Showing posts with label SOLVED PAPERS. Show all posts
Showing posts with label SOLVED PAPERS. Show all posts

Sunday 22 March 2015

IBPS Bank Clerk CWE Solved Paper -2012 (Exam Held on 14-12-2012)

1. If you wish to extend the length of the network without having the signal degrade, you would use a– 
(A) resonance (B) router (C) gateway (D) switch (E) repeater
Ans : (E)

2. A repair for a known software bug, usually available at no charge on the internet, is called a– 
(A) version (B) patch (C) tutorial (D) FAQ (E) rectifier
Ans : (B)

3. URL stands for– 
(A) Universal Research List (B) Universal Resource List 
(C) Uniform Research List (D) Uniform Research Locator
(E) Uniform Resource Locator
Ans : (D)

4. When data changes in multiple lists and all lists are not updated, this causes– 
(A) data redundancy (B) information overload (C) duplicate data (D) data inconsistency (E) data repetition
Ans : (D)

5. What is a backup?
(A) Restoring the information backup (B) An exact copy of a system’s information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these (E) None of these
Ans : (D)

6. The Internet is– 
(A) a large network of networks (B) an internal communication system for a business
(C) a communication system for the Indian government (D) a communication system for some states of India
(E) a communication system for some cities of Indian
Ans : (A)

7. Computers that are portable and convenient for users who travel are known as– 
(A) supercomputers (B) planners (C) minicomputers (D) file servers (E) laptops
Ans : (E)

8. What is the storage area for email messages called?
(A) A folder (B) A mailbox (C) A directory (D) The hard disk (E) None of these
Ans : (B)

9. One advantage of dial-up Internet access is– 
(A) it utilizes broadband technology (B) it is Indian
(C) it uses a router for security (D) modem speeds are very fast
(E) it utilizes existing telephone service
Ans : (E)

10. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) configuration (B) download (C) storage (D) upload (E) installation
Ans : (E)

11. Which process checks to ensure the components of the computer are operating and connected properly?
(A) Booting (B) Processing (C) Saving (D) Editing (E) Starting
Ans : (A)

12. A means of capturing an image (drawing or photo) so that it can be stored on a computer is– 
(A) Modem (B) Software (C) Scanner (D) Keyboard (E) Mouse
Ans : (C)

13. An error in a computer porgram–
(A) Crash (B) Power Failure (C) Bug (D) Virus (E) Fatal error
Ans : (C)

14. Access control based on a person’s fingerprints is an example of– 
(A) biometric identification (B) characteristic identification 
(C) characteristics security (D) fingerprint security
(E) logistics
Ans : (A)

15. The patterns of printed lines on most products are called– 
(A) prices (B) striping (C) scanners (D) OCR (E) barcodes
Ans : (E)

16. Most mail programs automatically complete the following two parts in an e-mail– 
(A) From : and Body (B) From : and Date (C) From : and To (D) From : and Subject (E) None of these
Ans : (B)

17. The computer’s capability of distinguishing spoken words is called–
(A) voice analysis (B) speech acknowledgment
(C) voice recognition (D) speech interpretation
(E) vocalization
Ans : (C)

18. Which of the following is an advantage of mounting an application on the Web?
(A) the possibility of 24 hours access for users (B) creating a system that can extend globally
(C) scandalizing the design of the interface (D) All of these
(E) None of these
Ans : (D)

19. The first page of a Web site is called the– 
(A) Homepage (B) Index (C) Java Script (D) Book mark (E) Intro Page
Ans : (A)

20. ERP is an acronym for– 
(A) Enterprise Retirement Planning (B) Enterprise Relationship Planning
(C) Enterprise Resource Planning (D) Enterprise Reorder Planning
(E) Enterprise Retention Planning
Ans : (C)

21. The software that allows users to surf the Internet is called a/an– 
(A) Search engine (B) Internet Service Provider (ISP)
(C) Multimedia application (D) Browser
(E) Internet Surfing Provider
Ans : (D)

