon
(B) monitor
(C) go now
(D) Control-P
(E) None of these
Ans : (D)

18. Easy to use……
(A) user friendly
(B) select
(C) helpful
(D) ever-ready
(E) None of these
Ans : (A)

19. When your computer stops working suddenly, it is referred to as a……
(A) crash
(B) die
(C) death
(D) penalty
(E) None of these
Ans : (E)

20. The smallest item of useful information a computer can handle…
(A) bite
(B) byte
(C) bit
(D) bait
(E) None of these
Ans : (C)

21. Devices that let the computer communicate with you……
(A) input
(B) output
(C) type
(D) print
(E) None of these
Ans : (B)

22. Devices that allow you to put information into the computer ……
(A) input
(B) output
(C) type
(D) print
(E) None of these
Ans : (A)

23. Eight bits of data……
(A) octabit
(B) word
(C) sentence
(D) byte
(E) None of these
Ans : (D)

24. The secret code that gives you access to some programs……
(A) clue
(B) cue
(C) password
(D) help
(E) None of these
Ans : (C)

25. The different styles of lettering in a word processing program……
(A) font
(B) calligraphy
(C) writing
(D) manuscript
(E) None of these
Ans : (A)

26. Any letter, number, or symbol found on the keyboard that you can type into the computer……
(A) output
(B) character
(C) type
(D) print
(E) None of these
Ans : (B)

27. A symbol or question on the screen that prompts you to take action and tell the computer what to do next……
(A) scanner
(B) questionnaire
(C) prompt and dialog box
(D) information seeker
(E) None of these
Ans : (C)

28. Choices are referred to as……
(A) options
(B) exit
(C) boot
(D) folder
(E) None of these
Ans : (A)

29. Anything written on the screen ……
(A) cursor
(B) text
(C) folder
(D) boot
(E) None of these
Ans : (B)

30. Lets you leave a screen or program……
(A) boot
(B) programs
(C) exit
(D) text
(E) None of these
Ans : (C)

31. Instructions that tell the computer what to do. Another name for software……
(A) programs
(B) CPU
(C) options
(D) folder
(E) None of these
Ans : (A)

32. A program which helps create written documents and lets you go back and make corrections as necessary……
(A) spreadsheet
(B) personal writer
(C) word printer
(D) word processor
(E) None of these
Ans : (D)

33. A place that a user can create to store files……
(A) cursor
(B) text
(C) folder
(D) boot
(E) None of these
Ans : (C)

34. Start or restart the computer……
(A) exit
(B) kick
(C) boot
(D) kick-start
(E) None of these
Ans : (C)

35. A blinking indicator that shows you where your next action will happen……
(A) CPU
(B) cursor
(C) tool bar
(D) boot
(E) None of these
Ans : (B)

36. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs……
(A) menu bar
(B) tool bar
(C) user friendly
(D) word processor
(E) None of these
Ans : (A)

37. CD-ROM stands for……
(A) central processing unit
(B) CD-remote open mouse
(C) CD-resize or minimize
(D) CD-read only memory
(E) None of these
Ans : (D)

38. To change written work already done……
(A) file
(B) edit
(C) cut
(D) close
(E) None of these
Ans : (B)

39. A place in the computer system where data and programs are temporarily stored……
(A) paste
(B) open
(C) memory
(D) pocket
(E) None of these
Ans : (C)

40. A key that will erase information from the computerÕs memory and characters on the screen……
(A) edit
(B) delete key
(C) dummy out
(D) trust key
(E) None of these
Ans : (B)

41. To insert a copy of the clipboard contents, whatever was last cut or copied at the insertion point……
(A) paste
(B) stick in
(C) fit in
(D) push in
(E) None of these
Ans : (A)

42. The command used to remove text or graphics from a document. The information is then stored on a clipboard so you can paste it.
(A) chop
(B) cut
(C) clip
(D) cart away
(E) None of these
Ans : (B)

43. To exit the program without leaving the application……
(A) file
(B) edit
(C) copy
(D) close
(E) None of these
Ans : (D)

44. A removable magnetic disc that holds information……
(A) floppy disk
(B) hard drive
(C) monitor
(D) portable
(E) None of these
Ans : (B)

