My Twitter Favorites


Don’t wait. The time will never be just right...

Saturday, August 9, 2014

Computer Questions for SBI clerk exam 2014

·  A collection of 8 bits is called Byte. A bit is the smallest unit of storage.

·  The first computer architecture was introduced by John Von Neumann.

·  A website containing periodic posts is called Blog.

·  Starting up on operating system is called Booting.

·  Restarting a computer that is already on, is referred to as Warm Booting.

·  A program used to browse the web is called Browser.

·  The code for a Web page is written using Hypertext Markup language (HTML).

·  A series of instructions that tells a computer what to do and how to do it is called a Program.

·  The device which is used with a computer to display or store data is called Peripherals.

·  The mechanical, magnetic, electronic and electrical components that comprises a computersystem such as the Central Processing Unit (CPU), monitor, keyboard, etc. is known as Hardware.

·  A set of instructions that tells the computer about the tasks to be performed and how these tasks are to performed, is known as Software.

·  Executing is the process of carrying out commands.

·  The rectangular area of the screen that displays a program, data, and or information is a Window.

·  Downloading means to receive data to a local system from a remote system, or to initiate such a data transfer.

·  Uploading refers to the sending of data from a local system to a remote system such as a server or another client with the intent that the remote system should store a copy of the data being transferred.

·  An email attachment is a computer file sent along with an email message. One or more files can be attached to any email message, and be sent along with it to the recipient.

·  CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message addressed primarily to another. The list of CCed recipients is visible to all other recipients of the message.

·  An additional BCC (Blind Carbon Copy) field is available for hidden notification; recipients listed in the BCC field receive a copy of the message, but are not shown on any other recipient’s copy (including other BCC recipients).

·  Disk drive is the part of the computer helps to store information.

·  Arithmetic operations include addition, subtraction, multiplication, and division.

·  The most important or powerful computer in a typical network is Network Server.

·  The primary purpose of software is to turn data into information.

·  A collection of related files is called Record.

·  Storage that retains its data after the power is turned off is referred to as Non-Volatile Storage. ROM is an example of this type of storage.

·  Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.

·  Computers use the Binary Number System to store data and perform calculations.

·  When sending an e-mail, the Subject line describe the contents of the message.

·  The Operating System tells the computer how to use its components.

·  During the cutting and pasting of an item, the part which is cut, is temporarily stored in Clipboard.

·  The blinking symbol on the computer screen is called the Cursor.

·  Magnetic tape is not practical for applications where data must be quickly recalled because tape is a sequential access medium.

·  Information travels between components on the motherboard through Buses.

·  A Website Address is a unique name that identifies a specific web site on the web.

·  Alt, Ctrl & Shift keys in a keyboard are known as: Modifier keys. 

·  Caps lock, Num lock & Scroll lock in a keyboard are known as: Toggle keys.

·  F1 to F12 keys in a keyboard are known as: Function keys.

·  A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a Hacker.

·  A Computer Virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be “infected”.

·  Antivirus Software is used to scan the hard disk to remove the virus from them.

·  The assembly language program is translated into machine code by a separate program known as an Assembler.


·  A Backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. It contains a copy of every program data and system file on a computer.


No comments:

Post a Comment

Please suggest your valuable comments here....