Vous êtes sur la page 1sur 24

.

Programs that automatically submit your search request to several search engines simultaneously are called (1) Metasearch engines (2) Webcrawlers (3) Spiders (4) Hits (5) None of these 2. Graphical diagrams used to represent different multiple perspectives of a system include (1) use-case, class, and state diagrams (2) state, interaction, derivative diagrams (3) interaction, relationship, and class diagrams (4) deployment, relationship, and use-case diagrams (5) None of these 3. Database redesign is not terribly difficult if the (1) database is structured (2) database is well-designed (3) database has no data (4) database is relatively small (5) database is relatively large 4. Which of the following are normally used to initialize a computer systems hardware? (1) Bootstrap memory (2) Volatile memory (3) Exteranl mass memory (4) Static memory (5) Random access memory 5. If you wanted to locate the hardware address of a local device, which protocol would you use? (1) ARP (2) RARP (3) ICMP (4) PING (5) PONG 6. What is Internet 2? (1) A new type of cabling system for Wide Area Networks (2) A second local area network that can connect with another online LAN to share access (3) A new standard for Internet browsers (4) An association to develop advanced Internet technology (5) None of these 7. The term, hypertext, means (1) Non-sequential writing (2) Hypermedia (3) Blinking text (4) Text with heavy formatting (5) None of these 8. While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information? (1) Visit Googles cached page to view the older copy. (2) Forget about it, as there is no way to find this information. (3) Visit a partner site of the organization to see if it is there. (4) Use the wayback machine. (5) None of these

9. Which kind of lock includes a keypad that can be used to control access into areas? (1) Cipher (2) Warded (3) Device (4) Tumbler (5) Typelock 10. A..sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk. (1) system virus (2) trojan horse virus (3) file virus (4) macro virus (5) None of these 11. Carbon credit is meant for (1) Deforestation (2) Protection of environment (3) Rural infrastructure (4) Diamond trading (5) Precision farming 12. Acetic acid is present in (1) Vinegar (2) Curd (3) Lime (4) Fish (5) Rancid butter 13. Deep litter and cage systems are associated with (1) Dairy development (2) Pig farming (3) Poultry growing (4) Quali farming (5) Sheep rearing 14. When milk is churned, the cream is separated due to (1) Gravitational force (2) Centrifugal force (3) Frictional force (4) Electro magnetic effect (5) None of the above 15. Agricultural scientist who got Nobel prize for peace (1) Dr Norman E. Borlaug (2) Dr M.S. Swaminathan (3) Dr Hargovind Khorana (4) Dr Chandrasekhar (5) Dr Watson 16. Free flow of capital, goods and services is envisaged under (1) WTO (2) Food Bill (3) AEZ (4) Essential commodities Act (5) Warehouse Bill

17. Process involved in the conversion of milk to curd is (1) Oxidation (2) Dehydration (3) Hydrogenation (4) Fermentation (5) Hydration 18. National Policy for Farmers 2007 is formulated based on the recommendations of (1) Committee on Financial Inclusion (2) Vaidyanathan Committee (3) Forward Market Commission (4) Working Group on Agriculture (5) National Commission on Farmers 19. The Head Quarters of CFTRIthe leading institute for research on various food products is located at (1) Mysore (2) New Delhi (3) Mumbai (4) Gurgaon (5) Jammu 20. Common refrigerant used in fridges and cold storages (1) Neon (2) Freon (3) Crypton (4) Argon (5) Ice 21. Who among the following is the author of the novel Two Lives? (1) Salman Rushdie (2) Vikram Seth (3) Arundhati Roy (4) Ruskin Bond (5) Dhruv Sawhney 22. Who among the following has been appointed as the first Chief Information Commissioner of India? (1) Vijay Shankar (2) T.N. Seshan (3) Wajahat Habibullah (4) Mathew Varghese (5) M.H. Baig 23. On which of the following dates is World AIDS Day observed? (1) December 9 (2) December 1 (3) November 30 (4) October 24 (5) December 30 24. Which of the following is Indias first indigenous animation film? (1) Hanuman (2) Ramayana (3) Harry Potter (4) Mughal-e-Azam (5) Ram Sita 25. Who among the following has been sworn in as the new Chief Minister of Jammu and Kashimir? (1) Mufti Mohammed Sayeed