45. A command that saves what you are working on into the hard drive, or onto a disk……
(A) view
(B) hold
(C) save
(D) go
(E) None of these
Ans : (E)

46. A command to get a file you worked on from the memory where it was stored……
(A) close
(B) delete
(C) open
(D) get it
(E) None of these
Ans : (C)

47. To move down a page in a document……
(A) jump
(B) fly
(C) wriggle
(D) scroll
(E) None of these
Ans : (D)

48. The primary device that a computer uses to store information……
(A) TV
(B) storehouse
(C) desk
(D) hard drive
(E) None of these
Ans : (D)

49. Screen that comes on when you turn on your computer that shows all the icons……
(A) desktop
(B) face to face
(C) viewer
(D) view space
(E) None of these
Ans : (A)

50. A program that works like a calculator for keeping track of money and making budgets……
(A) calculator
(B) spreadsheet
(C) budgeter
(D) financier
(E) None of these
Ans : (B)

Punjab National Bank Clerk Exam., 2010


Marketing and Computer Knowledge (Held on 4-4-2010) 
 
1. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group ?
1. Marketing function includes—
(A) Designing new products
(B) Advertisements
(C) Publicity
(D) After sales service
(E) All of these
Ans : (E)

2. Lead generation can be resorted to by browsing—
(A) Telephone directories
(B) Yellow pages
(C) Internet sites
(D) List of existing customers
(E) All of these
Ans : (E)

3. Effective selling skills depend on—
(A) Effective lead generation
(B) Sales Call Planning
(C) Territory Allocation
(D) Effective communication skills
(E) All of these
Ans : (E)

4. Market Information means—
(A) Knowledge level of marketing staff
(B) Information about marketing staff
(C) Information regarding Share market
(D) Knowledge of related markets
(E) All of these
Ans : (D)

5. Marketing channels mean—
(A) Delivery period
(B) Delivery time
(C) Delivery outlets
(D) Delivery place
(E) All of these
Ans : (E)


6. ‘Buyer Resistance’ means—
(A) Buyer’s interest in the product being sold
(B) Buyer fighting with the seller
(C) Buyer’s hesitation in buying the product
(D) Buyer becoming a seller
(E) Buyer buying the product
Ans : (C)

7. Marketing is the function of—
(A) Sales persons
(B) Production Department
(C) Planning Department
(D) Team leaders
(E) A collective function of all staff
Ans : (E)

8. A DSA means—
(A) Direct Service Agency
(B) Direct Selling Agent
(C) Double Selling Agent
(D) Distribution Agency
(E) None of these
Ans : (B)

9. Service Marketing is resorted to in—
(A) All manufacturing companies
(B) All production houses
(C) Export units
(D) Insurance companies and banks
(E) All of these
Ans : (D)

10. Marketing is—
(A) A skilled person’s job
(B) A one day function
(C) A one time act
(D) Required only when a new product is launched
(E) None of these
Ans : (A)

11. Market share refers to—
(A) Share market prices
(B) Price fluctuation in the market
(C) Share issue floated by the company
(D) Share of wallet
(E) Share of business of the company as compared to peers
Ans : (E)

12. Service Marketing is the same as—
(A) Internet marketing
(B) Telemarketing
(C) Internal Marketing
(D) Relationship Marketing
(E) All of these
Ans : (D)

13. Current Accounts can be freely opened by ………… Find the incorrect answer.
(A) All NRIs
(B) All businessmen
(C) Government departments
(D) Firms and Companies
(E) HUFs
Ans : (E)

14. Buyer Resistance can be overcome by—
(A) Cordial relation between buyer and seller
(B) Good negotiation
(C) Persuasive communication
(D) Good after sales service
(E) All of these
Ans : (A)

15. Cross-selling is useful for canvassing—
(A) Current Accounts
(B) Fixed Deposit Accounts
(C) Student loans
(D) Car loans
(E) All of these
Ans : (E)

16. Market segmentation helps to determine—
(A) Target groups
(B) Sale price
(C) Profit levels
(D) Product life cycle
(E) All of these
Ans : (A)

17. The target group for Car loans is—
(A) Auto manufacturing companies
(B) Car dealers
(C) Taxi drivers
(D) Car purchasers
(E) All of these
Ans : (E)

