Friday, 12 May 2017

SBI PO MAIN COMPUTER AWARENESS 5

SBI PO MAIN 

COMPUTER AWARENESS QUESTIONS


1. Programs from the same developer , sold bundled together , that provide better integration and share common features , tool-bars and menus are known as .... 
(A) software suites
(B) integrated software packages
(C) software processing packages
(D) personal information managers
(E) none of these 
ANS (A)

2. A data warehouse is which of the following ? 
(A) Can be updated by the end users 
(B) Contains numerous naming conventions and formats 
(C) Organized around important subject areas 
(D) Contains only current data 
(E) None of these
 ANS (C) 

3. ______________ servers store and manages files for network users. 
(A) Authentication 
(B) Main 
(C) Web
 (D) File
 (E) None of these 
ANS (D) 

4. All of the following are examples of real security and privacy risks Except _____ 
(A) hackers 
(B) spam
 (C) viruses
 (D) identify theft
 (E) None of these 
ANS (B)

5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
 (A) Data
 (B) Sales
 (C) Query 
(D) (Point-of-sale (POS) 
(E) None of these
 ANS (B) 

6. The OSI model is divided into _______ processes called layers. 
(A) five
 (B) six 
(C) seven 
(D) eight
(E) None of these
 ANS (C) 

7. System software is the set of programs that enables your computer's hardware devices and ______ software to work together.
 (A) management
 (B) processing
 (C) utility 
(D) application
 (E) None of these 
ANS (D)

 8. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
 (A) Servers 
(B) Embedded computers
(C) Robotic computers
 (D) Mainframes 
(E) None of these
 ANS (B) 

9. The following are all computing devices , except......... 
(A) notebook computers
 (B) cellular telephones
 (C) digital scanners 
(D) personal digital assistants
 (E) None of these 
ANS (C)

 10. in a ring topology , the the computer in possession of the ______ can transmit data 
(A) packet 
(B) data
(C) access method 
(D) token 
(E) None of these 
ANS (D)

 11. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports ____ 
(A) basic input/output system 
(B) secondary input/output system 
(C) peripheral input/output system 
(D) marginal input/output system 
(E) None of these 
ANS (A) 

12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive 
(A) Trojan horse 
(B) Boot sector 
(C) Script 
(D) Logic bomb 
(E) None of these 
ANS (B) 

13. ________ controls the way in which the computer system functions and provides a means by which users can interact with the computer
(A) The platform 
(B) Application software 
(C) Operating system 
(D) The motherboard 
(E) None of these 
ANS (C) 

14. Servers are computers that provide resources to other computers connected to a ___________
(A) mainframe 
(B) network 
(C) supercomputer 
(D) client 
(E) None of these
 ANS (B)

 15. A goal of data mining includes which of the following? 
(A) To explain some observed event or condition 
(B) To confirm that data exists 
(C) To analyze data for expected relationships 
(D) To create a new data warehouse 
(E) None of these
 ANS (A) 

16. URL stands for ........ 
(A) Universal Research List 
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(E) None of these
 ANS (C) 

17. A database management system (DBMS) is a ............ 
(A) hardware system used to create , maintain and provide controlled access to a database 
(B) hardware system used to create, maintain, and provide uncontrolled access to a database. 
(C) software system used to create, maintain, and provide uncontrolled access to a database.
 (D) software system used to create, maintain, and provide controlled access to a database. (E) None of these 
ANS (D) 

18. Which of the following is NOT a goal of transaction processing system ? 
(A) Capture , process and store transactions 
(B) Produce a variety of documents related to routine business activities
(C) Reduce manual effort associated with processing business transactions 
(D) Produce standard reports used for management decision making 
(E) None of these 
ANS () 

19. A Proxy server is used for which of the following? 
(A) To provide security against unauthorized users 
(B) To process client requests for web pages 
(C) To process client requests for database access 
(D) To provide TCP/IP 
(E) None of these
 ANS (B) 

20. When data changes in multiple lists and all lists are not updated, this causes: 
(A) data redundancy
 (B) information overload
 (C) duplicate data 
(D) data inconsistency
 (E) None of these 
ANS (D)

