You are on page 1of 99

Computer Awareness (Microsoft Word) Practice Set 03

1. To insert a drop cap in one of the paragraph you should access A) Insert Menu B) Format C) Tools D)
None of above

2. How many different positions can you set for drop cap? A) 1 B) 2 C) 4 D) 6
3. What is the maximum number of lines you can set for lines to drop box? A) 3 B) 5 C) 10 D) 15
4. Which of the following can NOT be used to create parallel style column? A) Format Tabs B) Table
Insert Table C) Insert Textbox D) Format Columns
5. Which of the following is used to create newspaper style columns? A) Format Tabs B) Table Insert
Table C) Insert Textbox D) Format Columns
6. Columns dialog box can be opened from A) Format menu Columns submenu B) Double click on
column space in ruler C) Press Alt + O + C D) All of above
7. You can jump to the next column by A) Clicking with your mouse on the next column B) Press Alt
+ Down-arrow C) Both of above D) None of Above
8. How can you break the current column and start a new column immediately? A) Press Ctrl + Shift
+ Enter B) Press Alt + Enter C) Press Ctrl + Enter D) Press Alt + Shift + Enter
9. What is the smallest width of a column? A) 0" B) 0.5" C) 1" D) 1.5"
10. If the number of columns is selected 1 and the line between check box is marked, where is the line
drawn? A) in the left margin B) in the right margin C) both in left and right margin D) None of
Above
11. The other Col# are inactive when youve select 3 columns. How will you activate those boxes? A)
double click on spacing box B) double click on inactive Col# C) Remove mark from Line between
checkbox D) Remove mark from Equal Column Width check box
12. How much space in minimum must be provided between columns? A) 0" B) 0.5" C) 1" D) 1.5"
13. To open Columns dialog box quickly A) double click on the left margin area of ruler B) double
click the space between area on ruler C) double click the right margin in ruler D) All of above
14. Which of the following command is not available in Tools menu? A) Auto text B) Autocorrect C)
Auto summarize D) Macro
15. To move the cursor page to page of document A) Ctrl+PgDn B) Ctrl+PgUp C) Both of above D)
None of above
16. Text boundary can be displayed or hidden from A) Auto text option from Insert menu B) Options
from Tools menu C) Customize from Tools menu D) All of above
17. Which of the following are word processing software? A) WordPerfect B) Easy Word C) MS
Word D) All of above

18. MS Office provides help in many ways, which of these is one of them? A) What is this? B) Office
Assistant C) Help menu D) All of the above
19. You wished to justify text over the height of paper, which option will you choose A) Page Setup
from File menu B) Paragraph from Format menu C) From formatting toolbar D) Font from Format
menu
20. Which of the following is not of the merge process? A) Sort the data source records B) Format a
main document C) Edit a data source D) Merge the two files to print or create a new document
21. There can be many ways to insert page number in a document. Which of the following lets you
insert page number A) Page number from Insert menu B) Page Setup from file menu C) Footnote from
Insert menu D) Both a & c

22. Which is not a data source component? A) mail merge toolbar B) header row C) data fields D)
data records
23. Which of the following is not the part of standard office suite? A) Word Processor B) Database C)
Image Editor D) File manager
24. Where can you find the Draw Table tool button? A) Standard toolbar B) Formatting toolbar C)
Drawing toolbar D) Tables and Formatting toolbar
25. Which of the following option in File pull down menu is used to close a MS Word document? A)
Quit B) Close C) Exit D) New
26. You need to jump to the next column breaking current column right at the cursor position. How
can you break column? A) Pressing Ctrl+Enter B) Pressing Alt+Shift+Enter C) Break command from
Insert menu D) Both b and c
27. Superscript, subscript, outline, emboss, engrave are known as A) font styles B) font effects C) word
art D) text effects

28. Shimmer, Sparkle text, Blinking Background etc. are known as A) font styles B) font effects C) word
art D) text effects

29. The feature of Word that automatically adjusts the amount of space between certain combination
of characters so that an entire word looks more evenly spaced. What is that feature called? A)
Spacing B) Scaling C) Kerning D) Positioning
30. Which of the following is not available in Font Spacing? A) Normal B) Loosely C) Condensed D)
Expanded
31. Which of the following position is not available for fonts on MS Word? A) Normal B) Raised C)
Lowered D) Centered

32. What is the maximum scale percentage available in Scale drop down box? A) 500 B) 200 C)
100 D) 90
33. Bold, Italic, Regular are known as A) font styles B) font effects C) word art D) text effects
34. Uppercase on Change Case dialog box and All Caps on Fonts dialog box both converts selected
text into Capital Letters. Whats the difference between the two? A) Both are same. They are only

two different ways of capitalize text. B) It is faster to convert from Change Case than from Font
dialog box C) Change Case makes conversion permanent but All Caps on Font can always be
reverted D) All Caps on Font dialog box makes the change permanent where Change Case can be
always reverted
35. If you need to hide some paragraphs, how can you do it? A) From Paragraph dialog box B) From
Font dialog box C) From Options Dialog box D) None of above
36. Which of the following is the latest version of MS Word? A) Word 2000 B) Word 2007 C) Word
2010 D) Word 2011

37. Changing the appearance of a document is called A) Proofing B) Editing C) Formatting D) All of
above
38. In a document what is the maximum number of columns that can be inserted in MS Word Table? A)
35 B) 15 C) 63 D) 65

39. You can detect spelling and grammar errors by A) Press Shift + F7 B) Press Ctrl + F7 C) Press Alt+
F7 D) Press F7

40. A screen element of MS Word that is usually located below the title bar that provides categorized
options is A) Menu mar B) Tool Bar C) Status Bar D) All of the above
Answers:- 1-B, 2-B, 3-C, 4-D, 5-D, 6-D, 7-C, 8-A, 9-B, 10-D, 11-D, 12-A, 13-B, 14-A, 15-C, 16-B, 17-D,
18-D, 19-A, 20-A, 21-A, 22-A, 23-D, 24-D, 25-B, 26-C, 27-B, 28-D, 29-C, 30-B, 31-D, 32-B, 33-A, 34C, 35-B, 36-C, 37-C, 38-C, 39-D, 40-A
Posted by kaivalya at 6/18/2013 01:30:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post

Computer Awareness (Microsoft Word) Practice Set 02


1. What happens when you click on Insert >> Picture >> Clip Art A) It inserts a clipart picture into
document B) It lets you choose clipart to insert into document C) It opens Clip Art taskbar D) None
of above
2. Which option is not available in Insert Table Autofit behavior? A) Fixed Column Width B) AutoFit
to Contents C) Autofit to Window D) Autofit to Column
3. To autofit the width of column A) Double click the right border of column B) Double click the left
border of column C) Double click the column header D) All of above
4. From which menu you can insert Header and Footer? A) Insert Menu B) View Menu C) Format
menu D) Tools Menu
5. After typing header text, how can you quickly enter footer text? A) Press PageDown key and type
the text for footer
B) Click on Switch between Heder & Footer then type the text C) Both of above D) None of above

6. When inserting Page number in footer it appeared 1 but you wish to show a. How can you do
that? A) From format menu choose bullets and Numbering and configure necessary setting B) From
Insert menu choose Page Number and specify necessary setting C) Click on Page Number Format
tool and specify required setting D) All of above
7. Which of the following statement is false? A) You can set different header footer for even and odd
pages B) You can set different page number formats for different sections C) You can set different
header footer for first page of a section D) You can set different header and footer for last page of a
section
8. Where can you change the vertical alignment? A) Formatting toolbar B) Paragraph dialog box C)
Page Setup dialog box D) Standard toolbar
9. To get to the Symbol dialog box, click on the ______ menu and choose Symbol. A) Insert B)
Format C) Tools D) Table
10. Which of the following symbol sets would be most likely to contain a mathematical symbol such
as a degree sign, greater than or equal to, or a Greek letter? A) Wingdings B) Wingdings 3 C)
Webdings D) Symbol
11. When assigning a shortcut key to a symbol, you should always try to select a key or key
combination that is: A) unassigned B) Located on the ten-key pad section of your keyboard. C)
Assigned to another task. D) From the same font family as the symbol.
12. Suppose you wanted to create an AutoCorrect entry that would type the words We regret to
inform you that your submission has been declined Of the following choices, which would be the
best name you could assign to this entry? A) Regret B) Subdual C) We regret to inform you that your
submission has been declined D) 11
13. If you want to convert a symbol or several lines of text into an AutoCorrect entry, you should:
A) Insert the symbol or type the text in a Word document first. Then, select the text or symbol and
go to the AutoCorrect dialog box.
B) Click the Tools menu and choose AutoCorrect Options. Then, click the Insert menu and choose
Symbol (or click the Format menu and choose Paragraph) to add the symbol or paragraph to
AutoCorrect.
C) AutoCorrect can only accommodate one line of text. It is not possible to convert a symbol or
multiple lines of text into an AutoCorrect entry.
D) Insert the symbol or type the text in a Word document first. Then, select the text or symbol and
click the Edit menu followed by Paste Special. Select New AutoCorrect Entry and then click OK.
14. AutoCorrect was originally designed to replace ______ words as you type. A) Short, repetitive B)
Grammatically incorrect C) Misspelled D) None of the above
15. Which of the following is the second step in creating a macro? A) Start recording B) Using your
mouse or keyboard, perform the task you want to automate C) Assign a keyboard shortcut to the
macro D) Give the macro a name

16. If you will be displaying or printing your document on another computer, youll want to make
sure and select the ____ option under the Save tab. A) Embed Fonts B) Embed True Type Fonts C)
Save True Type Fonts D) Save Fonts
17. In Word, the mailing list is known as the _____. A) Data sheet B) Source C) Data source D)
Sheet
18. Which of the following is not one of the three Mail Merge Helper steps? A) Merge the two
files B) Create the main document C) Set the mailing list parameters D) Create the data source
19. Which of the following button will allow you to add, delete, or change records in your Data
Source? A) Data Source button B) Edit button C) Edit Data Source button D) Data editing button
20. It is possible to _____ a data source before performing a merge. A) Create B) Modify C) Sort D)
all of the above
21. What is the default font size of a new Word document based on Normal template? A) 10 pt B) 12
pt C) 14 pt D) None of above
22. What is the default font used in MS Word document? A) Times New Roman B) Arial C)
Algerian D) Preeti
23. Which tab in Font dialog box contains options to apply font effects? A) Font tab B) Character
Spacing C) Text Effects D) Standard Toolbar
24. If you need to double underline a word, how will you do that? A) Go to Format menu and then
Font option. Open Underline Style and choose Double Underline B) From Format menu choose Font
option and then from Font tab open Underline Style and select Double Underline C) Select the text
then choose Format >> Font and on Font tab open Underline Style and choose Double Underline D)
Click double underline tool on formatting toolbar
25. DropCap means A) All Caps B) Small Caps C) Title case D) None of above
26. What is the short cut key to open Font dialog box? A) Ctrl + F B) Alt + Ctrl + F C) Ctrl + D D) Ctrl
+ Shift + D
27. How can you access the font size tool on formatting toolbar? A) Ctrl + S B) Ctrl + Shift + S C) Ctrl
+ P D) Ctrl + Shift + P
28. How can you make the selected character superscripted? A) Ctrl + = B) Ctrl + Shift + = C) Alt +
Ctrl + Shift + = D) None of above
29. What does Ctrl + = key effect? A) Superscript B) Subscript C) All Caps D) Shadow
30. What happens if you mark on Hidden check box of Font dialog box after you select some text? A)
The text is deleted from document and you need to bring from Recycle Bin if required again. B) The
text is hidden and you need to bring it by removing the check box if needed again C) The text is
deleted and cannot be returned back D) The text is hidden and cannot be returned back
31. How can you increase the font size of selected text by one point every time? A) By pressing Ctrl +
] B) By pressing Ctrl + [ C) By pressing Ctrl + } D) By pressing Ctrl + {
32. Which of the following line spacing is invalid? A) Single B) Double C) Triple D) Multiple

33. How can you apply exactly the same formatting you did to another text? A) Copy the text and
paste in new location. Then type the new text again. B) Copy the text and click on Paste Special tool
on new place C) Select the text then click on Format Painter and select the new text D) All of above
34. What should you do if you require pasting the same format in many places? A) Click the Format
painter and go on pasting in many places holding Alt Key B) Double click the format painter then go
on pasting in many places C) Click the format painter then go on pasting to many places holding Ctrl
Key D) All of above
35. On which toolbar can you find Format Painter tool? A) Standard toolbar B) Formatting toolbar C)
Drawing Toolbar D) Picture Toolbar
36. Which indent marker controls all the lines except first line? A) First Line Indent Marker B) Left
Indent Marker C) Hanging Indent Marker D) Right Indent Marker
37. How can you remove tab stop markers from ruler? A) Double click the tab marker and choose
Clear All B) Drag the tab stop marker out of the ruler C) Right click the tab stop marker and choose
remove D) All of above
38. Which operation you will perform if you need to move a block of text? A) Copy and Paste B) Cut
and Paste C) Paste and Delete D) Paste and Cut
39. What is the extension of Word files? A) FIL B) DOT C) DOC D) TXT
40. Which of the following option is not available in Insert >> Picture? A) Chart B) Word Art C) Clip
Art D) Graph

Answers:- 1-C, 2-D, 3-A, 4-B, 5-B, 6-C, 7-D, 8-C, 9-A, 10-D, 11-A, 12-B, 13-A, 14-C, 15-C, 16-B, 17-C,
18-C, 19-C, 20-D, 21-B, 22-A, 23-A, 24-C, 25-D, 26-C, 27-D, 28-B, 29-B, 30-B, 31-A, 32-C, 33-C, 34B, 35-A, 36-B, 37-B, 38-B, 39-C, 40-D
Posted by kaivalya at 6/18/2013 12:00:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Monday, June 17, 2013

Computer Awareness (Microsoft Word) Practice Set 01


1. Which of the following is not valid version of MS Office? A) Office XP B) Office Vista C) Office
2007 D) None of above
2. You cannot close MS Word application by A) Choosing File menu then Exit submenu B) Press
Alt+F4 C) Click X button on title bar D) From File menu choose Close submenu
3. The key F12 opens a A) Save As dialog box B) Open dialog box C) Save dialog box D) Close dialog
box

4. What is the short cut key to open the Open dialog box? A) F12 B) Shift F12 C) Alt + F12 D) Ctrl +
F12
5. A feature of MS Word that saves the document automatically after certain interval is available on
A) Save tab on Options dialog box B) Save As dialog box C) Both of above D) None of above
6. Where can you find the horizontal split bar on MS Word screen? A) On the left of horizontal scroll
bar B) On the right of horizontal scroll bar C) On the top of vertical scroll bar D) On the bottom of
vertical scroll bar
7. Which of the following is not available on the Ruler of MS Word screen? A) Tab stop box B) Left
Indent C) Right Indent D) Center Indent E) All of them are available on ruler
8. What is place to the left of horizontal scroll bar? A) Tab stop buttons B) View buttons C) Split
buttons D) Indicators E) None of above
9. Which file starts MS Word? A) Winword.exe B) Word.exe C) Msword.exe D) Word2003.exe
10. How many ways you can save a document? A) 3 B) 4 C) 5 D) 6
11. If you want to keep track of different editions of a document which features will you use? A)
Editions B) Versions C) Track Change D) All of above
12. Background color or effects applied on a document is not visible in A) Web layout view B) Print
Layout view C) Reading View D) Print Preview
13. What is a portion of a document in which you set certain page formatting options? A) Page B)
Document C) Section D) Page Setup
14. Borders can be applied to A) Cells B) Paragraph C) Text D) All of above
15. Which of the following is not a type of page margin? A) Left B) Right C) Center D) Top
16. What is the default left margin in Word 2003 document? A) 1" B) 1.25" C) 1.5" D) 2"
17. What is gutter margin? A) Margin that is added to the left margin when printing B) Margin that is
added to right margin when printing C) Margin that is added to the binding side of page when
printing D) Margin that is added to the outside of the page when printing
18. Portrait and Landscape are A) Page Orientation B) Paper Size C) Page Layout D) All of above
19. If you need to change the typeface of a document, which menu will you choose? A) Edit B)
View C) Format D) Tools
20. Which of the following is not a font style? A) Bold B) Italics C) Regular D) Superscript
21. Pressing F8 key for three times selects A) A word B) A sentence C) A paragraph D) Entire
document
22. What happens if you press Ctrl + Shift + F8? A) It activates extended selection B) It activates the
rectangular selection C) It selects the paragraph on which the insertion line is. D) None of above
23. How can you disable extended selection mode? A) Press F8 again to disable B) Press Del to
disable C) Press Esc to disable D) Press Enter to disable

24. What does EXT indicator on status bar of MS Word indicate? A) It indicates whether the external
text is pasted on document or not B) It indicates whether extended add-ons are installed on MS
Word or not C) It indicates whether Extended Selection mode is turned on or off D) None of above
25. What is the maximum number of lines you can set for a drop cap? A) 3 B) 10 C) 15 D) 20
26. What is the default number of lines to drop for drop cap? A) 3 B) 10 C) 15 D) 20
27. What is the shortcut key you can press to create a copyright symbol? A) Alt+Ctrl+C B) Alt + C C)
Ctrl + C D) Ctrl + Shift + C
28. How many columns can you insert in a word document in maximum? A) 35 B) 45 C) 55 D) 65
29. What is the smallest and largest font size available in Font Size tool on formatting toolbar? A) 8
and 72 B) 8 and 64 C) 12 and 72 D) None of above
30. What is the maximum font size you can apply for any character? A) 163 B) 1638 C) 16038 D)
None of above
31. Which of the following is graphics solution for Word Processors? A) Clipart B) WordArt C) Drop
Cap D) All of above
32. The keystrokes Ctrl + I is used to A) Increase font size B) Inserts a line break C) Indicate the text
should be bold
D) Applies italic format to selected text
33. A character that is raised and smaller above the baseline is known as A) Outlined B) Raised C)
Superscript D) Subscript
34. What is the purpose of inserting header and footer in document? A) To enhance the overall
appearance of the document B) To mark the starting and ending of page C) To make large document
more readable D) To allow page headers and footers appear on document when printed
35. Which of the following function key activates the speller? A) F5 B) F7 C) F9 D) Shift + F7
36. The minimum number of rows and columns in MS Word document is A) 1 and 1 B) 2 and 1 C) 2
and 2 D) None of above
37. Thesaurus tool in MS Word is used for A) Spelling suggestions B) Grammar options C) Synonyms
and Antonyms words D) All of above
38. Why Drop Caps are used in document? A) To drop all the capital letters B) To automatically
begin each paragraph with capital letter C) To begin a paragraph with a large dropped initial capital
letter D) None of above
39. A bookmark is an item or location in document that you identify as a name for future reference.
Which of the following task is accomplished by using bookmarks? A) To add anchors in web page B)
To mark the ending of a paragraph of document C) To quickly jump to specific location in
document D) To add hyperlinks in webpage
40. A word processor would most likely be used to do A) Keep an account of money spent B) Do a
computer search in media center C) Maintain an inventory D) Type a biography

Answers:- 1-B, 2-D, 3-A, 4-D, 5-A, 6-C, 7-D, 8-B, 9-A, 10-A, 11-B, 12-D, 13-C, 14-D, 15-C, 16-B, 17C, 18-A, 19-C, 20-D, 21-B, 22-B, 23-C, 24-C, 25-B, 26-A, 27-A, 28-B, 29-A, 30-B, 31-A, 32-D, 33-C,
34-D, 35-B, 36-A, 37-C, 38-C, 39-C, 40-D
Posted by kaivalya at 6/17/2013 11:19:00 pm No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Tuesday, May 28, 2013

