COMPUTER SCIENCE GENERAL KNOWLEDGE

The earlier computers, which were massive in size, were based on vacuum tubes.

Early computing machines, like the ENIAC, were actually meant to assist the armed forces.

The printers in pre-1950s were punch cards.

An improvement on the ENIAC, which pioneered ‘stored program’, was made possible with the help of the mathe-matician John von Neumann.



The B-programming language was developed by Ken Thompson.



Famous people, associated with the ENIAC, EDVAC, UNIVAC computers are Eckert & Mauchly.



The 1st commercially produced and sold computer (1951) was UNIVAC.



IBM was provided software for PCs by Microsoft.



Time-sharing, teletyping, were associated with mainframe computers.



The transformation from heavy computers to PCs was made possible using microprocessors.



The first microprocessor was developed in 1971 by Intel.



The term ‘micro’ (extremely small) denotes 10–6 m.



The Harvard student, who chose to write computer programs and dropped studies was Bill Gates.



A pentium 4 (P-4) employs roughly 40 million transistors.



Mark-1, Apple-1, and collossus were initial desktop computers.



Binary digits are briefed as bit.



A collection of bits is called byte.



The process of eliminating pro-gramming faults is called debugging.



Starting up on operating system is called booting.



A program used to browse the web is called browser. Like opera,safari,internet explorer



An error in software designing which can even cause a computer to crash is called bug.





Java, C, ForTran, Pascal and BASIC are computer programming languages.



The device which sends computer data using a phone line is called MODEM.



‘Worm’ and ‘virus’ are actually programs.



A ‘file’ is a unit of information.



A megabyte has 106 (million) bytes.



A small, single-site network is called LAN.



A processor that collects several data and sends them over a single line is called bridge.



‘Nano’ stands for one billionth part.



The number of bit patterns using an n-bit code is 2n.



The part of a computer that works with the data/programs is called CPU.



To convert a binary number to a decimal, we have to express it in power of 2.



www stands for world wide web.



Mathematics employed in compu-ters is called Boolean algebra.



A collection of 8 bits is called byte.



The first home computer (1977), which was sold in millions of units was Apple II.



‘PARAM’ is a supercomputer.



A website containing periodic posts is called blog.



While cutting and pasting, the cut item is temporarily stored in the clipboard.



http stands for hypertext transfer protocol.



The unwanted or non-requested e-mails are called “spam”.



A computer framed to give various network services is called server.