(2) (3) (4) (5)

Ghulam Nabi Azad Omar Abdullah M.H. Baig T. N. Seshan

ANSWERS: 1. (1) 2. (1) 3. 6. (4) 7. (2) 8. 11. (2) 12. (1) 16. (1) 17. (4) 21. (2) 22. (3)

(1) 4. (5) 5. (1) (3) 9. (4) 10. (1) 13. (3) 14. (2) 15. (1) 18. (5) 19. (1) 20. (2) 23. (2) 24. (1) 25. (2)

Read more: http://www.careers-india.com/2009/01/23/punjab-national-bank-po-exam-2008-professionalknowledge-and-indian-bank-computer-officers-exam-2008-solved-paper/#ixzz1VZUZq1dj

Almost exams like Bank PO, Clerical, CDS, NDA, B. Ed., ETT comprise of questions from Reasoning (also known as Mental Ability or Aptitude). Here we provide a set of fifty Solved Sample Questions. The first fourty Questions are from verbal reasoning and last ten from non-verbal reasoning. 1. In a certain code ROPE is written as $3%6 and RITE is written as $4#6. How is PORT written in that code? (1) %4$# (2) $3%# (3) $64% (4) %3$# (5) None of these 2. How many such pairs of letters are there in the word KNIGHT, each of which has as many letters between them in the word as they have in the English alphabet? (1) None (2) One (3) Two (4) Three (5) More than three 3. Pointing to a photograph Nikita said She is the only grad daughter of my grandmother's daughter'. How is the girl in photograph related to Nikita? (1) Sister (2) Niece/ daughter (3) Aunt (4) Cannot be determined (5) None of these 4. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group? (1) Pineapple (2) Guava (3) Grapes (4) Papaya (5) Pear 5. If the word STABLE all the consonants are replaced by the previous letter and all the vowels are replaced by the next letter which letter will be third from the left end? (1) S (2) B (3) A (4) K (5) None of these 6. In a certain code HOUSE is written as FTVPI, how is CHAIR written in that code?

(1) DIBJS (2) SBJID (3) SHBGD (4) SJBID (5) None of these 7. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group? (1) FH (2) KM (3) PR (4) CE (5) JM 8. If P Q' means P is wife of Q', P+Q' means P is father of Q' and P Q' means P is sister of Q' then in G H +R D, how is G related to D? (1) Cannot be determined (2) Mother (3) Niece (4) Aunt (5) None of these 9. If the digits of the number 5726489 are arranged in ascending order, how many digits will remain at the same position? (1) None (2) One (3) Two (4) Three (5) More than three 10. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group? (1) 17 (2) 19 (3) 23 (4) 29 (5) 27 11. How many meaningful words can be made from the letters AEHT, using each letter only once? (1) None (2) One (3) Two (4) Three (5) More than three ' means x', $ means +', # means ' and ' means - then what is the value of12. If 360 # 24$ 56 5 48? (1) 253 (2) 242 (3) 247 (4) 285 (5) None of these 13. If blue means pink, pink means green, green means yellow, yellow means red and red means white then what is the colour of turmeric? (1) green (2) yellow (3) red (4) pink (5) None of these

