Wednesday, March 31, 2010

Computer General Knowledge for Bank P.O. and Clerk Exams

Computer General Knowledge for Bank P.O. & Clerk Exams

1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Ans : B

2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Ans : A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Ans : B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Ans : A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Ans : C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Ans : C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Ans : B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Ans : A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Ans : A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Ans : A

11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Ans : D

12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Ans : D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Ans : B

14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Ans : B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Ans : B

16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Ans : C

17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Ans : D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Ans : D

19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Ans : C

20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Ans : B

21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Ans : C

22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Ans : C

23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Ans : A

24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Ans : C

25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Ans : D

26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Ans : A

27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Ans : B

28. The ____________, also called the “brains” of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Ans : D

29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Ans : B

30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Ans : A

31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Ans : B

32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Ans : D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Ans : A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Ans : C

35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Ans : A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Ans : D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Ans : B

38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Ans : D

39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Ans : A

40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Ans : A

41. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Ans : D

42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Ans : A

43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Ans : B

44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Ans : C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Ans : B

46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Ans : C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Ans : B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Ans : A

49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Ans : D

50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Ans : A

(Disclaimer, I Found them on internet (while searching) and publishing them on my blog also to help the world)

Friday, January 15, 2010

ASP.NET Page Life Cycle Overview

Page Event

Typical Use

PreInit

Use this event for the following:

· Check the IsPostBack property to determine whether this is the first time the page is being processed.

· Create or re-create dynamic controls.

· Set a master page dynamically.

· Set the Theme property dynamically.

· Read or set profile property values.

Note:

If the request is a postback, the values of the controls have not yet been restored from view state. If you set a control property at this stage, its value might be overwritten in the next event.

Init

Raised after all controls have been initialized and any skin settings have been applied. Use this event to read or initialize control properties.

InitComplete

Raised by the Page object. Use this event for processing tasks that require all initialization be complete.

PreLoad

Use this event if you need to perform processing on your page or control before the Load event.

Before the Page instance raises this event, it loads view state for itself and all controls, and then processes any postback data included with the Request instance.

Load

The Page calls the OnLoad event method on the Page, then recursively does the same for each child control, which does the same for each of its child controls until the page and all controls are loaded.

Use the OnLoad event method to set properties in controls and establish database connections.

Control events

Use these events to handle specific control events, such as a Button control's Click event or aTextBox control's TextChanged event.

Note:

In a postback request, if the page contains validator controls, check the IsValid property of the Page and of individual validation controls before performing any processing.

LoadComplete

Use this event for tasks that require that all other controls on the page be loaded.

PreRender

Before this event occurs:

· The Page object calls EnsureChildControls for each control and for the page.

· Each data bound control whose DataSourceID property is set calls its DataBind method. For more information, see Data Binding Events for Data-Bound Controls later in this topic.

The PreRender event occurs for each control on the page. Use the event to make final changes to the contents of the page or its controls.

SaveStateComplete

Before this event occurs, ViewState has been saved for the page and for all controls. Any changes to the page or controls at this point will be ignored.

Use this event perform tasks that require view state to be saved, but that do not make any changes to controls.

Render

This is not an event; instead, at this stage of processing, the Page object calls this method on each control. All ASP.NET Web server controls have a Render method that writes out the control's markup that is sent to the browser.

If you create a custom control, you typically override this method to output the control's markup. However, if your custom control incorporates only standard ASP.NET Web server controls and no custom markup, you do not need to override the Render method.

A user control (an .ascx file) automatically incorporates rendering, so you do not need to explicitly render the control in code.

Unload

This event occurs for each control and then for the page. In controls, use this event to do final cleanup for specific controls, such as closing control-specific database connections.

For the page itself, use this event to do final cleanup work, such as closing open files and database connections, or finishing up logging or other request-specific tasks.

Note:

During the unload stage, the page and its controls have been rendered, so you cannot make further changes to the response stream. If you attempt to call a method such as the Response.Writemethod, the page will throw an exception.

Wednesday, January 13, 2010

Whats are the New Features in Microsoft Office 2010


1. Built-In Screen Capture Tool

A really handy addition & at the same time a beautiful implementation of the same. Word & Powerpoint both have the ‘Screenshot’ feature under ‘Insert’ & the useful part is that it caches screen shots of the currently open windows for one-click insert. At the same time also gives you the marquee select option.