22. The issues that deal with the collection and use of data about individuals is– 
(A) access (B) publicity (C) accuracy (D) property (E) privacy
Ans : (E)

23. Aterm relating to sending data to a satellite is– 
(A) downlink (B) modulate (C) demodulate (D) uplink (E) Interrelate
Ans : (D)

24. On-line documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with relation information are called– 
(A) hypermedia (B) hypertext (C) HTML (D) URL (E) FTP
Ans : (B)

25. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and—security is concerned with protecting software from unauthorized tampering or damage.
(A) data (B) cyber (C) Internet (D) metaphysical (E) publicity
Ans : (A)

26. Hackers– 
(A) all have the same motive (B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage (D) are people who are allergic to computers
(E) break into other people’s computers
Ans : (E)

27. Unauthorized copying of software to be used for personal gain instead of for personal backups is called– 
(A) program thievery (B) data snatching (C) software piracy (D) program looting (E) data looting
Ans : (C)

28. Junk e-mail is also called– 
(A) Spam (B) spoof (C) cookie crumb (D) sniffer script (E) Spill
Ans : (A)

29. What is usually used for displaying information at public places?
(A) Monitors (B) Overhead Projections (C) Monitors and Overhead Projections (D) Touch Screen Kiosks (E) Loud Speakers
Ans : (B)

30. What is MP3?
(A) A mouse (B) A Printer (C) A Sound format (D) A Scanner (E) A Mobile Phone
Ans : (C)

31. What is the most popular hardware for multimedia creations?
(A) PCs (B) Minicomputers (C) Mainframe Computers (D) WANs (E) Super Computers
Ans : (A)

32. For sound recording what is necessary?
(A) Speaker (B) Microphone (C) Talker (D) Mouse (E) Telephone
Ans : (D)

33. The life-span of a CD-ROM is– 
(A) approximately one year (B) approximately two years (C) approximately five years 
(D) approximately twenty-five years (E) almost unlimited
Ans : (C)

34. The................settings are automatic and standard.
(A) default (B) CPU (C) peripheral (D) user friendly (E) defaulter
Ans : (A)

35. What are the two parts of an e-mail address?
(A) User name and street address (B) Legal name and phone number 
(C) User name and domain name (D) Initials and password
(E) User Name and Recipient Name
Ans : (C)

36. Participants can see and hear each other in a/ an– 
(A) electronic mail system (B) message system (C) teleconference (D) bulletin board (E) None of these
Ans : (C)

37. Magnetic tape is not practical for applications where data must be quickly recalled because tape is–
(A) A random-access medium (B) Expensive
(C) A read-only medium (D) Fragile and easily damaged
(E) A sequential-access medium
Ans : (E)

38. Why should you delete unknown e-mail attachments?
(A) You could go to jail (B) the person could track you down and hurt you
(C) it is bad manners (D) it might contain a virus that could hurt your computer
(E) None of these
Ans : (D)

39. Which of the following will you require to hear music on your computer?
(A) Video Card (B) Tape Recorder (C) Mouse (D) Joy Stick (E) Sound Card 
Ans : (E)

40. The signal that a computer is waiting for a command from the user– 
(A) prompt (B) event (C) time slice (D) interrupt (E) None of these
Ans : (A)

Sunday 1 July 2012

IBPS Probationary Officers' Exam 2011

Computer Knowledge

(Exam Held On: 18-09-2011)

1. Computer uses the_________number system to store data and perform calculations.

(A) binary
(B) octal
(C) decimal
(D) hexadecimal
(E) None of these
Ans : (A)

2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is_______________

(A) Memory-only
(B) Write-only
(C) Once-only
(D) Run-only
(E) Read-only
Ans : (E)

3. Which of the following can be used to select the entire document ?

(A) CTRL+A
(B) ALT+F5
(C) SHIFT+A
(D) CTRL+K
(E) CTRL+H
Ans : (A)

4___________are 'attempts by individuals to obtain confidential information from you by falsifying their identity.