14. If it is possible to make a meaningful word from the second, the third, the tenth and the eleventh letters of the word PASSIONATELY using each letter only once, second letter of that word is your answer. If no such word can be formed your answer is X and if more than one word can be formed your answer is Y. (1) A (2) E (3) L (4) X (5) Y 15. In a row of children facing north Manish is fourth to the left of Suresh who is tenth from the left end. Nisha is second to the right of Suresh and eighth from the right end of the row. Total how many children are there in the row? (1) 19 (2) 20 (3) 21 (4) 18 (5) None of these Directions (16-20): In these questions symbols , #, , $ and @ are used with different meanings as follows: A B' means A is smaller than B' A # B' means A is either smaller than or equal to B' A B' means A is greater than B' A $ B' means A is either greater than or equal to B' A @ B' means A is neither smaller than nor greater than B' In each of the following questions assuming the given statements to be true, find out which of the two conclusions I and II given below them is/ are definitely true Give answer (1) if only conclusion I is true. Give answer (2) if only conclusion II is true. Give answer (3) if either conclusion I or conclusion II is true. Give answer (4) if neither conclusion I nor conclusion II is true. Give answer (5) if both conclusions I and II are true. 16. Statements: V#S, SL, LJ Conclusions: I. V L II. S J 17. Statements: M#R, RJ, J#H Conclusions: I. M #H II. R H 18. Statements: H$F, F@G, GM Conclusions: I. H M II. H G 19. Statements: RJ, J T,,T # L Conclusions: I. R @ T II. J @ l 20. Statements: W@T, T$K, K F Conclusions: I. W $ K II. W @ K Directions (21-25): In each question below there are three statements followed by two conclusions numbered I and II. You have to take the three given statements to be true even if they seem to be at variance from commonly known facts and then decide which of the given conclusions logically follows from the three given statements disregarding commonly known facts. Then decide which of the answers (1), (2), (3), (4) and (5) is the correct answer and indicate it on the answer sheet. Give answer (1) if only conclusion I is follows. Give answer (2) if only conclusion II is follows Give answer (3) if either conclusion I or II follows. Give answer (4) if neither I nor II is follows. Give answer (5) if both I and II follow. 21. Statements:

Some pens are books. All books are pencils. All pencils are jars. Conclusions: I. All books are jars. II. Some pens are pencils. 22. Statements: Some bowls are spoons Some spoons are forks All forks are plates. Conclusions: I. Some bowls are forks. II. Some spoons are plates. 23. Statements: Some bottles are jars. All jars are buckets. All buckets are tanks. Conclusions: I. All jars are tanks. II. Some buckets are tanks. 24. Statements: Some phones are mobiles. Some mobiles are computers. Some computers are keys. Conclusions: I. Some phones are keys. II. Some computes are phones. 25. Statements: All papers are files. Some files are folders. All folders are bags. Conclusions: I. Some files are bags. II. Some papers are folders. Directions (26-30): Each of the questions below consists of a question and two statements numbered I and II are given below it. You have to decide whether the data provided in the statements are sufficient to answer the question. Read both the statements and Give answer (1) if the data is Statement I alone are sufficient to answer the question, while the data in Statement II alone are not sufficient to answer the question. Give answer (2) if the data in Statement II alone are sufficient to answer the question, while the data in Statement I alone are not sufficient to answer the question. Give answer (3) if the data in Statement I alone or in Statement II alone are sufficient to answer the question. Give answer (4) if the data in both the Statement I and II are not sufficient to answer the question. Give answer (5) if the data in both the Statement I and II together are necessary to answer the question. 26. Lalita is in which direction with respect to Sangita? I. Lalita is to the East of Prabha who is to the South of Sangita. II. Vinita is to the North of Lalita who is to the East of Sangita. 27. What is the code for Play' in the code language? I. In the code language play and dance' is written as ka to pe' II. In the code language enjoy the dance' is written as pe jo ra'. 28. How many children are there in the class? I. Vandana's rank in the class is five ranks below Nandini who is twenty fifth from the bottom. II. Nandini's rank is seventeenth from the top. 29. Who is tallest among Neeta, Sudha, Radha, Maya and Geeta?

I. Radha is shorter than Neeta and Sudha but not shorter than Maya and Geeta. II. Neeta is not the tallest. 30. How many sons does Ramesh have? I. F is sister of H who is son of Ramesh. II. R is brother of H. Directions (31-35): These questions are based on the following letter / number/ symbol arrangement . Study it carefully and answer the questions that follow: 5DGE79$F16R%LIAJ3B#4@KP8UM2 31. Four of the following five are alike in a certain way on the basis of their positions in the above arrangement and so form a group. Which is the one that does not belong to the group? (1) $9F (2) R6% (3) 8PU (4) #B4 (5) 3BJ 32. If all the symbols are removed from the above arrangement which element will be third to the left of thirteenth from the left? (1) L (2) R (3) 6 (4) I (5) None of these 33. What will come in place of the question mark (?) in the following series based on the above arrangement? EDH 9 7 I$F ? (1) 6RI (2) %R6 (3) R16 (4) %6R (5) None of these 34. Which element will be fifth to the right of ninth from the right end if all the numbers are removed from the above arrangement? (1) K (2) @ (3) P (4) # (5) None of these 35. How many such numbers are there in the above arrangement each of which is immediately followed by a consonant but not immediately preceded by a vowel? (1) None (2) One (3) Two (4) Three (5) More than three Directions (36-40): These questions are based on the basis of following information. Study it carefully and answer the questions. Eight executives J, K, L, M, N, O, P, and Q are sitting around a circular table for a meeting. J is second to the right of P who is third to the right of K. M is second to the left of O who sits between P and J, L is not a neighbour of K or N. 36. Who is to the immediate left of L? (1) Q (2) O (3) K (4) N (5) None of these 37. Who is to the immediate left of K?