Computer awareness Questions for IBPS PO/CLERK CWE


III SET:-02
1. A _____ describes a category of information in a table of database:- Field
2. A goal of data mining includes: - To analyze data for expected relationships
3. The correct hierarchical order (smallest to largest) for the database terms is :Field<Record<File<Database
4. In window XP which shortcut is used to cycle through opened items in taskbar:- Alt+Esc
5. A digital computer computes the value of the expression 2 * 5 2 > 2 inside:- CPU chip
6. Software providers who develop many productivity tools may also provides strippeddown versions that
combine the simpler features of these tools bundled together in to: - an integrated software
application
7. to produce a high quality graphics Hard copy in colour we would want to use a :- Plotter
8. The extension of Batch file is: - .bat
9. The file that is executed at the time of Booting is: - Autoexec.bat
10. Bit refers to a: - Binary digits ( 0 or 1 value)
11. In computer language each letter number and an array of special characters consists of :8 bits
12. A small biomedical device available in the market that can be implanted underneath the
skin for
identification purposes is called: - verichip
13. Microprocessor was introduced in which generation of computer: - 4th Generations
14. The time taken by the CPU to retrieve and interpret the instruction to be executed is
called as: - instruction
cycle
15. Internal memory in a CPU is nothing but: - A set of registers
16. Information retrieval is faster from: - Hard disk
17. OS (operating system) is: - a collection of software routines
18. If you wish to extend the length of the network without having the signal degrade you
would use a: Repeater
19. A repair for a known software bug usually available at no charge on the internet is called:
- Patch
20. When data changes in multiple lists and all lists are not updated this causes :- data
inconsistency
21. One advantage of dial up Internet access is that :- it utilizes existing telephone service
22. What is the process of coping software programs from secondary storage media to the
hard disk caked :Installation

23. Which process checks to ensure the components of the computer are operating and
connected properly :booting
24. Most mail programs automatically complete the ______ two parts of an e-mail:- from
and Date
25. The computers capability of distinguishing spoken words is called: - Voice recognition
26. ERP stands for: - enterprise resource planning
27. The issues that deal with the collection and use of data about individuals is: - Privacy
28. a term related to sending data to a satellite is :- uplink
29. Online Doc. Containing underlined phrases or icons that a user can click I order to move
immediately to
related parts of the current Doc. Or to other Doc. With relative information are called: hypertext
30. Physical security is concerned with protecting computer hardware form human
tampering and natural
disasters and _____ security is concerned with protecting software from unauthorized
tampering or damage :-Cyber
31. Collecting personal information and effectively posing an another individual is known as
:- Spoofing
32. What is usually used for displaying information at public places: - Monitors and
overhead projections
33. What is the most popular hardware for multimedia creation: - PCs
34. The life span of a CD-ROM is: - approx. 5 year
35. Magnetic tape is not practical for applications where data must be quickly recalled
because tape is: - a
sequential access medium
36. How is it possible that both programs and data can be stored in the same floppy disk: Programs and data
are both software and both cab be stored in any memory device
37. What is embedded system: - A computer and software system that controls a machine or
application
38. The signal which shows that a computed is waiting for a command from user is: interrupt
39. which software allows the user to move from page to page on the web by clicking on or
selecting a hyperlink
or by typing in the address of the destination page :- Web Browser
40. Which controls the manner of interaction between the user and the OS: - user interface
41. A _____ is a computer over internets which read IP address on a packet and relay it
towards its
destination:- Router
42. A floppy can be write protected by: - Positioning the slider away from the hole
43. Rotational delay time is also known as Latency
44. The average drives have an access time of: - 9-14ms
45. Father of C programming language was: - Dennis Ritchie
46. How is power supplied to a low power USB device: - through a USB cable
47. The _____ data mining technique derives rules from real world case examples: - Neural
nets
48. ______ is used to identify a user who returns to a website: - cookies
49. Which objects is passed to a java Bean when one of its properties is set via a JSP action:-

Servlet Response
50. Microwave transmission is used in environments where installing physical transmission
media is :- Easy or
promising and where line of sight transmission is available
Posted by kaivalya at 5/28/2013 06:01:00 pm No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post

Computer awareness Questions for IBPS PO/CLERK CWE


III SET:-01
1. A compiler is used to translate a program written in:-A high level language
2. In programming we use ___ keys:- Arrow keys
3. One nibble is = 4 bits
4. The resolution of a monitor is measured in: - DPI (Dot per Inch)
5. Which software allows users to perform calculations on rows and columns of Data: database management
systems
6. A _____ represents approx. one billion memory locations: - GB
7. Which cells involves creating a single cell by combining two or more selected cells: Merging
8. A data warehouse: - is organized around important subject areas
9. ____ servers store & manage files for network users: - FILE
10. An output device that uses words or massages recorded on a magnetic medium to
produce audio response
is :- Magnetic tape
11. What will happen when data is entered into a memory location:- it will erase the previous
content
12. A storage area used to store data to compensate for the difference in speed at which the
different units can
handle data is :- Buffer
13. Ctrl, Shift, alt are called _____ Keys:- Modifier
14. What is the permanent memory built into your computer: - ROM
15. The memory which is utmost accessible to the processor is :- cache Memory
16. To move to the beginning of a line or text press ____ key:- HOME
17. For creating a Document we use which command at file menu:- New
18. Which memory has the shortest access time :- cache memory
19. A 32 bit microprocessor has the word length equal to :- 4 byte
20. ________ tags when placed on an animal can be used to record and track in a database
all of the animals
movement:- RFID
21. A set of information that defines the status of resources allocated to a process is:Process description
22. Any method for controlling access to or use of memory is known as: - Memory
Protection
23. Software applies ______ also called as algorithms to process data: - Arithmetic
24. A file extension is separated from the main file name with a/an _____ but no space: ???
25. An ad hoc query is a: - pre scheduled question
26. An interrupt handler is a: - special numeric code that indicates the priority of a request

27. A spooler is: - a program that coordinates the print jobs that are waiting to be printed
28. Virtual memory is typically located: - on the hard drive
29. The purpose of a swap (or Page) file is to: - hold a programs data or instructions in
virtual memory when it
cannot be fitted in RAM
30. The definition of thrashing is: - Swapping data between virtual memory and RAM too
frequently
31. Which protocol is used by an operating system to generate error message like HOST
UNREACHABLE
over a TCP/IP network: - ICMP
32. SNMP stands for: - Simple Network Management Protocol
33. ______ are Linux boot loader: - LILO, GRUB
34. ___________ terminals (formerly known as cash registers) are often connected to
computer inventory
and sales computer system: - POS (Point of sale)
35. A ________ is a small program that helps to automate a frequently used series of
commands in most
productivity software tools: - macro
36. Multithread means: - One program doing more than one thing at a time
37. The 4 main functions of a computer are: - Input, Processing, Output, & Storage
38. What menu is selected to change the font and style: - format
39. The field that investigates the mechanics of human intelligence is: - Cognitive science
40. A C data structure called a structure is a group of a items in which each item is
indentified by its own
identifier each of which is known as a member of a structure. The member is also known as
:- field
41. SONET is used: - ????
42. The OSI model is divided into _______ processes called layers : - 7
43. System software is the set of programs that enables your computers hardware devices
and ______
software to work together: - application
44. The altering of data so that it is not usable unless the changes are undone is known as :Encryption
45. A voice mail: - functions much like an answering machine allowing callers to leave a
voice message for the
called party
46. A communication processor that connects dissimilar networks by providing translation
from one set of
protocol to another is known as: - Gateway
47. In MS-Excel 2003 the default workbook sheet contains maximum ______ rows: 65536
48. In MS-word a menu item in dim colour (gray) indicates that the menu is: - unavailable
for current context
49. Hot key is a: - Keyboard shortcut
50. A group of attribute/field in a database is known as a _____ :- Record
Posted by kaivalya at 5/28/2013 05:57:00 pm No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Tuesday, September 25, 2012

50 Common Computer Science Questions for Bank Clerk


Exam
1. A process known as ____________ is used by large retailers to study
trends. Ans:- data mining
2. All of the following are examples of real security and privacy risks EXCEPT:
Ans:- spam.
3. ____________terminals (formerly known as cash registers) are often
connected to complex inventory and sales computer systems. Ans:- Point-ofsale (POS)
4. A(n) ____________ system is a small, wireless handheld computer that
scans an items tag and pulls up the current price (and any special offers) as
you shop. Ans:- PSS
5. The ability to recover and read deleted or damaged files from a criminals
computer is an example of a law enforcement specialty called: Ans:- computer
forensics.
6. Which of the following is NOT one of the four major data processing
functions of a computer? Ans:- analyzing the data or information
7. ____________ tags, when placed on an animal, can be used to record and
track in a database all of the animals movements. Ans:- RFID
8. Surgeons can perform delicate operations by manipulating devices through
computers instead of manually. This technology is known as: Ans:- robotics.
9. Technology no longer protected by copyright, available to everyone, is
considered to be: Ans:- proprietary.
10. ________is the study of molecules and structures whose size ranges from
1 to 100 nanometers. Ans:- Nanoscience
11. ____________ is the science that attempts to produce machines that
display the same type of intelligence that humans do. Ans:- Artificial
intelligence (AI)
12. ____________ is data that has been organized or presented in a
meaningful fashion. Ans:- Information
13. The name for the way that computers manipulate data into information is
called: Ans:- processing.
14. Computers gather data, which means that they allow users to
____________ data. Ans:- input

15. After a picture has been taken with a digital camera and processed
appropriately, the actual print of the picture is considered: Ans:- output.
16. Computers use the ____________ language to process data. Ans:- binary
17. Computers process data into information by working exclusively with: Ans:numbers.
18. In the binary language each letter of the alphabet, each number and each
special character is made up of a unique combination of: Ans:- eight bits.
19. The term bit is short for: Ans:- binary digit.
20. A string of eight 0s and 1s is called a: Ans:- byte.
21. A ____________ is approximately one billion bytes. Ans:- gigabyte
22. A ____________ is approximately a million bytes. Ans:- megabyte
23. ____________ is any part of the computer that you can physically touch.
Ans:- Hardware
24. The components that process data are located in the: Ans:- system unit.
26. Which of the following is an example of an input device? Ans:- scanner
27. All of the following are examples of storage devices EXCEPT: Ans:printers.
28. The ________, also called the brains

of the computer, is

responsible for processing data. Ans:- (CPU)


29. The CPU and memory are located on the: Ans:- motherboard.
30. Word processing, spreadsheet, and photo-editing are examples of:
application software.
31. ____________ is a set of computer programs used on a computer to help
perform tasks. Software
32. System software is the set of programs that enables your computers
hardware devices and ____________ software to work together.application
33. The PC (personal computer) and the Apple Macintosh are examples of two
different: platforms.
34. Apple Macintoshes (Macs) and PCs use different ______ to process data
and different operating systems. CPUs
35. Servers are computers that provide resources to other computers
connected to a: network.
36. Smaller and less expensive PC-based servers are replacing ____________
in many businesses. Ans:- mainframes
37. _______ are specially designed computers that perform complex
calculations extremely rapidly. Ans:- Supercomputers
38. DSL is an example of a(n) ____________ connection. Ans:- broadband

39. The difference between people with access to computers and the Internet
and those without this access is known as the: Ans:- digital divide.
40. ____________ is the science revolving around the use of nanostructures
to build devices on an extremely small scale. Ans:- Nanotechnology
42. ____________ bits equal one byte.. Ans:- Eight
43. The binary language consists of ____________ digit(s). Ans:- 2
44. A byte can hold one ____________ of data. Ans:- character
45. ____________ controls the way in which the computer system functions
and provides a means by which users can interact with the computer.. Ans:The operating system
46. The operating system is the most common type of ____________
software.. Ans:- system
47. ____________ are specially designed computer chips that reside inside
other devices, such as your car or your electronic thermostat. Ans:- Embedded
computers
48. The steps and tasks needed to process data, such as responses to questions
or clicking an icon, are called: Ans:- instructions.
49. The two broad categories of software are: Ans:- system and application.
50. The metal or plastic case that holds all the physical parts of the computer is
the: Ans:- system unit.

Computer Awareness questions for SBI & IBPS PO CWE


2012
Fill in the Blank:
1. Between PCs and Macs, the __ is the platform of choice for graphic design and
animation.
Ans.: Mac
2. The _________ is the program that manages the hardware of the computer system,
including the CPU, memory, storage devices, and input/output devices. Ans.: operating
system
3. The type of operating system software you use depends on your computers _____.
Ans.: platform
4. ___software helps you carry out tasks, such as typing a document or creating a
spreadsheet.

Ans.: Application
5. ____________are the fastest and most expensive computers. Ans.:
Supercomputers
6. A ____________ is approximately 1,000 bytes. Ans.: kilobyte
7. Input devices are used to provide the steps and tasks the computer needs to process
data, and these steps and tasks are called ____________. Ans.: instructions
8. A computer gathers data, processes it, outputs the data or information, and
________ the data or information. Ans.: stores
9. The binary language consists of two digits: _________ and ________. Ans.: 0 and
1
10. A string of ________ 0s and 1s is called a byte. Ans.: eight (8)
11. The devices you use to enter data into a computer system are known as ____
devices.
Ans.: input
12. The devices on a computer system that let you see the processed information are
known as ___________ devices. Ans.: output
13. ______ is the set of computer instructions or programs that enables the hardware
to perform different tasks. Ans.: Software
14. When you connect to the ______, your computer is communicating with a server at
your Internet service provider (ISP). Ans.: Internet
15. ____ are computers that excel at executing many different computer programs at
the same time.
Ans.: Mainframes
16. ________is the application of computer systems and techniques to gather legal
evidence.
Ans.: Computer forensics
17. ____ is the science that attempts to create machines that will emulate the human
thought process.
Ans.: Artificial intelligence (AI)
18. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs
generally run ________ as an operating system. Ans.: Microsoft Windows
19. A process known as ____ tracks trends and allows retailers to respond to consumer
buying patterns. Ans.: data mining

20. Hard disk drives and CD drives are examples of ______ devices. Ans.: storage
21. You would use _____ software to create spreadsheets, type documents, and edit
photos.
Ans.: application
22. ______ are computers that support hundreds or thousands of users
simultaneously.
Ans.: Mainframes
23. _____ is the term given to the act of stealing someones identity and ruining their
credit rating.
Ans.: Identity theft
24. Surgeons are using ______ to guide robots to perform delicate surgery. Ans.:
computers
25. Patient ______ are life-sized mannequins that have a pulse and a heartbeat and
respond to procedures just like humans. Ans.: simulators
Posted by kaivalya at 4/17/2012 01:13:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Tuesday, March 27, 2012

Computer Awareness questions for SBI Clerk & IBPS PO


2012 CWE
1. A CD ROM disk (a) cannot be erased and rewritten (b) has more storage capacity than a CD-R (c) holds
less data than a floppy disk (d) can be written to oniy once (e) None of the above
2. Storage device found inside the computer. (a) CD-ROM(b) Zip Disk(c) Super Disk (d) Hard Disk
(e) None of the above
3. Which of these keys is not on the number keypad? (a) Ctrl(b) Del(c) Enter (d) NumLock(e) None of the
above
4. The computer monitor is which type of device? (a) Input(b) Output(c) Processing (d) Software
(e) None of the above
5. RAM is (a) volatile, temporary(b) nonvolatile, permanent (c) nonvolatile, temporary(d) volatile,
permanent
(e) None of the above
6. What menu is selected to cut, copy, and paste? (a) File(b) Edit(c) Too Is (d) Table(e) None of the above

7. A device that provides emergency power to your computer, conditions the voltage, and protects against
power surges is called a _ (a) PSU = Power Supply Unit (b) USP = Universal Surge Protector (c) UPPS =
Universal Power Protection and Supply (d) UPS = Uninterruptible Power Supply (e) None of the above
8. Secondary storage (a) does not require constant power (b) does not use magnetic media (c) consists of
four main types of devices (d) does not store information for later retrieval (e) None of the above
9. Deleted data remains on a disk until (a) the data is overwritten (b) the recycle bin is emptied (c) a file
compression utility is used (d) the disk is scanned (e) None of the above
10. What is the term for how words will appear on a page? (a) text formatting (b) Character formatting (c)
Point size
(d) Typeface (e) None of these
11. The process of a computer receiving information from a server on the Internet is known as (a)
pulling(b) pushing
(c) downloading(d) transferring (e) None of these
12. When sending an e-rnail. the ........ line describes the contents of the message. (a) subject(b) to (c)
contents(d) cc
(e) None of these
13. The software that allows users to surf the Internet is called alan (a) Search engine (b) Internet Service
Provider (ISP) (c) Multimedia application (d) Browser (e) None of these
14. A CD-RW disk (a) has a faster access than an internal disk (b) is a form of optical disk, so it can only be
written once (c) holds less data than a floppy disk (d) can be erased and rewritten (e) None of these
15. The" first page of a Web site is called the (a) Home page(b) Index (c) Java Script(d) Bookmark (e)
None of these
16. A contains buttons and menus that provide quick access to commonly used commands. (a) menu
bar(b) toolbar(c) window (d) action bar(e) None of these
17. Ctrl, shift and alt are called __ keys. (a) adjustment(b) function(c) modifier (d) alphanumeric(e) None
of these
18. Memory unit is one part of __ . (a) Control unit(b) Central Processing Unit (c) Input device(d) Output
device (e) None of these
19. An example of a telecommunications device is a (a) keyboard(b) mouse(c) printer (d) modem(e) None
of these
20. Which device is used as the standard pointing device in a Graphical User Environment? (a)
Keyboard(b) Mouse
(c) Joystick (d) Trackball(e) None of these
21. Which of the following is not an.output device? (a) Plotter(b) Printer(c) Monitor (d) Touch Screen(e)
None of these
22. Every component of your computer is either (a) software or CPUIRAM (b) input devices or output
devices (c) application software or, system software (d) hardware or software(e) None of these

23. What is an E-mail attachment? (a) A receipt sent by the recipient (b) A separate document from
another program sent along with an E-mail message (c) A malicious parasite that feeds off your messages
and destroys the contents
(d) A list of CC or BCC recipients (e) None of these
24. What is correcting errors in a program called?' (a) Interpreting(b) Translating (c) Debugging(d)
Compiling (e) None of these
25. What is the main folder on a storage device called? (a) Platform(b) Interface (c) Root directory(D)
Device driver
(E) None of these
26. 'DOS' floppy disk does not have(a) A Boot Record(b) A File Allocation Table(c) A Root Directory(d)
Virtual Memory(e) BIOS
27. The word FIP stands for(a) File Translate Protocol(b) File Transit Protocol(c) File Typing
Protocol(d) File Transfer Protocol(e) None of these
28. How is power supplied to a low-power USB device?(a) Through a power cable(b) From an external
power supply
(c) Directly from the computer's power supply(d) Through the USB cable(e) None of these
29. .are used to identify a user who returns to a Website.(a) Cookies(b) Plug-ins(c) Scripts(d)
ASPs(e) None of these
30. A proxy server is used for the which of the following?(a) To provide security against unauthorized
users(b) To process client requests for web pages(c) To process client requests for database access(d) To
provide TCP/IP(e) None of these
31. In the portion lebelled http is the(a) host(b) domain name(c) protocol(d) top-level domain(e) None
of these
32.The number of pixels displayed on a screen is known as the screen(a) resolution(b) colour depth(c)
refresh rate
(d) viewing size(e) None of these
33. Word processing, spreadsheet, and photo-editing are example of(a) application software(b) system
software
(c) operating system software(d) platform software(e) None of these
34. Ais approximately a million bytes.(a) gigabyte(b) kilobyte(c) megabyte(d) terabyte(e) None of
these
35. A computer cannot 'boot' if it does not have the (a) Compiler(b) Loader(c) Operating System(d)
Assembler(e) None of these
36. To view information on the web you must have a (a) cable modem(b) web browser(c) Domain Name
Server (d) hypertext viewer(e) None of these
37. What type of computer could be found in a digital watch?(a) Mainframe computer(b) Super
computer(c) Embedded computer(d) Notebook computer(e) None of these
38. The arrow keys can be used to (a) delete text(b) move the cursor in the text that has already been
entered(c) save the document(d) move the cursor while deleting text(e) None of these

39. Office LANS, which are scattered geographically on large scale, can be connected by the use of
corporate(a) CAN
(b) LAN(c) DAN(d) WAN(e) TAN
40. Directory in directory is called(a) Mini directory(b) Junior directory(c) Part directory(d) Sub
directory(e) None of these

