Hello and welcome to ExamPundit. Here is a set of Computer Knowledge Quiz for RBI Assistant 2015.
1. Which of the
following statements is true concerning ?
following statements is true concerning ?
(a) Virtual memory is the space on the hard drive where the
operating system begins to store data when it becomes memory-bound
operating system begins to store data when it becomes memory-bound
(b) Accessing data from RAM is a slower than accessing data
from virtual memory
from virtual memory
(c) When it is using virtual memory, the operating system
builds a file called the RAM file
builds a file called the RAM file
(d) If a computer is memory-bound, adding more RAM will not
solve the problem
solve the problem
(e) None of these
2. The term bit is
short for ________.
short for ________.
(a) megabyte
(b) binary language
(c) binary digit
(d) binary number
(e) None of these
3. All of the
following terms are associated with spreadsheet software except ________.
following terms are associated with spreadsheet software except ________.
(a) worksheet
(b) cell
(c) formula
(d) virus detection
(e) None of these
4. ________ are
devices used to transmit data over telecommunications lines.
devices used to transmit data over telecommunications lines.
(a) Drives
(b) Drive bays
(c) Modems
(d) Platforms
(e) None of these
5. A ________ is
approximately one billion bytes.
approximately one billion bytes.
(a) kilobyte
(b) bit
(c) gigabyte
(d) megabyte
(e) None of these
6. Companies use
which of the following vendors to provide access to software and services
rather than purchasing the
applications and maintaining the applications themselves?
which of the following vendors to provide access to software and services
rather than purchasing the
applications and maintaining the applications themselves?
(a) Open source vendors
(b) Alliances
(c) Application service providers
(d) All of the above
(e) None of these
7. Which one of the
following would be considered as a way that a computer virus can enter a
computer system?
following would be considered as a way that a computer virus can enter a
computer system?
(a) Opening an application previously installed on the
computer
computer
(b) Borrowed copies of software
(c) Viewing a website without causing any additional
transactions
transactions
(d) Running High Graphic Media
(e) None of these
8. Collecting
personal information and effectively posing as another individual is known as
the crime of _______.
personal information and effectively posing as another individual is known as
the crime of _______.
(a) spooling
(b) identity theft
(c) spoofing
(d) hacking
(e) None of these
9. The first step in
the transaction processing cycle is _______.
the transaction processing cycle is _______.
(a) database operations
(b) audit
(c) data entry
(d) user inquiry
(e) None of these
10. In the
information systems concept, the output function involves
information systems concept, the output function involves
(a) Capturing and assembling elements that enter the system
to be processed
to be processed
(b) Transformation processes that convert input into output
(c) Transferring elements that have been produced by a
transformation process to their ultimate destination
transformation process to their ultimate destination
(d) Monitoring and evaluating feedback to determine whether
a system is moving toward the achievement of its goal
a system is moving toward the achievement of its goal
(e) None of these
Regards
Team ExamPundit
Sponsored
(adsbygoogle = window.adsbygoogle || []).push({});
Books For 2015 Banking/Insurance Exams