Sunteți pe pagina 1din 20

nrrbeassistance.blogspot.

com

*Bank Exams (RBI, SBI, IBPS, RRB etc) Assistance*
Dear friend welcome, avail us & get benefited
*Join our SERVICES to get the UPDATES directly to your respective, dont miss any opportunity All the best

Join Email
http://goo.gl/C23qoH
(active link in ur inbox)
Subscribe and get updates

Google+
http://goo.gl/1p5dFa
http://goo.gl/wWzJcn
Follow and get updates

Face book
http://goo.gl/J87TUu
http://goo.gl/1ajrkS
Like & Join to get updates

Twitter
http://goo.gl/YGfuXB
(Encourage us by joining)
Follow and get updates
Click here or copy and paste the link / url at your browser, then subscribe with your email, g+, fb and twitter

*Our most viewed (famous) links; try once, may be useful to you (click here)*
Data Interpretation, Computer, English Language, Interviews, Previous Papers,
Professional Knowledge, Quantitative Aptitude, Questions and Answers,
Reasoning, Specialist Officers, Exam Pattern, Cut off Marks, Tips Tricks, FAQs, etc.
Keep watching our site weekly once or twice for more and more updatesNRR.

$ For the sake of pupil, we would like to advertise your Promo / Ad (any related
to bank exams) freely in our site. Submit details @ http://goo.gl/XlmzYN

*Search us in the GOOGLE as follows (only in yellow) to view all our POSTS*
site:nrrbeassistance.blogspot.com

*Currently we are looking for the VOLUNTEERS to work for our site/blog*
Interested please join as a member and earn money: http://goo.gl/94uvg4
Frequently Asked

Brought to you by
Nareddula Rajeev, admin of
nrrbeassistance.blogspot.com
(NRR Bank Exams Assistance)

1. Pick the odd one out:
1) Interpreter
2) Operating System
3) Compiler
4) Assembler
5) None of these

2. When a particular object or an image
is copied, in which of the foll owi ng
places it is stored?
1) Notice Board
2) Interim Board
3) Notepad
4) Clipboard
5) None of these

3. The Term 'BIT' is the short form for:
1) Mega Byte
2) Binary Language
3) Binary Digit
4) Binary Number
5) None of these

4. Servers are computers that provi de
resources to other computers
connected to a
1) Network
2) Super Computer
3) Micro Computer
4) Cli ent
5) None of these

5. A bar which is seen at the bottom of
the screen (usually) when the computer
is turned on
is known as:
1) Address Bar
2) Task Bar
3) Windows Bar
4) Line bar
5) None of these

6. Something which has easily
understood instructions is said to be:
1) User friendly
2) Information
3) Word Processing
4) Icon
5) None of these

7. To save an existing fil e with a new
name or to a new location, you shoul d
use the ..... command.
1) Save
2) Save and Replace
3) Save as
4) New file
5) None of these

8. Peripheral devices such as printers
and monitors are considered to be:
1) Hardware
2) Software
3) Data
4) Information
5) None of these

9. In a database, ....... fields store
numbers used to perform calculations.
1) Next
2) Key
3) Alpha Numeric
4) Numeric
5) None of these

10. Where is data saved permanently?
1) RAM
2) ROM
3) CPU
4) Printer
5) None of these

11. Which of the foll owi ng describes
relational database?
1) It provides relationship between
integers
2) It consists of separate tables
of related data
3) It retrieves dat a relat ed to its queri es
4) It provides the relationship between
floats
5) None of these

12. Find the odd one out:
1) Proj ector
2) Speakers
3) Monitor
4) Microphone
5) Printer

13. A program for vi ewi ng webpages is
called:
1) Word Processor
2) Spread sheet
3) Protocol
4) Browser
5) Database

14. Domain name Extension '.nic.in' is
generally used for which of the
following:
1) Organization websites
2) Educational Websites in indi a
3) Companies in india
4) e-governance websites
5) None of these

15. ........... view shows how the content
on pri nted page, along with foot er and
margi n header, appear.
1) Draft
2) Full screen readi ng
3) Outline
4) Page layout
5) None of these

16. What is the symbol for inbox in
mail?
1) BOX
2) Envelope
3) Upper Case 'I'
4) Lower case 'I'
5) None of these

19. File ....... shrinks the size of a file so
that it requires less storage space.
1) Scanni ng
2) Synthesizing
3) Defragmenting
4) Compression
5) None of these

20. Ctrl, shift, alt are call ed ....... keys.
1) Adjustment
2) Function
3) Modifier
4) Alphanumeric
5) None of these

22. The name, a user assigns to a
document is called:
1) File name
2) Program
3) Record
4) Data
5) None of these

23. ........... is processed by the
computer into information.
1) Numbers
2) Processor
3) Input
4) Data
5) None of these

24. A menu cont ains a list of ........
1) commands
2) dat a
3) obj ects
4) reports
5) None of these

25. The internet allows you to:
1) Send electronic mail
2) View web pages
3) Connect to servers all around the
worl d
4) All the above
5) None of these

26. Which of the foll owi ng is a function
of UPS?
1) It limits damage caused by
fluctuating levels of electricity
2) It provides battery back up for
limited time
3) It deli vers electronic messages vi a a
bus
4) It conducts a power-on self test or
POST
5) None of these

28. ...... is known as unauthorized
access to others system.
1) Hacking
2) Encryption
3) Decryption
4) Trafficking
5) None of these

29. The vast network of comput ers that
connects millions of people all over the
worl d is called.......
1) LAN
2) Web
3) Hypertext
4) Internet
5) None of these

31. To prevent a slide from bei ng
displayed duri ng the slide show one
should:
1) delete the slide
2) hide the slide by using animation
button
3) hide the slide by using the slide
show menu
4) Any of the above
5) None of the above

32. The ALU of a computer usually
contains a number of high speed
storage elements called ........
1) Semiconductor memory
2) Registers
3) Hard disk
4) Magnetic Disk
5) None of these

33. A connection from one HTML
document to anot her HTML document
is called:
1) Hyper Link
2) Connecting Li nk
3) Icon
4) All of these
5) None of these

34. Which of the foll owi ng is true about
RAM?
A) It is an acronym for Random Access
Memory
B) It is memory built from silicon chips
that is used to store programs and data
temporarily
while they are being processed
C) RAM stores the data permanently
like Hard Disks
1) Only A and C
2) Only B and C
3) Only A and B
4) All the three
5) None of these

35. Capability of comput er to perform
more than one tasks at the same time
is:
1) Batch Processing
2) Real Time Processing
3) Multitasking
4) Scheduled Processing
5) None of these

36. Computer Virus is:
1) A hardware
2) Windows tool
3) A computer program
4) Combi nation of 1 and 2
5) None of these

37. Firewall is used in communication
network / system to save:
1) Unauthorized attack
2) Virus attack
3) Data dri ven attack
4) Fire attack
5) None of these

38. Which of the foll owi ng can hold
maximum data?
1) Optical disk
2) Floppy disk
3) Magnetic disk inside comput er
4) Magnetic tape
5) None of these

39. ........ is a process of sendi ng
documents to
1) Printing
2) Queui ng
3) Waiting Queue
4) Print Spooling
5) None of these

40. The feat ure to customize the
desktop to display information that can
be updated from internet is:
1) Active desktop
2) Onli ne desktop
3) E-mail
4) Resource Sharing
5) None of these

Very Important

Brought to you by
Nareddula Rajeev, admin of
nrrbeassistance.blogspot.com
(NRR Bank Exams Assistance)

1. -----Key combi nation that lets you
toggle between open wi ndows
a) ALT+SHIFT+TAB
b) ALT+CTRL+TAB
c) ALT+CTRL
d) ALT+TAB

2. When more than one window is
open, to switch to the next window --- is
the key combination
a) CTRL+F5
b) CTRL+F6
c) CTRL+F7
d) CTRL+F8

3. To sel ect or unsel ect one word to the
right
a) CTRL+SHIFT
b) CTRL+SHIFT+Down Arrow
c) CTRL+SHIFT+Right Arrow
d) None of the above

4. To maximize or restore a sel ected
window
a) CTRL+F7
b) CTRL+F10
c) CTRL+F8
d) CTRL+F9

5. To Copy a picture of the selected
window to the clipboard
a) ALT+TAB
b) ALT+Print Screen
c) Both (a) and (b)
d) None of the above