Answer:
1.(a)2.(d)3.(a)4.(b)5.(a)6.(b)7.(d)8.(a)9.(b)10.(a)11.(c)12.(a)13.(d)14.(d)15.(a)16.(b)17.(b)18.(b)1
9.(d)20.(b)21.(e)22.(d)23.(b)24.(c)25.(c)26.(d)27.(a)28.(d)29.(a)30.(a)31.(c)32.(a)33.(a)34.(c)3
5.(c)36.(b)37.(c)38.(b)39(d)40.(d)
Posted by kaivalya at 3/27/2012 09:58:00 pm No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Saturday, December 17, 2011

IBPS PO CWE 2011(18 sep.) Computer Knowledge


Question Paper wih answer
1. The default view in Excel is.view. (A) Work (B) Auto (C) Normal (D) Roman (E)
None of these
2. The.folder retains copies of messages that you have started but are not yet ready
to send. (A) Drafts (B) Outbox (C) Address Book (D) Sent Items (E) Inbox
3. .is the process of dividing the disk into tracks and sectors. (A) Tracking (B)
Formatting (C) Crashing (D) Allotting (E) None of these
4. The.enables you to simultaneously keep multiple Web pages open in one browser
window. (A) tab box (B) pop-up helper (C) tab row (D) address bar (E) Esc key
5. The contents of.are lost when the computer turns off. (A) storage (B) input (C)
output (D) memory (E) None of these
6. Video processors consist of.and., which store and process images. (A) CPU
and VGA (B) CPU and memory (C) VGA and memory (D) VGI and DVI (E) None of these
7. Mobile Commerce is best described as (A) The use of Kiosks in marketing (B)
Transporting products (C) Buying and selling goods/services through wireless handheld
devices (D) Using notebook PC's in marketing (E) None of the above
8. To change selected text to all capital letters, click the change case button, then click
(A) UPPERCASE (B) UPPER ALL (C) CAPS LOCK (D) Lock Upper (E) Large Size
9. What displays the contents of the active cell in Excel ? (A) Name box (B) Row Headings
(C) Formula bar (D) Task pane (E) None of these
10. Which of the following are advantages of CD-ROM as a storage media? (A) CD-ROM is
an inexpensive way to store large, amount of data and information (B) CD-ROM disks

retrieve data and information more quickly than magnetic disks do (C) CD-ROMs make less
errors than magnetic media (D) An of the above (E) None of these
11. In Excel.allows users to bring together copies of work-books that other users
have worked on independently. (A) Copying (B) Merging (C) Pasting (D) Compiling (E)
None of these
12. Reusable optical storage will typica1ly have the acronym (A) CO (B) DVD (C) ROM (D)
RW (E) ROS
13. Computer uses the.number system to store data and perform calculations. (A)
binary (B) octal (C) decimal (D) hexadecimal (E) None of these
14. Help Menu is available at which button ? (A) End (B) Staft (C) Turnoff (D) Restart (E)
Reboot
15. In Word you can force a page break (A) By positioning your cursor at the appropriate
place and pressing the F1 key (B) By positioning your cursor at the appropriate place and
pressing Ctrl+Enter (C) By using the Insert/Section Break (D) By changing the font size of
your document (E) None of these
16. When you save to this, your data will remain intact even when the computer is turned
off
(A) RAM (B) Motherboard (C) Secondary storage device (D) Primary storage device (E)
None of these
17. Codes consisting of lines of varying widths or lengths that are computer-readable are
known as (A) an ASCII code (B) a magnetic tape (C) an OCR scanner (D) a bar code (E)
None of these
18. Which ports connect special types of music instruments to sound cards ? (A) BUS (B)
CPU (C) USB (D) MIDI (E) MINI
19. A(n) .is a special visual and audio effect applied in Power-point to text or content.
(A) animation (B) flash (C) wipe (D) dissolve (E) None of these
20. Why is it unethical to share copyrighted files with your friends ? (A) It is not unethical,
because it is legal. (B) It is unethical because the files are being given for free. (C) Sharing
copyrighted files without permission breaks copyright laws. (D) It is not unethical because
the files are being given for free. (E) It is not unethical-anyone can access a computer
21. The process of transferring files from a computer on the Internet to your computer is
called(A) downloading (B) uploading (C) FTP (D) JPEC (E) downsizing
22. A DVD is an example of a(n) (A) hard disk (B) optical disc (C) output device (D) solidstate storage device (E) None of these
23. A disk's content that is recorded at the time of manufacture and that cannot be changed
or erased by the user is (A) Memory-only (B) Write-only (C) Once-only (D) Run-only (E)
Read-only

24. Grouping and processing all of a firm's transactions at one time is called (A) a
database management system (B) batch processing (C) a real-time system (D) an on-line
system (E) None of these
25. To access properties of an object, the mouse technique to use is (A) dragging (B)
dropping (C) right-clicking (D) shift-clicking (E) None of these
26. .are words that a programming language has set aside for its own use. (A)
Control words (B) Control structures (C) Reserved words (D) Reserved keys (E) None of
these
27. A central computer that holds collections of data and programs for many PCs,
workstations, and other computers is a(n) (A) supercomputer (B) minicomputer (C) laptop
(D) server (E) None of these
28. You can keep your personal files / folders in (A) My folder (B) My Documents (C) My
Files (D) My Text (E) None of these
29. What is the process of copying software programs from secondary storage media to the
hard disk called?(A) Configuration (B) Download (C) Storage (D) Upload (E) Installation
30. To instruct Word to fit the width of a column to the contents of a table automatically,
click the button and then point to AutoFit Contents. (A) Fit to Form (B) Format (C) Autosize
(D) Contents (E) AutoFit
31. The simultaneous processing of two or more programs by multiple processors is (A)
multiprogramming (B) multitasking (C) time-sharing (D) multiprocessing (E) None of these
32. Which of the following can be used to select the entire document ? (A) CTRL+A (B)
ALT+F5 (C) SHIFT+A (D) CTRL+K (E) CTRL+H
33. Which of, the following is a storage device that uses rigid, permanently installed
magnetic disks to store data/information (A) floppy diskette (B) hard disk (C) permanent
disk (D) optical disk (E) None of these
34. A person who used his or her expertise to gain access to other people's computers to
get information illegally or do damage is a (A) hacker (B) analyst (C) instant messenger
(D) programmer (E) spammer
35. A.is the term used when a search engine returns a Web page that matches the
search criteria.(A) blog (B) hit (C) link (D) view (E) success
36. .are 'attempts by individuals to obtain confidential information from you by
falsifying their identity.(A) Phishing (B) Computer viruses (C) Spyware scams (D) Viruses
(E) None of the above
37. Part number, part description, and number of parts ordered are examples of (A) control
(B) output (C) processing (D) feedback (E) input
38. A Web site's main page is called its (A) Home Page (B) Browser Page (C) Search
Page (D) Bookmark (E) None of these

39. If you want to connect to your own computer through the Internet from another location,
you can use(A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these
40. When the pointer is positioned on a.it is shaped like a hand. (A) grammar error
(B) Formatting error (C) Screen Tip (D) Spelling error (E) hyperlink
41. The most common type of storage devices are (A) persistent (B) optical (C) magnetic
(D) flash (E) steel
42. A device that connects to a network without the use of cables is said to be(A)
distributed (B) free (C) centralized (D) open source (E) None of these
43. The basic unit of a worksheet into which you enter data in Excel is called a(A) tab (B)
cell (C) box (D) range (E) None of these
44. You can.a search by providing more information the search engine can use to
select a smaller, more useful set of results. (A) refine (B) expand (C) load (D) query (E)
slowdown
45. The piece of hardware that converts your computer's digital signal to an analog signal
that can travel over telephone lines is called a (A) red wire (B) blue cord (C) tower (D)
modem (E) None of these
46. To reload a Web page, press the.button. (A) Redo (B) Reload (C) Restore (D)
Ctrl (E) Refresh
47. Personal computers can be connected together to form a (A) server (B) supercomputer
(C) network (D) enterprise (E) None of these
48. What is the permanent memory built into your computer called ? (A) RAM (B) Floppy (C)
CPU (D) CO-ROM (E) ROM
49. This first step in the transaction processing cycle captures business data through
various modes such as optical scanning or at an electronic commerce website (A)
Document and report generation (B) Database maintenance (C) Transaction processing
startup (D) Data Entry (E) None of these
50. The computer abbreviation KB usually means (A) Key Block (B) Kernel Boot (C) Key
Byte (D) Kit Bit (E) Kilo Byte
ANSWER:- 1 : (C) 2 : (B) 3 : (B) 4 : (C) 5 : (D) 6 : (C) 7 : (C) 8 : (A) 9 : (A) 10 : (D) 11 : (B) 12 :
(D) 13 : (A) 14 : (B) 15 : (B) 16 : (C) 17: (D) 18 : (C) 19 : (A) 20 : (C) 21 : (A) 22 : (B) 23 : (E) 24
: (B) 25 : (C) 26 : (C) 27 : (D) 28 : (B) 29 : (D) 30 : (E) 31 : (D) 32 : (A) 33 : (B) 34 : (A) 35 : (E)
36 : (A) 37 : (E) 38 : (A) 39 : (D) 40 : (E) 41 : (D) 42 : (B) 43 : (B) 44 : (A) 45 : (D) 46 : (E) 47 :
(C) 48 : (E) 49 : (D) 50 : (E)
Posted by kaivalya at 12/17/2011 07:57:00 am 2 comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Thursday, September 29, 2011

IBPS CLERKS EXAM PRACTICE MCQs SET:-3

1. Buffer is device/storage area 1. Where data are temporarily stored 2. Where data is
permanently stored 3. Where data error occurs 4. All of the above 5. None of these
2. A network geometric arrangement in which a single connecting line is shared by a
number of nodes is called
1. Car Topology 2. Bus Topology 3. Truck Topology 4. All of the above 5. None of
these

3. An error in a computer program is referred as1. Bug 2. Bit 3. Virus 4. All of the
above 5. None of these

4. Circuits that provide a communication path between two or more devices of a digital
computer system is
1. Car 2. Bus 3. Truck 4. All of the above 5. None of these

5. A fixed number of adjacent bits that represent a particular character or symbol are
referred as
1. Byte 2. Octal 3. Bubble 4. All of the above 5. None of these

6. Cache memory is a1. Small buffer storage 2. Permanent storage 3. Main memory
4. All of the above 5. None of these

7. The total number of digits (symbols) available to represent numbers in a positional


number system is referred as
1. Number system 2. Base 3. Power 4. All of the above 5. None of these

8. Cache memory is1. Smaller and faster than main storage 2. Bigger and slower than
main storage 3. Smaller but slower than main memory 4. Bigger and faster than main
memory 5. None of these

9. Cache memory
1. Is a Static RAM 2. Increases the speed of processing by making current programs
and data available to the CPU at a rapid rate 3. Both 1. and 2. are true . 4. Both 1. and
2. are false 5. None of these

10. Following is false for BASIC1. Beginners All-Purpose Symbolic Instruction Code 2.
High-level interactive programming language 3. Works in time sharing environment 4.
Low level object oriented language 5. None of these

11. A unit for measuring data transmission speed that describes the capacity of a carrier
is referred as
1. Baud 2. Bit 3. Bond 4. All of the above 5. Batch

12. A process of trying out a new product by independent users before it is finally
manufactured/developed
1. Alpha test 2. Beta Test 3. Gamma test 4. All of the above 5. None of these

13. A selection, choice, or condition involving two possibilities is referred as


1. Unary 2. Binary 3. Octal 4. All of the above 5. None of these

14. Base band System is1. A networking system 2. Where the channel support a
single digital signal 3. Both 1. and 2. are true 4. All of the above 5. None is true

15. One of the early coding systems, based on the idea of converting each digit of a
decimal number into its binary equivalent rather than converting the entire decimal value
into a pure binary form is1. ASCII code 2. BCD 3. ASCII-8 4. All of the above 5. None
of these

16. In Batch processing

1. Several computer programs runs one after another without human interaction to run
each program individually
2. Several computer programs runs one after another with human interaction to run
each program individually
3. Selected computer programs runs one after another with human interaction to run
each program individually
4. All of the above 5. None is true

17. BISYNC is1. Binary synchronous 2. A process of transmitting data 3. A half-duplex,


character oriented, synchronous data communication transmission method 4. All of the
above 5. None of these

18. A device that is used to transmit data from one location to another is referred as1.
Storage 2. Memory 3. Carrier 4. All of the above 5. None of these

19. Programs developed by an outside supplier and provided to the user in a machine
readable form is known as
1. Canned programs 2. Beta program 3. Alpha program 4. All of the above 5. None of
these

20. A binary numbers are represented by


1. Digits 0 and 1 2. Digits 0, 1, ... 8 3. Digits AB, C,... 4. All of the above 5. None of
these

21. BIOS is responsible for 1. Handling the particulars of input/output operations 2.


Output operations 3. Input operations
4. All of the above 5. None of these

22. BIOS is an abbreviation for1. Binary Input/Binary Output 2. Binary synchronous 3.


Binary digit 4. All of the above 5. None of these

23. BISYNC is an abbreviation for1. Binary Input/Binary Output 2. Binary synchronous


3. Binary digit 4. All of the above 5. None of these

24. The overall design, construction, organiz-ation and interconnecting of the various
components of a computer system is referred as1. Computer Architecture 2. Computer
Flowchart 3. Computer Algorithm 4. All of the above 5. None of these

25. A number system with a base of two is referred as1. Unary number system 2.
Binary number system 3. Octal number system 4. All of the above 5. None of these
Answers:
1. (1) 2. (2) 3. (1) 4. (2) 5. (1) 6. (1) 7. (2) 8. (1) 9. (3) 10. (4) 11. (1) 12. (2) 13. (2) 14.
(3) 15. (2) 16. (1) 17. (4) 18. (3) 19. (1) 20. (1) 21. (1) 22. (1) 23. (1) 24. (1) 25. (2)

IBPS CLERKS EXAM PRACTICE QUESTIONS


1. Which of the following statements is FALSE concerning file names?
(a) Files may share the same name or same extension but not both
(b) Every file in the same folder must have a unique name
(c) File extension is another name for file type
(d) The file extension comes before the dot (.) followed by the file name (e) None of
the above
ANSWER: (d)

2. Which of the following would most likely NOT be a symptom of a virus ?


(a) Existing program files and icons disappear (b) The CD-ROM stops functioning (c)
The Web browser opens to an unusual home page (d) Odd messages or images are
displayed on the screen (e) None of the above

ANSWER: (b)

3. Main memory is (a) Random Access Memory (b) Read only Memory (c) Serial
Access Memory (d) Storage Memory (e) None of the above
ANSWER: (a)

4. A compact disc (CD) is a data storage of the type (a) Magnetic (b) Optical (c)
Electrical (d) Electromechanical (e) None of these
ANSWER: (a)

5. What are the two basic types of memory that your computer uses ?
(a) RAM (b) RW/ RAM (C) ROM (d) ERAM (e) POST
ANSWER: (a)

6. A computer with CPU speed around 100 million Instructions per second with the
word length of Around 64 bits is known as (a) Super computer (b) Mini computer (c)
Micro computer (d) Macro computer (e) None of these
ANSWER: (a)

7. To locate a data items for storage is (a) Field (b) Feed (c) Database (d) Fetch (e)
None of these
ANSWER: (d)

8. A type of line printer that uses embossed steel band to form the letters printed on the
paper is (a) Golf ball printer (b) Dot-matrix printer (c) Laser printer (d) Band printer (e)
None of these
ANSWER: (d)

9. The chip, used in computers, is made of (a) Chromium (b) Iron oxide (c) Silica (d)
Silicon (e) None of these
ANSWER: (d)

10. The size of commonly used Floppy disk is (a) 4.5" (b) 3.5" (c) 3.25" (d) 5.5" (e)
None of these
ANSWER: (b)

11. Operating system of a computer (a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references (c) Provides a layer, user friendly
interface (d) Hardware of computer (e) None of the above
ANSWER: (c)

12. Wild card operators specifies (a) Can be used when writing into multiple files (b)
Allows several files to be read simultaneously (c) Provide an easy way of groups of
related files (d) Are only used when printing the contents of a file (e) None of the above
ANSWER: (c)

13. Most Websites have a main page, the ...... which acts as a doorway to the rest of
the Web side pages.
(a) Search engine (b) Home page (C) Browser (d) URL (e) None of these
ANSWER: (b)

14. Which of the following is not true about Computer files? (a) They are collections of
data saved to a storage medium (b) Every file has a file name (c) A file extension is
established by the user to indicate the file's contents (d) Files usually contain data (e)
None of the above
ANSWER: (c)

15. What type of computer could be found in a digital watch? (a) Mainframe
computer (b) Super computer (c) Embedded computer (d) Note book computer (e)
Micro computer
ANSWER: (e)

16. This process is used by large retailers to study trends. (a) Data mining (b) Data
selection (C) POS (d) Data conversion
(e) None of the above
ANSWER: (a)

17. This system is a small, wireless handheld computer that scans an items tag and
pulls up the current price (and any special offers) as you shop. (a) PSS (b) POS (C)
Inventory (d) Data mining (e) None of these
ANSWER: (a)

18. Which of the following is NOT one of the four major data processing functions of a
computer ?
(a) Gathering data (b) Processing data into information (c) Analyzing the data or
information (d) Storing the data or information (e) None of the above
ANSWER: (c)

19. Surgeons can perform delicate operations by manipulating devices through


computers instead of manually. This technology is known as (a) Robotics (b) Computer
forensics (C) Simulation (d) Forecasting (e) None of these
ANSWER: (a)

20. It is the study of molecules and structures whose size ranges from 1 to 100 Nano
metres (a) Nano science (b) Microelectrodes (C) Computer forensics (d) Artificial
intelligence (e) None of the above

ANSWER: (a)

Monday, 19 September 2011


IBPS CLERKS EXAM PRACTICE QUESTIONS

1. _____Is a program which reproduces itself? a) Virus b) Software c) a and b d) None

2. ____Viruses that aim at the boot sector of a hard drive are infect-ing a very crucial
component of the boot process?
a) File infection virus b) Boot virus c) Network virus d) E-mail virus

3. _____Is the virus that they will attach themselves to EXE files, compressed files like
ZIP files and driver files?
a) File infector virus b) Boot virus c) Network virus d) E-mail virus

4. _____Is the virus, which is uniquely created to quickly spread throughout the local
area network?
a) File infector virus b)Boot virus c) Network virus d) E-mail virus

5. Which of the following are the main purposes of an operating system?


a) To provide an environment for a computer user to execute programs on a computer
hardware in a convenient and efficient manner
b) To allocate separate resources of the computer as needed to solve the problem
given
c) Supervision of the executions of user programs to prevent errors and improper use
of computer d) All of the above

6. Define acronym 'spooling'? a) Simultaneous Peripheral Operation On-line b)


Simultaneous Peripheral Operation Off-line
c) Simultaneous Peripheral Organization On-line d) System Peripheral Operation Online

7. Several programs are in a memory concurrently; the syste-m switches among the
programs for efficient processing and minimal idle time is called____? a) Multi tasking
b) Multi programming c) Multi functioning d) None of the above

8. ____ Is the using scheduling and multiprogramming to provide an economical


interactive system of two or more users?
a) Time sharing b)Time changing c) Processing d) None

9. ____Is a system with two or more central processing units?


a) No definition b) Multi processor c) Double processor d) None

10. ____ Is the system where fast response is desirable, but not required? a) Real time
systems b) Time sharing systems c) a and b d) None

11. ____Is the system where processing must be completed with in certain time
constraints appropriate for the system?
a) Real time systems b) Time sharing systems c) a and b d) None

12. ____Is the smallest block that can be read or written on a disk? a) Sector b) Track
c) Disk d) None of the above

13. ____Is the collection of sectors all as same circumference on a single surface? a)
Track b) Sector c) Disk d) None of the above

14. ____Is the time interval when a process uses Central Processing Unit only? a) CPU
burst b) I/O burst c) (a)And(b) d) Either (a)or(b)

15. ____Is the time interval when a process uses I/O devices only? a) CPU burst b) I/O
burst c) (a)And(b) d) Either (a)or(b)

16. ____Is simply consists of one or more attributes that determine other attributes? a)
Lock b) Database c) Key d) None of the above

