Professional Documents
Culture Documents
Computer PDF (Eng) - by Smartkeeda
Computer PDF (Eng) - by Smartkeeda
Computer PDF (Eng) - by Smartkeeda
Computer
MockDrill PDF
(PDF in English)
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
Warning: Smartkeeda possesses all copyrights on its content. This doesn’t allow
anyone to use its content for commercial purposes. If any infringement is found, legal
action will be taken against the individual or entity. If you want to use the content for
commercial purposes, kindly write to us at admin@smartkeeda.com
7. What are programs such as Microsoft Edge that serve as navigable windows into the Web
called as?
A. Windows Navigator B. Search Engine C. Networks
D. Internet E. Web browsers
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
10. In computer, EDI stands for what?
A. Explore Data Image B. E-mail Data InterchangeC. Exchange digital image
D. Electronic Data Interchange E. Electronic digital Interchange
11. What type of web technology creates an online community where people can make
statements and others can read and respond to those statements?
A. ASP B. I-Journal C. Podcast
D. Blog E. Cell
13. Internet access by transmitting digital data over the wires of a local telephone network
is provided by:
A. MODEM B. digital subscriber line C. digital signal line
D. leased line E. Router
19. is used for Unauthorized copying of software to be used for personal gain
instead of personal backups.
A. program looting B. software piracy C. program thievery
D. data snatching E. data looting
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
20. Which of the following topologies has the highest reliability?
A. Bus topology B. Ring topology C. Star topology
D. Square topology E. Mesh topology
21. is a useful tool which allows you to create a huge number of documents by
merging the main document with the data source.
A. Mail Merge B. Track Change C. Page Margin
D. Orientation E. Indentation
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
31. A device that not only provides surge protection, but also furnishes the computer with
battery backup power during a power outage is .
A. Router B. CPU C. Antina
D. Battery strip E. None of these
32. Which of the following is a type of electronic spam where unsolicited messages are sent
by email?
A. spam mail B. Floppy Mail C. Receive Mail
D. trash mail E. Weblog
36. Specialized program that allows user to utilize in specific application is classified as:
A. replicate programs B. logical programs C. application programs
D. function program E. compiling program
37. helps in communication between the memory and the arithmetic logical unit.
A. Router B. Speaker C. Antina
D. CPU E. CMU
38. adds functionality to your computer or help your computer perform better.
A. function program B. Utility program C. relative programs
D. compiling program E. None of these
41. button is called as middle button used as third mouse button by pressing on
it.
A. Primary Keys B. right button C. scroll wheel
D. Super Computer E. touch bar
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
42. In a keyboard, left-right-up-down set of keys facilitates which among the following
function?
A. Deleting Data or Modification B. Work Stations
C. Page Scrolling to view a Document D. Undo
E. Launching turn off window
43. is a small set of data holding place that is a part of the computer processor
and may hold an instruction, a storage address, or any kind of data.
A. Router B. Bus C. Antina
D. Register E. WAN
44. Which among the following memory in a computer is where information is temporarily
stored while it is being accessed or worked on by the processor?
A. RAM B. Work Stations C. Processor
D. ROM E. Primary
46. Information that comes from external source and fed into computer software is called .
A. Output B. Errors C. Status
D. Reports E. None of these
47. Different icons of application software can be found in bar in latest version of
Microsoft
Windows.
A. Control Panel B. Start Menu C. Notification
D. Status E. Window
49. Which among the following is area of an email that is a short description of the message?
A. Subject B. Draft C. Inbox
D. CC E. IP
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
52. Shift, Control, Alt are examples of category.
A. Modifier Keys B. Primary Keys C. Secondary Keys
D. Function Keys E. None of these
53. An optical input device that interprets pencil marks on paper media is .
A. Magnetic tape B. Reports C. OMR
D. Browser E. Stylus
57. is a term for the initial or main web page of a website or a browser.
A. Home Page B. Web Page C. Domain
D. CPU E. Yahoo
58. Which among the following term means/refers to web address of a page?
A. MAC B. URL C. HTTP
D. WWW E. None of these
62. Which among the following are specially designed computer chips reside inside other
devices, such as your car or your electronic thermostat?