6. ---- Is the key to close a selected
drop-down list; cancel a command and
close a dialog box
a) TAB
b) SHIFT
c) ESC
d) None of the above
7. --- Is the key we use to run the
selected command
a) SHIFT
b) TAB
c) ENTER
d) CTRL

8. --- Is the functional key to display
save as box
a) F5
b) F6
c) F9
d) F12

9. ----- Is the combination of keys to
switch between the l ast four places
that you have edited
a) ALT+CTRL+Z
b) ALT+CTRL+Y
c) ALT+TAB+Z
d) ALT+SHIFT+Z

10. To del ete one word to the right
a) CTRL+SHIFT
b) CTRL+TAB
c) CTRL+DEL
d) CTRL+Z

11. --- Is the combi nation of keys we
use to hide rows
a) CTRL+9
b) CTRL+8
c) CTRL+7
d) CTRL+6

12. To hide the columns --- is the
functional key
a) CTRL+3
b) CTRL+2
c) CTRL+1
d) CTRL+0

13. --- Is the shortcut key to delete
cells, rows or columns
a) CTRL+ Minus Sign
b) CTRL+ Plus Sign
c) CTRL+ Star Sign
d) CTRL+ Greater than Sign

14. To insert cells, rows or columns ---
the keyboard shortcut key
a)CTRL+ Minus Sign
b)CTRL+SHIFT+ Plus Sign
c)CTRL+ Star Sign
d)CTRL+ Greater than Sign

15. ---- Is the keyboard shortcut key to
insert auto sum
a) ALT
b) ALT=
c) ALT+
d) ALT-
16. ---- Is the shortcut key to move to
the next worksheet
a) CTRL+Pagedown
b) CTRL+Pageup
c) CTRL+Right arrow
d) CTRL+Left arrow

17. ---- Is the shortcut key to move to
the previ ous worksheet
a) CTRL+Pagedown
b) CTRL+Pageup
c) CTRL+Right arrow
d) CTRL+Left arrow

18. --- Key we use to select row
a) SHIFT+TAB
b) SHIFT+ Spacebar
c) CTRL+ Spacebar
d) SHIFT+ Enter

19. ---- Key we use to select column
a) SHIFT+TAB
b) SHIFT+ Spacebar
c) CTRL+ Spacebar
d) SHIFT+ Enter

20. ---- Is the key to exit from excel
a) ALT+F2
b) ALT+F3
c) ALT+F4
d) ALT+F5

21. A device, which is not connected to
CPU, is called as ---
a) On-line device
b) Off-line device
c) Device
d) None of the above

22. What is the other name for
programmed chip?
a) RAM
b) ROM
c) LSIC
d) None of the above

23. On-li ne real time systems become
popular in ---- generation
a) First Generation
b) Second Generation
c) Third Generation
d) Fourth Generation

24. EDVAC stands for
a) Electronic Discrete Variable
Automatic Computer
b) Electronic Discrete Value Automatic
Computer
c) Electronic Device Vari abl e Automatic
Computer
d) Electronic Discrete Vari able
Advanced Computer
25. EDSAC stands for
a) Electronic Delay Storage Advanced
Computer
b) Electronic Data Storage Aut omatic
Computer
c) Electronic Del ay Strong Automatic
Computer
d) Electronic Delay Storage
Automatic Computer

26. LSIC stands for
a) Large Scale Inner Ci rcuits
b) Large Scale Integrated Computer
c) Large Scale Integrated Circuits
d) Large Storage Integrated Ci rcuits

27. The task of performing operations
like arithmetic and logical
operations is called ----
a) Processing
b) Storing
c) Editing
d) Sorting

28. The ALU and Control Unit jointly
known as
a) RAM
b) ROM
c) CPU
d) None of the above

29. RAM is an example of
a) Secondary memory
b) Primary memory
c) Both (a) and (b)
d) None of the above

30. Magnetic disk is an example of
a) Secondary memory
b) Primary memory
c) Both (a) and (b)
d) None of the above

31. A bit is an acronym for
a) Di git
b) Binary digit
c) Number
d) None of the above

32. Each memory cell has a uni que
number, assigned to it is called as the
--- of the cell
a) Address
b) Register
c) Number
d) None of the above

33. RAM is also called as
a) Read/Write Memory
b) Long Memory
c) Permanent Memory
d) None of the above
34. ---- Store data or information
temporarily and pass it on as directed
by the control unit
a) Address
b) Register
c) Number
d) None of the above

35. The secondary storage memory is
also called as
a) Auxiliary Memory
b) Attracti ve Memory
c) Chip Memory
d) None of the above

Most Common

Brought to you by
Nareddula Rajeev, admin of
nrrbeassistance.blogspot.com
(NRR Bank Exams Assistance)

2. Match the foll owi ng.
(a) Accepts Data 1. Output
(b) Processes Data 2. Storage
(c) Produces Output 3. Processing
(d) Stores Result 4. Input
(a) a-4 ,b-3 ,c-4 ,d-2
(b) a-2,b-1,c-3,d-4
(c) a-3,b-2,c-1,d-4
(d) a-1,b-4,c-2,d-3

3. The physical parts of the computer
known as ---
(a) Software
(b) Data
(c) Hardware
(d) Information

4. The programs (instructions) that tell
the computer what to do is called as
(a) Information
(b) Data
(c) Hardware
(d) Software

5. What makes a computer powerful?
(a) Speed
(b) Reliability
(c) Storage
(d) All of the above

6. PDA refers to -----
(a) Personal Digital Assistant
(b) Personal Device Assistant
(c) Person Digital Assistant
(d) Personal Dat a Assistant

7. The computer, which is used for
massi ve amounts of calculations like
weat her forecasting, engineering
design and economic forecasting etc.,
is known as ---
(a) Mi ni Computer
(b) Notebook
(c) Desktop Computer
(d) Super Computer

8. -----Is the heart of a net work of
computers or termi nals, which all ows
people to work at the same time on the
same data.
(a) Mainframe Computer
(b) Personal Computer
(c) Mini Comput er
(d) Super Computer

9. -----Handles communication between
computers on the network.
(a) Computer
(b) Cent ral Processing Unit
(c) A Network Server
(d) Storage Unit

10. Find the right sequence in most of
the cases to produce a document .
(a) Edit, Format, Print, Create, Save
(b) Create, Edit, Format, Print, Save
(c) Create, Edit, Format, Save,
Print
(d) Edit, Format, Create, Print, Save

11. Data means the ---- gi ven to a
computer.
(a) Information
(b) Input
(c) Values
(d) Raw facts

12. Programs are the sets of ----- that
direct the computer.
(a) Commands
(b) Instructions
(c) Values
(d) Variables

13. ------ Are the special codes or
keywords that the user inputs to
perform a task.
(a) Commands
(b) Instructions
(c) Programs
(d) Software

14. ----- Is the device, which moves
cursor around the screen faster than
using keystrokes.
(a) Joystick
(b) Keyboard
(c) Mouse
(d) Poi nting device

15. ----- Has no ability to process or
store data.
(a) Termi nal
(b) A Intelligent terminal
(c) A Dumb terminal
(d) None of the above

16. -----Can process or store on its
own, at least to a limited extent.
(a) A Intelligent terminal
(b) Termi nal
(c) Screen
(d) A dumb termi nal

17. Name of the termi nal, which is used
at supermarkets, departmental
stores and restaurants etc.
(a) Intelli gent terminal
(b) Point-of-Sale terminal (P-O-S)
(c) Calcul ating Machines
(d) None of the above

19. VDT refers to ----
(a) Vital Data Transfer
(b) Virtual Data Transfer
(c) Video Desk Termi nal
(d) Video Display Terminal

20. The keys on the keyboard, which
may be programmed to do a special
tasks are the ---
(a) Numeric key pad
(b) Arrow keys
(c) Function keys
(d) Navigation keys

21. Joystick, Mouse etc. are the
examples of -----
(a) Multimedi a devices
(b) Data entry devices
(c) Pointing devices
(d) None of the above

22. ----- Is the part of the computer that
controls the machi ne cycle.
(a) Control unit
(b) ALU
(c) Memory
(d) None of the above

23. Find the correct sequence i n a
machine cycle.
1. Actually process the command
2. Translate it into computer
commands
3. Write the result to a main memory
4. Get an instruction from main
memory
(a) 4, 1,2,3
(b) 4,2,1,3
(c) 4,3,2,1
(d) 1, 2,3,4