17. Be unique is the characteristic of the ____key? a) Primary b) Secondary c) Foreign


d) Candidate

18. A unique key can uniquely identify each ____ in a table? a) Field b) Row c) File d)
Database

19. ____Is a database that treats all of its data as a collection of relations?
a) Relational database b) Rational database c) a and b d) None

20. ____Is the precise set of instructions that describes how to perform a specific
tasks?
a) Algorithm b) Graph c) Pie chart d) None of the above

21. Which of the following is a programming language? a) MS-Word b) C++ c) Access


d) Power point

22. ____Is the process of writing the programs is commonly called? a) Software b)
Coding c) Debugging d) None

23. ____Is the special program that converts programming language instructions into
machine level instructions?
a) Modem b) Central Processing Unit c) Compiler d)None of the above

24. After the program has been complied, the resulting set of instructions is called?
a) Final result b) Information c) Executable code d) Source code

25. Which of the following is presen-tation application software? a) MS-Power point b)


MS-Word c) MS-Excel d) MS-Access

26. ____Is a specific combination of a microprocessor family and an operating system?


a) Platform b) Operating system c) Central Processing Unit d) None of the above

27. ____Platform comprises a windows operating system and an intel or intel


compatible microprocessor?
a) Wintel b) Macintosh c) Normal platform d) Java platform

28. Application software is? a) System specific b) User specific c) Platform specific d)
None

29. An operating system runs multiple applications simultan-eously known as? a) Multi
tasking b) Multi programming c) Programming d) None of the above

30. Which of the following language use interpreter? a) C++ b) COBOL c) BASIC d) All
of the above

31. ____Is a database program that stores information that can be manipulated, stored
and filtered to meet your specific needs? a) Access b) Power point c) Excel d) None of
the above

32. ____Creates multimedia presen-tations to display information in a graphical


format?
a) Access b) Power point c) Excel d) None of the above

33. ____Allows you develop spreadsheets that display data in various tabular and
visual formats?
a) Access b) Power point c) Excel d) None of the above
34. FORTRAN is? a) Formula translation b) Formula generation c) Format generation
d) Format translation

35. EEPROM stands for? a) Electrically Erasable Program-mable Read Only Memory
b) Electrically Erasable Program-mable Run Only Memory c) Electrically Efficiently
Progr-ammed Read Only Memory d) Efficiently Erasable Program-mable Read Only
Memory

36. ____Generation computers are very big in size with less memory a) Third
Generation b) Fourth Generation c) First Generation d) Fifth Generation

37. EBCDIC stands for? a) Extended Binary Cut Decimal Interchange Code b)
Extended Binary Coded Dedicated Interchange Code c) Extended Binary Coded
Decimal Inner Code d) Extended Binary Coded Decimal Interchange Code

38. Computer can do everything except? a) Processing b) Storing c) Analyzing d) Own


decisions

39. ____Is a data model in which the data is organized into a tree like structure? a)
Hierarchical database model b) Sequential model c) Dimensional model d) None

40. SQL stands for? a) Structured Quest Language b) System Query Language c)
Structured Query Language d) Standard Query Language

Answers:
1) a 2) b 3) a 4) c 5) d 6) a 7) b 8) a 9) b 10) b 11) a 12) a 13) a 14) a 15) b 16) c 17) a
18) b 19) a 20) a 21) b 22) b 23) c 24) c 25) a 26) a 27) a 28) c 29) a 30) c 31) a 32) b
33) c 34) a 35) a 36) c 37) d 38) d 39) a 40) c

IBPS CLERKS COMPUTER KNOWLEDGE MCQs SET-2


1. Assembly language is 1. Low-level programming language 2. High level
programming language 3. Machine language 4. All of the above 5. None of these
2. In Assembly language 1. Mnemonics are used to code operations 2. Alphanumeric
symbols are used for addresses
3. Language lies between high-level language and machine 4. All of the above 5. None
of these
3. The following computer s memory is characterized by low cost per bit stored
1. Primary 2. Secondary 3. Hard disk 4. All of the above 5. None of these
4. The following is true for Auxiliary Storage 1. It has an operating speed far slower
than that of the primary storage. 2. It has an operating speed faster than that of the
primary storage. 3. It has an operating speed equivalent than that of the primary
storage. 4. All of the above 5. None of these
5. Following is true for Bandwidth 1. The narrow the bandwidth of a communications
system the less data it can transmit in a given period of time. 2. The narrow then
bandwidth of a communications system the more data it can transmit in a given period
of time. 3. The wider the bandwidth of a communications system the less data it can
transmit in a given period of time.
4. All of the above 5. None is true
6. Acknowledgement from a computer that a packet of data has been received and
verified is known as
1. ACK 2. BCK 3. ECK 4. All of the above 5. None of these
7. The following is a communications device (modem) which allows an ordinary
telephone to be used with a computer device for data transmission 1. Keyboard 2.
Acoustic coupler 3. Mobile phone 4. All of the above 5. None of these

8. ALGOL is the 1. High-level language 2. Low level language 3. Machine language 4.


All of the above 5. None of these
9. A high level programming language named after Ada Augusta, coworker with
Charles Babbage
1. Augustan 2. Babbage 3. Ada 4. Charlie 5. All of the above
10. Following is a logic circuit capable of forming the sum of two or more quantities 1.
Adder 2. Multiplier 3. Address 4. Access 5. None of these
11. To identification particular location in storage area one have a 1. Address 2.
Password 3. Logic 4. Mouse 5. None of these
12. A local storage register in the CPU which contains the address of the next
instruction to be executed is referred as
1. Key register 2. Address register 3. Password 4. All of the above 5. None of these
13. A sequence of precise and unambiguous instructions for solving a problem in a
finite number of operations is referred as 1. Address 2. Algorithm 3. Advice 4. All of the
above 5. None of these
14. A character set that contains letters, digits, and other special characters such as $,
@, + % etc. is referred as
1. Numeric 2. Alphanumeric 3. Alphabetic 4. All of the above 5. None of these
15. One of the components of central Processing Unit (CPU) of the computer that
performs mathematical and logical operations is 1. ALU (Arithmetic Logic Unit) 2.
Address register 3. Analog 4. All of the above 5. None of these
16. A standard intended to connect relatively lowspeed devices such as keyboards,
mouse, modems and printers is
1. Access bus 2. Access time 3. Connector 4. All of the above 5. None of these
17. The concept that one can disconnect peripherals and plug them in without letting
computer shut down or reconfigure the system is referred as 1. Hot plugging 2. Cold
plugging 3. Access bus 4. All of the above 5. None of these
18. The time interval between the instant at which data is called from a storage device
and the rust delivery begins in
1. Access time 2. Delivery time 3. Service time 4. All of the above 5. None of these
19. The automatic execution of lower-priority (background) computer programs when
higherpriority (foreground) programs are not using the system resources is referred as
1. Background processing 2. Foreground processing 3. Null processing 4. All of the
above 5. None of these

20. A form of access to a computer or network with specified user name and password
is referred as
1. Account 2. Address 3. Algorithm 4. All of the above 5. None of these
21. A local storage area also called a register, in which the result of an arithmetic or
logic operation is formed, is
1. Accumulator 2. Address 3. Algorithm 4. All of the above 5. None of these
22. Computer that operates on data which is in the form of continuously variable
physical quantities
1. Digital computer 2. Analog computer 3. Mechanical computer 4. All of the above 5.
None of these
23. Anonymous FTP is the 1. Internet file transfer protocol 2. Protocol that requires
password 3. None access files 4. None of these
24. EFF sites allows anonymous FTP that 1. Do not require a password or access 2.
Requires password or access 3. Is a none access file 4. All of the above 5. None of
these
25. ANSI is 1. American National Standards Institute 2. A USA based national
organization that establishes uniform standards in several fields of computers. 3. 1. and
2. both are true 4. All of the above 5. None is true
26. APL is 1. A high level language for specifying complex algorithms. 2. A real-time
language primarily for scientific applications. 3. Only 1. is true 4. Both 1. and 2. are true
5. None of these
27. The overall design, construction, organization and interconnecting of the various
components of a computer system is referred as 1. Computer Architecture 2.
Computer Flow chart 3. Computer Algorithm 4. All of the above 5. None of these
28. Asynchronous communication is 1. Communication between indepen-dently
operating units 2. Communication between dependent operating units 3.
Communication between independent and dependent operating units 4. All of the above
5. None of these
29. Audio response is 1. Output medium 2. Produces verbal responses from the
computer system 3. Both 1. and 2. are true
4. Only A is true 5. None is true
30. Automated Office refers to the merger of ............... in an office environment. 1.
Computers 2. Office 3. Telecommunications 4. All of the above 5. None is true
31. Auxiliary storage is 1. Secondary storage 2. Primary storage 3. Processing device
4. All of the above 5. None of these

32. Archive is 1. Backup storage 2. Forward operation 3. Primary storage 4. All of the
above 5. None of these
33. A branch of computer science that deals with computers that possess reasoning,
learning and thinking capabilities that resemble those of human beings is recognized
as 1. Software engineering 2. Artificial intelligence 3. Hardware engineering 4. All of
the above 5. None of these
34. ASCII is 1. A standard coding system for computers 2. Hardware device 3.
Software 4. All of the above 5. None of these
35. Following is true for Bandwidth
1. The wider the bandwidth of a communication system the more data it can transmit in
a given period of time.
2. The narrow the bandwidth of a communication system the more data it can transmit
in a given period of time.
3. The wider the bandwidth of a communication system the less data it can transmit in
a given period of time.
4. All of the above 5. None is true
36. ASCII-8 is 1. An extended version of ASCII-7 2. Is a 8-bit code 3. Both 1. and 2.
are true 4. Both 1. and 2. are false 5. None of these
37. ASCII File is 1. Document file in the universally recognized text format 2. Word
processor 3. System file 4. All of the above 5. None of these
38. A program that translates mnemonic statements into executable instructions is
referred as
1. Software 2. Assembler 3. Translator 4. All of the above 5. None of these
39. An assembler is 1. Translator 2. Hardware 3. Assembly language 4. All of the
above 5. None of these
40. Following is not true for Backup files
1. These are the files which are generated automatically in when one save a document.
2. These files help in protecting the document due to out of order of the computer or
power failure
3. These files delete as soon computer is off 4. All of the above 5. None of these
41. An algebra that deals with logical propositions which are either true or false is
referred as
1. Boolean algebra 2. Modern Algebra 3. Abstract Algebra 4. All of the above 5. None
of these
42. Bandwidth is 1. The range of frequencies available for data transmission 2. Data
transmission rate 3. Alternate for rubber band 4. All of the above 5. None is true

43. A coding structure in which characters are represented by means of a series of


parallel bars is
1. Bar code 2. Menu bar 3. Numeric bar 4. All of the above 5. None of these
44. In Broadband system or a network system
1. Several analog signals share the same physical network channel
2. Only digital signals share the same physical network channel
3. Single analog signals share the same physical network channel
4. All of the above 5. None of these
45. Bit stands for 1. Binary digit 2. One binary piece of information 3. Both 1. and 2.
are true 4. All of the above 5. None is true
46. Broadband channel is the 1. The fastest carriers where data transfer rates is of 1
million baud (bits/second) or more. 2. The slower carriers where data transfer rates is of
56k baud 3. Musical channel 4. All of the above 5. None of these
47. BLOB is 1. Binary Large Object 2. A long bit string representing complex data 3.
Object oriented language 4. Only 1. and 2. are true 5. None of these
48. A group of related items/section of program doing treated as a unit is referred as
1. Block 2. Duplex 3. Street 4. All of the above 5. None of these
49. An operation in which data is moved to a different location is referred as 1. Block
move 2. Street move 3. Delete 4. All of the above 5. None of these
50. The following is responsible for number of logical records in a physical record 1.
Blocking factor 2. Block 3. Boolean algebra 4. All of the above 5. None of these
ANSWERS:
1. (1) 2. (4) 3. (2) 4. (1) 5. (1) 6. (1) 7. (2) 8. (1) 9. (3) 10. (1) 11. (1) 12. (2) 13. (2) 14.
(2) 15. (1) 16. (1) 17. (1) 18. (1) 19. (1) 20. (1) 21. (1) 22. (2) 23. (1) 24. (1) 25. (3) 26.
(4) 27. (1) 28. (1) 29. (3) 30. (4) 31. (1) 32. (1) 33. (2) 34. (1) 35. (1) 36. (1) 37. (1) 38.
(2) 39. (1) 40. (3) 41. (1) 42. (1) 43. (1) 44. (1) 45. (3) 46. (1) 47. (4) 48. (1) 49. (1) 50.
(1)
Posted by kaivalya at 9/29/2011 11:48:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Wednesday, September 28, 2011

COMPUTER AWARENES IBPS CLERKS EXAM PRACTICE


QUESTIONS
1. A keyboard is this kind of device
(A) black
(B) input
(C) output

(D) word Processing


(E) None of these
Ans : (B)
2. IT stands for
(A) information Technology
(B) integrated Technology
(C) intelligent Technology
(D) interesting Technology
(E) None of these
Ans : (A)
3. Which of the following refers to the fastest, biggest and most expensive computers ?
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
Ans : (B)
4. A collection of related information sorted and dealt with as a unit is a
(A) disk
(B) data
(C) file
(D) floppy
(E) None of these
Ans : (C)
5. The process of a computer receiving information from a server on the Internet is
known as
(A) pulling
(B) pushing
(C) downloading
(D) transferring
(E) None of these
Ans : (C)
6. Which part of the computer helps to store information ?
(A) Disk drive
(B) Keyboard
(C) Monitor
(D) Printer
(E) None of these
Ans : (A)
7. is the process of carrying out commands.
(A) Fetching

(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)
8. The role of agenerally is to determine a buyers needs and match it to the
correct hardware and software.
(A) computer Scientist
(B) computer sales representative
(C) computer consultant
(D) corporate trainer
(E) None of these
Ans : (B)
9. Which of the following groups consist of only output devices ?
(A) Scanner, Printer, Monitor
(B) Keyboard, Printer, Monitor
(C) Mouse, Printer, Monitor
(D) Plotter, Printer, Monitor
(E) None of these
Ans : (D)
10. The rectangular area of the screen that displays a program, data, and/or
information is a
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)
11. A(n)contains commands that can be selected.
(A) pointer
(B) menu
(C) icon
(D) button
(E) None of these
Ans : (B)
12. An error is also known as
(A) bug
(B) debug
(C) cursor
(D) icon
(E) None of these
Ans : (A)

13. Arithmetic Operations


(A) involve matching one data item to another to determine if the first item is greater
than, equal to, or less than the other item
(B) sort data items according to standard, predefined criteria in ascending order or
descending order
(C) use conditions with operators such as AND, OR and NOT
(D) include addition, subtraction, multiplication and division
(E) None of these
Ans : (D)
14. Sending an e-mail is similar to
(A) picturing an event
(B) narrating a story
(C) writing a letter
(D) creating a drawing
(E) None of these
Ans : (C)
15. Microsoft Word is an example of
(A) an operating system
(B) a processing device
(C) application software
(D) an input device
(E) None of these
Ans : (B)
Posted by kaivalya at 9/28/2011 01:59:00 pm No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post

IBPS CLERKS COMPUTER KNOWLEDGE PRACTICE MCQs


SET:-1
1. ______Is the most widely used medium for telecommunications a) Twisted Pair b) Coaxial Cable c)
Optical Fiber d) None

2. ______Is widely used medium of communication for cable television systems a) Twisted Pair b)
Coaxial Cable c) Optical fiber d) None

3. ______Cable consists of one or more filaments of glass fiber wrapped in protective layers that carries
data by means of pulses of light a) Twisted Pair b) Coaxial Cable c) Optical fiber d) None

4. ______Is a computer network used for communications among computers and different inform-ation
technological devices close to one person a) Personal Area Network b) Local Area Network c)
Metropolitan Area Network d) Wide Area Network

5. ______Is a collection of concep-tual tools for describing data, data relationships, data semantics and
constraints
a) Data base b) Data Model c) E_R Model d) None

6. Association among two or more entities called a) Entity b) Entity set c) Relationship d) Degree of
relation

7. DDL stands for a) Data Definition Language b) Data Delete Language c) Data Device Language d)
Database Definition Language

8. SDL stands for a) Storage Definition Language b) Save Definition Language c) Storage Database
Language d) Shortcut Definition Language

9. DML stands for a) Date Manipulation Language b) Database Manipulation Language c) Data
Manuscript Language
d) Data Manipulation Language

10. ____Is the language that enable user to access or manipulate data as organized by appropriate data
model
a) DML b) SDL c) DDL d) All of the above

11. ____Is the language to specify the internal schema. (This language may specify the mapping
between two schemas)
a) DML b) SDL c) DDL d) None of the above

12. All candidate keys excluding the primary key are known as a) Compound key b) Partial key c)
Alternative key d) None of the above

13. The user commands that are used to interact with a database is called as a) Query b) Interaction c)
Command d) Instruction

14. The updates that are applied to database before it becomes effective in real world
a) Retroactive update b) Proactive update c) Simultaneous update d) All of the above

15. The updates that are applied to database after it becomes effective in real world
a) Retroactive update b) Proactive update c) Simultaneous update d) All of the above

16. The updates that are applied to database at the same time when it becomes effective in real world?
a) Retroactive update b) Proactive update c) Simultaneous update d) All of the above

17. Match the following (select the test by using the key board)
a) A word from its beginning to its end b) A paragraph from its begging to its end c) The entire document
1. CTRL+ DOWN ARROW 2. CTRL+LEFT ARROW 3.CTRL+SHIFT+RIGHTARROW
a) a-3,b-1,c-2 b) a-3,b-2,c-3 c) a-3,b-2,c-1 d) a-2,b-3,c-1

18. Match the following (Move through your document)


a) One character to the left b) One character to the right c) One word to the left d) One word to the right
1. CTRL+RIGHT ARROW 2. CTRL+LEFT ARROW 3. RIGHT ARROW 4. LEFT ARROW
a) a-4,b-3,c-2,d-1 b) a-4,b-2,c-3,d-1 c) a-1,b-3,c-4,d-2 d) a-2,b-1,c-3,d-4

19. Match the following (To move)


a) One paragraph down b) To the beginning of a document c) To the end of a document d) Up one
screen at a line e) Down one screen at a time
1. CTRL+END 2. PAGE DOWN 3. CTRL+HOME 4. CTRL+DOWN ARROW 5. PAGE UP
a) a-5,b-3,c-1,d-4,e-2 b) a-4,b-3,c-2,d-5,e-1 c) a-3,b-4,c-1,d-5,e-2 d) a-4,b-3,c-1,d-5,e-2

20. In a word document Red underline indicates

a) Possible spelling error/word doesn't recognize a word b) Word thinks that grammar should be
revised c) A word is spelled correctly, but does not seem to be the correct word sentence d) All of the
above

21. In a word document Green underline indicates a) Possible spelling error/word doesn't recognize a
word b) Word thinks that grammar should be revised c) A word is spelled correctly, but does not seem to
be the correct word sentence d) All of the above

22. In a word document Blue underline indicates? a) Possible spelling error/word doesn't recognize a
word b) Word thinks that grammar should be revised c) A word is spelled correctly, but does not seem to
be the correct word sentence d) All of the above

23. By default the Microsoft word document will be saved into a folder called a) Desktop b) My
documents c) D drive d) Personal folder

24. What is the default file name for the word document? a) Taken from the text at the start of the
document b) Word document c) Both (a) and (b) d) None of the above

25. In word-2010____is the key to see numbers and letters displayed over icons, tabs or commands
towards the top of your screen? a) Ctrl key b) Tab key c) Alt key d) None of the above

26. ____ Is the keyboard shortcut key to close the word program a) Alt+F4 b) Alt+F5 c) Alt+F6 d) Alt+F7

27. How will you remove all formatting added to your documents (such as bold, italics, and underline
etc.)
a) Save b) Save as plain text file c) Save as d) All of the above

28. _____Is the file format we can use to distribute the document to some one using totally different word
processing program from a different software manufacturer, such as word perfect
a) Word document (.doc) b) Rich Text Format (.RTF) c) Both (a) and (b) d) None of the above

29. _____Is the Icon to magnify or reduce the display a) Print layout b) Zoom c) View d) All of the above