COMPUTER ABBREVIATIONS

November 26th, 2009 CDMA – Code Division Multiple Access

GSM – Global System for Mobile Communication

TDMA – Time Division Multiple Access

PC – Personal Computer

RAM – Random Access Memory

CPU – Central Processing Unit

WWW – World Wide Web

UPS – Uninterruptible Power Supply

LAN – Local Area Network

WAN – Wide Area Network

MAN – Metropolitan Area Network

TCP/IP – Transmission Control Protocol/Internet Protocol

DOS – Disk Operating System

ROM – Read Only Memory

PROM – Programmable Read Only Memory

HTML – Hyper Text Markup Language

HTTP – Hyper Text Transfer Protocol

FTP – File Transfer Protocol

ATM – Automatic Teller Machine





: COMPUTER ABBREVIATIONS





SUPER COMPUTER OF INDIA PARAM PADMA



HOTMAIL SABEER BHATIA



“EXPANSION OF “”VIRUS “”" VITAL INFORMATION RESOURCES UNDER SIEGE



WORLD WIDE WEB TIM BERNESLI



COMPUTER VIRUS IS A COMPUTER PROGRAM



MICROSOFT CHAIRMAN -BILL GATES



IN BINARY NUMBER SYSTEM THE BASE IS 2



SECONDARY MEMORY OF THE COMPUTER HARD DISK



BOOTSTRAP PROGRAM IS A PROGRAM THAT STARTS THE COMPUTER WORKING



OPERATION INDICATES ERROR CORRECTION DEBUGGING



ONE BYTE IS- 8 BITS

1mb-1024bytes



PROTOCOL OF WIRELESS LAN 802.11



LEVEL OF SECURITY IMPLEMENTED IN WINDOWS NT C2



JAVA PROGRAMMING LANGUAGE JAMES GOSLING



DIRECT X IS A SOFTWARE THAT DRIVES GRAPHIC HARDWARE



FIRST TECHNOPARK IN INDIA THIRUVANANTHAPURAM



LINUX DEVELOPED BY LINUS TORVALD



OPEN SOURCE PROGRAM CONCEPT RICHARD STALLMAN



NEW OPERATING SYSTEM FROM WINDOWS WINDOWS VISTA



SECOND GENERATION SERVICES OF WWW WEB 2.0



MICROSOFT CHIEF EXECUTIVE OFFICER STEVE BALLMER



COST OF PRODUCTION OF WINDOWS VISTA $7 BILLION



YOU TUBE ASSOCIATED WITH GOOGLE



FLOPPY DISK IBM



LAPTOP COMPUTER SINCLAIR



BLU-RAY TECHNOLOGY SONY



INTEROPERABILITY FOR MICROWAVE ACCESS WIMAX



“THE “”ILOVEYOU”" VIRUS IS AN EXAMPLE OF” Script Virus



“”STORED PROGRAM CONCEPT ” BY” John von neumann



VIRTUAL DISK IS RAM Disk



“”WISDOM OF MASS PRINCIPLE”" IS ASSOCIATED WITH”

WIKIPEDIA



INFOSYS CEO S.GOPALAKRISHNAN

Operating system of a computer manages

Ans : all the operations of a computer

Software that can manipulate or destroy data or programs in a computer is known as

Ans : Virus

Binary Code’ used in computers makes use of which numbers

Ans : 0 & 1

One kilobyte is equal to

Ans : 1024 bytes

Who is the architect of Supercomputer

Ans : Seymour Cray

Which computer company introduced mouse for the first time

Ans : Apple Corporation

Who developed the World Wide Web first

Ans : Timothy Berners Lee

The first large scale, general purpose digital computer

Ans : ENIAC

ENIAC

Ans : Electronic Numerical Integrator And Computer

The shortcut key to print documents is

Ans : Ctrl + P

The function of key F4 in keyboard is

Ans : to repeat the last action

Name the first general purpose electronic computer

Ans : UNIVAC



COMPUTER GENERAL KNOWLEDGE



1. Register is a

(a) Set of capacitors used to register input instructions in a digital computer

(b) Set of paper tapes and cards put in a file

(c) Temporary storage unit within the CPU having dedicated or general purpose use

(d) part of the auxiliary memory

(e) device to convert current signal into voltage signal

Ans (c)



2. Errors in computer results could be due to

(a) encoding of data (b) transmission of data

(c) manipulation of data (d) all of the above

(e) none of above

Ans (d)



3. Terminal is a

(a) device used to give supply to a computer

(b) Point at which data may leave or enter the computer

(c) ending point in a program

(d) point where wires are interconnected

(e) an input/output device

Ans (b)



4. A computer programmer

(a) enters data into computer

(b) writes programs

(c) changes flow chart into instructions

(d) provides solutions to complex problems

(e) does total planning and thinking for a computer

Ans (e)



5.Pickup wrong definition

(a) Off line - is a system peripheral equipment not controlled by CPU

(b) Online - is system in which peripheral equipment is in direct contact with CPU

(c) Peripherals - are hardware under the control of CPU, like punched card readers, tapes, drums, disk, output devices

(d) PL/I is the acronym Peripheral Listing /Index

(e) Program or routine is a set sequence of instructions given to computer for problem solving

Ans (d)



6. When a CD (Compact Disc used in audio and Video system) is seen in sunlight, rainbow like colours are seen. This can be explained on the basis of phenomenon of

(a) reflection and diffraction

(b) reflection and transmission

(c) diffraction and transmission

(d) refraction, diffraction and transmission

(e) none of these

Ans (d) Internet is an inter-networking of information from one part of the network to any other provided the information is packed according to certain conventions