18. The best promotional tool in any marketing is—
(A) e-promotion
(B) Public Relations
(C) Viral marketing
(D) Word of mouth publicity
(E) Advertisements
Ans : (E)

19. Customisation results in—
(A) Customer exodus
(B) Customer retention
(C) Customer complaints
(D) All of these
(E) None of these
Ans : (B)

20. The target group for Education Loans is—
(A) All parents
(B) All Professors
(C) All Research Scholars
(D) All Tutorial Colleges
(E) All College Students
Ans : (E)

21. Find the correct sentence.
(A) Higher the price, higher are the sales
(B) More sales persons lead to more sales
(C) Mission statement is part of a Market Plan
(D) Better sales incentives means better performance
(E) All customers are profitable customers
Ans : (C)

22. Good marketing strategy envisages good and proper—
(A) Product development
(B) Promotion and Distribution
(C) Pricing
(D) Relationship management
(E) All of these
Ans : (E)

23. Savings Accounts can be opened by—
(A) All individuals fulfilling KYC norms
(B) All individuals earning more than Rs. 1,00,000 per annum
(C) All individuals above the age of 18
(D) All salaried persons only
(E) All students below the age of 18
Ans : (C)

24. Situation Analysis is useful for—
(A) SWOT Analysis
(B) Analysis of Sales person’s performances
(C) Analysis of capital markets
(D) All of these
(E) None of these
Ans : (A)

25. Information that comes from an external source and fed into computer software is called—
(A) Input
(B) Output
(C) Throughput
(D) Reports
(E) None of these
Ans : (A)

26. With a CD you can—
(A) Read
(B) Write
(C) Neither Read nor Write
(D) Both Read and Write
(E) None of these
Ans : (D)

27. Errors in a computer program are referred to as—
(A) bugs
(B) mistakes
(C) item overlooked
(D) blunders
(E) None of these
Ans : (A)

28. Which of the following are computers that can be carried around easily ?
(A) Laptops
(B) Supercomputers
(C) PCs
(D) Minicomputers
(E) None of these
Ans : (A)

29. What menu is selected to change font and style ?
(A) Tools
(B) File
(C) Format
(D) Edit
(E) None of these
Ans : (C)

30. Where is the disk put in a computer ?
(A) In the hard drive
(B) In the disk drive
(C) Into the CPU
(D) In the modem
(E) None of these
Ans : (B)

31. A computer’s hard disk is—
(A) an arithmetic and logical unit
(B) computer software
(C) operating system
(D) computer hardware
(E) None of these
Ans : (D)

32. A compiler is used to translate a program written in—
(A) a low level language
(B) a high level language
(C) assembly language
(D) machine language
(E) None of these
Ans : (B)

33. In programming, you use the following keys—
(A) Arrow keys
(B) Function keys
(C) Alpha keys
(D) page up and Page Down keys
(E) None of these
Ans : (A)

34. Which keys enable the input of numbers quickly ?
(A) Function keys
(B) The numeric keypad
(C) Ctrl, shift and alt
(D) Arrow keys
(E) None of these
Ans : (B)

35. Files are organized by storing them in—
(A) tables
(B) databases
(C) folders
(D) graphs
(E) None of these
Ans : (C)

36. The secret code that restricts entry to some programs—
(A) entry-code
(B) passport
(C) password
(D) access-code
(E) None of these
Ans : (C)

37. Advertisements are not required in—
(A) Public Sector banks
(B) Private Sector banks
(C) Government concerns
(D) Profit making companies
(E) None of these
Ans : (C)

38. The most common method of entering text and numerical data into a computer system is through the use of a—
(A) plotter
(B) scanner
(C) printer
(D) keyboard
(E) None of these
Ans : (D)

39. Computer programs are also known as—
(A) operating systems
(B) documents
(C) peripherals
(D) applications
(E) None of these
Ans : (D)

40. A collection of unprocessed items is ………
(A) information
(B) data
(C) memory
(D) reports
(E) None of these
Ans : (B)

41. ……… is when the more powerhungry components, such as the monitor and the hard drive, are put in idle.
(A) Hibernation
(B) Power down
(C) Standby mode
(D) The shutdown procedure
(E) None of these
Ans : (C)

42. ……… is the process of dividing the disk into tracks and sectors.
(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
(E) None of these
Ans : (B)