2. Background Removal Tool (for images)

A new addition to picture properties is ‘Background Removal’.

3. Protected Mode

Every time you download a document from the internet & open it, Word 2010 will open it in a ‘Protected mode’ that won’t allow you to edit the document unless you enable editing of the document. You can edit which file types are to be opened in the protect mode from the Trust Center panel.

4. New Smart Art Templates

Smart Art It’s right up there amongst the best features in Office and in Office 2010 there are new templates added. Existing categories have new templates & there’s a new category as well.

5. Author Permissions

Co-authoring a document & collaborating over the Internet will be one of Office 2010’s USPs, the ‘Protect Document’ option under ‘Review’ in Office 2007 has now been renamed to ‘Restrict Editing’ & a new tab titled ‘Block Authors’ has been added.

6. Completely Revamped Options Under the Office Button

Office 2010 has introduced a huge a change in the document options that are presented to you under the Office button. One of biggest pains was the meta-data that can be added in a
document. Quick access to permissions, document meta-data under document info. With Office 2010 you now have the option of saving your document to a SharePoint location as well.

7. Print Control Panel Under the Office Button

This is a fantastic addition, clicking ‘Print’ under the Office 2010 button opens a plethora of printing options. No need go through a ‘Print Wizard’ you can select all your print options from here & hit print.

8. Jumplists in Outlook 2010

As you’ll might have seen, Outlook 2010 now makes use of Windows 7’s Jumplist feature for quick access to certain processes.

9. Broadcast Presentations To Your Clients

Now you can broadcast your presentations by sending the intended viewer a URL, this works along with Office Live Workspaces & you need an account of the same.

10. Inserting & Editing Videos Is Painless & Fun

11. Compress Media While Saving Presentations

The all new file menu, known as — Backstage gives you options to compress the media files inserted in the presentation to reduce file size, it even gives an esitmate of the presentation size.

12. New Animations & Slide Transitions

My favorite from the new ones is the Gallery transition effect. Another addition to transitions is that the % can be defined.

13. Save File Notification

When closing an unsaved file Office 2010 now lets you know that it has auto-saved a draft.

14. Hide Ribbon

With Office 2010, a cleaner interface has been worked upon. There is now a single-click show/hide option for the Ribbon.


Wednesday, January 6, 2010

What is 'GodMode' in Windows 7

Although its name suggests perhaps even grander capabilities, Windows enthusiasts are excited over the discovery of a hidden "GodMode" feature that lets users access all of the operating system's control panels from within a single folder.

By creating a new folder in Windows 7 and renaming it with a certain text string at the end, users are able to have a single place to do everything from changing the look of the mouse pointer to making a new hard-drive partition.

The trick is also said to work in Windows Vista, although some are warning that although it works fine in 32-bit versions of Vista, it can cause 64-bit versions of that operating system to crash.

To enter "GodMode", one need only create a new folder and then rename the folder to the following:

GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

Once that is done, the folder's icon will change to resemble a control panel and will contain dozens of control options. I'm not sure it's my idea of playing God, but it is a handy way to get to all kinds of controls.

I've asked Microsoft for more details on the feature and how it came to be. But so far, Redmond is silent on the topic.

This article was first published as a blog post on CNET News.
Source : http://www.zdnetasia.com/news/software/0,39044164,62060303,00.htm?scid=rss_z_nw


How to Encrypt or Decrypt Connection Strings in ASP .Net 3.5


We can encrypt the section of a web configuration file (web.config).

After the Encryption of Connection Strings is done, you will notice a change in web.config file, that the contents of the section are no longer visible.

However, an ASP.NET page can continue to read the values of the Corresponding Database (For e.g. GuestBook connections string by using the <%$ ConnectionStrings:GuestBook %> expression.

The easiest way to encrypt the section is to use the aspnet_regiis
command-line tool. This tool is located in the following folder:

C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\

Executing the following command encrypts the section of a
Web.Config file located in a folder with the path c:\Websites\myGuestBook

aspnet_regiis -pef connectionStrings “c:\Websites\ myGuestBook”

The -pef option (Protect Encrypt Filepath) encrypts a particular configuration section
located at a particular path.

You can decrypt a section with the -pdf option like this:

aspnet_regiis -pdf connectionStrings “c:\Websites\myGuestBook”


how do you programmatically raise a button-click event


You can use the following C# code raise the event:

((IPostBackEventHandler)Button1).RaisePostBackEvent(null);

This code will raise the button-click event for Button1 just as though the user clicked the button. Since we are passing a null as the EventArgs for the event, the registered methods must not attempt to do anything with it. Or, you could create an EventArgs object and pass it.