7. For reproducing sound, a CD (Compact Disc) audio player uses a

(a) quartz crystal

(b) titanium needle

(c) laser beam

(d) barium titanium ceramic

(e) none of these

Ans (c) LASER stands for Light Amplification by Stimulated Emission of Radiation



8. The memory of a computer is commonly expressed in terms of Kilobytes or Megabytes. A byte is made up of

(a) eight decimal digits (b) eight binary digits

(c) two binary digits (d) two decimal digits (e) none of these

Ans (b) A byte consists of 8 bits—8 binary digits



9. Which of the following circuit is used as a 'Memory device' in computers?

(a) Rectifier (b) Flip-Flop (c) Comparator (d) Attenuator (e) none of these

Ans (b) Flip-flop refers to an electronic component which can adopt one of two possible states -0 or 1. It acts as an electronic switch which gets changed its state when input signals are received



10. Which is/are the main provisions of Information Technology (IT) Act, 2000?

(a) Legal recognition to digital signatures and documents.

(b) Finalisation of contracts through electronic media.

(c) Making hacking with computer system an office.

(d) All of the above

Ans (d)



11. Consider the following statements about Internet facility:

I. It serves as the largest one-line information system.

II. It provides the most dependable and latest mode for sending E-mail.

III. Recurring expenditure on communication E-mail is very high.

IV. It is often misused and has triggered cyber-crimes.

Which of these statements are correct?

(a) I, II and IV (b) I and IV (c) II, III and IV (d) II and III

Ans (a)



12. The computer device primarily used to provide hard copy is the

(a) CRT (b) Line Printer (c) Computer Console (d) Card Reader

Ans (b)



13. The unit of hardware, which an operator uses to monitor computer processing, is the

(a) Card Reader (b) CPU (c) Line Printer (d) Console

Ans (d)



14. Computers can be classified in which of the following hierarchical orders?

(a) PC, Large, Super Micro, Super Computer

(b) Super Micro, PC, Large, Super Computer

(c) PC, Super Micro, Large, Super Computer

(d) Large, Super Micro, Super Computer, PC

Ans (c)



15. Which one of the following is a stored program machine?

(a) Micro-processor (b) Calculator

(c) Analog-computer (d) Micro-computer

Ans (d)



16. First generation computer systems used

(a) Transistors (b) Vacuum tubes

(c) Magnetic cores (d) Silicon chips

Ans (b)



17. Transistors are associated with which computer system?

(c) Second generation

18. Charles Babbage invented

(a) ENIAC (b) Difference engine (c) Electronic computer (d) Punched card

19. Who wrote the book 'Computer Liberation and Dream Machine', the first book on personal computers?

Ted Nelson



20. Who was the inventor of mechanical calculator for adding numbers?

(d) Pascal

21. The most widely used commercial programming computer language is

(a) BASIC (b) COBOL (c) FORTRAN (d) PASCAL

Ans (b) Cobol is abbreviated term for Common Business Oriented Language. It is high level programme language designed to assist the task of programs by enabling them to write programme in more simple manner



22.The brain of a computer is

Ans - CPU is abbreviated term for Central Processing Unit. It is the principal operating part of a computer



23. Foxpro' is-- (c) a computer langua



24.In computer language, one kilobyte equals

) 1024 bytes , The memory of a computer is commonly expressed in terms of kilobytes



25. Which one of the following is not a programming language of a computer?

(c) LASER



26.Which of the following packages is used for composition in printing press?

(c) Page Maker

27. Which one of the following is not a computer language?

(a) BASIC (b) COBOL (c) LOTUS (d) FORTRAN

Ans (d)



28. The individual within the operations group who ordinarily uses a variety of keyboard devices, is the

(a) Data Clerk (b) Keypunch Operator

(c) Data Entry Clerk (d) Computer Operator

Ans (c)



29. An advantage of a distributed word processing network is

(a) increased number of reports handled

(b) less delay in inter-office communications

(c) greater corporate control over outputs

(d) All of these

Ans (b)



30.The retrieval of information from the computer is defined as

(a) collection of data (b) data retrieval operations

(c) output (d) data output collection

Ans (c)



31. Which of the following terms could be used to describe the concurrent processing of computer programs via CRTs, on one computer system?