24. ALU stands for.
(a) Arithmetic Logical Unit
(b) Arithmetic Local Unit
(c) Arithmetic Unit
(d) Accurate Logical Unit

31. From the gi ven below options, one
is not related to the same group.
Find the di fferent one.
(a) DOS
(b) Windows
(c) Unix
(d) MS-Word

32. When the computer is turned off.
All the data in a mai n memory
disappears. A data storage method of
this type is called.
(a) Non-Vol atile
(b) Volatile
(c) Cache
(d) None of the above

33. Numbers written with just 0 and 1
are called --- numbers
(a) Binary
(b) Digital
(c) Logical
(d) General numbers

34. Match the following
(a) 1 Bit 1. 8 Bits
(b) 1 Byte 2. 0 or 1
(c) 1 Kilobyte (KB) 3. 1024 Kilobytes
(d) 1 Megabyte (MB) 4. 1024 Bytes
(a) a-2, b-1, c-4, d-3
(b) a-1, b-2, c-3, d-4
(c) a-2, b-3, c-4, d-1
(d) a-1, b-4, c-2, d-3

35. ---- is the amount of data the CPU
can transmit at a time to main
memory and to input and output
devices
(a) Bus Width
(b) Data Width
(c) Memory Width
(d) None of the above

36. The informati on processing cycle
includes the following processes
(a) Input, Processing, Output,
Storage
(b) Input, Output, Mani pul ation,
Arithmetic
(c) Data, Processing, Printing, Editing
(d) Storage, Display, Data, Information

37. The processor consists of the
following parts
(a) CPU & Main memory
(b) Control Unit and ALU
(c) Main Memory and Storage
(d) Operating System and Applications

38. The ALU performs the foll owi ng
actions
(a) Both Calculations & Logical
Operations
(b) Only calculations
(c) Checks data for accuracy
(d) None of the above

39. The Megabyte actually equal to ---
kilobytes
(a) 1000
(b) 1042
(c) 1024
(d) 1024*1024

40. ----Works like a photocopy machi ne
and creates a digital image
(a) Scanner
(b) Barcode
(c) Printer
(d) Monitor

41. Typi ng the wrong character is what
type of error
(a) Transposition Error
(b) Transcription Error
(c) Typi ng Error
(d) Technical Error

42. Which of the foll owi ng is an
example of Transcri ption error
(a) 7355 instead of 3755
(b) Saksi instead of sakshi
(c) 7355 instead of 7455
(d) None of the above

43. Int erchangi ng the two characters is
--- type of error
(a) Transposition error
(b) Transcri ption error
(c) Tying error
(d) Technical error

44. The computer message reads, Do
you want to save the changes made
to Document 1? The user clicks on the
button labeled YES. This is an
example of ----
(a) Data Input
(b) User Interaction with the
system
(c) A program
(d) None of the above

45. 1 nanosecond means ----
(a) 1 billionth of a mi nute
(b) I billionth of a second
(c) 1 millionth of a minute
(d) 1 milli onth of a second

46. After completion of typing we will
get print, this output is called
(a) Fil e
(b) Softcopy
(c) Multimedi a
(d) Hardcopy

47. Output with a combi nation of
sounds, videos and pictures is called
as --
(a) Fil e
(b) Softcopy
(c) Multimedia
(d) Hardcopy

48. A laser pri nter is an example of ---
printer
(a) Dot-matrix
(b) Conti nuous-form
(c) Chain
(d) Non-impact

49. An indi vidual dot on a computer
screen is called ---
(a) Character
(b) Pixel
(c) Font
(d) Dot

50. The speed of the laser printer can
be measured in
(a) Pages Per Minute (PPM)
(b) Characters Per Minute (CPM)
(c) Lines Per Minute (LPM)
(d) Inches Per Second (IPS)

Previous Papers

Brought to you by
Nareddula Rajeev, admin of
nrrbeassistance.blogspot.com
(NRR Bank Exams Assistance)

1. The speed of the dot mat rix printer
can be measured in
(a) Pages Per Mi nute (PPM)
(b) Characters Per Minute (CPM)
(c) Lines Per Minute (LPM)
(d) Inches Per Second (IPS)

2. --- Is the process of assessing
addresses to the different areas
(a) Tracking
(b) Addressing
(c) Di vi ding
(d) Formatting

3. ----- Is a circul ar pat h on the surface
of a disk or diskette on which
informati on is magnetically recorded
and from which recorded information is
read.
(a) Track
(b) Storage Block
(c) Block
(d) Platter

4. ---- Is a subdi vision of a track
(a) Sub track
(b) Sector
(c) Block
(d) None of the above

5. A piece of stiff paper that contains
digital information represented by the
presence or absence of holes in
predefined positions is known as ---
(a) Punch Card
(b) Magnetic Strip
(c) Data Recorder
(d) None of the above

6. Match the foll owi ng
(a) DRAM 1. Non-Volatile
(b) SRAM 2. Volatile
(c ) PROM
(d) EPROM
(a) a-2, b-2, c-1, d-1
(b) a-1, b-2, c- 2, d-2
(c) a-1, b-2, c-1, d-2
(d) a-2, b-1, c-2, d-1

7. RAM stands for ---
(a) Random Memory
(b) Random Access Memory
(c) Random Allocation Memory
(d) Random Acceptable Memory

11. Which of the foll owi ng are the
functions of a operating system
(a) Allocates resources
(b) Monitors Acti vities
(c) Manages disks and files
(d) All of the above

12. -----Is a Multitasking operating
system that aims at executing real time
Applications
(a) Multitasking Operating System
(b) Single User Operating System
(c) Real Time Operating System
(d) None of the above

13. ----Operating system enable a
multiple user access to a computer
through the shari ng of time.
(a) Multi user operating system
(b) Single user operating system
(c) Real time operati ng system
(d) None of the above

14. --- Is comput er soft ware designed
to operate the computer hardware
and to provide platform for runni ng
application soft ware
(a) Application software
(b) System software
(c) Soft ware
(d) None of the above

15. ----- Is computer soft ware designed
to help the user to perform specific
tasks
(a) Application software
(b) System software
(c) Soft ware
(d) None of the above

16. Match the following
(a) Graphical User Interface APPS
software 1. DOS and UNIX
(b) Command Line Interface 2.
Microsoft WINDOWS
(c) Product Engineeri ng Software 3.
Web Browsers
(d) Cont ent Access Software 4. CAD
and CAM
(a) a-2, b-1, c-4, d-3
(b) a-2, b-3, c-1, d-4
(c) a-1, b-2, c-3, d-4
(d) a-3, b-2, c-4, d-1

17. BIOS refers to
(a) Basic Input/Output System
(b) Basic Instruction Organized System
(c) Basic Interacti ve Output system
(d) Basic Input Office System

18. The primary function of the ---- is to
set up the hardware and load and
start an operating system.
(a) System Programs
(b) BIOS
(c) CPU
(d) Memory

19. The clock rate of a Processor
Measured in ----
(a) Milliseconds
(b) Megahertz or Gigahertz
(c) Megabytes or Gi gabytes
(d) None of the above

20. Spooli ng helps because
(a) It is more secure method of
accessing data
(b) Pri nt jobs go more smoothly with
less stop and go
(c) The computer is released to
do other things while still
printing
(d) None of the above

21. When creating a computer
program, the ---- designs the structure
of the program
(a) End user
(b) System Analyst
(c) Programmer
(d) All of the above

22. Checking the computer program for
errors is called
(a) Correcting
(b) Verificati on
(c) Debugging
(d) Inspecting

23. ----- Is an artificial language
designed to communicate instructions
to a computer
(a) Programming language
(b) Machine l anguage
(c) Soft ware language
(d) None of the above

24. Machine language sometimes also
referred as the -----
(a) Binary language
(b) High l evel language
(c) Middl e level language
(d) None of the above

25. ----- Is a language, instead of using
numbers, programmers began using
English like abbreviations (Mnemonics)
to represent the elementary operations.
(a) Machine l anguage
(b) Mnemonics language
(c) Assembly level language
(d) None of the above

26. BASIC stands for ----
(a) Beginners All Purpose
Symbolic Instruction Code
(b) Beginners All Symbolic Instruction
Code
(c) Beginners All Purpose Systematic
Instruction Code
(d) Beginners All Programs Symbolic
Instruction Code

27. COBOL is an acronym for ----
(a) Common Business Oriented
Language
(b) Computer Business Oriented
Language
(c) Common Business Operated
Language
(d) Common Business Organized
Language