(1) N (2) J (3) Q (4) Cannot be determined (5) None of these 38. Which of the following is the correct position of N? (1) Second to the right of K (2) To the immediate left of K (3) To the immediate right of M (4) To the immediate right of K (5) None of these 39. Who is third to the right of P? (1) L (2) J (3) Q (4) N (5) None of these 40. Which of the following groups of persons have the first person sitting between the other two? (1) PJO (2) OPJ (3) OPM (4) MPO (5) None of these Directions (41-50): In each of the questions given below which one of the five answer figures on the right should come after the problem figures on the left, if the sequence were continued?

Answers for Reasoning (Mental Aptitude) Solved Sample Question Paper: 1. (4), 2. (3), 3. (2), 4. (3), 5. (2), 6. (4), 7. (5), 8. (2), 9. (4), 10. (5), 11. (3), 12. (3), 13. (3), 14. (5), 15. (1), 16. (5), 17. (2), 18. (1), 19. (4), 20. (1), 21. (5), 22. (2), 23. (5), 24. (4), 25. (1), 26. (3), 27. (4), 28. (5), 29. (5), 30. (5), 31. (5), 32. (2), 33. (4), 34. (1), 35. (2), 36. (5), 37. (3), 38. (4), 39. (1), 40. (2), 41. (3), 42. (4), 43. (1), 44. (5), 45. (1), 46. (4), 47. (5), 48. (1), 49. (2), 50. (3)

atabase is structured. database is well-designed. database has no data. database is relatively small. Ans (3) 2. A regular subquery can be processed: from the top down. from the bottom up. by nesting. None of the above is correct. Ans (2) 3. Which of the following SQL statements are helpful in database redesign? Correlated subqueries only EXISTS/NOT EXISTS expressions only Both of the above are helpful None of the above are helpful. Ans (3) 4. Which is not true of a correlated subquery? EXISTS/NOT EXISTS is a form of a correlated subquery. The processing of the SELECT statements is nested. They can be used to verify functional dependencies. They are very similar to a regular subquery. Ans (4) 5. The EXISTS keyword will be true if: any row in the subquery meets the condition only. all rows in the subquery fail the condition only. both of these two conditions are met. neither of these two conditions is met. Ans (1) 6. The NOT EXISTS keyword will be true if: any row in the subquery meets the condition. all rows in the subquery fail the condition. both of these two conditions are met. neither of these two conditions is met. Ans (2)

7. How can you find rows that do not match some specified condition? EXISTS Double use of NOT EXISTS NOT EXISTS None of the above is correct. Ans (2) 8. Before any changes to database structure are attempted one should first: clearly understand the current structure and contents of the database only. test any changes on a test database only. create a complete backup of the operational database only. All of the above should be done. Ans (4) 9. The process of reading a database schema and producing a data model from that schema is known as: data modeling. database design. reverse engineering. None of the above is correct. Ans (3) 10. The data model that is produced from reverse engineering is: 1. a conceptual model. 2. an internal model. 3. a logical model. 4. None of the above is correct. Ans (4) 11. A tool that can help designers understand the dependencies of database structures is a: dependency graph. data model. graphical display. None of the above is correct. Ans (1) 12. How many copies of the database schema are typically used in the redesign process? One Two Three Four Ans (3) 13 Which SQL-92 standard SQL command can be used to change a table name? RENAME TABLE