A. Router B. Mainframes C. Embedded computers
D. Cache E. None of these
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
63. ‘SIM’ stands for .
A. Subscriber Identity Module B. Station Interactive Module
C. Super Interactive Module D. Super Identity Module
E. System Identity Module
64. The ability to recover and read deleted or damaged files from a criminal’s computer is
an example of a law enforcement specialty called what?
A. Virus B. Cyber Crime C. simulation
D. computer forensics E. hacking
65. Which of the following is an examples of Word processing spreadsheet and photo-
editing?
A. System software B. System hardware C. application software
D. platform software E. None of these
67. Red triangle at the top right corner of a cell indicates that .
A. There is an error in the cell B. The cell can't accept formula
C. The cell color is blue D. There is an error in the text
E. There is a comment associated with the cell
72. A repair for a known software bug, usually available at no charge on the internet, is called
a(n) what?
A. Router B. patch C. Antina
D. FAQ E. None of these
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
73. Which of the following is a small group of computers and peripherals linked together in
a small geographic area?
A. LAN B. RAM C. CAN
D. ROM E. WAN
75. 1 GB = KB.
A. 128 × 1024 B. 128 × 1024 × 256 C. 1024
D. 256 × 1024 E. None of these
77. is the most common tool used to restrict access to a computer system.
A. User logout B. Access-control software C. User logins
D. Super Computer E. Passwords
81. In Word, the feature that automatically correcting the most common of spelling
errors and typos while writing?
A. Auto sequence B. Spelling and Grammar C. Autocorrect
D. Dictionary E. Go to
82. Operating system and utility programs are in a class of software known as .
A. System software B. System hardware C. sequential software
D. application software E. None of these
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
83. Which of the following Appear at the bottom of the Excel Window?
A. Title bar B. Home C. Format bar
D. Sheet tabs E. Name Box
84. Backup is .
A. Protecting data by copying it from the original source to a different destination.
B. Accessing data on tape C. Restoring the information backup
D. A & C E. None of these
87. Which of the following translates internet domain and host names to IP address?
A. Translator B. DNS C. Software
D. Super Computer E. File transfer protocol
88. Which among the following are symbols used to replace or represent one or more
characters?
A. Primary Keys B. Wildcard C. Playing card
D. Public Keys E. Secondary Keys
89. When your turn on the computer, the boot routine will perform this test .
A. Power-on self-test B. Memory test C. Hard disk test
D. ROM test E. RAM test
90. Which of the following you should use In order to avoid memorizing e-mail address?
A. Software B. Search engine C. Address
book
D. Keyword E. None of these
92. is used to delete one character to the left of the current position of the
cursor.
A. Backspace B. Space C. Esc
D. Alt E. Delete
93. The altering of data so that it is not usable unless the changes are undone is .
A. Compression B. Encryption C. Function
D. Mainframe E. Biometrics
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
94. process checks to ensure that the components of the computer are
operating and connected properly.
A. Editing B. Restarting C. Drafting
D. Booting E. None of these
97. Which of the following is identified by the cell in the upper-left corner and the cell in the
lower-right corner, separated by a colon, In Excel?
A. range B. value C. worksheet
D. cell reference E. None of these
99. Which of the following is the most important/powerful computer in a typical network?
A. Network switch B. Work Stations C. Network cable
D. Network server E. None of these
101. software secretly collects information about the web client's internet
habits.
A. Spyware B. Spam C. Detectware
D. Pharming E. None of these
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
105. Select the odd one out:
A. Assembler B. Interpreter C. Compiler
D. Operating system E. None of these
110. Which among the following is not legitimate type of computer virus?
A. Multipartite B. Nano Virus C. Resident
Virus Virus
D. Hangout Virus E. B & D both
113. Name the type of monitoring file which is commonly used on and accepted from Internet
sites.