28. The program that comprises the ----
are called system software
(a) Operating System
(b) Application Software
(c) Devel opment Software
(d) None of the above

29. Match the following
(a) YOTTA 1. 2^50
(b) PETA 2. 2^40
(c ) TERA 3. 2^30
(d) GIGA 4. 2^80
(a) a-4, b-1,c-2, d-3
(b) a-2, b-1, c-3, d-4
(c) a-1, b-2, c-3, d-4
(d) a-2, b-1, c-2, d-3

30. A bit can hold the val ue -----
(a) 1 byte
(b) 8 bits
(c) 0 or 1
(d) None of the above

31. When was the fi rst CPU introduced
(fi rst Microprocessor the Intel 4004)
(a) 1981
(b) 1971
(c) 1981
(d) 1991

32. Which is of the following is NOT
part of a computer chips job?
(a) Performi ng mat hematical
operations
(b) Movi ng data from one memory
location to another
(c) Starting up the computer
(d) Stori ng the data

33. -----Translates the semantic
instructions developed by programmers
into the machine language
(a) Assembler
(b) Interpreter
(c) Loader
(d) Complier

34. ----- Fi rst takes in the entire
program, checks errors, compli es and
executes it
(a) Assembl er
(b) Interpreter
(c) Loader
(d) Complier

35. ----- Takes one li ne, checks it for
errors and then executes it
(a) Assembl er
(b) Interpreter
(c) Loader
(d) Complier

36. What kind of memory is both static
and non-volatile?
(a) RAM
(b) ROM
(c) BIOS
(d) CACHE

37. Where does most data go fi rst with
in a computer memory hierarchy?
(a) RAM
(b) ROM
(c) BIOS
(d) CACHE

38. The path that dat a travels between
two computers is NOT called a
(a) Communication channel
(b) Communication link
(c) Communication bridge
(d) None of the above

39. A modem us used to ----
(a) Change incoming analog signals to
digital signals and outgoi ng
digital signals to analog signals
(b) Connect two computers using
telephone lines
(c) Both (a) and (b)
(d) None of the above

40. To move a copy of fil e from one
computer to anot her over a
communication channel is called.
(a) File transfer
(b) Fil e encryption
(c) File modi fication
(d) None of the above

42. Match the following
(a) LAN (1) No entry restriction and No
geographical limitation
(b) WAN (2) Entry is restricted and
limited to geographical area
(c) MAN (3) Entry is restricted and No
geographical limitation
(a) a-2, b-1, c-3
(b) a-2, b-3, c-1
(c) a-3, b-2, c-1
(d) a-1, b-2, c-3

43. An airline reservation network
woul d most likely to be in a --- topology
(a) Star
(b) Bus
(c) Ring
(d) Mesh

45. Match the following
(a) System Analyst 1. Writes the actual
code to perform the task
(b) End User 2. Designs the overall
requirements and sets the
strategy for program
(c) Programmer 3. Sets the tasks to be
done, what does the
customer want to do
(a) a-2, b-3, c-1
(b) a-1, b-2, c-3
(c) a-2, b-1, c-3
(d) a-1, b-3, c-2

Model Papers

Brought to you by
Nareddula Rajeev, admin of
nrrbeassistance.blogspot.com
(NRR Bank Exams Assistance)

1. ---- Is a program which reproduces
itself
a) Virus
b) Software
c) Both (a) and (b)
d) None of the above

2. ---- Viruses that aim at the boot
sector of a hard dri ve are infecting a
very crucial component of the boot
process
a) File infection virus
b) Boot virus
c) Network vi rus
d) E-mail virus

3. ---- Is the vi rus that they will attach
themsel ves to EXE files, compressed
files like ZIP fil es and dri ver files
a) File infector virus
b) Boot vi rus
c) Network vi rus
d) E-mail virus

4. ---- Is the vi rus, which is uni quely
created to quickly spread throughout
the local area network
a) File infector virus
b) Boot vi rus
c) Network virus
d) E-mail virus

5. Which of the following are the main
purposes of an operating system
a) To provide an envi ronment for a
computer user to execut e programs
on a computer hardware in a
convenient and efficient manner
b) To all ocate separate resources of
the computer as needed to sol ve the
problem gi ven
c) Supervision of the executions of user
programs to prevent errors and
improper use of comput er
d) All of the above

6. Define acronym spooling
a) Simultaneous Peripheral
Operation On-line
b) Simultaneous Peripheral Operation
Off-li ne
c) Simultaneous Peripheral
Organization On-line
d) System Peripheral Operation On-line

7. Several programs are in a memory
concurrently; the system switches
among the programs for efficient
processing and mi nimal idl e time is
called ----
a) Multi tasking
b) Multi programming
c) Multi functioni ng
d) None of the above

8. ---- Is the using scheduli ng and
multiprogramming to provi de an
economical interacti ve system of two or
more users
a) Time sharing
b) Time changi ng
c) Processing
d) None of the above

9. ---- Is a system with two or more
central processing units
a) No definition
b) Multi processor
c) Double processor
d) None of the above

10. ----- Is the system where fast
response is desirable, but not required
a) Real time systems
b) Time sharing systems
c) Both (a) and (b)
d) None of the above

11. ---- Is the system where processing
must be completed with in cert ain
time constraints appropriat e for the
system
a) Real time systems
b) Time sharing systems
c) Both (a) and (b)
d) None of the above

12. ----Is the smallest block that can be
read or written on a disk
a) Sector
b) Track
c) Disk
d) None of the above

13. ---- Is the collection of sectors all as
same circumference on a single
surface
a) Track
b) Sector
c) Disk
d) None of the above

14. ---- Is the time interval when a
process uses Central Processing Unit
only
a) CPU burst
b) I/O burst
c) (a) And (b)
d) Either (a) or (b)

15. -----Is the time interval when a
process uses I/O devices only
a) CPU burst
b) I/O burst
c) (a) And (b)
d) Either (a) or (b)

16. ---- Is simply consists of one or
more attributes that det ermi ne other
attributes
a) Lock
b) Database
c) Key
d) None of the above

17. Be unique is the characteristic of
the --- key
a) Primary
b) Secondary
c) Forei gn
d) Candi date

18. A unique key can uni quely identify
each ---- in a table
a) Field
b) Row
c) File
d) Database

19. ---- Is a database that treats all of
its data as a collection of relations
a) Relational database
b) Rational database
c) (a) And (b)
d) None of the above

20. ---- Is the precise set of instructions
that describes how to perform a
specific tasks
a) Algorithm
b) Graph
c) Pie chart
d) None of the above

21. Which of the foll owi ng is a
programming language
a) MS-Word
b) C++
c) Access
d) Power point
22. ---- Is the process of writing the
programs is commonly called
a) Software
b) Coding
c) Debugging
d) None of the above

23. ----- Is the special program that
converts programming language
instructions into machine level
instructions
a) Modem
b) Central Processing Unit
c) Compiler
d) None of the above

24. After the program has been
complied, the resulting set of
instructions is called
a) Final result
b) Information
c) Executable code
d) Source code

25. Which of the foll owi ng is
presentation application soft ware
a) MS-Power point
b) MS-Word
c) MS-Excel
d) MS-Access

26. ---- Is a speci fic combination of a
microprocessor family and an
operating system
a) Platform
b) Operating system
c) Central Processing Unit
d) None of the above

27. ----Plat form comprises a windows
operating system and an intel or
intel compatibl e microprocessor
a) Wintel
b) Macintosh
c) Normal plat form
d) Java plat form

28. Application software is
a) System specific
b) User specific
c) Platform specific
d) None of the above

29. An operating system runs multiple
applications simultaneously known
as
a) Multitasking
b) Multiprogramming
c) Programming
d) None of the above

30. Which of the foll owi ng language
use interpret er
a) C++
b) COBOL
c) BASIC
d) All of the above

31. ---- Is a database program that
stores information that can be
manipulated, stored and filtered to
meet your specific needs
a) Access
b) Power point
c) Excel
d) None of the above

32. ---- Creates multimedi a
presentations to display information in
a graphical format
a) Access
b) Power point
c) Excel
d) None of the above

33. ---- Allows you devel op
spreadsheets that display data in
various tabular and visual formats
a) Access
b) Power point
c) Excel
d) None of the above

