1. It contains data descriptions and defines the name, data type, and length of each field in the database:
(a) data dictionary
(b) data table
(c) data record
(d) data field
(e) None of these




2. Personal logs or journal entries posted on the Web are known as :
(a) listserves
(b) Webcasts
(c) blogs
(d) subject directories
(e) None of these




3. It uses pictures (called icons) and menus displayed on the screen to send commands to the computer system
(a) command-based user interface
(b) GUI
(c) system utility
(d) API
(e) None of the above



4. Which of the following is NOT a type of broadband Internet connection?
(a) cable
(b) DSL
(c) Dial-up
(d) Satellite
(e) None of these




5. Software such as viruses, worms and Trojan-horses, that has a malicious intent, is known as
(a) spyware
(b) adware
(c) spam
(d) malware
(e) None of these




6. The first generation of computers was based upon?
(a) Transistors
(b) ICs
(c) Valves
(d) Conductor
(e) None of these




7. In “MICR” “C” stands for?
(a) Colour
(b) Code
(c) Character
(d) Coding
(e) None of these




8. __________ is a set of keywords, symbols, and system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer
(a) A computer program
(b) A programming language
(c) An assemble
(d) Syntax
(e) None of these




9. A hard copy of a document is ______
(a) Printed on the printer
(b) Stored on a floppy
(c) Stored on a CD
(d) Stored in the hard disk
(e) None of these




10. Which of the following groups consist of only input devices?
(a) Mouse, keyboard, monitor
(b) Mouse, keyboard, printer
(c) Mouse, keyboard, plotter
(d) Mouse, keyboard, scanner
(e) None of these




11. __________ is the process of finding errors in software code.
(a) Compiling
(b) Testing
(c) Running
(d) Debugging
(e) None of these




12. The _________ tells the computer how to use its components
(a) Utility
(b) Network
(c) Operating system
(d) Application program
(e) None of these




13. A flaw in a program that causes it to produce incorrect or inappropriate results is called a ________.
(a) Bug
(b) Byte
(c) Attribute
(d) Unit problem
(e) None of these




14. The _________ of software contains lists of commands and options
(a) Title bar
(b) Menu bar
(c) Formula bar
(d) Tool bar
(e) None of these





15. A (n) ________ is a combination of hardware and software that facilitates the sharing information between computing devices
(a) Network
(b) Peripheral
(c) Expansion board
(d) Digital device
(e) None of these




16. Servers are computers that provide resources to other computers connected to a _____
(a) Network
(b) Mainframe
(c) Supercomputer
(d) Client
(e) None of these



17. Each cell in a Microsoft Office Excel document referred to by its cell address, which is the _________.
(a) Cell’s column label
(b) Cell’s column label and worksheet tab name
(c) Cell’s row label
(d) Column labels
(e) None of these



18. How can the user determine what programs are available on a computer?
(a) Checking the hard disk properties
(b) viewing the installed programs during the booting process
(c) checking the operating system for a list of installed programs
(d) checking the existing files saved on the disk
(e) none of these



19. Which of the following can handle most system functions that aren’t handled directly by the operating system?
(a) Vertical market applications
(b) Utilities
(c) Algorithms
(d) Integrated software
(e) Compilers



20. When cutting and pasting, the item cut is temporarily stored in
(a) ROM
(b) Hard drive
(c) Diskette
(d) Dashboard
(e) Clipboard



Important For: SBI Associates Clerk, Insurance Assistant Exams