Thursday, 11 May 2017

SBI PO MAIN COMPUTER AWARENESS 4

SBI PO MAIN 

COMPUTER AWARENESS QUESTIONS


1. The software tools that enable a user to interact with a computer for specific purposes are known as— 
(A) Hardware (B) Networked Software (C) Shareware (D) Applications (E) None of these Ans : (D)

2. A………shares hardware, software, and data among authorized users.
A) network (B) protocol (C) hyperlink (D) transmitter (E) None of these
Ans : (A)

3. Computer programs are written in a high-level programming language; however, the humanreadable version of a program is called— 
(A) cache (B) instruction set (C) source code (D) word size (E) None of these
Ans : (C)

4. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is— 
(A) copy and paste (B) copy, cut and paste (C) cut, copy and paste (D) cut and paste (E) None of these
Ans : (D)

5. Which of the following is not a function of the control unit ?
(A) Read instructions (B) Execute instructions (C) Interpret instructions (D) Direct operations (E) None of these
 Ans : (D)

6. Software for organizing storage and retrieval of information is a(n)— 
(A) operating system (B) database (C) database program (D) data warehouse (E) None of these
Ans : (C)

7. A set of step-by-step procedures for accomplishing a task is known as a(n)— 
(A) algorithm (B) hardware program (C) software bug (D) firmware program (E) None of these Ans : (A)

8. Which of the following is not true about RAM ?
 (A) RAM is a temporary storage area (B) RAM is the same as hard disk storage (C) RAM is volatile (D) Information stored in RAM is gone when you turn the computer off (E) None of these
 Ans : (B)

9. The main directory of a disk is called the………directory. 
(A) root (B) sub (C) folder (D) network (E) None of these
Ans : (A)

10. The physical arrangement of elements on a page is referred to as a document’s…… 
(A) features (B) format (C) pagination (D) grid (E) None of these
Ans : (B)

11. =SUM (B1 : B8) is an example of a—
(A) function (B) formula (C) cell address (D) value (E) None of these
Ans : (B)

12. Which of the following storage media provides sequential access only ? 
(A) Floppy disk (B) Magnetic disk (C) Magnetic tape (D) Optical disk (E) None of these
Ans : (B)

13. Compilers and translators are one form of—
 (A) ROM (B) RAM (C) Hard disk (D) Software (E) None of these
Ans : (D)

14. Data representation is based on the………number system, which uses two numbers to represent all data.
 (A) binary (B) biometric (C) bicentennial (D) byte (E) None of these
 Ans : (A)

15. The most common input devices include— 
(A) Monitor and keyboard (B) Monitor and mouse (C) Mouse and keyboard (D) Printer and mouse (E) None of these
Ans : (C)

Monday, 8 May 2017

HS STUDENT RESULT 2016


HS RESULT 2016
STUDENT NAME CLASS YEAR MARKS
SOUGAT DEY

XII 2016 94

ISMAIL MONDAL
XII 2016 91
MOLAY DAS
XII 2016 90
PARTHA ROY
XII 2016 86
AVI DEY XII 2016 86
ANANYA DAW
XII 2016 80
RANA DAS
XII 2016 77
DEEP MITRA XII 2016 76
DISHA MALLIK XII 2016 74
ZAFAR ALI XII 2016 72
KOUSHIK GHOSAL XII 2016 66
DIPESH GAIN
XII 2016 65
ARITRO DAS XII 2016 64
SUDIPTA MUKHERJEE XII 2016 --
KAUSTAV GHOSH XII 2016 --
ANUPAM MONDAL XII 2016 60