A. Cache B. Phishes C. Trojans
D. Smartware E. Cookies
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
115. The term ISDN stands for .
A. Integrated Service Dynamic Network B. Integral Service Digital Network
C. Integrated Services Digital Network D. International Subscriber Dialup Network
E. None of these
121. Which among the following is something that can cause harm?
A. Spam B. Work Stations C. vulnerability
D. threat E. Draft
122. Which among the following is a small program embedded inside of a GIF image?
A. spyware application B. web bug C. Device Driver
D. Cache E. cookie
124. When you save an Microsoft Access project, what file format do you use?
A. .adp B. .doc C. .txt
D. .xml E. .mbd
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
126. A set of instruction telling the computer what to do is called?
A. instructor B. program C. Hardware
D. compiler E. None of these
128. is a software.
A. Microsoft Windows B. Keyboard C. ROM
D. UPS E. All of the above
129. Which among the following are the two types of computer memory?
A. UPS and CPU B. RAM and CPU C. RAM and ROM
D. UPS and ROM E. UPS and Hard disk
130. computer bus connects the main memory to the memory controller in
computer systems.
A. Router Bus B. Memory Bus C. Data Bus
D. Disk Bus E. All of the above
134. How can the user determine what programs are available on a computer?
A. Viewing the installed programs during the booting process
B. Viewing the installed programs during the shutdown process
C. Checking the hard disk properties
D. Checking the programs list
E. Checking the operating system for a list of installed programs
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
135. process checks to ensure the components of the computer are
operating and connected properly.
A. Refreshing B. Booting C. Editing
D. Saving E. All of the above
139. Terminal is a .
A. Software to secure the computer
B. Device to give power supply to computer
C. Point at which data enters or leaves the computer
D. Device to control the computer
E. None of these
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
144. CD-ROM is a:
A. Cache Memory B. Semiconductor C. Memory registers
memory
D. Magnetic memory E. None of these
148. How can the user determine what programs are available on a computer?
A. Checking the operating system for a list of installed programs
B. Viewing the installed programs during the booting process
C. Checking the data source
D. Checking the hard disk properties
E. None of these
149. Cache and main memory will lose their contents when the power is off. They are .
A. dynamic B. Spam C. volatile
D. Static E. None of these
151. Which of the following is/are Controls access to the resources on a network?
A. Antina B. Work Stations C. Client
D. Server E. A & D
152. data functions would you use to hide all rows in a worksheet except those
that meet some criteria you specify.
A. Custom Filter B. Conditional Formatting C. Conditional Drafting
D. Auto sequence E. None of these
153. is the short cut key to open the Open dialog box.
A. Shift F12 B. Ctrl + F12 C. F12
D. Alt + F12 E. Ctrl + F11
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
154. Commands at the top of a screen such as File-Edit, Format and Tools to operate and
change things
are incorporated .
in
A. Start menu B. Notification bar C. Tool
D. Menu bar E. None of these bar
156. What type of web technology creates an online community where people can make
statements and others can read and respond to those statements?
A. ALU B. Podcast C. Blog
D. I-Journal E. ASP
158. Which of the following device enabling data transfer between two different networks?
A. Router B. Gateway C. Antina
D. Super Computer E. Bridge
160. IEEE standard used to define the specification for a wireless LAN.
A. IEEE 802.21 B. IEEE 802.01 C. IEEE 802.11
D. IEEE 802.4 E. IEEE 802.12
161. In PowerPoint, is the function of Alt+N in navigating the ribbon with only the
keyboard.
A. Open the Tell me box B. Open the Home tab C. Open the Insert tab
D. Open the View tab E. Open the Help tab
163. A high speed device used in CPU for temporary storage during processing is called .
A. Bus B. Compiler C. Register
D. Super Computer E. None of these
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
164. When a computer is turned on, where does it get the first instructions that it loads into
RAM?
A. From RAM B. From Link C. From the Hard Disk
D. From ROM E. None of these
165. When you are rerouted from your requested internet site to another, undesired site, is
called
.
A. Pharming B. Trojan C. Hacking
D. All of the above E. None of these
171. allows you to verbally speak with someone over the Internet.
