Icttrends-BPO-01 Computer GK For Bank Probationary Officers & Clerk Exams

50 Questions | Total Attempts: 493

SettingsSettingsSettings
Icttrends-BPO-01 Computer GK For Bank Probationary Officers & Clerk Exams

Computer General Knowledge for Bank Probationary Officers and Clerk Exam Number of Questions


Questions and Answers
  • 1. 
    All of the following are examples of real security and privacy risks EXCEPT:
    • A. 

      Hackers

    • B. 

      Spam

    • C. 

      Viruses

    • D. 

      Identity theft

  • 2. 
    A process known as ____________ is used by large retailers to study trends.
    • A. 

      Data mining

    • B. 

      Data selection

    • C. 

      POS

    • D. 

      Data conversion

  • 3. 
    ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
    • A. 

      Data

    • B. 

      Point-of-sale (POS)

    • C. 

      Sales

    • D. 

      Query

  • 4. 
    A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
    • A. 

      PSS

    • B. 

      POS

    • C. 

      Inventory

    • D. 

      Data mining

  • 5. 
    The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
    • A. 

      Robotics

    • B. 

      Simulation

    • C. 

      Computer forensics

    • D. 

      Animation

  • 6. 
    Which of the following is NOT one of the four major data processing functions of a computer?
    • A. 

      Gathering data

    • B. 

      Processing data into information

    • C. 

      Analyzing the data or information

    • D. 

      Storing the data or information

  • 7. 
    ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
    • A. 

      POS

    • B. 

      RFID

    • C. 

      PPS

    • D. 

      GPS

  • 8. 
    Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
    • A. 

      Robotics

    • B. 

      Computer forensics

    • C. 

      Simulation

    • D. 

      Forecasting

  • 9. 
    Technology no longer protected by copyright, available to everyone, is considered to be:
    • A. 

      Proprietary

    • B. 

      Open

    • C. 

      Experimental

    • D. 

      In the public domain

  • 10. 
    ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers
    • A. 

      Nanoscience

    • B. 

      Microelectrodes

    • C. 

      Computer forensics

    • D. 

      Artificial intelligence

  • 11. 
    ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
    • A. 

      Nanoscience

    • B. 

      Nanotechnology

    • C. 

      Simulation

    • D. 

      Artificial intelligence (AI)

  • 12. 
     ____________ is data that has been organized or presented in a meaningful fashion.
    • A. 

      A process

    • B. 

      Software

    • C. 

      Storage

    • D. 

      Information

  • 13. 
    The name for the way that computers manipulate data into information is called:
    • A. 

      Programming

    • B. 

      Processing

    • C. 

      Storing

    • D. 

      Organizing

  • 14. 
    Computers gather data, which means that they allow users to ____________ data.
    • A. 

      Present

    • B. 

      Input

    • C. 

      Output

    • D. 

      Store

  • 15. 
    After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
    • A. 

      Data

    • B. 

      Output

    • C. 

      Input

    • D. 

      The process

  • 16. 
    Computers use the ____________ language to process data.
    • A. 

      Processing

    • B. 

      Kilobyte

    • C. 

      Binary

    • D. 

      Representational

  • 17. 
    Computers process data into information by working exclusively with:
    • A. 

      Multimedia

    • B. 

      Words

    • C. 

      Characters

    • D. 

      Numbers

  • 18. 
    In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
    • A. 

      Eight bytes

    • B. 

      Eight kilobytes

    • C. 

      Eight characters

    • D. 

      Eight bits

  • 19. 
    The term bit is short for:
    • A. 

      Megabyte

    • B. 

      Binary language

    • C. 

      Binary digit

    • D. 

      Binary number

  • 20. 
    A string of eight 0s and 1s is called a:
    • A. 

      Megabyte

    • B. 

      Byte

    • C. 

      Kilobyte

    • D. 

      Gigabyte

  • 21. 
    A ____________ is approximately one billion bytes.
    • A. 

      Kilobyte

    • B. 

      Bit

    • C. 

      Gigabyte

    • D. 

      Megabyte

  • 22. 
    A ____________ is approximately a million bytes.
    • A. 

      Gigabyte

    • B. 

      Kilobyte

    • C. 

      Megabyte

    • D. 

      Terabyte

  • 23. 
    ____________ is any part of the computer that you can physically touch.
    • A. 

      Hardware

    • B. 

      A device

    • C. 

      A peripheral

    • D. 

      An application

  • 24. 
    The components that process data are located in the:
    • A. 

      Input devices

    • B. 

      Output devices

    • C. 

      System unit

    • D. 

      Storage component

  • 25. 
    All of the following are examples of input devices EXCEPT a:
    • A. 

      Scanner

    • B. 

      Mouse

    • C. 

      Keyboard

    • D. 

      Printer