CHANGE TABLE ALTER TABLE None of the above is correct. Ans (4) 14.What SQL command can be used to add columns to a table? MODIFY TABLE TableName ADD COLUMN ColumnName MODIFY TABLE TableName ADD ColumnName ALTER TABLE TableName ADD COLUMN ColumnName ALTER TABLE TableName ADD ColumnName Ans (3) 15. What SQL command can be used to delete columns from a table? MODIFY TABLE TableName DROP COLUMN ColumnName MODIFY TABLE TableName DROP ColumnName ALTER TABLE TableName DROP COLUMN ColumnName ALTER TABLE TableName DROP ColumnName Ans (3) 16. To drop a column that is used as a foreign key, first: drop the primary key. drop the table containing the foreign key.. drop the foreign key constraint. All of the above must be done. Ans (3) 17. Which of the following modifications may not succeed? Changing a column data type from char to date Changing a column data type from numeric to char Both of the above actions should succeed. Neither of the above actions will succeed. Ans (1) 18. What SQL command will allow you to change the table STUDENT to add the constraint named GradeCheck that states that the values of the Grade column must be greater than 0? ALTER TABLE STUDENT ALTER CONSTRAINT GradeCheck (Grade > 0); ALTER TABLE STUDENT ADD CONSTRAINT GradeCheck (Grade > 0); ALTER TABLE STUDENT ADD CONSTRAINT GradeCheck CHECK (Grade > 0); None of the above is correct. Ans (3) 19. Changing cardinalities in a database is: a common database design task. a rare database design task, but does occur. a database design task that never occurs.

is impossible to do, so a new database must be constructed and the data moved into it. Ans (1)

20. Because of the importance of making data model changes correctly, many professionals are __________ about using an automated process for database redesign. optimistic skeptical ambivalent None of the above is correct. Ans (2)

. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. Answer: B 2. A process known as ____________ is used by large retailers to study trends. A. data mining B. data selection C. POS D. data conversion Answer: A 3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. A. Data B. Point-of-sale (POS) C. Sales D. Query Answer: B 4. A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop. A. PSS B. POS C. inventory D. data mining Answer: A 5. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called: A. robotics. B. simulation. C. computer forensics. D. animation.

Answer: C 6. Which of the following is NOT one of the four major data processing functions of a computer? A. gathering data B. processing data into information C. analyzing the data or information D. storing the data or information Answer: C 7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animals movements. A. POS B. RFID C. PPS D. GPS Answer: B 8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as: A. robotics. B. computer forensics. C. simulation. D. forecasting. Answer: A 9. Technology no longer protected by copyright, available to everyone, is considered to be: A. proprietary. B. open. C. experimental. D. in the public domain. Answer: A 10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. A. Nanoscience B. Microelectrodes C. Computer forensics D. Artificial intelligence Answer: A 11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do. A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AI) Answer: D 12. ____________ is data that has been organized or presented in a meaningful fashion. A. A process B. Software C. Storage D. Information Answer: D 13. The name for the way that computers manipulate data into information is called:

A. programming. B. processing. C. storing. D. organizing. Answer: B 14. Computers gather data, which means that they allow users to ____________ data. A. present B. input C. output D. store Answer: B 15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered: A. data. B. output. C. input. D. the process. Answer: B

16. Computers use the ____________ language to process data. A. processing B. kilobyte C. binary D. representational Answer: C 17. Computers process data into information by working exclusively with: A. multimedia. B. words. C. characters. D. numbers. Answer: D 18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of: A. eight bytes. B. eight kilobytes. C. eight characters. D. eight bits. Answer: D 19. The term bit is short for: A. megabyte. B. binary language. C. binary digit. D. binary number. Answer: C

20. A string of eight 0s and 1s is called a:

A. megabyte. B. byte. C. kilobyte. D. gigabyte. Answer: B 21. A ____________ is approximately one billion bytes. A. kilobyte B. bit C. gigabyte D. megabyte Answer: C 22. A ____________ is approximately a million bytes. A. gigabyte B. kilobyte C. megabyte D. terabyte Answer: C 23. ____________ is any part of the computer that you can physically touch. A. Hardware B. A device C. A peripheral D. An application Answer: A

24. The components that process data are located in the: A. input devices. B. output devices. C. system unit. D. storage component. Answer: C 25. All of the following are examples of input devices EXCEPT a: A. scanner. B. mouse. C. keyboard. D. printer. Answer: D 26. Which of the following is an example of an input device? A. scanner B. speaker C. CD D. printer Answer: A 27. All of the following are examples of storage devices EXCEPT: A. hard disk drives. B. printers. C. floppy disk drives. D. CD drives.