34. FORTRAN is
a) Formula translation
b) Formula generation
c) Format generation
d) Format translation

35. EEPROM stands for
a) Electrically Erasable
Programmable Read Only
Memory
b) Electrically Erasabl e Programmabl e
Run Only Memory
c) Electrically Efficiently Programmed
Read Only Memory
d) Efficiently Erasable Programmable
Read Only Memory

36. ---- Generation comput ers are very
big in size with less memory
a) Thi rd Generation
b) Fourth Generation
c) First Generation
d) Fift h Generation

37. EBCDIC stands for
a) Extended Binary Cut Decimal
Interchange Code
b) Extended Binary Coded Dedicated
Interchange Code
c) Extended Binary Coded Decimal
Inner Code
d) Extended Binary Coded
Decimal Interchange Code

38. Computer can do every thing
except
a) Processing
b) Storing
c) Analyzing
d) Own decisions

39. ---- Is a data model in which the
data is organized into a tree like
structure
a) Hierarchical database model
b) Sequential model
c) Dimensional model
d) None of the above

40. SQL stands for
a) Structured Quest Language
b) System Query Language
c) Structured Query Language
d) Standard Query Language

Operating Systems (OS)

Brought to you by
Nareddula Rajeev, admin of
nrrbeassistance.blogspot.com
(NRR Bank Exams Assistance)

1. If there are multiple recycle bin for a
hard disk
a. you can set different size for
each recycle bin
b. you can choose which recycle bin to
use to store your deleted fil es
c. You can make any one of them
default recycle bin
d. None of above

2. Identify false statement
a. You can fi nd del eted files in recycle
bin
b. You can restore any fil es in recycle
bin if you ever need
c. You can increase free space of
disk by sending files in recycle
bin
d. You can right click and choose
Empty Recycle Bin to clean it at once

3. If the displayed system time and
date is wrong, you can reset it using
a. Write
b. Calendar
c. Write file
d. Control panel

4. You should save your computer
from?
a. Viruses
b. Time bombs
c. Worms
d. All of the above

5. World Wide Web is being standard
by
a. Worldwi de corporation
b. W3C
c. World Wide Consortium
d. World Wide Web Standard

6. A co-processor
a. Is relatively easy to support in
software
b. Causes all processor to function
equally
c. Works with any application
d. Is quite common in modern
computer

7. A Microsoft Windows is ..... a(n)
a. Operating system
b. Graphic program
c. Word Processing
d. Database program

8. Which of the following is program
group?
a. Accessories
b. Paint
c. Word
d. All of above

9. Which is not application soft ware?
a. Windows NT
b. Page Maker
c. WinWord XP
d. Photoshop

10. The ..... program compresses large
files into a smaller fil e
a. WinZip
b. WinShrink
c. WinStyle
d. None of above

11. Which of the foll owi ng is an
example of a real time operating
system?
a. Lynx
b. MS DOS
c. Windows XP
d. Process Control

12. Which of the following operating
system does not impl ement the
multitasking truly?
a. Windows 98
b. Windows NT
c. Windows XP
d. MS DOS

13. Which of the following wi ndows
version support 64 bit processor?
a. Windows 98
b. Windows 2000
c. Windows XP
d. Windows 95

14. Which of the following Operating
System does not implement
multitasking truly?
a. Windows 98
b. Windows NT
c. Windows XP
d. MS DOS

15. What program runs fi rst after
computer is booted and l oadi ng GUI?
a. Desktop Manager
b. File Manager
c. Windows Explorer
d. Authentication

16. Which of the following operating
system do you choose to implement a
client server net work?
a. MS DOS
b. Windows
c. Windows 98
d. Windows 2000

17. Which of the following Operating
systems is better for implementing a
Client -Server net work
a. MS DOS
b. Windows 95
c. Windows 98
d. Windows 2000

18. My Computer was introduced from
a. Windows 3.1
b. Windows 3.11
c. Windows 95
d. Windows 98

19. Which of the following Windows do
not have Start button
a. Windows Vista
b. Windows 7
c. Windows 8
d. None of above

20. Which is the latest version of MS
Windows?
a. Windows 2007
b. Windows 8.1
c. Windows 2008
d. Windows 7

21. Which operating system doesn't
support net working between
computers?
a. Windows 3.1
b. Windows 95
c. Windows 2000
d. Windows NT

22. Which Operating System doesn't
support net working between
computers?
a. Windows 3.1
b. Windows 95
c. Windows 2000
d. Windows NT

23. Which of the following does not
support more than one program at a
time?
a. DOS
b. Linux
c. Windows
d. Unix

24. Which of the following is not an
operating system?
a. DOS
b. Linux
c. Windows
d. Oracle

25. Linux is a(n) ... operating system
a. Open source
b. Microsoft
c. Windows
d. Mac

26. Which operating system can you
gi ve small est file name?
a. Ps/2
b. Dos
c. Windows
d. Windows NT

27. Which one is not operating system?
a. P11
b. OS/2
c. Windows
d. Unix

28. Which of the foll owi ng is not a
multitasking operating system?
a. Windows
b. Linux
c. Win NT
d. DOS

29. You should choose Sleep option
when
a. The computer is tired after working
for the whole day
b. You are leaving for a very
short time and want to resume
you work shortly
c. When computer gets hanged
frequently. Let it sleep for some time
d. You finish working and going to bed

30. The .... displays the name of every
computer user on the computer
a. Wish list screen
b. Command screen
c. Welcome screen
d. None of the above

31. The category of software most
appropriate for controlling the design
and layout of complex document like
newsl etters and brochure is:
a. Word processing
b. Computer aided design
c. Web page aut hori ng
d. Desktop publishing

32. Which one is not a system tool?
a. Backup
b. Disk defragment
c. Virus scanning
d. All of the above

33. The memory which allocates space
for DOS and application is called
a. Expanded memory
b. Cache memory
c. Virtual memory
d. Conventional memory

34. The operati ng system creates ...
from the physical computer
a. Virtual space
b. Virtual computer
c. Virtual device
d. None

35. The operating system creates
_____ from the physical comput er
a. Virtual space
b. Virtual computers
c. Virtual device
d. None

36. Which menu bar selection woul d
you access to open fil e?
a. Option
b. Help
c. View
d. None of above

37. Which mode loads minimal set of
dri vers when starting Windows?
a. Safe Mode
b. Normal Mode
c. VGA Mode
d. Network Support Mode

38. Which of the following are loaded in
safe mode?
a. Keyboard dri ver
b. Mouse dri ver
c. VGA drive
d. All of above

39. A .... is a named location on a disk
where files are stored
a. Folder
b. Pod
c. Version
d. None of the above

40. Which command is used to see the
version of operating system?
a. Vol
b. Version
c. Ver
d. None of the above

41. Which type of command requi res
additional files to perform specific
operations?
a. Internal commands
b. External commands
c. Valuable commands
d. Primary commands

43. A user-interface that is easy to use
is considered to be
a. User-happy
b. User-simple
c. User-friendly
d. None of the above

44. A ....is a flash memory storage
device that plugi ns into a USB port
a. USB snap dri ve
b. USB flash drive
c. USB memory maker dri ve
d. None of above

45. The ....is the dri ve contai ning the
files to be copi ed
a. Source drive
b. Destination dri ve
c. USB dri ve
d. None of the above

46. The number of character contai ned
in primary name (DOS)?
a. Up to 8 characters
b. 3 characters
c. Up to 10 characters
d. None of the above

47. Which one of the following is not a
multitasking operating system?
a. DOS
b. Windows
c. Unix
d. Linux

48. The most recent version of MAC
OS is based on the ... operating system
a. Windows
b. Linux
c. Unix
d. CMOS

49. The ... operati ng system was
initially created i n the early 1970s at AT
and T's Bell Labs
a. Linux
b. DOS
c. Unix
d. GNU

50. Which command is used to
undelete a bunch of fil es with extension
.doc that you have just delet ed?
a. Undelete
b. Undelete/all
c. Undelete *.doc
d. All of above

Security and Risks
Brought to you by
Nareddula Rajeev, admin of
nrrbeassistance.blogspot.com
(NRR Bank Exams Assistance)

1. The typical computer criminal is a(n):
A. young hacker.
B. trusted employee with no
criminal record.
C. trusted empl oyee with a long, but
unknown crimi nal record.
D. overseas young cracker.

2. The majority of comput er crimes are
committed by:
A. hackers.
B. insiders.
C. overseas criminals.
D. young teenage computer geniuses.

