Wednesday 7 November 2012

IBPS CLERKS CWE COMPUTER KNOWLEDGE QUESTIONS


1. The Title and Page number of a document can be displayed using which of the following options?
1) Insert table
2) Spelling and Grammar
3) Header and Footer
4) Thesaurus
5) File

2. Which of the following is the advantage of Assembly language over Machine language?
1) Easy to use
2) Easy to understand
3) Easy to modify
4) Only 1 and 3
5) All the above

3. Pop-ups are a form of ..... on the World Wide Web?
1) Instant Messaging
2) Search Engines
3) Browsers
4) Mark-up Languages
5) Online Advertising

4. Which of the following is not used to align text in a document?
1) Left
2) Right
3) Center
4) Diagonal
5) Justify

5. Which of the following characteristics is/are used to compute the results from excel data?
1) Goto
2) Table
3) Diagram
4) Formula and Function
5) None of these

6. ....... is a combination of text, audio, still images, animation, video.
1) Multiplexer
2) Multiplier
3) Multimedia
4) Multiuser
5) None of these

7. Which of the following refers to the process of trading goods over the internet?
1) E-seva
2) E-Trading
3) E-Finance
4) E-Sales
5) E-Commerce

8. Multiple autonomous computers communicating through a computer network to achieve a common goal is called .......
1) Centralized Computing
2) Co-operative Computing
3) Distributed Computing
4) Connected Computing
5) None of these

9. In order to change page margins in a word document:
1) Drag the scroll box on the scroll bars.
2) Delete the margin boundaries on the ruler
3) Right Click on the ruler
4) Drag the margin boundaries on the ruler
5) None of these

10. USB 3.0 is the second major revision of the Universal Serial Bus standard for Computer Connectivity. Which of the following is true about USB 3.0?
1) It is more than 10 times as fast as USB 2.0
2) Its Data transfer rate is up to 5 Gbits/sec
3) Power consumption is less than USB 2.0
4) All the above
5) None of the above



11. MICR is exclusively used in:
1) Libraries
2) Super markets
3) Stock markets
4) Banking Industry
5) None of these

12. A communication system which provides communication in both directions, but not simultaneously is known as:
1) Half-Duplex
2) Full-Duplex
3) Broadcast
4) Only 1 and 2
5) None of these

13. Which of the following uses computers and data communication to transmit data electronically between computers?
1) EDI
2) Physical Media
3) Printing a paper
4) DTE
5) None

14. Which key, when toggled off, causes keyed characters to override existing characters?
1) Delete
2) Insert
3) Page up
4) Page down
5) Down arrow

15. An act of unauthorized copying of computer software is called:
1) Network Piracy
2) License Piracy
3) Plagiarism
4) Software Piracy
5) None of these

16. .... are attempts by individuals to obtain confidential information from the user by falsifying their identity.
1) Phishing Trips
2) Computer Virus
3) Spyware Scams
4) Viruses
5) None of these

17. The default view in Excel is:
1) Work
2) Auto
3) Normal
4) Roman
5) None of these

18. Bus topology is also known as ........
1) Multipoint network
2) Multi drop network
3) Broadcasting network
4) All of these
5) None of these

19. Which of the following is not an advantage of multiprocessor system?
1) Low Cost
2) High Reliability
3) Increased Throughput
4) All of these
5) None of these

20. Data redundancy can be eliminated by using:
1) Networking
2) DBMS
3) Operating System
4) Processing the data manually
5) None of these

21. System bus is also known as :
1) Internal bus
2) Information bus
3) RTA bus
4) Component bus
5) None of these

22. Which memory is normally used between RAM and CPU?
1) Cache
2) Register
3) Virtual
4) Disk
5) None of these

23. ...... is a computer software designed to help people involved in a common task to achieve goals.
1) Shareware
2) Software
3) Freeware
4) Collaborative Software
5) None

24. The CPU of a computer ?
1) understands only assembly language
2) understands machine language and high-level languages
3) understands only machine language
4) understands only high-level language
5) does not understand machine language

25. Which of the following is not a term related to the World Wide Web?
1) Hyperlink
2) Hypertext
3) Website
4) Homepage
5) Keyboard

26. ..... is the process of getting access to the computer.
1) Switch on
2) Login
3) Logoff
4) Enter
5) None

27. Display bar that lists all the open folders and active applications is.......
1) Menubar
2) Toolbar
3) Task bar
4) Window list
5) None of these

28. A picture / image file which is displayed in the background of the computer screen is called ..........
1) Wall Paper
2) Screen Saver
3) Windows Theme
4) Photo Desktop
5) None of these

29. Which of the following operating systems does not exist?
1) Windows 7
2) Mac OS X
3) Windows CE
4) Windows 12
5) Ubuntu

30. Which of the following is true about Operating System?
1) It is an interface between user and the computer.
2) It manages all resources
3) It does all Memory management and Process management tasks
4) All are true
5) None of these

31. ....... is a software for personal computers that combines the most commonly used functions of many productivity software programs into one application.
1) Integrated Software
2) Application Software
3) System Software
4) Software Suite
5) None of these

32. Expand RDBMS.
1) Relative Database Management System
2) Rational Database Minimize System
3) Relational Database Management System
4) Relational Database Maximize System
5) None of these

33. ..... is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law.
1) CID
2) Cryptography
3) Steganography
4) Computer Forensics
5) None of these

34. Find the odd one out.
1) Scanner
2) Mouse
3) Keyboard
4) Printer
5) Barcode Reader

35. Which of the following is not a logic gate?
1) AND
2) OR
3) NOT
4) KNOT
5) None of these

36. DSL is an example of a ...... connection
1) Broadband
2) Dialup
3) Both 1 and 2
4) Computer
5) None of these

37. ...... is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
1) Encryption
2) Cryptography
3) Steganography
4) Forensics
5) None of these

38. 'Bespoke Software' is also known as:
1) Legacy Software
2) Respoke Software
3) System Software
4) Custom Software
5) None of these

39. Which of the following is not a utility program?
1) File copying
2) Listing files
3) Sending files to printer
4) File conversion
5) None of these

40. Which of the following is an audio input device?
1) Microphone
2) Webcam
3) MIDI keyboard
4) Only 1 & 2
5) Only 1 & 3

ANSWERS:

1-3; 2-5; 3-5; 4-4; 5-4; 6-3; 7-5; 8-3; 9-4; 10-4;
11-4; 12-1; 13-1; 14-2; 15-4; 16-1; 17-3; 18-4; 19-5; 20-2;
21-1; 22-1; 23-4; 24-3; 25-5; 26-2; 27-3; 28-1; 29-4; 30-4;
31-1; 32-3; 33-4; 34-4; 35-4; 36-1; 37-3; 38-4; 39-5; 40-5.

3 comments:

  1. This is interesting and very logical idea which help everyone to know something new.
    pst file limit

    ReplyDelete
  2. I ATTEMPTED 27 CORRECTLY....NICE PAPER

    ReplyDelete
  3. thanks for share nice information and share everyone. Keep it up.1



    prashamcomputer.com visit this web page

    ReplyDelete