43. A saved document is referred to as a ………
(A) file
(B) word
(C) folder
(D) project
(E) None of these
Ans : (A)

44. Which of the following is the largest unit of storage ?
(A) GB
(B) KB
(C) MB
(D) TB
(E) None of these
Ans : (D)

45. The operating system is the most common type of ……… software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (B)

46. A ……… is approximately one billion bytes.
(A) kilobyte
(B) bit
(C) gigabyte
(D) megabyte
(E) None of these
Ans : (C)

47. A scanner scans—
(A) Pictures
(B) Text
(C) Both Pictures and Text
(D) Neither Pictures nor Text
(E) None of these
Ans : (C)

48. Dumb terminals have terminals and—
(A) Mouse
(B) Speakers
(C) Keyboard
(D) Mouse or Speakers
(E) None of these
Ans : (C)

49. The portion of the CPU that coordinates the activities of all the other computer components is the—
(A) motherboard
(B) coordination board
(C) control unit
(D) arithmetic logic unit
(E) None of these
Ans : (C)

50. A repair for a known software bug, usually available at no charge on the Internet, is called a(n)—
(A) version
(B) patch
(C) tutorial
(D) FAQ
(E) None of these
Ans : (B)

Allahabad Bank Probationary Officers Exam, 2010


Computer Knowledge 
(Held on 21-2-2010)

1. A………typically connects personal computers within a very limited geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)

2. Computers manipulate data in many ways, and this manipulation is called—
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)

3. An e-mail address typically consists of a user ID followed by the ……… sign and the name of the e-mail server that manages the user’s electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)


4. Software applies……, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)

5. A file extension is separated from the main file name with a(n) ……, but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)

6. An ad hoc query is a—
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)

7. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)

8. A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Ans : (B)

9. The desktop contains small graphics called—
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Ans : (C)

10. C, BASIC, COBOL, and Java are examples of ……… languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)

11. A(n)………camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Ans : (A)

12. ……makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) E-commerce
(C) E-spend
(D) E-business
(E) None of these
Ans : (D)

13. Networks are monitored by security personnel and supervised by ………who set(s) up accounts and passwords for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Ans : (C)

14. Application software is designed to accomplish—
(A) real-world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Ans : (D)

15. A telephone number, a birth date, and a customer name are all examples of—
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Ans : (D)

16. The human-readable version of a program is called—
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Ans : (D)

17. A ……… computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
Ans : (A)

18. ……… is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Ans : (C)

19. Programs such as Internet Explorer that serve as navigable windows into the Web are called—
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Ans : (D)

20. A ……… is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Ans : (C)

21. When you save to ………, your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
Ans : (C)

22. The motherboard is the—
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Ans : (D)

23. A computer-intensive problemruns on a—
(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these
Ans : (C)

24. A(n)……converts and executesone statement at a time.
(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these
Ans : (B)

25. The term ……… designates equipment that might be added to a computer system to enhance its functionality.
(A) digital device
(B) system add-on
(C) disk pack
(D) peripheral device
(E) None of these
Ans : (D)

26. Approximately how many bytes make one megabyte ?
(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these
Ans : (D)

27. What is MP3 ?
(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these
Ans : (C)

28. All the deleted files go to—
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)

29. ……… this is the act of copying or downloading a program from a network and making multiple copies of it.
(A) Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site-license piracy
(E) None of these
Ans : (C)

30. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)

31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
Ans : (B)

32. In MICR, C stands for ……….
(A) Code
(B) Colour
(C) Computer
(D) Character
(E) None of these
Ans : (D)

33. Fax machines and imaging systems are examples of—
(A) bar-code readers
(B) imaging systems
(C) scanning devices
(D) pen-based systems
(E) None of these
Ans : (B)

34. When writing a document, you can use the ……… feature to find an appropriate word or an alternative word if you find yourself stuck for the right word.
(A) dictionary
(B) word finder
(C) encyclopedia
(D) thesaurus
(E) None of these
Ans : (A)

35. Which key is used in combination with another key to perform a specific task ?
(A) Function
(B) Control
(C) Arrow
(D) Space bar
(E) None of these
Ans : (B)

36. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—
(A) read-only
(B) memory-only
(C) run-only
(D) write-only
(E) None of these
Ans : (A)

