Computer Knowledge Quiz for Bank Exams 2016 – Set 1 – Ruchi



Hello and welcome to ExamPunditHere is a set of Computer Knowledge Quiz for Bank Exams 2016. This is shared by our very own Ruchi.

Rules:
Post answers according to the following format(s)
1-2
2-3
3-4
Or
12345
54213
In case the options are ABCD, use the Appropriate Options.
Do Not Rectify anyone.
If you have any doubt regarding any question of the quiz, kindly ask after the quiz is over i.e answers given.
Do Not CHAT here. If you have any query, use today’s Ask The Mentor Page.

At least 7 Attempts for Scores.

Exampundit.in reserves the right to choose winner or give scores.

1.  Console is
(A)  A device that allows human operators not to
communicate with the computer
(B)  A device that allows human operators to
communicate with the computer
(C)  Communication between computers
(D)  Other than those provided in the option
(E) None of them
2.  Following is true for Bubble memory
(A)  A compact data storage device made of thin
wafers of garnet(a semiconductor material)  in a magnetic field
(B)  Non volatile memory
(C)  Data contained in them is lost when the power
is turned off
(D) Only 1 and 2
are correct
(E) All 1, 2 and
3 are correct
3.  The first digital computer build with IC chips
was known as
(A) IBM system /
360
(B) IBM 7090
(C)  Apple 1
(D)  VAX 10
(E) None of them
4.  Laptop computer was invented by
(A)  Allan Osborne
(B) Dr Edgar
Frank Codd
(C)  Adam Osborne
(D)  Ray Kurzweil
(E) None of them
5. A device
invented by Dr Bobeck
(A) Magnetic
disc
(B)  Punched paper tape
(C) Magnetic
bubble storage
(D)  Other than those given in the option
(E) None of them
6. The
shortcut command to close window
(A) Alt+F4
(B) Alt+F1
(C) Alt+End
(D) Ctrl+F4
(E) None of them
7. A
program written in machine level language is what kind of program
(A) Source
(B) Object
(C) Low level
(D) Computer
(E) None of them
8. Rootkit
is
(A) An
application that captured TCP/IP data packets,which can maliciously be used to
capture passwords and other data while it is in transit either within the
computer or over the network
(B) a situation
in which one program or person successfully masquerades  as another by falsifying data and thereby
gaining illegitimate access
(C) A toolkit
for hiding the fact that a computer’s security has been compromised,is a
general description of a set of programs which work to subvert control of an
operating system from its illegitimate(in accordance with established rules)  operators
(D)  Other than those given in the option
(E) All of A, B
and C
9. Blue hat
is
(A)  a hacker breaks security for altruistic or
atleast non malicious reasons
(B) Hacker of
ambiguous ethics or borderline legality often frankly admitted
(C) someone
outside computer security consulting firms that are used to bug test a system
prior to its launch ,looking for exploits so that they can be closed
(D)  other than those given in the option
(E) None of them
10. A
computer can be joined to more than one network through
(A) connector
(B) gateway
(C) passages
(D) All of them
(E) None of them
11. Synapse
is
(A)  a class of graphic techniques used to
visualize the contents of a database
(B) A branch
that connects one node to another
(C) the division
of a certain space into various areas based on guide points
(D)  All of them
(E) None of them

If you want, you can share your own quiz and after 10 sets, we will dedicate a page for your quizzes.



Regards

Team ExamPundit

Sponsored

(adsbygoogle = window.adsbygoogle || []).push({});