HS RESULT 2015 HS RESULT 2014 HS RESULT 2012

HS STUDENT RESULT 2015


HS RESULT 2015
STUDENT NAME CLASS YEAR MARKS
BANANI SARKAR XII 2016 85

HS RESULT 2016 HS RESULT 2014 HS RESULT 2012

HS STUDENT RESULT 2014


HS RESULT 2014
STUDENT NAME CLASS YEAR MARKS
SUBHAJIT PAUL XII 2016 67

HS RESULT 2016 HS RESULT 2015 HS RESULT 2012

HS STUDENT RESULT 2012


HS RESULT 2014
STUDENT NAME CLASS YEAR MARKS
ISITA MUKHERJEE XII 2016 76

HS RESULT 2016 HS RESULT 2015 HS RESULT 2014

Sunday, 7 May 2017

Dot Matrix Printing


Dot Matrix Printing




Dot matrix printing or impact matrix printing  is a type of computer printing which uses a print head that moves back-and-forth, or in an up-and-down motion, on the page and prints by impact, striking an ink-soaked cloth ribbon against the paper, much like the print mechanism on a typewriter.


A type of printer that produces characters and illustrations by striking pins against an ink ribbon to print closely spaced dots in the appropriate shape. Dot-matrix printers are relatively expensive and do not produce high-quality output. However, they can print to multi-page forms (that is, carbon copies), something laser and ink-jet printers cannot do.





Dot-matrix printers vary in two important characteristics:


>> speed: Given in characters per second (cps),the speed can vary from about 50 to over 500 cps. Most dot-matrix printers offer different speeds depending on the quality of print desired.




>> 
print quality: Determined by the number of pins (the mechanisms that print the dots), it can vary from 9 to 24. The best dot-matrix printers (24 pins) can produce near letter-quality type, although you can still see a difference if you look closely.

Thursday, 4 May 2017

Ransomware Virus NEW VIRUS

About | Ransomware

What is ransomware?Malicious software that locks a device, such as a computer, tablet or smartphone and then demands a ransom to unlock it
Where did ransomware originate?The first documented case appeared in 2005 in the United States, but quickly spread around the world
How does it affect a computer?The software is normally contained within an attachment to an email that masquerades as something innocent. Once opened it encrypts the hard drive, making it impossible to access or retrieve anything stored on there – such as photographs, documents or music
How can you protect yourself?Anti-virus software can protect your machine, although cybercriminals are constantly working on new ways to override such protection
How much are victims expected to pay?The ransom demanded varies. Victims of a 2014 attack in the UK were charged £500. However, there’s no guarantee that paying will get your data back

Monday, 1 May 2017

Internet

INTERNET

  • The Internet is a global network of interconnected network, enabling users to share information along multiple channels.
  • A computer that connects to the Internet can access information from a vast array of available servers and other computers by moving information from them to the computer’s local memory.
  • A majority of widely accessible information on the Internet consists of inter-linked hypertext documents and other resources of the World Wide Web (WWW).
  • Computer users typically manage sent and received information with web browsers; other software for users’ interface with computer networks includes specialised programs for electronic mail, online chat, file transfer and file sharing.
  • The movement of information in the Internet is achieved via a system of interconnected computer networks that share data by packet switching using the standardised Internet Protocol Suite (TCP/IP).
  • It is a “network of networks” that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by copper wires, fiber-optic cables, wireless connections, and other technologies.
  • It is really a way for computers to communicate and share informations.
  • It is a fast developing net and is of outmost importance for public sector undertakings, educational institutions, research organisations etc.

Services of Internet

E-mail


  • The internet enables user to exchange data/information and communicate via electronic media.
  • E-mail messages are usually encoded in American Standard Code for Information Interchange (ASCII) text.
  • A popular protocol for sending e-mail is Simple Mail Transfer Protocol (SMTP) and for receiving it is POP3.

Chat

  • It is the exchange of typed message by netizens.
  • It enables netizens to ‘talk not vocal’ by typing and sending the messages back and forth.
  • It has two modes—computer to telephone and computer to computer.
  • Internet Relay Chart (IRC) developed by Jarkko Oikarinen in 1998.
Video Conferencing
  • A service that allows a group of users to exchange video information over the internet.
  • It include an audio teleconference facility.
  • Each participant’s computer must have a camera, microphone and earphones (or speaker).

Class XI Computer Application Wbchse

 Class XI Computer Application Wbchse