3. The common name for the crime of
stealing passwords is:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.

4. Coll ecting personal i nformation and
effecti vely posing as another indi vi dual
is known as the crime of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.

5. Malicious software is known as:
A. badware.
B. malware.
C. maliciousware.
D. illegal ware.

9. The thing that eventually terminates
a worm vi rus is a lack of:
A. memory or disk space.
B. time.
C. CD dri ve space.
D. CD-RW.

10. When a logic bomb is acti vated by
a time-related event, it is known as a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.

11. What is the name of an application
program that gathers user information
and sends it to someone through the
Internet?
A. A virus
B. Spybot
C. Logic bomb
D. Security patch

12. Standardization of Microsoft
programs and the Windows operating
system has made the spread of
viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.

13. HTML viruses infect:
A. your computer.
B. a Web page in the HTML code.
C. both a Web page and the computer
that is viewing it.
D. None of these answers is correct.

14. Software programs that close
potential security breaches in an
operating system are known as:
A. security breach fixes.
B. refresh patches.
C. security repai rs.
D. security patches.

15. When customers of a Web site are
unable to access it due to a
bombardment of fake traffic, it is known
as:
A. a vi rus.
B. a Troj an horse.
C. cracking.
D. a denial of service attack.

16. ___________ is the measurement
of things such as fingerpri nts and
retinal scans used for security access.
A. Biometrics
B. Biomeasurement
C. Computer security
D. Smart weapon machi nery

17. What is the most common tool
used to restrict access to a computer
system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software

18. Hardware or software designed to
guard agai nst unauthorized access to a
computer network is known as a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
D. encryption safe wall.

19. The scrambli ng of code is known
as:
A. encryption.
B. a firewall.
C. scrambling.
D. password-proofing.

20. If you want to secure a message,
use a(n):
A. cryptology source.
B. encryption key.
C. encryption software package.
D. cryptosystem.

21. To prevent the loss of data during
power fail ures, use a(n):
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.

22. A(n) ____________ can shiel d
electronic equi pment from power
spikes.
A. encryption program
B. surge protector
C. firewall
D. UPS

23. All of these are suggestions for
safe computing EXCEPT:
A. dont borrow disks from other
people.
B. open all e-mail messages but
open them slowly.
C. download shareware and freeware
with caution.
D. disinfect your system.

24. Freeware ___________ encrypts
data.
A. encryption
B. firewall soft ware
C. PGP
D. pri vate and public keys

25. ____________ is defined as any
crime completed through the use of
computer technol ogy.
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking

26. Most computer systems rely solely
on ___________ for authentication.
A. logins
B. passwords
C. encryption
D. lock and key

27. Creating strong computer security
to prevent computer crime usually
simultaneously helps protect :
A. privacy rights.
B. personal ethics.
C. the number of cookies downloaded
to your personal comput er.
D. personal space.

28. Security procedures can:
A. will eliminate all computer security
risk.
B. reduce but not eliminate risks.
C. are prohibiti vely expensi ve.
D. are inaccessible for the average
home user.

29. A __________ is anything that can
cause harm.
A) vul nerability
B) phish
C) threat
D) spoof

30. In the right setting a thief will steal
your information by simply watching
what you type.
A) snaggi ng
B) spying
C) social engineering
D) shoulder surfing

31. A __________ is a small program
embedded inside of a GIF image.
A) web bug
B) cookie
C) spyware applicati on
D) spam

32. A hacker contacts you my phone or
email and attempts to acquire your
password.
A) spoofing
B) phishing
C) spamming
D) buggi ng

33. This power protection device
includes a battery that provi des a few
minutes of power.
A) surge suppressor
B) line conditioner
C) generator
D) UPS

34. The phrase __________ descri bes
viruses, worms, Trojan horse attack
appl ets, and attack scripts.
A) malware
B) spam
C) phish
D) vi rus

35. A hacker that changes or forges
informati on in an electronic resource, is
engaging in __________.
A) deni al of service
B) sniffing
C) terrorism
D) data diddling

36. Hackers often gain entry to a
network be pretendi ng to be at a
legitimate computer.
A) spoofing
B) forging
C) IP spoofing
D) ID theft

37. The __________ of a threat
measures its potential impact on a
system.
A) vul nerabilities
B) countermeasures
C) degree of harm
D) susceptibility

38. The power level drops below 120V.
A) brownout
B) spike
C) bl ackout
D) surge

39. You shoul d keep credit card and
pay statements for at least _________
years.
A) two
B) three
C) four
D) fi ve

40. The __________ prevents unlawful
access to voice communications by
wire.
A) Electronic Communications
Privacy Act
B) Freedom of Information Act
C) USA Patri ot Act
D) Pri vacy Act of 1974

41. __________cookies are also
known as transient cookies.
A) Third-party
B) First-party
C) Session
D) Persistent

42. Which of the following will not
protect you from spam?
A) spam blockers
B) e-mail rules
C) popup blocker
D) filt ers

43. A __________s main purpose is to
prohibit unauthorized access to your
computer via the Int ernet.
A) popup bl ocker
B) firewall
C) spyware blocker
D) spam assassin

44. To read the system messages and
warnings, access the __________ i n
Windows.
A) system manager
B) control panel
C) event viewer
D) message screen

45. Before discardi ng a fi nancial
document, you shoul d __________.
A) copy it
B) shred it
C) fil e it
D) post it

46. To create a copy of files in the
event of system failure, you create a
__________.
A) restore file
B) backup
C) fi rewall
D) redundancy

47. If configured correctly, the
__________ will prevent interaction
with your comput er aft er a specified
time peri od.
A) firewall
B) filter
C) screen saver
D) popup blocker

48. To recover files from a backup, you
perform a __________.
A) restore
B) scan
C) unerase
D) copy

Ms-Office

Brought to you by
Nareddula Rajeev, admin of
nrrbeassistance.blogspot.com
(NRR Bank Exams Assistance)

1. IC chips used in computers are
usually made of
1. Lead
2. Silicon
3. Chromium
4. Gold

2. One kilobyte is equal to
1. 1000 bytes
2. 1024 bytes
3. 100 bytes
4. 1023 bytes

3. Which supercomputer is developed
by the Indian Scientists?
1. Param
2. Super 301
3. Compaq Presari o
4. CRAY YMP

4. One Gigabyte is Approximately
equal is
1. 1000,000 bytes
2. 1000,000,000 bytes
3. 1000,000, 000, 000 bytes
4. None of these

5. The errors that can be pointed out by
the compiler are
1. Syntax error
2. Symantic error
3. Logical error
4. Internal error

6. What is the control unit's function i n
the CPU
1. To transfer data to primary storage .
2. TO store program instructions.
3. To perform logic functions.
4. To decode program instructions.

7. What is the best way to have a data
and the slide number appear on every
slide?
1. choose Tools, Header and Foot er,
click Slide tab, select the desired
options, click Apply to All.
2. choose Insert, Header and
Footer, click Slide tab, select the
desired options, click Apply to
All.
3. choose View, Header and Foot er,
click Slide tab, select the desired
options, click Apply to All.
4. choose File, Header and Foot er,
click Slide tab, select the desired
options, click Apply to All.

8. What do you use to creat e a chart?
1. Pie Wizard
2. Excel Wizard
3. Data Wizard
4. Chart Wizard

9. Which of the foll owi ng statements is
true?
1. Minicomputer works faster
than Microcomputer
2. Microcomputer works faster than
Minicomput er
3. Speed of both the comput ers is the
same
4. The speeds of bot h these comput ers
cannot be compared with the speed of
advanced computer

10. The background of any Word
document -
1. is always white colour
2. is the colour you preset under
the Options menu
3. is always the same for the entire
document
4. can have any colour you choose

11. The blinking symbol on the
computer screen is called the
1. mouse
2. logo
3. hand
4. cursor

12. Which function calculates the
largest value in a set of numbers in
Excel?
1. Average
2. Count
3. Minimum
4. Maximum

13. To move to t he bottom of a
document, press ...
1. Auto Summarize
2. Home key
3. Ctrl key + End key
4. End key

14. The Word function that corrects text
as you type is referred to as
1. Auto Summarize
2. Auto Insert
3. Auto Correct
4. Track Changes

15. To fi nd and load a file that has
been saved -
1. select the Close command
2. select the New command
3. select the Save command
4. select the Open command

