Marketing Aptitude and Computer Awareness are an essential part of various recruitment exams like Bank PO and Bank Clerical. We are providing some questions to help you prepare for the written test. All these have been solved with descriptive answers.
MCQs on Marketing Aptitude
1. Which of the following statements is correct?
a) Marketing is the term used to refer only to the sales function within a firm
b) Marketing managers usually don't get involved in production or distribution decisions
c) Marketing is an activity that considers only the needs of the organization, not the needs of society as a whole
d) Marketing is the activity, set of institutions, and processes for creating, communicating, delivering, and exchanging offerings that have value for customers, clients, partners, and society at large*
Marketing is the activity, set of institutions, and processes for creating, communicating, delivering, and exchanging offerings that have value for customers, clients, partners, and society at large
2. The term marketing refers to:
a) New product concepts and improvements
b) Advertising and promotion activities
c) A philosophy that stresses customer value and satisfaction*
d) Planning sales campaigns
Two popular definitions of marketing are:
The management process of anticipating, identifying and satisfying customer requirements profitably.
The set of institutions, and processes for creating, communicating, delivering, and exchanging offerings that have value for customers, clients, partners, and society at large.
3. In the history of marketing, when did the production period end?
a) In the late 1800s
b) In the early 1900s
c) In the 1920s*
d) After the end of the Second World War
The development of marketing was first characterised by a production period which occurred during the 1890s to 1920s. This period of marketing was characterised by a focus on physical production and supply, where demand exceeded supply, there was little competition and the range of products was limited. This phase took place after the industrial revolution.
4. A marketing philosophy summarized by the phrase "a good product will sell itself" is characteristic of the _________ period.
The development of marketing was first characterised by a production period which occurred during the 1890's to 1920's. This period of marketing was characterised by a focus on physical production and supply, where demand exceeded supply, there was little competition and the range of products was limited. This phase took place after the industrial revolution.
5. Which of the following factors contributed to the transition from the production period to the sales period?
a) Increased consumer demand
b) More sophisticated production techniques
c) Increase in urbanization*
d) The Great Depression
The development of marketing has been characterised by four periods. The first of these was the production period in which focus was on the production of the product and its attributes. However as technologies advanced and production techniques became more sophisticated, competition between organisations increased. As such the focus shifted from a period of focus on production to focus on sales in which to influence customer purchase behaviour.
MCQs on Computer Knowledge
1. All of the following are examples of real security and privacy risks EXCEPT:
d) Identity theft
Spam is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, television advertising and file sharing network spam.
2. A process known as ____________ is used by large retailers to study trends.
a) data mining*
b) data selection
d) Data conversion
Data mining, a branch of computer science and artificial intelligence, is the process of extracting patterns from data. Data mining is seen as an increasingly important tool by modern business to transform data into business intelligence giving an informational advantage. It is currently used in a wide range of profiling practices, such as marketing, surveillance, fraud detection, and scientific discovery
3. ________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
a) Data Card Reader
b) Point-of-sale (POS)*
c) Sales inventory
d) Magnetic Swipe Reader
Point-of-sale (POS) terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. Magnetic Swipe Reader: Reads the magnetic strip on the back of a credit or debit card. The information stored on the magnetic strip includes the credit card number, expiration date, customer name, and address. The information is transmitted to a credit card processing network through the point-of-sale system for payment of merchandise.
4. A(n) _______ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop.
c) Data retrieval
d) Data mining
Bar Code Scanner: A laser type of device (gun style, counter style) that when triggered over a bar code, converts bar code lines into numbers. This number or SKU (Stock Keeping Unit) is then transmitted back to the POS computer for automatic price lookup
5. The ability to recover and read deleted or damaged files from a criminal computer is an example of a law enforcement speciality is called:
c) computer forensics*
Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of preserving, recovering, analyzing and presenting facts and opinions about the information. Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.