37. In an information system, alphanumeric data normally takes the form of—
(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these
Ans : (B)

38. A Website’s main page is called its—
(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these
Ans : (A)

39. When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these
Ans : (A)

40. A collection of interrelated files in a computer is a—
(A) file manager
(B) field
(C) record
(D) database
(E) None of these
Ans : (D)

41. A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these
Ans : (B)

42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as—
(A) a roller ball which moves the cursor
(B) a pen-shaped device which allows data to be entered through the CRT screen
(C) a figure which resembles a familiar office device
(D) an outdated input device
(E) None of these
Ans : (A)

43. Various applications and documents are represented on the Windows desktop by—
(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these
Ans : (D)

44. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these
Ans : (D)

45. The real business and competitive value of information technology lies in—
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
(D) The capabilities of the hardware and the speed at which it processes information
(E) None of these
Ans : (B)

46. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
(A) Open source vendors
(B) Alliances
(C) Application service providers
(D) All of the above
(E) None of these
Ans : (C)

47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(A) Opening an application previously installed on the computer
(B) Borrowed copies of software
(C) Viewing a website without causing any additional transactions
(D) Running antivirus programs
(E) None of these
Ans : (B)

48. Collecting personal information and effectively posing as another individual is known as the crime of—
(A) spooling
(B) dentity theft
(C) spoofing
(D) hacking
(E) None of these
Ans : (B)

49. The first step in the transaction processing cycle is—
(A) database operations
(B) audit
(C) data entry
(D) user inquiry
(E) None of these
Ans : (C)

50. In the information systems concept, the output function involves—
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation process to their ultimate destination
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
(E) None of these
Ans : (A)

State Bank of India Clerk (First Shift) Examination, 2009


Computer Knowledge
(Held on 8-11-2009)  
 
1. If text was highlighted and ‘Edit’ ‘Copy’ was clicked, what would happen ?
(A) Text would be copied from the document and placed in the clipboard
(B) Text would be removed from the document and placed in the clipboard
(C) Text from the clipboard would be placed in the document at the place where the cursor is blinking
(D) Only (B) and (C)
(E) None of these
Ans : (A)

2. The blinking point which shows your position in the text is called—
(A) Blinker
(B) Cursor
(C) Causer
(D) Pointer
(E) None of these
Ans : (B)

3. For seeing the output, you use—
(A) Monitor
(B) Keyboard
(C) Mouse
(D) Scanner
(E) None of these
Ans : (A)


4. CDs are of which shape ?
(A) Square
(B) Rectangular
(C) Round
(D) Hexagonal
(E) None of these
Ans : (C)

5. A scanner scans—
(A) Pictures
(B) Text
(C) Both Pictures and Text
(D) Neither Pictures nor Text
(E) None of these
Ans : (C)

6. A directory within in directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)

7. For opening and closing of the file in Excel, you can use which bar ?
(A) Formatting
(B) Standard
(C) Title
(D) Formatting or Title
(E) None of these
Ans : (C)

8. Which of the following controls the manner of interaction between the user and the operating system ?
(A) User interface
(B) Language translator
(C) Platform
(D) Screen saver
(E) None of these
Ans : (A)

9. Computer language used on the Internet is—
(A) BASIC
(B) COBOL
(C) Java
(D) Pascal
(E) None of these
Ans : (C)

10. You click at B to make the text—
(A) Italics
(B) Underlined
(C) Italics and Underlined
(D) Bold
(E) None of these
Ans : (D)

11. Which part is the ‘brain’ of the computer ?
(A) CPU
(B) Monitor
(C) RAM
(D) ROM
(E) None of these
Ans : (A)

12. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—
(A) Memory-only
(B) Write-only
(C) Read-only
(D) Run-only
(E) None of these
Ans : (C)

13. Help Menu is available at which button ?
(A) End
(B) Start
(C) Turnoff
(D) Restart
(E) None of these
Ans : (B)

14. You can keep your personal files/folders in—
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Ans : (B)

15. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n)—
(A) Supercomputer
(B) Minicomputer
(C) Laptop
(D) Server
(E) None of these
Ans : (D)

16. A Website’s main page is called its—
(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these
Ans : (A)

17. Data that is copied from an application is stored in the—
(A) Driver
(B) Terminal
(C) Prompt
(D) Clipboard
(E) None of these
Ans : (D)