Answer: B 28. The ____________, also called the brains of the computer, is responsible for processing data. A. motherboard B. memory C. RAM D. central processing unit (CPU) Answer: D 29. The CPU and memory are located on the: A. expansion board. B. motherboard. C. storage device. D. output device. Answer: B 30. Word processing, spreadsheet, and photo-editing are examples of: A. application software. B. system software. C. operating system software. D. platform software. Answer: A 31. ____________ is a set of computer programs used on a computer to help perform tasks. A. An instruction B. Software C. Memory D. A processor Answer: B 32. System software is the set of programs that enables your computers hardware devices and ____________ software to work together. A. management B. processing C. utility D. application Answer: D 33. The PC (personal computer) and the Apple Macintosh are examples of two different: A. platforms. B. applications. C. programs. D. storage devices. Answer: A 34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems. A. languages B. methods C. CPUs D. storage devices Answer: C 35. Servers are computers that provide resources to other computers connected to a: A. network. B. mainframe.

C. supercomputer. D. client. Answer: A 36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses. A. supercomputers B. clients C. laptops D. mainframes Answer: D 37. ____________ are specially designed computers that perform complex calculations extremely rapidly. A. Servers B. Supercomputers C. Laptops D. Mainframes Answer: B 38. DSL is an example of a(n) ____________ connection. A. network B. wireless C. slow D. broadband Answer: D 39. The difference between people with access to computers and the Internet and those without this access is known as the: A. digital divide. B. Internet divide. C. Web divide. D. broadband divide. Answer: A 40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale. A. Nanotechnology B. Micro-technology C. Computer forensics D. Artificial intelligence Answer: A 41. Which of the following is the correct order of the four major functions of a computer? A. Process Output Input Storage B. Input Output Process Storage C. Process Storage Input Output D. Input Process Output Storage Answer: D 42. ____________ bits equal one byte. A. Eight B. Two C. One thousand D. One million Answer: A

43. The binary language consists of ____________ digit(s). A. 8 B. 2 C. 1,000 D. 1 Answer: B 44. A byte can hold one ____________ of data. A. bit B. binary digit C. character D. kilobyte Answer: C 45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer. A. The platform B. The operating system C. Application software D. The motherboard Answer: B 46. The operating system is the most common type of ____________ software. A. communication B. application C. system D. word-processing software Answer: C 47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat. A. Servers B. Embedded computers C. Robotic computers D. Mainframes Answer: B 48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called: A. instructions. B. the operating system. C. application software. D. the system unit. Answer: A 49. The two broad categories of software are: A. word processing and spreadsheet. B. transaction and application. C. Windows and Mac OS. D. system and application. Answer: D 50. The metal or plastic case that holds all the physical parts of the computer is the: A. system unit. B. CPU.

C. mainframe. D. platform. Answer: A

Fill in the Blank:


51. Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation. Answer: Mac 52. The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices. Answer: operating system 53. The type of operating system software you use depends on your computers ____________. Answer: platform 54. ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet. Answer: Application 55. ____________are the fastest and most expensive computers. Answer: Supercomputers 56. A ____________ is approximately 1,000 bytes. Answer: kilobyte 57. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________. Answer: instructions 58. A computer gathers data, processes it, outputs the data or information, and ____________ the data or information. Answer: stores 59. The binary language consists of two digits: ____________ and ____________. Answer: 0 and 1 60. A string of ____________ 0s and 1s is called a byte. Answer: eight (8) 61. The devices you use to enter data into a computer system are known as ____________ devices. Answer: input 62. The devices on a computer system that let you see the processed information are known as ____________ devices. Answer: output 63. ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks. Answer: Software 64. When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP). Answer: Internet 65. ____________ are computers that excel at executing many different computer programs at the same time. Answer: Mainframes 66. ____________is the application of computer systems and techniques to gather legal evidence. Answer: Computer forensics