16. What displays the content of the
active cell in Excel?
1. Name box
2. Row Headings
3. Formula bar
4. Taskpane

17. In Word you can force a page
break -.
1. by positioning your cursor at the
appropriate pl ace and pressing the F1
key
2. by positioning your cursor at
the appropriate place and
pressing Ctrl + Enter
3. by using the Insert/Section Break
4. by changing the font size your
document

18. Which of the followi ng refers to a
small, single-site network?
1. LAN
2. DSL
3. RAM
4. USB

19. By default, your documents print in
- mode.
1. Landscape
2. Portrait
3. Page Setup
4. print View

20. How do you prevent emailed word
documents from al ways openi ng in the
Reading Layout?
1. From the Tools Menu >
Options > General Tab > uncheck
the `Allow starting in Reading
Layout'
2. From the View Menu > Reading
Layout > General Tab > uncheck the
`Allow stari ng in Reading Layout'
3. From the Format Menu > Autoformat
> Edit Tab > uncheck the `Use with
emailed attachments'.
4. All the above

21. Which of these is a quick way to
copy formatting from a selected cell to
two other cells on the same
worksheet?
1. Use CTRL to select all three cells,
then click the Paste Button image
button on the Standard toolbar
2. Copy the selected cell, then select
the other two cells, click Style on the
Format menu, then click Modify
3. Click Format Painter Button
image on the Formatting toolbar
twice, then click in each cell you
want to copy the formatting to
4. Use Alt to select all three cells, then
click the Paste Button image button on
the Standard toolbar

22. Which of the following pl aces the
common data el ements in order from
smallest to largest?
1. Character, file, record, fi eld,
database
2. Character, record, fiel d, file,
database
3. Character, field, record, file,
database
4. Bit, byte, character, record, fi eld, file,
database

23. The Assistant is -.
1. an application that allows you to take
notes and save them in a fil e
2. an animated character that
provides help and suggestions
3. a button on the standard Tool bar
that executes the Print command
4. a collection of frequently misspelled
words in a dictionary file

24. Suppose you have columns of data
that span more t han one pri nted page.
How can you automatically print the
column headi ngs on each page?
1. Click Page Setup on the File
menu, click the Sheet tab, and
enter the row that contains these
column headings under Print
titles
2. Click Page Setup on t he Fil e menu,
click the Page tab, click the Options
button, then enter your choices
3. Click Page Preview on the Fil e
menu, click the Sheet tab, and enter
the row that contains these column
headings under Print titles
4. Click Page Setup on t he Fil e menu,
click the Sheet tab, and make a
selection under the Print headi ng

25. How do you print your slides in a
handout that includes lines for notes?
1. In the Print di alog box, select
Handouts and set the number of slides
per page to 3
2. In the Print dialog box, select
Handouts and a number of slices
per page, then select the Include
comment pages option
3. In the Pri nt dialog box, select Notes
Pages instead of Handouts
4. It cannot be done

26. Which of the following describes a
relational database?
1. It provides a rel ationshi p between
integers
2. It consists of separate tables
or related data
3. It retrieves data rel ated to its queries
4. It provides a rel ationshi p between
floats

27. What do you press to enter the
current date in a cell ?
1. CTRL +; (semicolon)
2. CTRL + SHIFT + :(colon) + shi ft +
:(colon) >
3. CTRL + F10
4. CTRL + F11

28. What happens when you press Ctrl
+ V key?
1. A Capital V letter is typed into your
document at the cursor point
2. The selected item is pasted
from the Clipboard
3. The selected item is pasted from the
Clipboard
4. The selected drawing objects are
distributed vertically on the page

29. ATM means
1. Any Time Marketing
2. Any Time Money
3. Any Time Machi ne
4. Automatic Teller Machine

30. CRM means -.
1. Customer Relationship
Management
2. Customer Ret ention Manager
3. Customers' Relati ves Meet
4. Channel Route Market

31. A presentation means
1. Display of products
2. Explaining the utility of
products or plan
3. A gift
4. Display of Communication skils

32. A term associated with the
comparison of processing speed is
1. FFTS
2. MPG
3. MIPS
4. CPS

33. An octal number 237 is equal to the
binary number
1. 010 011 111
2. 010 111 011
3. 011 101 101
4. 011 000 001

34. Magnetic disk a medium known as
1. Serial access
2. Direct access
3. Sequential access
4. Sequential and rot ational access

35. Which of the foll owi ng is true?
1. Plotters are not available for
microcomputer systems
2. Micro-computer are not programmed
like conventional computers
3. Mini-computers are
task-oriented
4. The cont ents of ROM are easily
changed

36. ROM is composed of
1. Magnetic cores
2. Micro-processors
3. Photoelectric cells
4. Floppy disks

37. The computer code for interchange
of information bet ween termi nals is
1. ASCII
2. BCD
3. BCDIC
4. Hollerith

38. A temporary storage area, attached
to the CPU, for I/O operations, is a
1. Channel
2. Buffer
3. Register
4. Core

39. A characteristic of the ASCII code
is
1. its limitation to a maximum of 96
character configuration
2. its use of the zone codes 1010, 1011
and 1100
3. its independence from
Hollerith code
4. All of these

40. A decimal equi valent of m second
is
1.0.000001 sec
2.1000000 sec
3.0.001 sec
4.1000 sec

41. An I/O device which provi des
photographic outputs for printing
galleys, is the
1. Camera printer
2. Automatic typesetter
3. Radix printer
4. All of these

42. A term used interchangeably with
diskette is
1. Disk cartridge
2. Disk pack
3. Floppy disk
4. Packette disk

43. A peripheral device used in a word
processing system is
1. Floppy disk
2. Magnetic card reader
3. CRT
4. All of these

44. MS-DOS is the name of a/an
1. Application software
2. Hardware
3. System software
4. None of these

45. Which of the following fl oppy sizes
exists?
1. 5.25 inches
2.4.75 inches
3.6 inches
4.8 inches

46. A characteristic of card system is
1. slowness in processing data
2. using cards as records of
transactions
3. needing a l arger data staff
4. All of these

47. The daily processing of corrections
to customer accounts best exempli fies
the processing mode of
1. batch processing
2. real -time processing
3. time-shari ng
4. off-line processing

48. Which of the followi ng terms could
be used to describe the concurrent
processing of computer programs vi a
CRTs, on one computer system?
1. Time shari ng
2. On-line processing
3. Interacti ve processing
4. All of these

49. The retrieval of information from the
computer is defi ned as
1. collection of data
2. data ret rieval operations
3. output
4. data output collection

50. An advant age of a distributed word
processing network is
1. increased number of reports handled
2. less delay in inter-office
communications
3. greater corporate control over
outputs
4. All of these

51. The indi vidual within the operations
group who ordinarily uses a variety of
keyboard devices, is the
1. Data Cl erk
2. Keypunch Operator
3. Data Entry Clerk
4. Computer Operator

52. Which one of the following is not a
computer language?
1. BASIC
2. COBOL
3. LOTUS
4. FORTRAN

53. Which of the foll owi ng packages is
used for composition in printing press?
1. Lotus
2. dBase
3. Page Maker
4. Word Perfect

54. Which one of the following is not a
programming language of a computer?
1. BASIC
2. FORTRAN
3. LASER
4. PASCAL

55. In computer language, one kilobyte
equals
1. 1000 bytes
2. 1024 bytes
3. 100 bytes
4. 8 bytes

56. 'Foxpro' is
1. a medicine
2. a disease
3. a computer language
4. an animal

57. The most widely used commercial
programming computer language is
1. BASIC
2. COBOL
3. FORTRAN
4. PASCAL

58. Who was the inventor of
mechanical calculator for adding
numbers?
1. Charles Babbage
2. Peano
3. Newton
4. Pascal

59. Who wrote the book 'Computer
Liberation and Dream Machine', the
first book on personal computers?
1. John McCarthy
2. Ted Nelson
3. Niklaus Wirth
4. Karl Capek

60. Which one of the following is a
stored program machine?
1. Micro-processor
2. Calculator
3. Analog-computer
4. Micro-computer

61. Computers can be classified in
which of the foll owi ng hierarchical
orders?
1. PC, Large, Super Micro, Super
Computer
2. Super Micro, PC, Large, Super
Computer
3. PC, Super Micro, Large, Super
Computer
4. Large, Super Micro, Super
Computer, PC

62. The unit of hardware, which an
operator uses to monit or computer
processing, is the
1. Card Reader
2. CPU
3. Line Print er
4. Console

63. The computer device primarily used
to provide hard copy is the
1. CRT
2. Line Printer
3. Computer Console
4. Card Reader

64. Consider the foll owi ng statements
about Internet facility:
1. It serves as the largest
one-line information system.
2. It provides the most dependable and
latest mode for sending E-mail.
3. Recurring expenditure on
communication E-mail is very high.
4. It is often misused and has triggered
cyber-crimes.