30. Match the following


a) Cut 1. CTRL+C b) Copy 2. CTRL+V c) Paste 3. CTRL+X
a) a-1, b-3, c-2 b) a-2, b-1, c-3 c) a-3, b-1, c-2 d) a-3, b-2, c-1

31. What is text formatting? a) Formatting characters and words with in a document b) Saving the word
document c) Both (a) and (b) d) None of the above

32. By default MS-Word 2010 uses a font called a) Arial b) Times New roman c) Tahoma d) Caliber

33. Superscript refers to____ a) Characters displayed below the line of the normal text b) Characters
displayed above the line of the normal text c) Both (a) and (b) d) None

34. Subscript refers to ___ a) Characters displayed below the line of the normal text b) Characters
displayed above the line of the normal text c) Both (a) and (b) d) None

35. (a+b)2 is an example for ---- a) Subscript b) Superscript c) Both (a) and (b) d) None

36. CO2 is an example for --- a) Subscript b) Superscript c) Both (a) and (b) d) None

37. You need to find a particular word or phrase and replace this item with alternative text, what is the
keyboard shortcut key
a) Ctrl+G b) Ctrl+P c) Ctrl+H d) Ctrl+F

38. _____Is the path to create Header/Footer a) Insert/Header & Footer b) File/Header & Footer c)
Edit/Header & Footer d) None of the above

39. __ Is the path to create footnotes a) References/footnote b) Insert/footnote c) Edit/footnote d) None

40. _____ Is the path to save a document in PDF format a) Edit/Save as/PDF/Save b) File/Save
as/PDF/Save c) Both (a) and (b) d) None of the above

ANSWERS:
1) a 2) b 3) c 4) a 5) b 6) c 7) a 8) a 9) d 10) a 11) b 12) c 13) a 14) b 15) a 16) c 17) a 18) a 19) d 20) a
21) b 22) c 23) b 24) a 25) c 26) a 27) b 28) b 29) b 30) c 31) a 32) d 33) b 34) a 35) b 36) a 37) c 38) a
39) a 40) b

Computer Awareness MCQ Part:- 2 for IBPS CWE (Q.51-Q.100)


51. Which of the following memory is volatile (A) RAM (B) ROM (C) EPROM (D)
PROM
52. The memory which is programmed at the time it is manufactured is (A) ROM
(B) RAM (C) PROM (D) EPROM
53. Which memory is non volatile and may be written only once. (A) RAM (B) EEPROM (C) EPROM (D) PROM
54. Which of the following statements is wrong (A) magnetic core memory, RAMs
and ROMs have constant access time b . magnetic tape is non volatile (C)
semiconductor memories are used as mass memory medium (D) An EPROM can be
programmed, erased and reprogrammed by the user with an EPROM programming
instrument
55. The fastest type of memory is (A) tape (B) semiconductor memory (C) disk (D)
bubble memory
56. In magnetic disks data is organized on the platter in a concentric sets or rings
called (A) sector (B) track (C) head (D) block
57. When we move from the outer most track to the innermost track in a magnetic
disk, the density
(A) increases (B) decreases (C) remains the same (D) either remains constant or
decreases
58. Which of the following device can be used to directly input printed text (A)
OCR (B) Mouse (C) MIC (D) Joystick
59. Which device can draw continuous lines (A) daisy wheel (B) plotter (C) chain
printer (D) impact printer
60. In which storage device, recording is done by burning tiny pits on a circular
disk (A) punched cards (B) floppy disk (C) magnetic tape (D) optical disk
61. Which of the following printers uses light beam and electro statically sensitive
black powder
(A) dot matric printer (B) daisy wheel printer (C) chain printer (D) laser printer
62. The primary purpose of an operating system is
(A) to make the most efficient use of the computer hardware (B) to allow people to use
the computer (C) to keep system programmers employed (D) to make computers fast.

63. The operating system manages (A) memory (B) processor (C) disk and I/O
devices (D) all of the above
64. Scheduling is (A) allowing job to use the processor (B) unrelated performance
considerations (C) quiet simple to implement, even on large main frames (D) the same
regardless of the purpose of the system
65. Which of the following translator program converts assembly language
program to object program (A) assembler (B) compiler (C) macroprocessor (D) linker
66. Multiprogramming systems
(A) are easier to develop than single programming systems (B) execute each job faster
(C) execute more jobs in the same time period (D) use only one large mainframe
computer
67. What device is used for entering x - y coordinates (A) card reader (B) joystick
(C) keyboard (D) all of the above
68. Impact printers
(A) strike a ribbon against the paper to produce character images. (B) include ink-jet
and thermal devices (C) are more expensive than laser printers (D) use optical
technology
69. Bar codes stores information using (A) punched holes (B) dots (C) thick and thin
tines (D) all of the above
70. How many types of storage loops exist in magnetic bubble memory (A) 8 (B) 4
(C) 3 (D) 2
71. In comparison to the internal (main) memory, tape or disk memory is
(A) slower and more expensive (B) slower and less expensive (C) faster and more
expensive (D) faster and less expensive
72. One of the main features that distinguish microprocessor from
microcomputers is
(A) words are usually larger in microprocessors (B) words are shorter in
microprocessors (C) microprocessor doesnot contain I/O devices (D) computers are not
fully integrated
73. microprocessor with 'n' address lines is capable of addressing
(A) 2n locations (B) 2(n + 1)locations (C) 2n locations (D) n2 locations
74. Which technique is preferable for transferring a large amount of data to and
from a memory in a short time
(A) DMA (B) Interrupt driven I/O (C) programmed I/O (D) None of these
75. A(n) ____________ system is a small, wireless handheld computer that scans
an items tag and pulls up the current price (and any special offers) as you
shop. (A) PSS (B) POS (C) inventory (D) data mining
76. The binary representation 100110 is numerically equivalent to (A) the decimal

representation 46 (B) the octal representation 46 (C) the hexadecimal representation 46


(D) the binary representation 26
77. Surgeons can perform delicate operations by manipulating devices through
computers instead of manually. This technology is known as: (A) robotics. (B)
computer forensics. (C) simulation. (D) forecasting.
78. The greatest negative number which can be stored in a computer that has 8bit word length and uses 2's complement arithmetic is (A) -256 (B) -255 (C) -128
(D) -127
79. By taking 2's complement again of the 2's complement of a binary, one
gets (A) the 1's complement (B) the 2's complement (C) the original number (D) the
sign magnitude form of the numbers
80. ____________ are specially designed computer chips that reside inside other
devices, such as your car or your electronic thermostat. (A) Servers (B) Embedded
computers (C) Robotic computers (D) Mainframes
81. In the sign magnitude representation, the leading bit (A) is a part of the number
itself (B) is unit for positive numbers (C) is always unit (D) stands for the sign
82. The steps and tasks needed to process data, such as responses to questions
or clicking an icon, are called:
(A) instructions. (B) the operating system. (C) application software. (D) the system unit.
83. The OSI reference model defines the function for seven layers of protocols (A)
including the user and communication medium. (B) not including the user or
communication medium (C) including the communication medium but not the user (D)
including the user but not the communication medium
84. The OSI reference model is (A) worthless (B) a protocol (C) not a protocol (D)
None of these
85. A data packet is a packet header together with (A) a network layer (B) an
administrative layer (C) user data (D) a packet switch
86. The application layer of the OSI model is the (A) seventh layer (B) sixth layer (C)
fifth layer (D) fourth layer
87. Working of the WAN generally involves (A) satellite (B) frame delay (C) ATM (D)
user agent
88. Which of the following technique provides dedicated communication channel
between two stations.
(A) switch network (B) circuit switching (C) packet switching (D) none of these
89. End-to-end connectivity is provided from hosttohost in (A) network layer (B)
session layer (C) data link layer (D) transport layer
90. Base band is
(A) transmission of signals without modulation (B) a signal all of whose energy is
contained within a finite frequency range.

(C) the simultaneous transmission of data to a number of stations (D) all of the above
91. The simultaneous transmission of data to a number of stations is known
as (A) broad cast (B) bandwidth (C) Aloha (D) analog transmission
92. The communication mode that supports data in both directions (A) simplex (B)
half duplex (C) duplex (D) multiplex
93. Modulation is the process of (A) sending a file from one computer to another
computer (B) converting digital signals to analog signals (C) converting analog signals
to digital signals (D) echoing every character that is received
94. A distributed network configuration in which all data/information pass
through a central computer is
(A) bus network (B) star network (C) duplex (D) multiplex
95. To connect a computer with a device in the same room, you might be likely to
use (A) a coaxial cable (B) a dedicated time (C) a ground station (D) all of the above
96. Administrative supervision of database activities is the responsibility of
the (A) data base administrator (B) DP Manager (C) DB Manager (D) VP-DP
administrator
97. Which of the following component of a computer system is the most
important to a data base management system
(A) mouse (B) high resolution video display (C) printer (D) high speed, large capacity
disk
98. What is the serious problem(s) of file management systems (A) data
redundancy (B) difficult to update (C) program dependence (D) All of the above
99. Which of the following contains complete record of all activity that affected
the contents of a database during a certain period of time (A) master file (B)
transaction file (C) report (D) query file
100. In a database, related fields are grouped to form (A) record (B) file (C) bank (D)
field group
ANSWER:51. a 52. a 53. d 54. c 55. B 56. b 57. a 58. a 59. b 60. d 61. d 62. a 63. d 64. a 65. b
66. C 67. b 68. a 69. c 70. d 71. b 72. c 73. c 74. a 75. A 76. b 77. A 78. c 79. c 80.
B 81. d 82. A 83. b 84. c 85. c 86. a 87. a 88. B 89. d 90. a 91. a 92. b 93. b 94. b 95.
a 96. a 97. d 98. d 99. B 100. a
Posted by kaivalya at 8/19/2011 09:00:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Thursday, August 18, 2011

Computer Awareness MCQ Part:- 1 for IBPS CWE (Q.1-Q.50)

1. Which of the following is the product of data processing (A) information (B) data
(C) software program (D) system
2. The process of putting data into a storage location is called (A) reading (B)
writing (C) controlling (D) hand shaking
3. The process of copying data from a memory location is called (A) reading (B)
writing (C) controlling (D) booting
4. A list of instructions used by a computer is called (A) program (B) CPU (C) text
(D) output
5. The CPU consists of (A) input, output and processing (B)control unit, primary
storage and secondary storage (C) Control unit; arithmetic logic unit and primary
storage (D)input, processing and storage
6. Which of the following is true about primary storage (A) it is a part of the CPU (B)
It allows very fast access to data (C) It is relatively more expensive (D) all of the above
7. Which of the following is the most powerful type of the computer (A) main frame
(B) super conductor (C) micro computer (D) super computer
8. Software instruction intended to satisfy a user's specific processing needs are
called (A) system software (B) process software (C) documentation (D) application
software
9. The computer device primarily used to provide hardcopy is the (A) CRT (B) line
printer (C) computer console (D) card reader
10. Which one of the following can produce the final product of machine
processing in a form usable by humans
(A) storage (B) control (C) input device (D) output device
11. The term 'memory' applies to which one of the following (A) logic (B) storage
(C) input device (D) output device
12. A program written in machine language is called ........ program. (A) object (B)
computer (C) assembler (D) high level
13. A source program is the program written in .......... language. (A) English (B)
symbolic (C) high level (D) object
14. A typical modern computer uses (A) magnetic cores for secondary storage (B)
LSI chips (C) magnetic tape for primary memory (D) more than 10,000 vaccum tubes
15. A collection of 8 bits is called (A) byte (B) record (C) word (D) nibble
16. General purpose computers are those that can be adopted to countless uses
simply by changing its
(A) output device (B) input device (C) processor (D) program
17. The current generation of computers (A) second (B) fifth (C) fourth (D) third
18. All of the following are examples of real security and privacy risks EXCEPT:
(A) hackers (B) spam (C) viruses (D) identity theft.

19. To implement all functions of the basic logic functions, it needs (A) OR gate
(B) NOT gate (C) AND and NOT gates (D) None of these
20. In the binary number 110.101, the fractional part has the value (A) 0.625 (B)
0.125 (C) 0.875 (D) 0.5
21. The value of binary 1111 is (A) 23 -1 (B) 24 (C) 24 - 1 (D) None of these
22. The value of 25 in octal system is (A) 20 (B) 40 (C) 400 (D) None of these
23. A hexa decimal number 'AO' has the decimal value (A) 80 (B) 256 (C) 100 (D)
160
24. The binary representation of hexadecimal 'C3' is (A) 1111 (B) 110011 (C)
110001 (D) 11000011
25. The ASCII code is for information interchange by a binary code for (A)
numbers only (B) alphabets only (C) alphanumeric and other common symbols (D)
None of these
26. A four bit number is given as 1001. Its 1's complement is (A) 1001 (B) 11001
(C) 0110 (D) 0101
27. 2's complement representation of a decimal number -4 is (A) 0100 (B) 1100 (C)
1011 (D) 1010
28. BCD numbers are obtained (A) by converting decimal number to binary (B) by
converting decimal to octal (C) when each decimal digit is represented by four bit binary
(D) by converting binary to decimal.
29. A gate in which all inputs must be low to get a high output is called (A) an
inverter (B) a NOR gate (C) an AND gate (D) a NAND gate
30. For a logical circuit there are 'n' binary inputs. Then the number of different
input combinations in the truth table is
(A) 2n (B) 2/n (C) 2n (D) 2(n+1)
31. Which of the following performs modulation and demodulation? (A) Satellite
(B) modem (C) fiber optic (D) amplifier
32. A characteristic of multiprogramming system is (A) Simultaneous execution of
program instructions from two applications (B) concurrent processing of two or more
programs (C) multiple CPU's (D) all of the above
33. Communication circuits that transmit data in both directions but not at the
same time are operating in (A) Simplex mode (B) half-duplex mode (C) full-duplex
mode (D) asynchronous mode
34. Operating system functions may include (A) input/output control (B) virtual
storage (C) multiprogramming (D) all of the above
35. Transmission of computerised data from one location to another is called (A)
data transfer (B) data flow (C) data communication (D) datamanagement
36. Which of the following items is not used in LAN (A) computers (B) modem (C)
printer (D) cable

37. Which is the device that converts computer output into a form that can be
transmitted over a telephone line
(A) teleport (B) multiplexer (C) concentrator (D) modem
38. What is the commonly used unit for measuring the speed of data
transmission(A) bytes per second (B) bits per second (C) baud (D) either b or d
39. A kilobyte also referred to as KB, is equal to (A) 1000 bytes (B) 1024 bytes (C)
2048 bytes (D) 512 bytes
40. Inputs to your computer is accomplished using the (A) Screen (B) keyboard (C)
printer (D) plotter
41. Which of the following is not used as secondary storage (A) Semiconductor
memory (B) magnetic disks (C) magnetic drums (D) magnetic tapes
42. A collection of wires that connects several device is called (A) link (B) bus (C)
cable (D) port
43. A offline device is (A) a device which is not connected to CPU (B) a device which
is connected to CPU (C) a device which is in breakdown stage (D) None of these
44. Which of the following is the fastest (A) CPU (B) magnetic tapes and disks (C)
video terminal (D) sensors, mechanical controllers
45. Memories in which any location can be reached in a fixed and short amount of
time after specifying its address is called
(A) sequential access memory (B) random access memory (C) secondary memory (D)
mass storage
46. The register which contains the data to be written into or read out of the
addressed location is known as
(A) index register (B) memory address register (C) memory data register (D) program
counter
47. The register which keeps track of the execution of a program and which
contains the memory address of the next instruction to be executed is known
as (A) index register (B) instruction register (C) memory address register (D) program
counter
48. Which of the following is used as storage locations both in the ALU and in the
control section of a computer
(A) accumalator (B) register (C) adder (D) decoder
49. Accumulator is a (A) hardwired unit (B) sequential circuit (C) finite state machine
(D) register
50. Non volatility is an important advantage of (A) CCDs (B) magnetic tapes and
disks (C) magnetic bubbles (D) both b and c
ANSWER:_

1. a 2. b 3. a 4. a 5. c 6. d 7. d 8. d 9. b 10. d 11. B 12. a 13. c 14. b 15. a 16. d 17. c


18. B 19. c 20. a 21. c 22. b 23. d 24. d 25. c 26. c 27. b 28. c 29. b 30. c 31. b 32. b
33. B 34. d 35. c 36. b 37. d 38. d 39. b 40. b 41. a 42. b 43. a 44. A 45. b 46. c 47. d
48. b 49. d 50. d
Posted by kaivalya at 8/18/2011 07:56:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Wednesday, August 17, 2011

Computer Awareness Question for IBPS CWE


1. Atypically connects personal computers within a very limited geographical area, usually within a
single building.(A) LAN(B) BAN(C) TAN(D) NAN(E) None of these
1. (A)
2. Computers manipulate data in many ways, and this manipulation is called (A) utilizing(B) batching(C)
upgrading(D) processing(E) None of these
2.(D)
3. An e-mail address typically consists of a user ID followed by the sign and the name of the email server that manages the users electronic post office box. (A) @(B) #(C) &(D) *(E) None of these
3.(A)

4. Software applies, also called algorithms, to process data. (A) arithmetic(B) procedures(C)
objects(D) rules(E) None of these
4. (A)
5. A file extension is separated from the main file name with a(n) , but no spaces.
(A) question mark(B) exclamation mark(C) underscore(D) period(E) None of these
5.(E)
6. An ad hoc query is a(A) pre-planned question(B) pre-scheduled question(C) spur-of-the-moment
question(D) question that will not return any results(E) None of these
6. (B)
7. A Web consists of one or more Web pages located on a Web server.
(A) hub(B) site(C) story(D) template(E) None of these
7. (B)
8. A computer is a set of program instructions that can attach itself to a file, reproduce itself, and
spread to other files.(A) worm(B) virus(C) trojan horse(D) phishing scam(E) None of these
8. (B)
9. The desktop contains small graphics called(A) windows(B) logos(C) icons(D) pictures(E) None of
these
9.(C)
10. C, BASIC, COBOL, and Java are examples of languages.
(A) low-level(B) computer(C) system programming(D) high-level(E) None of these
10.(D)

11. A(n)camera is a peripheral device used to capture still images in a digital format that can be
easily transferred into a computer and manipulated using graphics software.
(A) digital(B) analog(C) classic(D) film(E) None of these
11.(A)
12. makes it possible for shoppers to make purchases using their computers.
(A) E-world(B) E-commerce(C) E-spend(D) E-business(E) None of these
12. (D)
13. Networks are monitored by security personnel and supervised by who set(s) up accounts and
passwords for authorized network users.
(A) IT managers(B) the government(C) network administrators(D) password administrators(E) None of
these
13.(C)
14. Application software is designed to accomplish
(A) real-world tasks(B) computer-centric tasks(C) gaming tasks(D) operating system tasks(E) None of
these
14. (D)
15. A telephone number, a birth date, and a customer name are all examples of
(A) a record(B) data(C) a file(D) a database(E) None of these
15.(D)
16. The human-readable version of a program is called(A) source code(B) program code(C) human
code(D) system code(E) None of these
16. (D)
17. A computer (also referred to as a laptop), is a small, lightweight personal computer that
incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook(B) journal(C) diary(D) briefcase(E) None of these
17.(A)
18. is the result produced by a computer.(A) Data(B) Memory(C) Output(D) Input(E) None of these
18. (C)
19. Programs such as Internet Explorer that serve as navigable windows into the Web are called
(A) Hypertext(B) Networks(C) Internet(D) Web browsers(E) None of these
19.(D)
20. A is a device that not only provides surge protection, but also furnishes your computer with
battery backup power during a power outage.(A) surge strip(B) USB(C) UPS(D) battery strip(E) None of
these
20. (C)
21. When you save to , your data will remain intact even when the computer is turned off.
(A) RAM(B) motherboard(C) secondary storage device(D) primary storage device(E) None of these
21.(C)
22. The motherboard is the(A) circuit board that houses peripheral devices(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on(D) circuit board that contains a CPU
and other chips(E) None of these
22. (D)
23. A computer-intensive problemruns on a(A) server(B) main frame(C) supercomputer(D) super PC(E)
None of these