(a) Time sharing (b) On-line processing

(c) Interactive processing (d) All of these

Ans (d)



32.The daily processing of corrections to customer accounts best exemplifies the processing mode of

(a) batch processing (b) real-time processing

(c) time-sharing (d) off-line processing

Ans (a)



33. A characteristic of card system is

(a) slowness in processing data

(b) using cards as records of transactions

(c) needing a larger data staff

(d) All of these

Ans (d)



34. Which of the following floppy sizes exists?

(a) 5.25 inches (b) 4.75 inches (c) 6 inches (d) 8 inches

Ans (a)



35. MS-DOS is the name of a/an

(a) Application software (b) Hardware

(c) System software

Ans (c)



36. A peripheral device used in a word processing system is

(a) Floppy disk (b) Magnetic card reader

(c) CRT (d) All of these

Ans (d)



37. A term used interchangeably with diskette is

(a) Disk cartridge (b) Disk pack

(c) Floppy disk (d) Packette disk

Ans (c)



38. An I/O device which provides photographic outputs for printing galleys, is the

(a) Camera printer (b) Automatic typesetter

(c) Radix printer (d) All of these

Ans (d)



39. Which one of the following a file?

(a) Floppy disk (b) Magnetic drum (c) magnetic tape (d) None of these

Ans (d)



40.A decimal equivalent of m second is

(a) 0.000001 sec (b) 1000000 sec (c) 0.001 sec (d) 1000 sec

Ans (a)



41. A characteristic of the ASCII code is

(a) its limitation to a maximum of 96 character configuration

(b) its use of the zone codes 1010, 1011 and 1100

(c) its independence from Hollerith code

(d) All of these

Ans (c)



42. A temporary storage area, attached to the CPU, for I/O operations, is a

(a) Channel (b) Buffer (c) Register (d) Core

Ans (b)



43. The computer code for interchange of information between terminals is

(a) ASCII (b) BCD (c) BCDIC (d) Hollerith

Ans (a)



44. ROM is composed of

(a) Magnetic cores (b) Micro-processors

(c) Photoelectric cells (d) Floppy disks

Ans (b)



45. Which of the following is true?

(a) Plotters are not available for microcomputer systems

(b) Micro-computer are not programmed like conventional computers

(c) Mini-computers are task-oriented

(d) The contents of ROM are easily changed

Ans (c)



46. Magnetic disk a medium known as

(a) Serial access (b) Direct access (c) Sequential access (d) Sequential and rotational access

Ans (b)



47. A dot-matrix printer

(a) is an input-output device (b) is an output device only

(c) is an input device only (d) None of these

Ans (b)



48.An octal number 237 is equal to the binary number

(a) 010 011 111 (b) 010 111 011

(c) 011 101 101 (d) 011 000 001

Ans (c)



49. A term associated with the comparison of processing speed is

(a) FFTS (b) MPG (c) MIPS (d) CPS

Ans (c)



50. The maximum size of a memory addressed by 12 bits is

(a) 1 K bytes (b) 16 K bytes (c) 32 K bytes (d) 4 K bytes

Ans (d)

Bank IT Officer Descriptive Solved Question Paper For SBI, Allahabad Bank

Q1. What is Client-server Computing?



Ans: The short answer: Client/server is a computational architecture that involves client processes

requesting service from server processes.

The long answer: Client/server computing is the logical extension of modular programming. Modular programming has as its fundamental assumption that separation of a large piece of software into its constituent parts ("modules") creates the possibility for easier development and better maintainability. Client/server computing takes this a step farther by recognizing that those modules need not all be executed within the same memory space.

With this architecture, the calling module becomes the "client" (that which requests a service), and the called module becomes the "server" (that which provides the service). The logical extension of this is to have clients and servers running on the appropriate hardware and software platforms for their functions. For example, database management system servers running on platforms specially designed and configured to perform queries, or file servers running on platforms with special elements for managing files. It is this latter perspective that has created the widely-believed myth that client/server has something to do with PCs or Unix machines.