65. Which is/are the main provisions of
Information Technology (IT) Act, 2000?
1. Finalisation of contracts through
electronic media.
2. Legal recognition to di gital
signatures and documents.
3. Making hacking wit h computer
system an office.
4. All of the above

66. Which of the following circuit is
used as a 'Memory device' in
computers?
1. Rectifier
2. Flip-Flop
3. Comparator
4. Attenuator

67. The memory of a comput er is
commonly expressed in terms of
Kilobytes or Megabytes. A byte is
made up of
1. eight decimal digits
2. eight binary digits
3. two binary digits
4. two decimal di gits

68. For reproducing sound, a CD
(Compact Disc) audio pl ayer uses a
1. quartz crystal
2. titanium needle
3. laser beam
4. barium titanium ceramic

69. Pickup wrong definition
1. Off line - is a system peripheral
equi pment not controll ed by CPU
2. Online - is system in which
peri pheral equi pment is in direct
contact with CPU
3. PL/I is the acronym Peripheral
Listing /Index
4. Program or routine is a set sequence
of i nstructions gi ven to comput er for
problem sol ving

70. A computer programmer
1. enters dat a into computer
2. writes programs
3. changes flow chart into instructions
4. does total planning and
thinking for a computer

71. Termi nal is a
1. device used to gi ve supply to a
computer
2. Point at which data may leave
or enter the computer
3. point where wi res are interconnected
4. an input/output device
Errors in comput er results could be due
to
1. encodi ng of data
2. transmission of data
3. manipulation of data
4. all of the above

72. Register is a
1. Set of capacitors used to register
input instructions in a di gital computer
2. Set of paper tapes and cards put in a
file
3. Temporary storage unit within
the CPU having dedicated or
general purpose use
4. part of the auxiliary memory

73. MAN is a -
1. Cost
2. Company
3. Network
4. Country

74. Which of the following is the
uni versal gate?
1. NAND-Gate
2. OR-Gate
3. AND-Gate
4. NOT-Gate

75. The translator program t hat
converts source code in high level
language into machi ne code line by line
is called -
1. Assembler
2. Compil er
3. Loader
4. Interpreter

Miscellaneous

Brought to you by
Nareddula Rajeev, admin of
nrrbeassistance.blogspot.com
(NRR Bank Exams Assistance)

1. Algorithm and Fl ow chart help us to

a) Know the memory capacity
b) Identify the base of a number
system
c) Direct the out put to a pri nter
d) Specify the problem
completely and clearly
e) None of these

2. The contents of information are
stored in
a) Memory data register
b) memory address register
c) Memory access register
d) Memory arithmetic register
e) None of these

3. An I/O device which provi des
photographic outputs for printing
galleys, is the
(a) Camera print er
(b) Automatic typesetter
(c) Radix printer
(d) All of these

4. The daily processing of corrections
to customer accounts best exempli fies
the processing mode of
(a) batch processing
(b) real -time processing
(c) time-sharing
(d) off-li ne processing

5. A decimal equi val ent of m second is
(a) 0.000001 sec
(b) 1000000 sec
(c) 0.001 sec
(d) 1000 sec

6. Which of the following is true?
(a) Plotters are not available for
microcomputer systems
(b) Micro-computer are not
programmed like conventional
computers
(c) Mini-computers are
task-oriented
(d) The contents of ROM are easily
changed

7. Magnetic disk a medium known as
(a) Serial access
(b) Direct access
(c) Sequential access
(d) Sequential and rotational access

8. Which one of the followi ng is a
stored program machine?
(a) Micro-processor
(b) Calculat or
(c) Analog-computer
(d) Micro-computer

9. Computers can be classifi ed i n
which of the foll owi ng hierarchical
orders?
(a) PC, Large, Super Micro, Super
Computer
(b) Super Micro, PC, Large, Super
Computer
(c) PC, Super Micro, Large, Super
Computer
(d) Large, Super Micro, Super
Computer, PC

10. Charl es Babbage invented
(a) ENIAC
(b) Difference engine
c) Electronic computer
(d) Punched card

11. The memory of a comput er is
commonly expressed in terms of
Kilobytes or Megabytes. A byte is
made up of
(a) ei ght decimal digits
(b) eight binary digits
(c) two bi nary di gits
(d) two decimal digits
(e) none of these

12. When a CD (Compact Disc used in
audi o and Vi deo system) is seen i n
sunlight, rainbow like colours are seen.
This can be explai ned on the basis of
phenomenon of (a) reflection and
diffraction
(b) reflection and transmission
(c) diffraction and transmission
(d) refraction, diffraction and
transmission
(e) none of these

13. The most widely used commercial
programming computer language is
(a) BASIC
(b) COBOL
(c) FORTRAN
(d) PASCAL

14. Transistors are associated with
which computer system?
(a) Fi rst generation
(b) Fi fth generation
(c) Second generation
(d) None of these

15. First generation computer systems
used (a) Transistors
(b) Vacuum tubes
(c) Magnetic cores
(d) Silicon chips

16. Which of the following circuit is
used as a Memory device i n
computers?
(a) Rectifier
(b) Flip-Flop
(c) Comparator
(d) Attenuator
(e) none of these

17. For reproducing sound, a CD
(Compact Disc) audio pl ayer uses a
(a) quartz crystal
(b) titani um needle
(c) laser beam
(d) bari um titanium ceramic
(e) none of these

18. Consider the foll owi ng statements
about Internet facility:
I. It serves as the l argest one-line
informati on system.
II. It provides the most dependable and
latest mode for sending E-mail.
III. Recurri ng expendit ure on
communication E-mail is very high.
IV. It is often misused and has
triggered cyber-crimes. Which of these
statements are correct?
(a) I, II and IV
(b) I and IV
(c) II, III and IV
(d) II and III

19. Which of the followi ng terms could
be used to describe the concurrent
processing of computer programs vi a
CRTs, on one computer system?
(a) Time shari ng
(b) On-li ne processing
(c) Int eracti ve processing
(d) All of these

20. The daily processing of corrections
to customer accounts best exempli fies
the processing mode of
(a) batch processing
(b) real -time processing
(c) time-sharing
(d) off-li ne processing

21. MS-DOS is the name of a/an
(a) Application software
(b) Hardware
(c) System software
(d) None of these

22. Memory which forgets every thing
when you switch off the power is
known as
a. Corrupted
b. Volatile
c. Non-Vol atile
d. Non-Corrupted
e.None of these

23. A fault in a computer program
which prevents it from working correctly
is known as
a. Boot
b. Bug
c. Biff
d. Strap
e. None of these

24. A self replicating program, similar
to a virus which was taken from a
1970s science fiction novel by John
Bruner entitled the Shockwave Ri der is
_________
a. Bug
b. Vice
c. Lice
d. Worm
e. None of these

25. A _______ is a bi-stabl e electronic
circuit that has two stable states.
a. Multi vibrator
b. Flip-flop
c. Logic gates
d. laten
e. None of these

26. Collecting personal information and
effecti vely posing as another indi vi dual
is known as the crime of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.

27. A program that performs a useful
task while simultaneously allowing
destructi ve acts is a:
A. worm.
B. Trojan horse.
C. virus.
D. macro vi rus.

28. An intentionally disrupti ve program
that spreads from program to program
or from disk to disk is known as a:
A. Troj an horse.
B. virus.
C. time bomb.
D. time-related bomb sequence.

29. ___________ is the measurement
of things such as fingerpri nts and
retinal scans used for security access.
A. Biometrics
B. Biomeasurement
C. Computer security
D. Smart weapon machi nery

30. When customers of a Web site are
unable to access it due to a
bombardment of fake traffic, it is known
as:
A. a vi rus.
B. a Troj an horse.
C. cracking.
D. a denial of service attack.

Brought to you by
Nareddula Rajeev, admin of
nrrbeassistance.blogspot.com
(NRR Bank Exams Assistance).
Source: Internet

Get connected to our Face book
| Google+ | Twitter| Group |
Community for free alerts.

Subscribe to our E-mail for free Updates

Motto: Serve poor and needy
kindheartedly NRR. All the best*

S-ar putea să vă placă și