A. VoIP B. Wiki C. Antina
D. Blog E. All of the above
173. The coding language used to create documents for use on the Internet is .
A. HSMT B. HLTM C. HTTP
D. HTML E. None of these
174. Which of the following groups contains all graphical file extensions?
A. GIF, TCF, WMF B. ADP, GIF, PPT C. JPG, CPX, GCM
D. JPG, GIF, BMP E. TCP, JPG, BMP
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
175. ‘SMTP’ stands for .
A. Swift Mail Transmission Program B. Simple Mail Transfer Protocol
C. Simple Mail Transfer Program D. Swift Mail Transfer Protocol
E. Swift Mail Trash Program
176. Adwords is .
A. Advanced Search History
B. Automatic words Search Engine by Yahoo
C. Advertising Service by Google
D. Automatic correction
E. None of these
177. The technique in which an attacker convinces an authorized user to pass classified
information to an unauthorized person is called .
A. Cracking B. dumpster diving C. social engineering
D. Hacking E. reverse social engineering
178. What do you call the programs that are used to find out possible faults and their
causes?
A. Operating system extensions B. Cache
C. Cookies D. Diagnostic software E. All of the above
181. is the Global Access shortcut key for Opening a new database in MS Access.
A. Alt + N B. Shift + N C. F2
D. Ctrl + N E. Ctrl + O
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
185. is/are more than TB.
A. MB B. KB C. PB
D. BIT E. All of the above
186. If you wish to extend the length of the network without having the signal degrade, you
would use a:
A. Router B. Repeater C. Antina
D. Gateway E. Network
188. The button on the Quick Access Toolbar allows you to cancel your recent
commands or activities.
A. Undo B. Redo C. Copy
D. Paste E. None of these
190. Name the type of memory that stores data in large number.
A. Cache memory B. ROM C. Hard Disk
D. Data E. None of these
192. The process of converting analog signals into digital signals so they can be processed
by a receiving computer is referred to as .
A. Modulation B. Demodulation C. Transmission
D. A & C E. None of these
193. is/are created when two tables are joined on attributes that are neither
primary keys nor foreign keys.
A. Candidate Key B. Spurious tuple C. Cardinality
D. All of the above E. None of these
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
194. From where to where is a multicast message sent?
A. From one source to one destination
B. From multiple sources to multiple destination
C. From one source to multiple destinations
D. From multiple sources to one destination
E. None of these
196. What is a group of computers and associated devices that share a common
communications line or wireless link to a server within a small geographic area are called?
A. LAN B. MAN C. WAN
D. All of the above E. None of these
199. 1024 TB = .
A. 1 PB B. 1 GB C. 1 XB
D. 1 MB E. 1 ZB
201. In Power Point, which of the following will not advance the slides in a slide show view?
A. The spacebar B. The Enter key C. Right click
D. A & B E. Esc key
203. Each time you turn on your computer, it will check on the control file.
A. io.sys B. msdos.sys C. Command.com
D. A & C E. All of the above
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
204. The term ‘MPEG’ stands for what?
A. Magnetic Picture Experts Group
B. Motion Picture Experts Group
C. Multimedia Picture Experts Group
D. Motion Picture Experts Graphics
E. None of these
205. Which of the following refer to the process of starting computer from a powerless and
setting it up to normal working condition?
A. Warm Start B. Cold Boot C. Hard Start
D. All of the above E. None of these
206. Which of the following looks for system files during a boot process?
A. UPS B. CPU C. BIOS
D. Device Driver E. Mouse
208. Which of the following option may be used to change page-size and margins?
A. View B. Review C. Page Layout
D. Tools E. All of the above
211. Name the type of computers which is also known informally as Number crunchier.
A. Hybrid computer B. Nano computer C. Minicomputer
D. Super Computer E. Mainframe computer
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
214. refers to a standard interface for connecting a motherboard to storage
devices such as hard drives and CD ROM/DVD drives.
A. HWA B. HDMI C. Antina
D. PCS E. IDE
215. The storage area for the next likely data or instruction to be processed preventing
bottleneck and slowing of the system is called?
A. Cookies B. Cache C. UPS
D. ROM E. All of the above
216. is a part of primary storage that holds a software programme and small
amounts of data when they are brought from secondary storage.
A. ROM B. UPS C. RAM
D. Modem E. USB
219. In order to move from one worksheet to another in MS-Excel workbook. One should
click
.