Q2 What is a Client process?



Ans: The client is a process (program) that sends a message to a server process (program), requesting that the server perform a task (service). Client programs usually manage the user-interface portion of the application, validate data entered by the user, dispatch requests to server programs, and sometimes execute business logic. The client-basedprocess is the front- end of the application that the user sees and interacts with. The client process contains solution-specific logic and provides the interface between the user and the rest of the application system. The client process also manages the local resources that the user interacts with such as the monitor, keyboard, workstation CPU and peripherals. One of the key elements of a client workstation is the graphical user interface (GUI). Normally a part of operating system i.e. the window manager detects user actions, manages the windows on the display and displays the data in the windows.



Q3 What is a Server process?



Ans : A server process (program) fulfills the client request by performing the task requested. Server programs generally receive requests from client programs, execute database retrieval and updates, manage data integrity and dispatch responses to client requests. Sometimes server programs execute common or complex business logic. The server-based process "may" run on another machine on the network. This server could be the host operating system or network file server; the server is then provided both file system services and application services. Or in some cases, another desktop machine provides the application services. The server process acts as a software engine that manages shared resources such as databases, printers, communication links, or high powered-processors. The server process performs the back-end tasks that are common to similar applications.



Q4 What is a Two-Tier Architecture?



Ans : A two-tier architecture is where a client talks directly to a server, with no intervening server. It is typically used in small environments (less than 50 users). A common error in client/server development is to prototype an application in a small, two-tier environment, and then scale up by simply adding more users to the server. This approach will usually result in an ineffective system, as the server becomes overwhelmed. To properly scale to hundreds or thousands of users, it is usually necessary to move to a three-tier architecture.



Q5 What is a Three-Tier Architecture?



A three-tier architecture introduces a server (or an "agent") between the client and the server. The role of the agent is manyfold. It can provide translation services (as in adapting a legacy application on a mainframe to a client/server environment), metering services (as in acting as a transaction monitor to limit the number of simultaneous requests to a given server), or intellegent agent services (as in mapping a request to a number of different servers, collating the results, and returning a single response to the client.

For SBI Speciality Officer, Allahabad bank IT Officer Exam



Model Questions : The Descriptive Test should be Prepared on Basis of All Books of Degree Exam with Special Emphasis on Banking.We are Listing Sample Questions



1. What do you understand by 'Authentication' and 'Encryption' in the context of system security? In this context explain

(i) Kerberos

(ii) IP Security

(iii) RSA Encryption



2.Write short notes on each of the following:

(a) Trojan Horse

(b) Smart Cards



3. Write short notes on each of the following:

(a) Trojan Horse

(b) Smart Cards

(c) Physical threats and security

(d) PGP



4. Explain the DMA controller with block diagram. What is meant by a block transfer? What are the various phases of an instruction cycle ? Give the micro operation of fetch and decode phases

Compare Static RAM with Dynamic RAM.



5. Using NAND gate generate the AND and NOR functions



6. Which of the following services should be enabled in a secure workstation connected in an Ethernet LAN ?



Give reasons for your answer.

Anacron, ftp, netfs, nfs, telnet, sendmail, SSH, syslog, SNMP, time. (Assume the LAN is connected to the Internet but is not connected via Firewall nor is Kerberos used).



7. What is a Socket ? Write two differences between a TCP Socket and a UDP Socket.



8. What are the standard port numbers for (i) Web Server (ii) Mail Server (iii) FTP Server (iv) Telnet ?



9 What is Network Address Translation (NAT) ? Give any two advantages and two disadvantages of NAT.



10 What is VPN ? How is it useful for an organization ?



11. What is a Search Engine ? How is it useful for Internet/Intranet ? Give the names of any four Search engines.



12 What is WAP ? Give any two advantages and two limitations of WAP. Also explain its layered architecture.

No comments:

Post a Comment