Monday, November 30, 2009

How to Display Current Date and Time using PHP


Let's see how to display current time in the format : HH:MM:SS ( Hours:Minutes:Seconds )
We will call Built in Function of PHP: time(); and another one : date(); in a combination to set our time according to our Time Zone.

The most easiest example is:

PHP Code :

echo date("h:i:s");
$time = date("F j, Y, g:i a");
echo $time ;
$time = date(”m.d.y”); // 06.13.08
echo $time ;
$time = date(”j, n, Y”); // 13, 6, 2008
echo $time ;
$time = date("Ymd"); // 20080613
echo $time ;
$time = date("h-i-s, j-m-y, it is w Day z "); // 12-16-41, 13-06-08, 1630 1641 5 Fripm08 164
echo $time ;
$time = date("\i\t \i\s \t\h\e jS \d\a\y."); // It is the 13th day.
echo $time ;
$time = date("D M j G:i:s T Y"); // Fri Jun 13 12:17:06 PKT 2008
echo $time ;
$time = date("H:m:s \m \i\s\ \m\o\n\t\h"); // 12:06:18 m is month
echo $time ;
$time = date("H:i:s"); // 12:17:32
echo $time ;
?>


format character Description Example returned values
Day --- ---
d Day of the month, 2 digits with leading zeros 01 to 31
D A textual representation of a day, three letters Mon through Sun
j Day of the month without leading zeros 1 to 31
l (lowercase 'L') A full textual representation of the day of the week Sunday through Saturday
N ISO-8601 numeric representation of the day of the week (added in PHP 5.1.0) 1 (for Monday) through 7 (for Sunday)
S English ordinal suffix for the day of the month, 2 characters st, nd, rd or th. Works well with j
w Numeric representation of the day of the week 0 (for Sunday) through 6 (for Saturday)
z The day of the year (starting from 0) 0 through 365
Week --- ---
W ISO-8601 week number of year, weeks starting on Monday (added in PHP 4.1.0) Example: 42 (the 42nd week in the year)
Month --- ---
F A full textual representation of a month, such as January or March January through December
m Numeric representation of a month, with leading zeros 01 through 12
M A short textual representation of a month, three letters Jan through Dec
n Numeric representation of a month, without leading zeros 1 through 12
t Number of days in the given month 28 through 31
Year --- ---
L Whether it's a leap year 1 if it is a leap year, 0 otherwise.
o ISO-8601 year number. This has the same value as Y, except that if the ISO week number (W) belongs to the previous or next year, that year is used instead. (added in PHP 5.1.0) Examples: 1999 or 2003
Y A full numeric representation of a year, 4 digits Examples: 1999 or 2003
y A two digit representation of a year Examples: 99 or 03
Time --- ---
a Lowercase Ante meridiem and Post meridiem am or pm
A Uppercase Ante meridiem and Post meridiem AM or PM
B Swatch Internet time 000 through 999
g 12-hour format of an hour without leading zeros 1 through 12
G 24-hour format of an hour without leading zeros 0 through 23
h 12-hour format of an hour with leading zeros 01 through 12
H 24-hour format of an hour with leading zeros 00 through 23
i Minutes with leading zeros 00 to 59
s Seconds, with leading zeros 00 through 59
Timezone --- ---
e Timezone identifier (added in PHP 5.1.0) Examples: UTC, GMT, Atlantic/Azores
I (capital i) Whether or not the date is in daylight saving time 1 if Daylight Saving Time, 0 otherwise.
O Difference to Greenwich time (GMT) in hours Example: +0200
P Difference to Greenwich time (GMT) with colon between hours and minutes (added in PHP 5.1.3) Example: +02:00
T Timezone setting of this machine Examples: EST, MDT ...
Z Timezone offset in seconds. The offset for timezones west of UTC is always negative, and for those east of UTC is always positive. -43200 through 50400
Full Date/Time
--- ---
c ISO 8601 date (added in PHP 5) 2004-02-12T15:19:21+00:00
r RFC 2822 formatted date Example: Thu, 21 Dec 2000 16:01:07 +0200
U Seconds since the Unix Epoch (January 1 1970 00:00:00 GMT) See also time()