18. Changing an existing document is called ……… the document.
(A) creating
(B) deleting
(C) editing
(D) adjusting
(E) None of these
Ans : (C)

19. In a spreadsheet program the ………… contains related worksheets and documents.
(A) workbook
(B) column
(C) cell
(D) formula
(E) None of these
Ans : (A)

20. Which of the following is not an input device ?
(A) Keyboard
(B) Monitor
(C) Joystick
(D) Microphone
(E) None of these
Ans : (B)

21. Marketing is the combined study of—
(A) Buyer’s behaviour and consumer tasks
(B) Product demand and Product supply
(C) Brand building and Publicity
(D) Sales force abilities and customer responses
(E) All of these
Ans : (A)

22. Effective Marketing helps in—
(A) Boosting the sales
(B) Boosting the purchases
(C) Boosting the demand and supply
(D) All of these
(E) None of these
Ans : (A)

23. Market size means—
(A) Size of the sales teams
(B) Size of the company
(C) Scope for profit
(D) Scope for marketing
(E) None of these
Ans : (D)

24. Market share means—
(A) Share Market
(B) Sensex
(C) Market changes
(D) Market demands
(E) Share of business among pears
Ans : (E)

25. Direct Marketing means—
(A) Face to face marketing
(B) Over the counter marketing
(C) Door to door marketing
(D) All of these
(E) None of these
Ans : (D)

26. A ‘Lead’ means—
(A) A buyer
(B) A seller
(C) Employee
(D) Employer
(E) None of these
Ans : (B)

27. DSA means—
(A) District Sales Authority
(B) Direct Selling Agent
(C) Distributor and Sales Agents
(D) Distributor and State Agent
(E) None of these
Ans : (B)

28. A DSA’s main function is—
(A) To boost customer contacts
(B) To boost emails
(C) To boost telemarketing
(D) All of these
(E) None of these
Ans : (D)

29. A ‘Prospect’ means—
(A) Company’s Prospectus
(B) Company’s Memorandum of Association
(C) A likely buyer
(D) A likely seller
(E) None of these
Ans : (C)

30. To ‘close a call’ means—
(A) To clinch the sales
(B) To abandon the sales
(C) To lose the business
(D) To annoy the customer
(E) To exit from the sales team
Ans : (A)

31. Good selling skill calls for—
(A) Patience
(B) Perseverance
(C) Persuasion
(D) Pursuit
(E) All of these
Ans : (D)

32. Marketing channels means—
(A) Delivery time
(B) Delivery period
(C) Sales outlets
(D) Purchase outlets
(E) All of these
Ans : (C)

33. Value added services means—
(A) Additional cost
(B) Additional production
(C) Additional staff
(D) Additional services
(E) All of these
Ans : (D)

34. A ‘Target Group’ means—
(A) Group of salesmen targeting the customers
(B) Likely buyers
(C) Group of products
(D) Group of companies
(E) All of these
Ans : (B)

35. ‘USP’ in Marketing means—
(A) Useful Sales Procedures
(B) Useful Selling Propositions
(C) Useful Sales Persons
(D) Used Sales Plans
(E) Unique Selling Propositions
Ans : (E)

36. ‘ATM’ stands for—
(A) Anywhere Marketing
(B) Any Time Marketing
(C) Any Time Money
(D) Automated Teller Machine
(E) Automatic Timely Machine
Ans : (D)

37. Market Plan is a—
(A) Selling process
(B) Year-end-budget
(C) Calendar
(D) Business document for marketing strategies
(E) All of these
Ans : (D)

38. Market segmentation means dividing—
(A) The market group into homogeneous groups
(B) The market process into easy steps
(C) The sales teams into small groups
(D) All of these
(E) None of these
Ans : (A)

39. ‘HNI’ means—
(A) Highly Non-interested Individuals
(B) Highly Needy Individuals
(C) High Networth Individuals
(D) Highly Negative Individuals
(E) None of these
Ans : (C)

40. Digital Marketing includes. Find the incorrect answer—
(A) Web advertisement
(B) E-mail canvassing
(C) Blogs
(D) SMS campaigns
(E) Mobile alerts
Ans : (C)