A. tab button B. Esc button C. scroll bar
D. sheet tab E. Touch pad
220. Which of the following shortcut key use to justify the selected text?
A. Alt + J B. Shift + J C. Ctrl + J
D. Ctrl + E E. Ctrl + K
222. option is the line that describes the contents of the message while sending
an e-mail.
A. Bcc B. Subject C. Cc
D. From E. None of these
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
224. Which of the following is a power protection device that includes a battery providing
power for a short period of time?
A. Router B. CPU C. Modem
D. ESD E. None of these
225. In Microsoft PowerPoint, two kinds of sound effects files that can be added to the
presentation are
.
A. .wav files and .mid files B. .jpg files and .gif files C. .mid files and .gif files
D. .mp3 files and jpg files E. None of these
227. refers to the time, the alphanumeric key is to be held before the keyboard
will repeat itself.
A. Repeat Rate B. Relay Rate C. Buffer Rate
D. Key Rate E. Reboot Rate
231. The feature that opens a window on your desktop where you can browse for file
stored on your computer is called_________.
A. Router B. Device Manager C. Web Browser
D. File Explorer E. None of these
233. Which of the following menu types is also called a drop-down menu?
A. Push-down B. Drag-down C. Pull-down
D. Super-down E. None of these
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
234. Row in an Access table is also called what?
A. Data B. Field C. Layout
D. Record E. None of these
237. specifies this action: Holding the mouse button down while moving an
object of text.
A. Dragging B. Dropping C. Selecting
D. Saving E. None of these
241. In a spreadsheet, which of the following is a number you will use in a calculation?
A. Value B. cell C. Raw
D. All of the above E. None of these
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
244. In MS Word, what is following happens if you press Ctrl + Shift + F8?
A. It activates extended selection.
B. It selects the paragraph on which the insertion line is.
C.It selects the whole sentence.
D. It activates the rectangular selection.
E. None of these
246. What is the smallest and largest font size available in Font Size tool on formatting
toolbar?
A. 8 and 72 B. 12 and 72 C. 8 and 27
D. 7 and 27 E. 8 and 62
247. Each telephone regional office needs to be connected to every other regional office.
This is an example of which of the following topology?
A. Tree Topology B. Bus Topology C. Square Topology
D. Mesh Topology E. Star Topology
249. How can you update the values of formula cells if Auto Calculate mode of Excel is
disabled?
A. F2 B. F8 C. F6
D. F9 E. None of these
251. In MS Word, what is the shortcut key you can press to create a copyright symbol?
A. Alt + C B. Ctrl + C C. Alt + Ctrl + C
D. Ent + Shift + C E. None of these
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
253. Copy and X Copy are same. Why?
A. Both are internal command of DOS
B. Both external command of OS
C.Both are commands of Apple OS
D. Both can be used to copy file or group of files
E. All of the above
258. Programs such as Internet Explorer that serve as navigable windows into the Web are
called
.
A. Hypertext B. Internet C. Web Browser
D. Router E. Super Network
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
262. Which of the following is displayed by MS Excel when the column is not big enough to
display the information?
A. **** B. #### C. $$$$
D. !!!! E. ????
263. Which of the following are valid minimum & maximum zoom sizes in MS word?
A. 30, 800 B. 20, 700 C. 10, 500
D. 40, 300 E. 90, 100
264. If in a computer, 16 bits are used to specify address in a RAM, the number of
addresses will be
.
A. 64k B. 65,536 C. 216
D. 724 E. All of the above
265. Personnel who design, program, operate and maintain computer equipment refers
to__________.
A. Router B. Console-operator C. System Analyst
D. Software E. Programmer
266. A(n) system is a small, wireless handheld computer that scans an item’s
tag and pulls up the current price (and any special offers) as you shop.
A. inventory B. data mining C. POS
D. PSS E. All of the above
268. Which of the following devices can be processed to directly image printed text?
A. OCR B. MCR C. MICR
D. OMR E. A & C
269. Which of the following is NOT one of the four major data processing functions of a
computer?