(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above
Ans : (A)

5. Part number, part description, and number of parts ordered are examples of__________

(A) control
(B) output
(C) processing
(D) feedback
(E) input
Ans : (E)

6. A Web site's main page is called its______________

(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these
Ans : (A)

7. The simultaneous processing of two or more programs by multiple processors is_____________

(A) multiprogramming
(B) multitasking
(C) time-sharing
(D) multiprocessing
(E) None of these
Ans : (D)


Wednesday 30 May 2012

Indian Overseas Bank Probationary Officers’ Exam., 2011


Computer Knowledge
(Held on May 2011)

1. If you wish to extend the length of the network without having the signal degrade, you would use a ………………
(A) resonance
(B) router
(C) gateway
(D) switch
(E) repeater
Ans : (E)

2. A repair for a known software bug, usually available at no charge on the Internet, is called a ………………
(A) version
(B) patch
(C) tutorial
(D) FAQ
(E) rectifier
Ans : (B)

3. URL stands for ………………
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Research List
(D) Uniform Research Locator
(E) Uniform Resource Locator
Ans : (E)

4. When data changes in multiple lists and all lists are not updated, this causes ………………
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) data repetition
Ans : (D)

5. What is a backup ?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
(E) None of these
Ans : (B)

6. The Internet is ………………
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) a communication system for some states of India
(E) a communication system for some cities of India
Ans : (A)

7. Computers that are portable and convenient for users who travel are known as ………………
(A) supercomputers
(B) planners
(C) minicomputers
(D) file servers
(E) laptops
Ans : (E)


8. What is the storage area for e-mail messages called ?
(A) A folder
(B) A mailbox
(C) A directory
(D) The hard disk
(E) None of these
Ans : (B)

9. One advantage of dial-up Internet access is
(A) it utilises broadband technology
(B) it is Indian
(C) it uses a router for security
(D) modem speeds are very fast
(E) it utilises existing telephone service
Ans : (E)

10. What is the process of copying software programs from secondary storage media to the hard disk called ?
(A) configuration
(B) download
(C) storage
(D) upload
(E) installation
Ans : (E)

11. Which process checks to ensure that the components of the computer are operating and connected properly ?
(A) Booting
(B) Processing
(C) Saving
(D) Editing
(E) Starting
Ans : (A)

12. A means of capturing an image (drawing or photo) so that it can be stored on a computer is………………
(A) Modem
(B) Software
(C) Scanner
(D) Keyboard
(E) Mouse
Ans : (C)

13. An error in a computer program………………
(A) Crash
(B) Power Failure
(C) Bug
(D) Virus
(E) Fatal error
Ans : (C)

14. Access-control based on a person's fingerprints is .an example of………………
(A) biometric identification
(B) characteristic identification
(C) characteristic security
(D) fingerprint security
(E) logistics
Ans : (A)

15. The patterns of printed lines on most products are called………………
(A) prices
(B) striping
(C) scanners
(D) OCR
(E) barcodes
Ans : (E)

16. Most mail programs automatically complete the following two parts in an e-mail ………………
(A) From: and Body :
(B) From: and Date :
(C) From: and To :
(D) From: and Subject :
(E) None of these
Ans : (B)

17. The computer's capability of distinguishing spoken words is called ………………
(A) voice analysis
(B) speech acknowledgement
(C) voice recognition
(D) speech interpretation
(E) vocalisation
Ans : (C)

18. Which of the following is an advantage of mounting an application on the Web ?
(A) The possibility of 24-houraccess for users
(B) Creating a system that can extend globally
(C) Standardising the design of the interface
(D) All of these
(E) None of these
Ans : (D)

19. The first page of a Website is called the ………………
(A) Homepage
(B) Index
(C) Java Script
(D) Bookmark
(E) Intro Page
Ans : (A)