23. (C)
24. A(n)converts and executesone statement at a time.(A) compiler(B) interpreter(C) converter(D)
instructions(E) None of these
24.(B)
25. The term designates equipment that might be added to a computer system to enhance its
functionality.
(A) digital device(B) system add-on(C) disk pack(D) peripheral device(E) None of these
25.(D)
26. Approximately how many bytes make one megabyte ?
(A) One thousand(B) Ten thousand(C) One hundred(D) One million(E) None of these
26.(D)
27. What is MP3 ?
(A) A mouse(B) A Printer(C) A Sound format(D) A Scanner(E) None of these
27. (C)
28. All the deleted files go to(A) Recycle Bin(B) Task Bar(C) Tool Bar(D) My Computer(E) None of
these
28. (A)
29. this is the act of copying or downloading a program from a network and making multiple copies
of it.
(A) Network piracy(B) Plagiarism(C) Software piracy(D) Site-license piracy(E) None of these
29.(C)
30. A directory within a directory is called(A) Mini Directory(B) Junior Directory(C) Part Directory(D) Sub
Directory(E) None of these
30. (D)
31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
31.(B)
32. In MICR, C stands for . (A) Code(B) Colour(C) Computer(D) Character(E) None of these
32. (D)
33. Fax machines and imaging systems are examples of(A) bar-code readers(B) imaging systems(C)
scanning devices(D) pen-based systems(E) None of these
33. (B)
34. When writing a document, you can use the feature to find an appropriate word or an
alternative word if you find yourself stuck for the right word.(A) dictionary(B) word finder(C)
encyclopedia(D) thesaurus(E) None of these
34.(A)
35. Which key is used in combination with another key to perform a specific task ?
(A) Function(B) Control(C) Arrow(D) Space bar(E) None of these
35. (B)

36. A disks content that is recorded at the time of manufacture and that cannot be changed or erased by
the user is(A) read-only(B) memory-only(C) run-only(D) write-only(E) None of these
36. (A)
37. In an information system, alphanumeric data normally takes the form of
(A) Sentences and paragraphs(B) Numbers and alphabetical characters(C) Graphic shapes and
figures(D) Human voice and other sounds(E) None of these
37.(B)
38. A Websites main page is called its(A) home page(B) browser page(C) search place(D)
bookmark(E) None of these
38. (A)
39. When installing , the user must copy and usually decompress program files from a CDROM or
other medium to the hard disk.(A) programming software(B) system hardware(C) applications
hardware(D) applications software(E) None of these
39. (A)
40. A collection of interrelated files in a computer is a
(A) file manager(B) field(C) record(D) database(E) None of these
40. (D)
41. A computer is a large and expensive computer capable of simultaneously processing data for
hundreds or thousands of users.(A) server(B) mainframe(C) desktop(D) tablet(E) None of these
41. (B)
42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these
operating systems, a trackball is described as
(A) a roller ball which moves the cursor
(B) a pen-shaped device which allows data to be entered through the CRT screen
(C) a figure which resembles a familiar office device
(D) an outdated input device
(E) None of these
42. (A)
43. Various applications and documents are represented on the Windows desktop by
(A) Symbols(B) Labels(C) Graphs(D) Icons(E) None of these
43. (D)
44. What is usually used for displaying information at public places ?
(A) Monitors(B) Overhead Projections(C) Monitors and Overhead Projections(D) Touch Screen Kiosks(E)
None of these
44. (D)
45. The real business and competitive value of information technology lies in
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many
companies
(D) The capabilities of the hardware and the speed at which it processes information
(E) None of these
45.(B)
46. Companies use which of the following vendors to provide access to software and services rather than
purchasing the applications and maintaining the applications themselves ?(A) Open source vendors(B)
Alliances(C) Application service providers(D) All of the above(E) None of these

46. (C)
47. Which one of the following would be considered as a way that a computer virus can enter a computer
system ?
(A) Opening an application previously installed on the computer(B) Borrowed copies of software(C)
Viewing a website without causing any additional transactions(D) Running antivirus programs(E) None of
these
47.(B)
48. Collecting personal information and effectively posing as another individual is known as the crime of
(A) spooling(B) dentity theft(C) spoofing(D) hacking(E) None of these
48. (B)
49. The first step in the transaction processing cycle is(A) database operations(B) audit(C) data
entry(D) user inquiry(E) None of these
49. (C)
50. In the information systems concept, the output function involves
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation process to their ultimate
destination
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the
achievement of its goal (E) None of these
50.(A)
Posted by kaivalya at 8/17/2011 02:52:00 pm No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Saturday, August 13, 2011

Computer Awareness Question For Bank Po/Clerk & IBPS


CWE2011
Fill the Blanks with right Answer:1. IP stands for ..
2. An IP Address is of .. bits or .bytes or nibbles.
3. In Network Architecture OSI stands for
4. ARPANET is
5. .. is a network of networks based on TCP/IP, especially designed for a particular
organization.
6. PPP is . and stands for .
7. . is a set of rules & regulations.
8. . coverts digital signal to analog signal and vice versa.
9. HTTP stands for
10 An OSI architecture has .. layers.
11. GPRS stands for .
12. . is the most powerful computer in a network that provides services to other
computers.
13. .com, .co, .edu are examples of .
14. . is the fastest medium to transmit data.

15. PoP is a .. and stands for


16. SMTP is a . . It stands for . and it is followed by
.
17. VSNL stand for .
18. Modem is contraction of two words .. and ..
19. FAQ stands for ..
20. Google is the best example of ..
21. WAP stands for ..
22. DNS stands for ..
23. Match the followings:
a) TELNET
1) WAN H/W
b) Bridge
2) Protocol
24. In . Switching techniques, firstly a dedicated physical path is
established between nodes and then messages are transmitted.
25. . switching technique is also known as Store and forward
technique.
26. In . switching techniques message are transmitted in form of small data to
called packets.
27. .. network established within a city limit.
28. www stands for ..
29. IP address is faster than DNS. (True/False)
30. It is extended part for intranet provided to the outsider of the organization
..
Answer:1.
Internet Address
2.
32, 4, 8
3.
Open System Interconnection
4.
Network
5.
Intranet
6.
Protocol, Point to Point
7.
Protocol
8.
MODEM
9.
Hypertext Transfer Protocol
10.
7
11.
General Packet Radio Service
12.
Server
13.
Domain Name
14.
Fibre Optics
15.
Protocol, Post Office Protocol
16.
Protocol, Simple Mail Transfer Protocol, email
17.
Videsh Sanchar Nigam Limited
18.
Modulator, Demodulator
19.
Frequently Asked Question
20.
Search Engine
21.
Wireless Access Protocol
22.
Domain Name System

23.
24.
25.
26.
27.
28.
29.
30.

a) 2) b) 1)
Circuit
Message
Packet
Metropolitan Area
World Wide Web
True
Extranet

Posted by kaivalya at 8/13/2011 09:21:00 am No comments:


Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Thursday, August 11, 2011

Computer Awareness Questions from Ch- "SOFTWARE &


PROGRAMMING LANGUAGES" for IBPS CWE & Other Exams
Fill the Blanks with right Answer:1.Tally-I is an example of . Software.
2. Program in a running state is known as .
3. . Operating Systems treats similar types of processes as a single job.
4. SQL stands for .
5. Internet Explorer, Mozilla Firefox, Netscape Navigator are the best example of. and are
. software.
6. MS-Office is also known as .
7. . is a type of software that is provided free of cost to the user for a limited time
period with all functionality.
8. . is known as logical entity of computer.
9. Compiler converts .. to ..
10. Machine level language is also known as ..
11. Assembly language is also known as ..
12. .. Converts high level language to binary equivalent line by line.
13. In programming language OOPL stands for ..
14. Assembler is an example of ..
15. .bmp, .txt, .doc, .ppt are example of ..
16. .. is a set of instructions.
17. Software, which has more than a single specific purpose are known as S/w.
18. is the process to find out errors from the program.
19. Grammatical or format error in a program is known as
20. Logical error in your program is known as error.
21. is known as way of representation if any programming language.
22.Codes written in assembly language in the form of
23. are restricted words in programming language not to be used in any other menace.
24. is a designing tool that describes the designing algorithm by pictures.
25. FAT stands for ..
26.To access start menu, we can press key on keyboard.
27. A directory within the directory is known as
28. A box is a logical space where computer provides information and accepts data from user.
29.. is a space which stores accidently deleted files.
30. .. is the keyboard shortcut to restart your computer.
ANSWER: 1. Application Software 2. Process 3. Batch 4. Structured Query Language 5.
Browser, Application 6.Software suit 7.Freeware 8. Software 9. High level language, machine

language 10. Binary Language/ 1st Generation Language 11. 2nd Generation Language/ Low level
Language 12. Interpreter 13. Object Oriented Programming Language 14. Language
Translator/System Software 15. Extensions 16. Program 17. Integrated 18. Debugging 19.
Syntax 20. Semantic 21. Syntax 22. Mnemonics 23. Keywords 24. Flow Charts 25. File
Allocation Table 26. Windows key 27. Subdirectory 28. Dialogue 29. Recycle Bin 30.
Ctrl+Alt+Del

Computer General Awareness Paper For IBPS CWE


1. Programs from the same developer , sold bundled together , that provide better
integration and share common features , toolbars and menus are known as ....
(A) software suites
(B) integrated software packages
(C) software processing packages
(D) personal information managers
(E) none of these
Ans : (A)
2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these
Ans : (C)
3. ______________ servers store and manages files for network users.
(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these
Ans : (D)
4. All of the following are examples of real security and privacy risks Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
Ans : (B)
5. ___________ terminals (formerly known as cash registers) are often connected to
complex inventory and sales computer systems .
(A) Data
(B) Sales
(C) Query

(D) (Point-of-sale (POS)


(E) None of these
Ans : (B)
6. The OSI model is divided into _______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(E) None of these
Ans : (C)
7. System software is the set of programs that enables your computer's hardware
devices and ______ software to work together.
(A) management
(B) processing
(C) utility
(D) application
(E) None of these
Ans : (D)
8. ________ are specially designed computer chips reside inside other devices, such as
your car or your electronic thermostat.
(A) Servers
(B) Embedded computers
(C) Robotic computers
(D) Mainframes
(E) None of these
Ans : (B)
9. The following are all computing devices , except.........
(A) notebook computers
(B) cellular telephones
(C) digital scanners
(D) personal digital assistants
(E) None of these
Ans : (C)
10. in a ring topology , the the computer in possession of the ______ can trasmit data
(A) packet
(B) data
(C) access method
(D) token
(E) None of these
Ans : (D)

11. This part of operating system manages the essential peripherals, such as the
keyboard, screen , disk drives, and parallel and serial ports ____
(A) basic input/output system
(B) secondary input/output system
(C) peripheral input/output system
(D) marginal input/output system
(E) None of these
Ans : (A)
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these
Ans : (B)
13. ________ controls the way in which the computer system functions and provides a
meAns : by which users can interact with the computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
Ans : (C)
14. Servers are computers that provide resources to other computers connected to a
___________
(A) mainframe
(B) network
(C) supercomputer
(D) client
(E) None of these
Ans : (B)
15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition
(B) To confirm that data exists
(C) To analyze data for expected relationships
(D) To create a new data warehouse
(E) None of these
Ans : (A)
16. URL stands for ........
(A) Universal Research List
(B) Universal Resource List

(C) Uniform Resource Locator


(D) Uniform Research Locator
(E) None of these
Ans : (C)
17. A database management system (DBMS) is a ............
(A) hardware system used to create , maintain and provide controlled access to a
database
(B) hardware system used to create, maintain, and provide uncontrolled access to a
database.
(C) software system used to create, maintain, and provide uncontrolled access to a
database.
(D) software system used to create, maintain, and provide controlled access to a
database.
(E) None of these
Ans : (D)
18. Which of the following is NOT a goal of transaction processing system ?
(A) Capture , process and store transactions
(B) Produce a variety of documents related to routine business activities
(C) Reduce manual effort associated with processing business transactions
(D) Produce standard reports used for management decision making
(E) None of these
Ans : ()
19. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
Ans : (B)
20. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) None of these
Ans : (D)
21. _____________ are words that a programming language has set aside for its own
use.
(A) Control worlds
(B) Reserved words
(C) Control structures

(D) Reserved keys


(E) None of these
Ans : (B)
22. What is the primary difference between a virus and a worm?
(A) A worm has the ability to self-propagate from an infected user's computer to other
computers
(B) A worm is usually written by a cracker: Script bunnies do not have the skills to
develop a worm program
(C) A virus is very harmful to the computers it infects : a worm is not a serious a
problem
(D) Anti-virus software is effective in fighting viruses but not worms
(E) None of these
Ans : ()
23. ______ describe what is database fields.
(A) Structures
(B) Field markers
(C) Field definition
(D) Field names
(E) None of these
Ans : (D)
24. You must install a (n) ____________ on a network if you want to share a broadband
Internet connection.
(A) router
(B) modem
(C) node
(D) cable
(E) None of these
Ans : (A)
25. A goal of normalization is to __________
(A) minimize the number of relationships
(B) minimize the number of entities
(C) minimize the number of tables
(D) minimize the number of redundancy
(E) None of these
Ans : (D)
26. Granting an outside organization access to internet web pages is often implemented
using a (n) ____
(A) extranet
(B) intranet
(C) internet
(D) hacker

(E) None of these


Ans : (A)
27. Which term identifies a specific computer on the web and the main page of the
entire site
(A) URL
(B) Web site address
(C) Hyperlink
(D) Domain name
(E) None of these
Ans : (A)
28. The code that relational database management systems use to perform their
database task is referred to as .....
(A) QBE
(B) SQL
(C) OLAP
(D) Sequel Server
(E) None of these
Ans : (B)
29. Chip is a common nickname for a (n):
(A) transistor
(B) resistor
(C) integrated circuit
(D) semiconductor
(E) None of these
Ans : (C)
30. The purpose of the primary key in a database is to:
(A) unlock the database
(B) provide a map of the data
(C) uniquely identify a record
(D) establish constraints on database operations.
(E) None of these
Ans : (B)
31. A _________ contains specific rules and words that express the logical steps of an
algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
Ans : ()

32. The design of the network is called the network:


(A) architecture
(B) server
(C) transmission
(D) type
(E) None of these
Ans : (A)
33. The most frequently used instructions of a computer program are likely to be fetched
from:
(A) the hard disk
(B) cache memory
(C) RAM
(D) registers
(E) None of these
Ans : (B)
34. The ____________ contains data descriptions and defines the name, data type, and
length of each field in the database.
(A) data dictionary
(B) data table
(C) data record
(D) data field
(E) None of these
Ans : (A)
35. Personal logs or journal entries posted on the Web are known as:
(A) listservs
(B) Webcasts
(C) blogs
(D) subject directories
(E) None of these
Ans : (C)
36. A(n) _______ uses pictures (called icons) and menus displayed on the screen to
send commands to the computer system.
(A) command - based user interface
(B) GUI
(C) system utility
(D) API
(E) None of these
Ans : (B)
37. The _____ manual tells you how to use a software program.
(A) documentation
(B) programming

(C) technical
(D) user
(E) None of these
Ans : ()
38. Which of the following is NOT a type of broadband Internet connection?
(A) Cable
(B) DSL
(C) Dial-up
(D) Satellite
(E) None of these
Ans : (C)
39. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is
known as:
(A) spyware
(B) adware
(C) spam
(D) malware
(E) None of these
Ans : (D)
40. Making a field ______ meAns : that it cannot be left blank.
(A) numeric
(B) required
(C) calculated
(D) validated
(E) None of these
Ans : (B)
41. _________ is the process of finding errors in software code.
(A) Debugging
(B) Compiling
(C) Testing
(D) Running
(E) None pf these
Ans : ()
42. ____________ are viruses that are triggered by the passage of time or on a certain
date.
(A) Boot-sector viruses
(B) Macro viruses
(C) Time bombs
(D) Worms
(E) None of these
Ans : (C)

43. Linux is a (n) ____________ operating system.


(A) open-source
(B) Microsoft
(C) Windows
(D) Mac
(E) None of these
Ans : (A)
44. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
(E) None of these
Ans : (D)
45. Which of the following places the common data elements in order from smallest to
largest
(A) character, file, record, field, database
(B) character, record, field, database, file
(C) character, field, record, file, database
(D) Bit, byte, character, record, field, file, database,
(E) None of these
Ans : (C)
46. The internet is ......
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) All of these
(E) None of these
Ans : (D)
47. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
(E) None of these
Ans : (C)
48. Which of the following statements is FALSE concerning file names?
(A) Files may share the same name or the same extension but not both
(B) Every file in the same folder must have a unique name
(C) File extension is another name for file type

(D) The file extension comes before the dot (.) followed by the file name
(E) None of these
Ans : (D)
49. Verification of a login name and password is known as:
(A) configuration
(B) accessibility
(C) authentication
(D) logging in
(E) None of these
Ans : (C)
50. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear.
(B) The CD-ROM stops functioning.
(C) The Web browser opens to an unusual home page.
(D) Odd messages or images are displayed on the screen.
(E) None of these
Ans : (B)
Posted by kaivalya at 8/11/2011 01:13:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Wednesday, August 10, 2011

Computer Awareness Questions Part-7 For Bank PO/Clerk &


IBPS CWE
1. The quickest and easiest way in Word, to locate a particular word or phrase in a document is to
use the command. (A) Replace(B) Find(C) Lookup(D) Search(E) None of these
Ans : (B)
2. What is the default file extension for all Word documents ? (A) WRD(B) TXT(C) DOC(D) FIL(E)
None of these
Ans : (C)
3. With a CD you can (A) Read(B) Write(C) Read and Write(D) Either Read or Write(E) None of
these
Ans : (C)
4. A collection of interrelated records is called a (A) Utility file(B) Management information
system(C) Database(D) Spreadsheet(E) None of these
Ans : (C)
5. To move to the beginning of a line of text, press the key. (A) PageUp(B) A(C) Home(D)
Enter(E) None of these
Ans : (C)
6. The term user interface refers to
(A) What the user sees on the screen and how they can interact with it

(B) How the operating system responds to user commands


(C) the means by which the user interacts with the peripheral devices on the computer
(D) The monitor that is available for the computer
(E) None of these
Ans : (A)
7. The background of any Word document (A) Is always white colour(B) Is the colour you preset
under the Options menu(C) Is always the same for the entire document(D) Can have any colour
you choose(E) None of these
Ans : (D)
8. Reusable optical storage will typically have the acronym (A) CD(B) DVD(C) ROM(D) RW(E)
None of these
Ans : (D)
9. For creating a document, you use command at File Menu. (A) Open(B) Close(C) New(D)
Save(E) None of these
Ans : (C)
10. The contents of are lost when the computer turns off. (A) storage(B) input(C) output(D)
memory(E) None of these
Ans : (D)
11. Grouping and processing all of a firms transactions at one time is called
(A) A database management system(B) Batch processing(C) A real-time system(D) An on-line
system(E) None of these
Ans : (C)
12. A printer is this kind of device (A) Input(B) Word processing(C) Processing(D) Output(E)
None of these
Ans : (D)
13. Text in a column is generally aligned (A) Justified(B) Right(C) Center(D) Left(E) None of
these
Ans : (D)
14. What type of device is a computer mouse ? (A) Input(B) Output(C) Software(D) Storage(E)
None of these
Ans : (A)
15. In Excel, Charts are created using which option ? (A) Chart Wizard(B) Pivot Table(C) Pie
Chart(D) Bar Chart(E) None of these
Ans : (A)
16. What is the permanent memory built into your computer called ? (A) RAM(B) ROM(C) CPU(D)
CD-ROM(E) None of these
Ans : (B)
17. If text was highlighted and Edit Copy was clicked, what would happen ?
(A) Text would be copied from the document and placed in the clipboard
(B) Text would be removed from the document and placed in the clipboard
(C) Text from the clipboard would be placed in the document at the place where the cursor is
blinking
(D) (B) and (C) above
(E) None of these

Ans : (A)
18. You can start Microsoft Word by using button. (A) New(B) Start(C) Program(D) Control
Panel(E) None of these
Ans : (C)
19. You click at B to make the text (A) Italics(B) Underlined(C) Italics and Underlined(D) Bold(E)
None of these
Ans : (D)
20. Thebecomes different shapes depending on the task you are performing.(A) Active tab(B)
Insertion point(C) Mouse pointer(D) Ribbon(E) None of these
Ans : (C)
Posted by kaivalya at 8/10/2011 08:18:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Tuesday, August 09, 2011

Computer General Awareness Question Part-6 For Bank


PO/Clerk & IBPS CWE
1. You can keep your personal files/folders in (A) My folder(B) My Documents(C) My Files(D) My
Text(E) None of these
Ans : (B)
2. The primary purpose of software is to turn data into (A) Web sites(B) Information(C)
Programs(D) Objects(E) None of these
Ans : (B)
3. A directory within a directory is called(A) Mini Directory(B) Junior Directory(C) Part
Directory(D) Sub Directory(E) None of these
Ans : (D)
4. A compiler translates a program written in a high-level language into
(A) Machine language(B) An algorithm (C) A debugged program(D) Java(E) None of these
Ans : (A)
5. When you turn on the computer, the boot routine will perform this test
(A) RAM test(B) Disk drive test(C) Memory test(D) Power-on self-test(E) None of these
Ans : (B)
6. What is Internet 2? (A)A new type of cabling system for Wide Area Networks (B)A second local
area network that can connect with another online LAN to share access (C)A new standard for
Internet browsers (D)An association to develop advanced Internet technology (E)None of these
Ans. (D)
7. The term, "hypertext", means
(A)Non-sequential writing(B)Hypermedia(C)Blinking text(D)Text with heavy formatting(E)None of
these
Ans. (B)
8. While searching a website, you have been unable to find information that was on the site
several months ago. What might you do to attempt to locate that information?