A. gathering data
B. analyzing the data or information
C.processing data into information
D. storing the data or information
E. None of these
270. is the science that attempts to produce machines that display the same
type of intelligence that humans do.
A. Simulation B. Nanotechnology C. Micro technology
D. Artificial intelligence (AI) E. None of these
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
271. is specially designed computer that perform complex calculations
extremely rapidly.
A. Server B. Laptop C. Main frame
D. Super Computer E. Palmtop
272. A computer program that translates one program instructions at a time into machine
language is called a/an __________.
A. CPS B. UPS C. Interpreter
D. Router E. Compiler
273. Computer gather data, which means that they allow users to__________data.
A. Input B. Output C. Present
D. ROM E. Store
275. Which of the following will happen when data is entered into a memory location?
A. It will erase the previous content
B. It will add to the content of the location
C. It will change the address of the memory location
D. It will erase the follows content
E. None of these
280. System software is the set of programs that enables your computer’s hardware devices
and
Software to work together.
A. Application B. utility C. processing
D. Commercial E. None of these
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
Correct answer:
1 A 41 C 81 C 121 D 161 C 201 E 241 A
2 C 42 C 82 A 122 B 162 E 202 D 242 D
3 D 43 D 83 D 123 A 163 C 203 E 243 D
4 B 44 A 84 D 124 A 164 D 204 B 244 D
5 D 45 B 85 E 125 D 165 A 205 B 245 C
6 B 46 E 86 A 126 B 166 B 206 C 246 A
7 E 47 B 87 B 127 D 167 C 207 B 247 D
8 E 48 D 88 B 128 A 168 E 208 C 248 B
9 C 49 A 89 A 129 C 169 A 209 D 249 D
10 D 50 C 90 C 130 B 170 A 210 B 250 D
11 D 51 A 91 B 131 D 171 A 211 D 251 C
12 E 52 A 92 A 132 C 172 A 212 D 252 B
13 B 53 C 93 B 133 A 173 D 213 E 253 D
14 A 54 C 94 D 134 E 174 D 214 E 254 A
15 D 55 A 95 E 135 B 175 B 215 A 255 E
16 C 56 E 96 C 136 C 176 C 216 C 256 B
17 B 57 A 97 A 137 C 177 C 217 D 257 B
18 C 58 B 98 D 138 C 178 D 218 A 258 C
19 B 59 D 99 D 139 C 179 E 219 D 259 C
20 E 60 E 100 A 140 B 180 B 220 C 260 D
21 A 61 D 101 A 141 B 181 C 221 C 261 C
22 C 62 C 102 B 142 C 182 E 222 B 262 B
23 D 63 A 103 C 143 D 183 C 223 C 263 C
24 E 64 D 104 C 144 E 184 A 224 E 264 B
25 B 65 C 105 D 145 B 185 C 225 A 265 E
26 A 66 E 106 A 146 D 186 B 226 B 266 D
27 C 67 E 107 A 147 B 187 B 227 A 267 C
28 B 68 A 108 B 148 A 188 A 228 C 268 A
29 A 69 B 109 D 149 C 189 E 229 E 269 B
30 D 70 D 110 E 150 B 190 C 230 B 270 D
31 E 71 C 111 A 151 D 191 D 231 D 271 D
32 A 72 B 112 E 152 A 192 A 232 B 272 C
33 E 73 A 113 E 153 B 193 B 233 C 273 A
34 B 74 C 114 D 154 D 194 C 234 D 274 E
35 C 75 E 115 C 155 A 195 C 235 B 275 A
36 C 76 C 116 A 156 C 196 A 236 C 276 C
37 D 77 E 117 A 157 C 197 D 237 A 277 C
38 B 78 B 118 D 158 B 198 A 238 C 278 D
39 A 79 D 119 E 159 E 199 A 239 D 279 E
40 D 80 B 120 D 160 C 200 D 240 E 280 A
www.smartkeeda.com | testzone.smartkeeda.com /#
SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | Join
CLAT | RJS us
A GLIMPSE OF SOME GENUINE TESTIMONIALS
A GLIMPSE OF SOME GENUINE TESTIMONIALS