Social Icons

Monday 16 April 2012

SAMPLE PAPER OF ALLAHABAD BANK(PO)COMPUTER AWARENESS

1. Microsoft word is a ____________.
a) Closed Source Software
b) Open Source Software
c) Vertical Market Software
d) Vertical Market Software
e) None of These



2. Which of the Following keyboard shortcut is Used For Selecting / Highlighting the url address in the text-box of a web browser's address bar?
a) Ctrl + A
b) Ctrl + S
c) Alt + D
d) Ctrl + Alt + S
e) None of These

3. Which of the Following computer softwares is best example of freeware Programs?
a) Firewall / Antivirus
b) Instant Messaging / Google Toolbar
c) Ms-Office / Internet Explorer
d) Adobe Photoshop / Coreldraw
e) None of These

4. A ____________ is a set of rules.
a) Network
b) Link
c) URL
d) Blog
e) Protocol

5. A __________ is the result / match Returned by a search engine When a user search in a topic with asearch criteria.
a) Link
b) URL
c) View
d) Hit
e) Success

6. Each computer Have a / an ___________, and Some ______.
a) Operating System, Application Programs
b) Internet Browser, Document files
c) Hard Disk, Application Programs,
d) Operating system, Antivrus Programs
e) None of These

7. UNIX is Used as a year in operating system:
a) PC Desktop
b) Supercomputers
c) Web Sever
d) All The Above
e) None of These

8. The term CPU stands for:
a) Protecting Central Unit
b) Central Processing Unit
c) Processing Unit Chief
d) Customer Processing Unit
e) None of These

9. Primary function of a processor is:
a) Carried out instructions to Programs in a
b) to process data and information
c) to store the result Into storage device
d) to manage a network printer
e) None of These

10. Which one of the Following is Stored data storage devices for long time and Permanently Stored Dataread by a beam of laser?
a) Digital Disc Verstaile
b) Hard Disk
c) Floppy Disk
d) Pen drive
e) None of These

11. Which of the Following is a secondary storage device to hold off Amount of data?
a) DVD
b) CD
c) Hard disk
d) Floppy disk
e) None of These

12. Among the Following Devices Which is a / an image processing input device?
a) Printer
b) ScannaR
c) Monitor
d) Keyboard
e) None of These

13.The ____________, Also called the brain of the computer, is responsible for processing data.
a) CPU
b) RAM
c) Motherboard
d) Hard disk
e) None of These

14. A Computerized System consists of:
a) Hardware, Data, Procedure, Processing, Peoples
b) Hardware, Programs, Data, Processing, Networks
c) Hardware, Programs, Data, Networks, Peoples
d) Hardware, Software, Procedure, Data, Peoples
e) None of These

15. A __________ Involves a kind of email messages Designed to steal your sensitive information,Such as passwords and credit card details, with the intention of stealing your identity.
a) Phishing trip
b) Hacking
c) Spamming
d) Spyware
e) Phishing scam


16. A ________ is a person Who Breaks Into computers and computer networks for profit, as protest,Sometimes gold by the motivation of the challenge.
a) Software engineer
b) Progammer
c) Hacker
d) Spammar
e) None of These

17. A (n) _______ is a collection of computers and communications devices by Interconnected channelsto share information and resources.
a) Internet
b) Network
c) Server
d) Blog
e) None of These

18. The use of technology to enable people to learn anytime and anywhere is Called ________.
a) e-commerce
b) information technolgoy
c) e-learning
d) online business
e) None of These

19. A Way of Accessing information over the medium of the Internet is
a) WWW
b) Web server
c) Website
d) All The Above
e) None of These

20. The external devices are connected to has That computer system are Known As:
a) Slots
b) Peripheral
c) Nozzles
d) Expansion cards
e) None of These

No comments:

Post a Comment