(A)Visit Google's cached page to view the older copy.


(B)Forget about it, as there is no way to find this information.
(C)Visit a partner site of the organization to see if it is there.
(D)Use the wayback machine. (E)None of these
Ans. (C)
9. Which kind of lock includes a keypad that can be used to control access into areas?
(A)Cipher(B)Warded(C)Device(D)Tumbler(E)Typelock
Ans. (D)
10. The simultaneous processing of two or more programs by multiple processors is
(A) Multiprogramming(B) Multitasking(C) Time-sharing(D) Multiprocessing(E) None of these
Ans : (D)
11. Making a field ______ means that it cannot be left blank.
(A) numeric(B) required(C) calculated(D) validated(E) None of these
Ans : (B)
12. ____________ are viruses that are triggered by the passage of time or on a certain date.
(A) Boot-sector viruses(B) Macro viruses(C) Time bombs(D) Worms(E) None of these
Ans : (C)
13. Linux is a (n) ____________ operating system.
(A) open-source(B) Microsoft(C) Windows(D) Mac(E) None of these
Ans : (A)
14. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these (E) None of these
Ans : (D)
15. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the
best viewing option is the __________ view.
(A) List(B) Thumbnails(C) Details(D) Icon(E) None of these
Ans : (C)
16. A(n) is a program that makes the computer easier to use.
(A) utility(B) application(C) operating system(D) network(E) None of these
Ans : (A)
17. A complete electronic circuit with transistors and other electronic components on a small
silicon chip is called a(n)
(A) Workstation(B) CPU(C) Magnetic disk(D) Integrated circuit(E) None of these
Ans : (D)
18. Computer systems are comprised of
(A) Hardware, programs, processors, procedures and people
(B) Hardware, programs, information, people and procedures
(C) Hardware, programs, information, people and networks
(D) Hardware, software, procedures, networks and people
(E) None of these
Ans : (D)

19. An error in a computer program(A) Crash(B) Power Failure(C) Bug(D) Virus(E) None of these
Ans : (C)
20. What is output ? (A) What the processor takes from the user(B) What the user gives to the
processor(C) What the processor gets from the user(D) What the processor gives to the user(E)
None of these
Ans : (D)
21. A saved document is referred to as a(A) file(B) word(C) folder(D) project(E) None of these
Ans : (A)
22. Specialized programs that assist users in locating information on the Web are called
(A) Information engines(B) Search engines(C) Web browsers(D) Resource locators(E) None of
these
Ans : (B)
23. An application program has which one of the following functions ?
(A) It specifies the informationprocessing procedures required by a particular
informationprocessing job
(B) It controls the input/output and storage functions of the computer system
(C) It provides various support services for the computer system
(D) It supervises the operations of the CPU
(E) None of these
Ans : (A)
24. In page preview mode
(A) You can see all pages of your document(B) You can only see the page you are currently
working(C) You can only see pages that do not contain graphics(D) You can only see the title
page of your document(E) None of these
Ans : (A)
25. An operating system that can do multitasking means that
(A) The operating system can divide up work between several CPUs
(B) Several programs can be operated concurrently
(C) Multiple people can use the computer concurrently
(D) All of the above (E) None of these
Ans : (B)
Posted by kaivalya at 8/09/2011 07:06:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Monday, August 08, 2011

Computer General Awareness Question Part-5 For Bank


PO/Clerk & IBPS CWE
1. All the information collected during database development is stored in a
(A)repository(B)data warehouse(C)RAD(D)CASE(E)None of these
Ans. (B)

2. The.component is used by the data analyst to create the queries


that access the database.
(A)data extraction(B)end-user query tool(C)end-user presentation tool(D)data
store(E)None of these
Ans. (B)
3. A(n).allows network users to share a single copy of software, which
resides on the network server.
(A)single-user license agreement(B)network site license(C)end-user license
agreement(D)business software license(E)None of these
Ans. (B)
4. A polymorphic virus
(A)modifies its program code each time it attaches itself to another program or
file
(B)is a malicious-logic program that copies itself repeatedly in memory or on a
disk drive until no memory or disk space remains
(C)a malicious-logic program that hides within or looks like a legitimate program
(D)infects a program file, but still reports the size and creation date of the
original, uninfected program (E)None of these
Ans. (A)
5. Microwave transmission is used in environments where installing physical
transmission media is (A)difficult or impossible and where line-of-sight
transmission is unavailable
(B)easy or promising and where line-of-sight transmission is unavailable
(C)difficult or impossible and where line-of-sight transmission is available
(D)easy or promising and where line-of-sight transmission is available
(E)None of these
Ans. (D)

6. A is a unique name that you give to a file of information.(A) device letter(B)


folder(C) filename(D) filename extension(E) None of these
Ans : (D)
7. Hardware includes
(A) all devices used to input data into a computer
(B) sets of instructions that a computer runs or executes
(C) the computer and all the devices connected to it that are used to input and
output data
(D) all devices involved in processing information including the central
processing unit, memory and storage
(E) None of these
Ans : (D)
8. A contains specific rules and words that express the logical steps of an
algorithm.
(A) programming language(B) syntax(C) programming structure(D) logic chart(E)
None of these
Ans : (A)
9. All the deleted files go to(A) Recycle Bin(B) Task Bar(C) Tool Bar(D) My
Computer(E) None of these
Ans : (A)
10. A..sometimes called a boot sector virus, executes when a computer
boots up because it resides in the boot sector of a floppy disk or the master boot
record of a hard disk.
(A)system virus(B)trojan horse virus(C)file virus(D)macro virus (E)None of these
Ans. (A)

11. Which of the following is a general-purpose programming language, designed


by Sun Microsystems, and well suited for use on the Web? (A)VB Script(B)Java
Script(C)CSS(D)Java(E)None of these
Ans. (B)
12. This.............tier processes HTTP protocol, scripting tasks, performs
calculations, and provides access to data. (A)Client(B)Applications/Web
server(C)Enterprise server(D)DBA(E)None of these
Ans. (A)
13. RSA is (A)Symmetric Cryptosystem(B)Asymmetric Cryptosystem(C)Block
Cypher(D)Digital Signature(E)None of these
Ans. (D)
14. A DVD-RAM is similar to aexcept it has storage capacities up to
5.2 GB.
(A)CD-R(B)floppy disk(C)CD-RW(D)hard disk(E)None of these
Ans. (C)
15. When you are selecting a mouse for a particular computer system, what is the
most important consideration?
(A)The type of drivers that come with the mouse (B)The length of the mouse
cord(C)The type of connector the mouse is equipped with (D)The number of
buttons the mouse has (E)None of these
Ans. (C)
16. Programs that automatically submit your search request to several search
engines simultaneously are called (A)Metasearch
engines(B)Webcrawlers(C)Spiders(D)Hits(E)None of these
Ans. (A)
17. Graphical diagrams used to represent different multiple perspectives of a
system include
(A)use-case, class, and state diagrams (B)state, interaction, derivative
diagrams(C)interaction, relationship, and class diagrams (D)deployment,
relationship, and use-case diagrams (E)None of these
Ans. (A)

18. Database redesign is not terribly difficult if the (A)database is


structured(B)database is well-designed(C)database has no data(D)database is
relatively small (E)database is relatively large
Ans. (A)
19. Which of the following are normally used to initialize a computer system's
hardware?
(A)Bootstrap memory(B)Volatile memory(C)Exteranl mass memory(D)Static
memory(E)Random access memory
Ans. (E)
20. If you wanted to locate the hardware address of a local device, which protocol
would you use?
(A)ARP(B)RARP(C)ICMP(D)PING(E)PONG
Ans. (A)
21. The person who writes and tests computer programs is called a (A)
programmer(B) computer scientist(C) software engineer(D) project developer(E)
None of these
Ans : (A)
22. A set of instructions telling the computer what to do is called (A) mentor(B)
instructor(C) compiler(D) program(E) None of these
Ans : (D)
23. What menu is selected to print ? (A) Edit(B) Special(C) File(D) Tools(E) None
of these
Ans : (C)
24. What is backup ?
(A) Adding more components to your network
(B) Protecting data by copying it from the original source to a different
destination
(C) Filtering old data from the new data

(D) Accessing data on tape


(E) None of these
Ans : (B)
25. The term bit is short for(A) Megabyte(B) Binary language(C) Binary digit(D)
Binary number(E) None of these
Ans : (C)

Computer Awareness Question Part-4 For Bank PO/Clerk


& CWE
1. A passive threat to computer security is
(A)Malicious Intent (B)Sabotage (C)Accident Errors(D)Espionage Agents(E)None of these
Ans. (A)

2. The Secure Electronic Transaction (SET) specification


(A)is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is
legitimate
(B)provides private-key encryption of all data that passes between a client and a server
(C)allows users to choose an encryption scheme for the data that passes between a client and a
server
(D)uses a public-key encryption to secure credit-card transaction systems (E)None of these
Ans. (D)

3. allows wireless mobile devices to access the Internet and its services such as the
Web and e-mail(A)TCP/IP(B)Ethernet(3)WAP(D)Token ring (E)None of these
Ans. (C)

4. 'DOS' floppy disk does not have (A)A Boot Record(B)A File Allocation Table(C)A Root
Directory(D)Virtual Memory(E)BIOS
Ans. (D)

5. 'MICR' technology used for clearance of cheques by banks refers to


(A)Magnetic Ink Character Recognition(B)Magnetic Intelligence Character Recognition(C)Magnetic
Information Cable Recognition(D)Magnetic Insurance Cases Recognition(E)None of these
Ans. (A)

6. Which of the following places the common data elements in order from smallest to largest
(A) character, file, record, field, database (B) character, record, field, database, file(C) character,
field, record, file, database (D) Bit, byte, character, record, field, file, database, (E) None of these
Ans : (C)

7. All of the following statements concerning files are true EXCEPT


(A) A file is a collection of related pieces of information stored together for easy reference. (B)
Files can be generated from an application. (C) Files are stored in RAM. (D) Files should be
organized in folders. (E) None of these
Ans : (C)

8. Verification of a login name and password is known as: (A) configuration(B) accessibility(C)
authentication(D) logging in(E) None of these
Ans : (C)

9. Using Windows Explorer, a plus (+) sign in front of a folder indicates (A) an open folder.(B)
the folder contains subfolders.(C) a text file.(D) a graphics file. (E) None of these
Ans : (B)

10. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear. (B) The CD-ROM stops functioning.(C) The Web
browser opens to an unusual home page. (D) Odd messages or images are displayed on the
screen. (E) None of these
Ans : (B)
11. Which is NOT a good Web security strategy?
(A)Restrict access to the Web server; keep a minimum number of ports open(B)Limit the users
who can load software, edit or add files.(C)Add demo programs, so users can test system without
accessing production data.(D)Remove unnecessary compilers and interpreters.(E)None of these
Ans. (D)

12. The altering of data so that it is not usable unless the changes are undone is
(A)Biometrics(B)Compression(C)Encryption(D)Ergonomics(E)None of these
Ans. (C)

13. The word FIP stands for (A)File Translate Protocol(B)File Transit Protocol(C)File Typing
Protocol(D)File Transfer Protocol(E)None of these

Ans. (A)

14. Voice mail (A)is the exchange of text messages and computer files transmitted via a
communications network such as a local area network or the Internet (B)permits users to
converse in real time with each other via the computer while connected to the
Internet (C)functions much like an answering machine, allowing callers to leave a voice message
for the called party (D)involves using video and computer technology to conduct a meeting
between participants at geographically separate locations (E)None of these
Ans. (C)

15. A communication processor that connects dissimilar networks by providing the translation
from one set of protocol to another is (A)Bridge(B)Gateway(C)Router(D)Modem(E)All of these
Ans. (B)
16. The memory resident portion of the operating system is called the (A) registry.(B) API.(C)
CMOS.(D) kernel. (E) None of these
Ans : (D)
17. Which of the following is NOT a type of broadband Internet connection? (A) Cable(B) DSL(C)
Dial-up(D) Satellite(E) None of these
Ans : (C)
18. The operating system allows users to organize the computers contents in a hierarchical
structure of directories that include all of the following EXCEPT: (A) files.(B) folders.(D) drives.(D)
systems. (E) None of these
Ans : (D)
19. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(A) spyware(B) adware(C) spam(D) malware(E) None of these
Ans : (D)
20. All of the following statements concerning windows are true EXCEPT
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
(E) None of these
Ans : (A)

21. How is power supplied to a low-power USB device? (A)Through a power cable(B)From an
external power supply(C)Directly from the computer's power supply(D)Through the USB
cable(E)None of these
Ans. (D)

22. All of the following are basic principles of net works, except
(A)each computer must have a network card
(B)there must be communications media connecting the network hardware devices
(C)there must be at least one connecting device
(D)each computer must have software that supports the movement of information
(E)None of these
Ans. (B)

23. The.data mining technique derives rules from real-world case examples.
(A)Rule discover(B)Signal processing(C)Neural nets(D)Case-based reasoning(E)None of these
Ans. (C)

24. .are used to identify a user who returns to a Website.(A)Cookies(B)Plugins(C)Scripts(D)ASPs(E)None of these


Ans. (A)

25. Which one of the following objects is passed to a JavaBean when one of its properties is set
via a JSP action?
(A)Servlet Request(B)Http Servlet Request(C)Servlet Response(D)Http Servlet Response(E)None
of these
Ans. (C)
Posted by kaivalya at 8/07/2011 06:00:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Saturday, August 06, 2011

Computer General Awareness Question Part-3 For Bank


PO/Clerk & IBPS CWE
1. The code that relational database management systems use to perform their database task is
referred to as ..... (A) QBE(B) SQL(C) OLAP(D) Sequel Server(E) None of these
Ans : (B)
2. Chip is a common nickname for a (n): (A) transistor(B) resistor(C) integrated circuit(D)
semiconductor(E) None of these

Ans : (C)
3. The purpose of the primary key in a database is to: (A) unlock the database(B) provide a map of
the data(C) uniquely identify a record(D) establish constraints on database operations.(E) None of
these
Ans : (B)
4. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
(E) None of these
Ans : (D)
5. The ____________, stored on a ROM chip, is responsible for loading the operating system from
its permanent location on the hard drive into RAM. (A) BIOS(B) API(C) device driver(D) supervisor
program(E) None of these
Ans : (A)
6. The basic input/output system (BIOS) is stored in: (A) RAM.(B) ROM.(C) the CPU.(D) the hard
drive. (E) None of these
Ans : (B)
7. Personal logs or journal entries posted on the Web are known as: (A) listservs(B) Webcasts(C)
blogs(D) subject directories(E) None of these
Ans : (C)
8. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send
commands to the computer system.
(A) command - based user interface(B) GUI(C) system utility(D) API(E) None of these
Ans : (B)
9. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
(E) None of these
Ans : (A)
10. All of the following are TRUE regarding virtual memory EXCEPT
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually
changed.

(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
(E) None of these
Ans : (A)

11. The secret code that restricts entry to some programs (A) Password(B) Passport(C) Entrycode(D) Access-code(E) None of these
Ans : (A)
12. Computers use the number system to store data and perform calculations. (A) binary(B)
octal(C) decimal(D) hexadecimal(E) None of these
Ans : (A)
13. The main function of the ALU is to
(A) Perform arithmetic and logical operations
(B) Store data and information for future use
(C) Control computer output, such as printing
(D) Monitor all computer activities
(E) None of these
Ans : (A)
14. is the process of carrying out commands.
(A) Fetching(B) Storing(C) Executing(D) Decoding(E) None of these
Ans : (C)
15. Softcopy is the intangible output, so then what is hardcopy ?
(A) The physical parts of the computer (B) The printed parts of the computer (C) The printed
output (D) The physical output devices (E) None of these
Ans : (C)
16. The internet is ......
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) All of these
(E) None of these
Ans : (D)
17. ____________ are lists of commands that appear on the screen. (A) GUIs(B) Icons(C) Menus(D)
Windows(E) None of these
Ans : (C)
18. Which of the following statements is FALSE concerning file names?
(A) Files may share the same name or the same extension but not both

(B) Every file in the same folder must have a unique name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.) followed by the file name
(E) None of these
Ans : (D)
19. The combination of the operating system and the processor is referred to as the computers:
(A) CPU.(B) platform.(C) BIOS.(D) CMOS. (E) None of these
Ans : (B)
20. The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
(E) None of these
Ans : (A)
21. Which of the following is the correct sequence of actions that takes place during the boot-up
process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
(E) None of these
Ans : (B)
22. The design of the network is called the network: (A) architecture(B) server(C) transmission(D)
type(E) None of these
Ans : (A)
23. The most frequently used instructions of a computer program are likely to be fetched from:
(A) the hard disk(B) cache memory(C) RAM(D) registers (E) None of these
Ans : (B)
24. The ____________ contains data descriptions and defines the name, data type, and length of
each field in the database. (A) data dictionary(B) data table(C) data record(D) data field(E) None of
these
Ans : (A)
25. Ensuring that the essential peripheral devices are attached and operational is
the____________ process. (A) configuration(B) CMOS(C) POST(D) ROM(E) None of these
Ans : (C)

Computer General Awareness Question Part-2 For Bank


PO/Clerk & IBPS CWE
1. Programs from the same developer , sold bundled together , that provide better integration and
share common features , toolbars and menus are known as ....
(A) software suites(B) integrated software packages(C) software processing packages(D) personal
information managers(E) none of these
Ans : (A)
2. A data warehouse is which of the following ?
(A) Can be updated by the end users(B) Contains numerous naming conventions and formats(C)
Organized around important subject areas(D) Contains only current data(E) None of these
Ans : (C)
3. ______________ servers store and manages files for network users.
(A) Authentication(B) Main(C) Web(D) File(E) None of these
Ans : (D)
4. All of the following are examples of real security and privacy risks Except _____
(A) hackers(B) spam(C) viruses(D) identify theft(E) None of these
Ans : (B)
5. ___________ terminals (formerly known as cash registers) are often connected to complex
inventory and sales computer systems .
(A) Data(B) Sales(C) Query(D) (Point-of-sale (POS)(E) None of these
Ans : (B)
6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting (B) Merging (C) Embedding (D) Splitting (E) None of these
Ans : (B)
7. The operating system is the most common type of____________software.
(A) communication(B) application(C) system(D) word-processing(E) None of these
Ans : (C)
8. When you quickly press and releaes the left mouse button twice , you are
(A) Primary-clicking(B) pointing(C) Double-clicking(D) Secondary-clicking(E) None of these
Ans : (C)
9. The horizontal and vertical lines on a worksheet are called
(A) cells(B) sheets(C) block lines(D) gridlines(E) None of these
Ans : (D)
10. To delete an incorrect character in a document, ____________ to erase to the right of the
insertion point.(A) press the left mouse key(B) double-click the right mouse key(C) press the
BACKSPACE key
(D) press the delete key(E) None of these
Ans : (D)

