Computer Knowledge Quiz for Bank Exams 2016 - Set 1 - Ruchi

Hello and welcome to ExamPunditHere is a set of Computer Knowledge Quiz for Bank Exams 2016. This is shared by our very own Ruchi.


Post answers according to the following format(s)
In case the options are ABCD, use the Appropriate Options.

Do Not Rectify anyone.

If you have any doubt regarding any question of the quiz, kindly ask after the quiz is over i.e answers given.
Do Not CHAT here. If you have any query, use today’s Ask The Mentor Page.

At least 7 Attempts for Scores. reserves the right to choose winner or give scores.

1.  Console is
(A)  A device that allows human operators not to communicate with the computer
(B)  A device that allows human operators to communicate with the computer
(C)  Communication between computers
(D)  Other than those provided in the option
(E) None of them

2.  Following is true for Bubble memory
(A)  A compact data storage device made of thin wafers of garnet(a semiconductor material)  in a magnetic field
(B)  Non volatile memory
(C)  Data contained in them is lost when the power is turned off
(D) Only 1 and 2 are correct
(E) All 1, 2 and 3 are correct

3.  The first digital computer build with IC chips was known as
(A) IBM system / 360
(B) IBM 7090
(C)  Apple 1
(D)  VAX 10
(E) None of them

4.  Laptop computer was invented by
(A)  Allan Osborne
(B) Dr Edgar Frank Codd
(C)  Adam Osborne
(D)  Ray Kurzweil
(E) None of them

5. A device invented by Dr Bobeck
(A) Magnetic disc
(B)  Punched paper tape
(C) Magnetic bubble storage
(D)  Other than those given in the option
(E) None of them

6. The shortcut command to close window
(A) Alt+F4
(B) Alt+F1
(C) Alt+End
(D) Ctrl+F4
(E) None of them

7. A program written in machine level language is what kind of program
(A) Source
(B) Object
(C) Low level
(D) Computer
(E) None of them

8. Rootkit is
(A) An application that captured TCP/IP data packets,which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network
(B) a situation in which one program or person successfully masquerades  as another by falsifying data and thereby gaining illegitimate access
(C) A toolkit for hiding the fact that a computer's security has been compromised,is a general description of a set of programs which work to subvert control of an operating system from its illegitimate(in accordance with established rules)  operators
(D)  Other than those given in the option
(E) All of A, B and C

9. Blue hat is
(A)  a hacker breaks security for altruistic or atleast non malicious reasons
(B) Hacker of ambiguous ethics or borderline legality often frankly admitted
(C) someone outside computer security consulting firms that are used to bug test a system prior to its launch ,looking for exploits so that they can be closed
(D)  other than those given in the option
(E) None of them

10. A computer can be joined to more than one network through
(A) connector
(B) gateway
(C) passages
(D) All of them
(E) None of them

11. Synapse is
(A)  a class of graphic techniques used to visualize the contents of a database
(B) A branch that connects one node to another
(C) the division of a certain space into various areas based on guide points
(D)  All of them
(E) None of them

If you want, you can share your own quiz and after 10 sets, we will dedicate a page for your quizzes.


Team ExamPundit