67. ____________ is the science that attempts to create machines that will emulate the human thought process. Answer: Artificial intelligence (AI) 68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system. Answer: Microsoft Windows 69. A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns. Answer: data mining 70. Hard disk drives and CD drives are examples of ____________ devices. Answer: storage 71. You would use ____________ software to create spreadsheets, type documents, and edit photos. Answer: application 72. ____________ are computers that support hundreds or thousands of users simultaneously. Answer: Mainframes 73. ____________ is the term given to the act of stealing someones identity and ruining their credit rating. Answer: Identity theft 74. Surgeons are using ____________ to guide robots to perform delicate surgery. Answer: computers 75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans. Answer: simulators

True and False


76. Currently, the performance of tasks by robots is based on preprogrammed algorithms. Answer: True 77. Data can be a number, a word, a picture, or a sound. Answer: True 78. Strictly defined, a computer is a data processing device. Answer: True 79. The discrepancy between the haves and have-nots with regard to computer technology is commonly referred to as the digital society. Answer: False (digital divide) 80. One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that pose threats to computer security. Answer: True 81. Trend-spotting programs, developed for business, have been used to predict criminal activity. Answer: True 82. Employers do not have the right to monitor e-mail and network traffic on employee systems used at work. Answer: False 83. Clicking on an icon with the mouse is a form of giving an instruction to the computer. Answer: True 84. Output devices store instructions or data that the CPU processes. Answer: False (memory)

85. The CPU and memory are located on a special circuit board in the system unit called the motherboard. Answer: True 86. Nanostructures represent the smallest human-made structures that can be built. Answer: True 87. The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible, whereas mainframes are designed to handle many programs running at the same time (but at a slower pace). Answer: True 88. Being computer fluent means that you should be able to build a computer yourself. Answer: False 89. Embedded computers are self-contained computer devices that have their own programming and do not receive input. Answer: True 90. A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network. Answer: False (network adapter) 91. With a wireless network, it is easier to relocate devices. Answer: True 92. The most common type of memory that the computer uses to process data is ROM. Answer: False (RAM)

Matching:
93. Match the following terms with their approximate size: I. kilobyte A. one million bytes II. byte B. eight bits III. gigabyte C. one thousand bytes IV. megabyte D. one billion bytes V. terabyte E. one trillion bytes Answer: C, B, D, A, E 94. Match the following terms with their meanings: I. printer A. storage device II. scanner B. output device III. RAM C. input device IV. CPU D. a type of memory V. CD drive E. processor Answer: B, C, D, E, A 95. Match the following terms with their meanings: I. mainframe A. the most expensive computers that perform complex calculations extremely rapidly II. supercomputer B. a computer that provides resources to other computers connected to a network III. embedded computer C. a large, expensive computer that supports hundreds or thousands of users simultaneously IV. PDA D. a self-contained computer device that usually performs preprogrammed functions such as

temperature control V. server E. a small mobile computing device Answer: C, A, D, E, B 96. Match the following terms with their meanings: I. software A. transforming data into information II. hardware B. data that has been organized or presented in a meaningful fashion III. operating system C. any part of the computer that you can physically touch IV. processing D. a set of computer programs that enables hardware to perform different tasks V. information E. the most common type of system software, it controls the way in which the computer system functions Answer: D, C, E, A, B 97. Match the following terms with their meanings: I. system software A. the set of programs that enables computer hardware devices and application software to work together II. application software B. the kind of operating system software you will use depends on this III. platform C. operating system software generally used on PCs IV. Microsoft Windows D. a set of programs used to accomplish a specific task V. Mac OS E. operating system software used on the Apple Macintosh Answer: A, D, B, C, E 98. Match the following terms with their meanings: I. data A. the main circuit board in the system unit II. memory B. the representation of a fact or idea (unprocessed information) III. output C. processed data or information IV. storage D. holds instructions or data that the CPU processes V. motherboard E. data or information that can be accessed again Answer: B, D, C, E, A 99. Match the following terms with their meanings: I. bit A. the science revolving around the use of nanostructures to build devices on an extremely small scale II. binary language B. the case that contains the system components III. instructions C. consists of 0s and 1s IV. system unit D. short for binary digit V. nanotechnology E. steps and tasks necessary to process data into usable information Answer: D, C, E, B, A

100. Match the following fields to the related computer technology: I. medicine A. Internet research and virtual tours II. business B. data mining III. law enforcement C. robotics and simulation IV. education D. computer forensics V. archeology E. digital recreations of ruins Answer: C, B, D, A, E

Vous aimerez peut-être aussi