11. This part of operating system manages the essential peripherals, such as the keyboard,
screen , disk drives, and parallel and serial ports ____
(A) basic input/output system(B) secondary input/output system(C) peripheral input/output
system(D) marginal input/output system(E) None of these
Ans : (A)
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse(B) Boot sector(C) Script(D) Logic bomb(E) None of these
Ans : (B)
13. ________ controls the way in which the computer system functions and provides a means by
which users can interact with the computer
(A) The platform(B) Application software(C) Operating system(D) The motherboard(E) None of
these
Ans : (C)
14. Servers are computers that provide resources to other computers connected to a__________
(A) mainframe(B) network(C) supercomputer(D) client(E) None of these
Ans : (B)
15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition(B) To confirm that data exists(C) To analyze data
for expected relationships(D) To create a new data warehouse(E) None of these
Ans : (A)
16. The operating system controls access to the processor by assigning a(n) ____________ to
each task requiring the processors attention.
(A) CPU(B) slice of time(C) stack(D) event(E) None of these
Ans : (B)
17. The blocks of code, included in the operating system, that software applications interact with
are known as:
(A) application programming interfaces (APIs). (B) complimentary metal-oxide conductors
(CMOS). (C) device drivers.(D) bootstrap loaders. (E) None of these
Ans : (A)
18. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
Ans : (B)
19. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy(B) information overload(C) duplicate data(D) data inconsistency(E) None of
these
Ans : (D)

20. _____________ are words that a programming language has set aside for its own use.
(A) Control worlds(B) Reserved words(C) Control structures(D) Reserved keys(E) None of these
Ans : (B)
21. The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
(E) None of these
Ans : (A)
22. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
(E) None of these
Ans : (B)
23. Verification of a login name and password is known as:
(A) configuration.(B) accessibility.(C) authentication.(D) logging in. (E) None of these
Ans : (C)
24. Granting an outside organization access to internet web pages is often implemented using a
(n) ____
(A) extranet(B) intranet(C) internet(D) hacker(E) None of these
Ans : (A)
25. Which term identifies a specific computer on the web and the main page of the entire site
(A) URL(B) Web site address(C) Hyperlink(D) Domain name(E) None of these
Ans : (A)
Posted by kaivalya at 8/05/2011 11:00:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post

Computer General Awareness question Part-1 for Bank


PO/Clerk & IBPS CWE
1. If a word is typed that is not in Words dictionary, a____________wavy underline appears below
the word. (A) red(B) green(C) blue(D) black(E) None of these
Ans : (A)
2. The____________button on the quick access Toolbar allows you to cancel your recent
commands or actions. (A) Search(B) Cut(C) Document(D) Undo(E) None of these

Ans : (D)
3. In Excel, any set of characters containing a letter , hyphen, or space is considered
(A) a formula(B) text(C) a name(D) a title(E) None of these
Ans : (B)
4. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing(B) Presentation graphics(C) Database Management Systems(D) Electronic
Spreadsheet (E) None of these
Ans : (C)
5. A ____________represent approximately one billion memory locations.
(A) kilobyte(B) megabyte(C) gigabyte(D) terabyte(E) None of these
Ans : (C)
6. The OSI model is divided into _______ processes called layers.
(A) five(B) six(C) seven(D) eight(E) None of these
Ans : (C)
7. System software is the set of programs that enables your computer's hardware devices and
______ software to work together. (A) management(B) processing(C) utility(D) application(E) None
of these
Ans : (D)
8. ________ are specially designed computer chips reside inside other devices, such as your car
or your electronic thermostat. (A) Servers(B) Embedded computers(C) Robotic computers(D)
Mainframes(E) None of these
Ans : (B)
9. The following are all computing devices , except.........
(A) notebook computers(B) cellular telephones(C) digital scanners(D) personal digital
assistants(E) None of these
Ans : (C)

10. in a ring topology , the the computer in possession of the ______ can trasmit data (A)
packet(B) data(C) access method(D) token(E) None of these
Ans : (D)
11. The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.(B) manage the central processing
unit (CPU).(C) manage memory and storage.(D) enable users to perform a specific task such as
document editing. (E) None
Ans : (D)
12. During the boot process, the____________looks for the system files.
(A) CD (B) BIOS (C) CPU (D) DVD (E) None
Ans : (B)
13. ____________ are lists of commands that appear on the screen.
(A) GUIs(B) Icons(C) Menus(D) Windows(E) None of these
Ans : (C)
14. ____________ is the ability of an operating system to control the activities of multiple
programs at the same time.
(A) Multitasking(B) Streamlining(C) Multiuser(D) Simulcasting(E) None of these
Ans : (A)
15. The unique signal, generated by a device, that tells the operating system that it is in need of
immediate attention is called an:
(A) action.(B) event.(C) interrupt.(D) activity. (E) None of these
Ans : (C)
16. URL stands for ........ (A) Universal Research List(B) Universal Resource List(C) Uniform
Resource Locator(D) Uniform Research Locator(E) None of these
Ans : (C)
17. A database management system (DBMS) is a ............

(A) hardware system used to create , maintain and provide controlled access to a database
(B) hardware system used to create, maintain, and provide uncontrolled access to adatabase.
(C) software system used to create, maintain, and provide uncontrolled access to adatabase.
(D) software system used to create, maintain, and provide controlled access to a database.
(E) None of these
Ans : (D)
18. MS-DOS is a ____________ operating system.
(A) point-and-click(B) user-friendly(C) command-driven(D) Mac(E) None of these
Ans : (C)
19. An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.(B) peripheral device.(C)
utility program. (D) special numeric code that indicates the priority of a request.(E) None of these
Ans : (D)
20. A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.(B) print
job.(C) program that coordinates the print jobs that are waiting to print.(D) message sent from the
printer to the operating system when a print job is completed. (E) None of these
Ans : (C)
21. Virtual memory is typically located:
(A) on a floppy disk.(B) in the CPU.(C) in a flash card.(D) on the hard drive. (E) None of these
Ans : (D)
22. The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a programs data or instructions in virtual memory when it cant fit in RAM.

(C) prevent thrashing in a multitasking environment.


(D) allow multiple print jobs to print their pages out simultaneously.
(E) None of these
Ans : (B)
23. ______ describe what is database fields.
(A) Structures(B) Field markers(C) Field definition(D) Field names(E) None of these
Ans : (D)
24. You must install a (n) ____________ on a network if you want to share a broadband Internet
connection.
(A) router(B) modem(C) node(D) cable(E) None of these
Ans : (A)
25. A goal of normalization is to __________
(A) minimize the number of relationships(B) minimize the number of entities(C) minimize the
number of tables(D) minimize the number of redundancy (E) None of these
Ans : (D)
Posted by kaivalya at 8/05/2011 07:00:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Saturday, July 23, 2011

Computer General Awareness Questions for Bank PO & Other


Exams:
Computer General Awareness Questions for Bank PO & Other Exams:
1. Making a field ______ means : that it cannot be left blank.
(A) numeric(B) required(C) calculated(D) validated(E) None of these

2. Which term identifies a specific computer on the web and the main page of the entire
site
(A) URL(B) Web site address(C) Hyperlink(D) Domain name(E) None of these

3. Which one of the following objects is passed to a JavaBean when one of its
properties is set via a JSP action?(a) Servlet Request(b) Http Servlet Request(c) Servlet

Response (d) Http Servlet Response (e) None of these

4. The word FIP stands for(a) File Translate Protocol(b) File Transit Protocol(c) File Typing
Protocol(d) File Transfer Protocol(e) None of these

5. 'DOS' floppy disk does not have(a) A Boot Record(b) A File Allocation Table(c) A Root
Directory (d) Virtual Memory(e) BIOS

6. ____________ are viruses that are triggered by the passage of time or on a certain
date.
(A) Boot-sector viruses(B) Macro viruses(C) Time bombs(D) Worms(E) None of these

7. A goal of normalization is to __________ (A) minimize the number of relationships(B)


minimize the number of entities(C) minimize the number of tables(D) minimize the number of
redundancy(E) None of these

8. allows wireless mobile devices to access the Internet and its services
such as the Web and e-mail(A) TCP/IP(B) Ethernet (C)WAP(D) Token ring(E) None of these
9. .are used to identify a user who returns to a Website.
(A) Cookies(B) Plug-ins (C) Scripts(D) ASPs(E) None of these

10. Which is NOT a good Web security strategy?


(A) Restrict access to the Web server; keep a minimum number of ports open
(B) Limit the users who can load software, edit or add files.
(C) Add demo programs, so users can test system without accessing production data.
(D) Remove unnecessary compilers and interpreters.
(E) None of these

11. Linux is a (n) ____________ operating system.


(A) open-source (B) Microsoft(C) Windows(D) Mac(E) None of these

12. Personal logs or journal entries posted on the Web are known as:
(A) listservs(B) Webcasts(C) blogs(D) subject directories(E) None of these

13. All the information collected during database development is stored in a


(A) repository(B) data warehouse(C) RAD (D) CASE (E) None of these
14. How is power supplied to a low-power USB device?
(A) Through a power cable (B) From an external power supply (C) Directly from the computer's
power supply (D) Through the USB cable (E) None of these

15. Which of the following places the common data elements in order from smallest to
largest
(A) character, file, record, field, database(B) character, record, field, database, file(C) character,
field, record, file, database(D) Bit, byte, character, record, field, file, database, (E) None of these

16. The.data mining technique derives rules from real-world case examples.
(A) Rule discover (B) Signal processing(C) Neural nets(D) Case-based reasoning(E) None of these

17. A passive threat to computer security is (A) Malicious Intent(B) Sabotage(C) Accident
Errors(D) Espionage Agents(E) None of these

18. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear.(B) The CD-ROM stops functioning.(C) The Web

browser opens to an unusual home page.(D) Odd messages or images are displayed on the
screen. (E) None of these

19. The code that relational database management systems use to perform their
database task is referred to as .....(A) QBE (B) SQL(C) OLAP(D) Sequel Server(E) None of these
20. A database management system (DBMS) is a ............
(A) hardware system used to create , maintain and provide controlled access to a database
(B) hardware system used to create, maintain, and provide uncontrolled access to a database.
(C) software system used to create, maintain, and provide uncontrolled access to a database.
(D) software system used to create, maintain, and provide controlled access to a database.
(E) None of these

21. System software is the set of programs that enables your computer's hardware
devices and ______ software to work together.(A) management(B) processing(C) utility(D)
application(E) None of these

22. 'MICR' technology used for clearance of cheques by banks refers to


(A) Magnetic Ink Character Recognition (B) Magnetic Intelligence Character Recognition (C)
Magnetic Information Cable Recognition(D) Magnetic Insurance Cases Recognition(E) None of
these

23. All of the following are basic principles of net works, except
(A) each computer must have a network card
(B) there must be communications media connecting the network hardware devices
(C) there must be at least one connecting device
(D) each computer must have software that supports the movement of information
(E) None of these

24. A(n) _______ uses pictures (called icons) and menus displayed on the screen to
send commands to the computer system.(A) command - based user interface(B) GUI(C)
system utility(D) API(E) None of these

25. Chip is a common nickname for a (n): (A) transistor(B) resistor (C) integrated circuit(D)
semiconductor(E) None of these

26. When you are selecting a mouse for a particular computer system, what is the most
important consideration? (A) The type of drivers that come with the mouse (B) The length of the
mouse cord(C) The type of connector the mouse is equipped with (D) The number of buttons the
mouse has (E) None of these

27. This part of operating system manages the essential peripherals, such as the
keyboard, screen , disk drives, and parallel and serial ports ____ (A) basic input/output
system(B) secondary input/output system(C) peripheral input/output system(D) marginal
input/output system(E) None of these

28. ______________ Servers store and manages files for network users.
(A) Authentication (B) Main(C) Web (D) File(E) None of these

29. Programs from the same developer , sold bundled together , that provide better
integration and share common features , toolbars and menus are known as ....

(A) software suites(B) integrated software packages(C) software processing packages(D) personal
information managers(E) none of these

30. _____ are lists of commands that appear on the screen.(A) GUIs(B) Icons(C) Menus (D)
Windows(E) None of these

31. A polymorphic virus


(A) modifies its program code each time it attaches itself to another program or file
(B) is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no
memory or disk space remains
(C) a malicious-logic program that hides within or looks like a legitimate program
(D) infects a program file, but still reports the size and creation date of the original, uninfected
program
(E) None of these

32. A DVD-RAM is similar to aexcept it has storage capacities up to 5.2


GB.
(A) CD-R(B) floppy disk(C) CD-RW(D) hard disk(E) None of these

33. The purpose of the primary key in a database is to: (A) unlock the database(B) provide a
map of the data (C) uniquely identify a record(D) establish constraints on database operations.(E)
None of these

34. What is a backup?


(A) Restoring the information backup(B) An exact copy of a system's information (C) The ability to
get a system up and running in the event of a system crash or failure(D) All of these(E) None of
these

35. A goal of data mining includes which of the following?


(A) To explain some observed event or condition (B) To confirm that data exists(C) To analyze
data for expected relationships (D) To create a new data warehouse (E) None of these

36. The following are all computing devices , except.........


(A) notebook computers(B) cellular telephones (C) digital scanners(D) personal digital assistants
(E) None of these

37. A data warehouse is which of the following?


(A) Can be updated by the end users(B) Contains numerous naming conventions and formats (C)
Organized around important subject areas(D) Contains only current data(E) None of these

38. ______ describe what is database fields.


(A) Structures (B) Field markers(C) Field definition(D) Field names(E) None of these

39. RSA is(A) Symmetric Cryptosystem(B) Asymmetric Cryptosystem(C) Block Cypher(D)


Digital Signature(E) None of these

40. Verification of a login name and password is known as:


(A) configuration(B) accessibility(C) authentication(D) logging in(E) None of these

41. ___________ terminals (formerly known as cash registers) are often connected to
complex inventory and sales computer systems . (A) Data (B) Sales (C) Query (D) (Point-ofsale (POS)(E) None of these

42. URL stands for ........ (A) Universal Research List(B) Universal Resource List(C) Uniform
Resource Locator(D) Uniform Research Locator(E) None of these

43. The ____________ contains data descriptions and defines the name, data type, and
length of each field in the database. (A) data dictionary(B) data table(C) data record(D) data
field(E) None of these

44. A(n).allows network users to share a single copy of software, which


resides on the network server.(A) single-user license agreement(B) network site license(C)
end-user license agreement(D) business software license(E) None of these

45. Which of the following statements is FALSE concerning file names?


(A) Files may share the same name or the same extension but not both
(B) Every file in the same folder must have a unique name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.) followed by the file name
(E) None of these

46. A Proxy server is used for which of the following?


(A) To provide security against unauthorized users (B) To process client requests for web
pages (C) To process client requests for database access (D) To provide TCP/IP (E) None of these

47. The design of the network is called the network: (A) architecture (B) server(C)
transmission(D) type(E) None of these

48. This.............tier processes HTTP protocol, scripting tasks, performs calculations,


and provides access to data.(A) Client(B) Applications/Web server(C) Enterprise server (D)
DBA(E) None of these

49. ________ controls the way in which the computer system functions and provides a
meAns : by which users can interact with the computer (A) The platform(B) Application
software(C) Operating system(D) The motherboard(E) None of these

50. You must install a (n) ____________ on a network if you want to share a broadband
Internet connection.(A) router(B) modem(C) node(D) cable(E) None of these
51. Which of the following is NOT a type of broadband Internet connection?
(A) Cable(B) DSL(C) Dial-up(D) Satellite(E) None of these

52. _____________ are words that a programming language has set aside for its own
use.
(A) Control worlds(B) Reserved words(C) Control structures(D) Reserved keys(E) None of these

53. in a ring topology , the computer in possession of the ______ can transmit data
(A) packet(B) data(C) access method (D) token(E) None of these

54. A communication processor that connects dissimilar networks by providing the


translation from one set of protocol to another is(A) Bridge (B) Gateway (C) Router (D)
Modem (E) All of these

55. The OSI model is divided into _______ processes called layers. (A) five (B) six(C)
seven(D) eight(E) None of these

56. Servers are computers that provide resources to other computers connected to a
___________
(A) mainframe(B) network(C) supercomputer(D) client(E) None of these

57. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is
known as:
(A) spyware(B) adware(C) spam(D) malware(E) None of these

58. The Secure Electronic Transaction (SET) specification


(A) is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is
legitimate
(B) provides private-key encryption of all data that passes between a client and a server
(C) allows users to choose an encryption scheme for the data that passes between a client and a
server
(D) uses a public-key encryption to secure credit-card transaction systems
(E) None of these

59. The internet is ...... (A) a large network of networks (B) an internal communication system
for a business (C) a communication system for the Indian government (D) All of these
(E) None of these

60. Which of the following is a general-purpose programming language, designed by


Sun Microsystems, and well suited for use on the Web? (A) VB Script (B) Java Script (C)
CSS (D) Java (E) None of these

61. The most frequently used instructions of a computer program are likely to be fetched
from:
(A) the hard disk(B) cache memory(C) RAM(D) registers(E) None of these

62. The.component is used by the data analyst to create the queries that
access the database. (1) data extraction(2) end-user query tool(3) end-user presentation tool(4)
data store(5) None of these

63. All of the following are examples of real security and privacy risks Except _____
(A) hackers(B) spam(C) viruses(D) identify theft(E) None of these

64. Granting an outside organization access to internet web pages is often implemented
using a (n) ____(A) extranet(B) intranet(C) internet(D) hacker(E) None of these

65. The altering of data so that it is not usable unless the changes are undone is
(A) Biometrics(B) Compression(C) Encryption(D) Ergonomics(E) None of these

66. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse(B) Boot sector(C) Script(D) Logic bomb(E) None of these

67. Microwave transmission is used in environments where installing physical


transmission media is

(A) difficult or impossible and where line-of-sight transmission is unavailable


(B) easy or promising and where line-of-sight transmission is unavailable
(C) difficult or impossible and where line-of-sight transmission is available
(D) easy or promising and where line-of-sight transmission is available
(E) None of these

68. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy(B) information overload(C) duplicate data(D) data inconsistency(E) None of
these

69. Voice mail


(A) is the exchange of text messages and computer files transmitted via a communications
network such as a local area network or the Internet
(B) permits users to converse in real time with each other via the computer while connected to the
Internet
(C) functions much like an answering machine, allowing callers to leave a voice message for the
called party
(D) involves using video and computer technology to conduct a meeting between participants at
geographically separate locations
(E) None of these

70. ________ are specially designed computer chips reside inside other devices, such
as your car or your electronic thermostat. (A) Servers(B) Embedded computers(C) Robotic
computers(D) Mainframes(E) None of these

ANSWERS:
1 : (B) 2 : (A) 3. (c) 4. (a) 5. (d) 6 : (C) 7 : (D) 8. (C) 9. (A) 10. (D) 11 : (A) 12 : (C) 13.
(B) 14. (D) 15 : (C) 16. (C) 17. (A) 18 : (B) 19 : (B) 20 : (D)21 : (D) 22. (A) 23. (B) 24 :
(B) 25 : (C) 26. (C) 27 : (A) 28: (D) 29 :(A) 30 : (C) 31. (A) 32. (C) 33 : (B) 34 : (D) 35 :
(A) 36 : (C) 37 : (C) 38 : (D) 39. (D) 40 : (C) 41 : (B) 42 : (C) 43 : (A) 44. (B) 45 : (D) 46
: (B) 47 : (A) 48. (1) 49 : (C) 50 : (A) 51 : (C) 52 : (B) 53 : (D) 54. (B) 55 : (C) 56 : (B)
57 : (D) 58. (D) 59 : (D) 60. (B) 61 : (B) 62. (2) 63 : (B) 64 : (A) 65. (C) 66 : (B) 67. (D)
68 : (D) 69. (C) 70 : (B)

You might also like