0

Computer Awareness

Description: This test covers some topics important from Computer Awaremness section of Bank Papers.
Number of Questions: 15
Created by:
Tags: Computer Awareness Computer Knowledge
Attempted 0/15 Correct 0 Score 0

What is the unsolicited bulk e-mail involving nearly identical messages sent to numerous recipients called?

  1. Trash mail

  2. Sent mail

  3. Spam mail

  4. Snail mail

  5. Starred mail


Correct Option: C
Explanation:

E-mail spam, also known as junk e-mail or unsolicited bulk e-mail (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by e-mail.

Which of the following provides different views of data across different dimensions?

  1. OLTP

  2. OLAP

  3. Data warehouse

  4. Data integration

  5. Application integration


Correct Option: B
Explanation:

OLAP tools enable users to analyse multidimensional data interactively from multiple perspectives.

Which of the following is a stand alone malware computer program?

  1. Computer virus

  2. Trojan horse

  3. Zombie computer

  4. Computer worm

  5. Ransomware


Correct Option: D
Explanation:

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself relying on security failures on the target computer to access it.

Which of the following is a network operating system (NOS)?

  1. Amoeba

  2. NetWare

  3. MINIX

  4. A/ROSE

  5. Android


Correct Option: B
Explanation:

NetWare is a computer network operating system developed by Novell Inc.

What is the extension of an Excel 2007 XML Workbook?

  1. xlsm

  2. xltx

  3. xltm

  4. xll

  5. xlsx


Correct Option: E
Explanation:

Excel 2007 XML Workbook

In which of the following systems is the database updated immediately on entry of the transaction?

  1. Batch Processing System

  2. OLAP

  3. OLTP

  4. Data Mining

  5. Data Warehouse


Correct Option: C
Explanation:

In an online real time system, the database is updated immediately upon entry of the transaction by the operator. Such systems are referred to as online transaction processing or OLTP systems.

Which of the following technologies is used for academic testing and surveys?

  1. Data mart

  2. OMR

  3. POS

  4. OCR

  5. COM


Correct Option: B
Explanation:

Optical mark recognition is the process of capturing human marked data from document forms such as surveys and tests. The device used for this purpose is called as Optical Mark Reader.

In DBMS, what is the centralised repository of information about data called?

  1. Data mart

  2. Data warehouse

  3. View

  4. Data dictionary

  5. Table


Correct Option: D
Explanation:

A data dictionary is a data structure that stores metadata.

What are the computer simulated environments called?

  1. Artificial Intelligence

  2. Virtual Reality

  3. Animation

  4. Perception

  5. Digitisation


Correct Option: B
Explanation:

Virtual reality (VR) is a term that applies to computer simulated environments that can simulate physical presence.

Which of the following is not a form of electronic money?

  1. Bitcoin

  2. Electronic funds transfer (EFT)

  3. Social shopping

  4. Debit card

  5. Credit card


Correct Option: C
Explanation:

Social shopping is a method of commerce where shoppers' friends become involved in the shopping experience.

A collection of wires that transfer data between components inside a computer is called a

  1. vacuum tube

  2. daisy chain

  3. transmitter

  4. bus

  5. repeater


Correct Option: D
Explanation:

In computer architecture, a bus is a subsystem that transfers data between components inside a computer.

What is a software that aids in gathering information about a person or organisation without their knowledge called?

  1. Web browser

  2. Operating system

  3. Firewall

  4. Spyware

  5. Web proxy


Correct Option: D
Explanation:

Spyware is a software that aids in gathering information about a person or organisation without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.

What combination of shortcut keys is used to switch between open applications in all versions of Windows?

  1. Ctrl + Esc

  2. Alt + Print Screen

  3. Ctrl + Alt + Del

  4. Ctrl + Shift + Esc

  5. Alt + Tab


Correct Option: E
Explanation:

This combination is used to switch between open applications in all versions of Windows.

Which of the following operating systems has a command line interface?

  1. Windows XP

  2. MS DOS

  3. X Window System

  4. Amoeba

  5. Windows Vista


Correct Option: B
Explanation:

MS DOS has a command line interface.

Which medium of transmission is used by Wi-Fi technology?

  1. Coaxial cable

  2. Infrared rays

  3. Laser

  4. Optical fibre

  5. Radio waves


Correct Option: E
Explanation:

Wi-Fi is a popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network.

- Hide questions