20. ERP is an acronym for ………………
(A) Enterprise Retirement Planning
(B) Enterprise Relationship Planning
(C) Enterprise Resource' Planning
(D) Enterprise Reorder Planning
(E) Enterprise Retention Planning
Ans : (C)

21. The software that allows users to surf the Internet is called a/an ………………
(A) Search Engine
(B) Internet Service Provider (ISP)
(C) Multimedia Application
(D) Browser
(E) Internet Surfing Provider
Ans : (D)

22. The issues that deal with the collection and use of data about individuals is ………………
(A) access
(B) publicity
(C) accuracy
(D) property
(E) privacy
Ans : (E)

23. A term related to sending data to a satellite is ………………
(A) downlink
(B) modulate
(C) demodulate
(D) uplink
(E) interrelate
Ans : (D)

24. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with related information is called ………………
(A) hypermedia
(B) hypertext
(C) HTML
(D) URL
(E) FTP
Ans : (B)

25. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and ………………security is concerned with protecting software from unauthorized tampering or damage.
(A) data
(B) cyber
(C) Internet
(D) metaphysical
(E) publicity
Ans : (A)

26. Hackers ………………
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) are people who are allergic to computers
(E) break into other people's computers
Ans : (E)

27. Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
(E) data looting
Ans : (C)

28. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
(E) spill
Ans : (A)

29. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) Loud Speakers
Ans : (B)

30. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
(E) A Mobile Phone
Ans : (C)

31. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
(E) Super Computers
Ans : (A)

32. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
(E) Telephone
Ans : (B)

33. The life-span of a CD-ROM is………………
(A) approximately one year
(B) approximately two years
(C) approximately five years
(D) approximately twenty-five years
(E) almost unlimited
Ans : (C)

34. The ……………… settings are automatic and standard.
(A) default
(B) CPU
(C) peripheral
(D) user frien9ly
(E) defaulter
Ans : (A)

35. What are the two parts of an E-mail address ?
(A) User name and street address
(B) Legal name and phone number
(C) User name and domain name
(D) Initials and password
(E) User name and Recipient name
Ans : (C)

36. Participants can see and hear each other in a/an ………………
(A) electronic mail system
(B) message system
(C) tele-conference
(D) bulletin board
(E) None of these
Ans : (C)

37. Magnetic tape is not practical for applications where data must be quickly recalled because tape is ………………
(A) a random-access medium
(B) expensive
(C) a read-only medium
(D) fragile and easily damaged
(E) a sequential-access medium
Ans : (E)

38. Why should you delete unknown e-mail attachments ?
(A) You could go to jail
(B) The person could track you down and hurt you
(C) It is bad manners
(D) It might contain a virus that could hurt your computer
(E) None of these
Ans : (D)

39. How is it possible that both programs and data can be stored on the same floppy disk ?
(A) A floppy disk has two sides, one for data and one for programs
(B) A floppy disk has to be formatted for one or for the other
(C) Programs and data are both software, and both can be stored on any memory device
(D) Floppy disks can only store data, not programs
(E) Floppy disks are better than CDs
Ans : (C)

40. What is an embedded system ?
(A) A program that comes wrapped in a box
(B) A program that is permanently part of a computer
(C) A computer that is part of a larger computer
(D) A computer and software system that controls a machine or appliance
(E) None of these
Ans : (D)

41. Which of the following will you require to hear music on your computer ?
(A) Video Card
(B) Tape Recorder
(C) Mouse
(D) Joy Stick
(E) Sound Card
Ans : (E)

42. The signal that a computer is waiting for a command from the user is ………………
(A) prompt
(B) event
(C) time slice
(D) interrupt
(E) None of these
Ans : (A)

43. This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page ………………
(A) Web browser
(B) Web search engine
(C) Web homepage
(D) Web service
(E) None of these
Ans : (A)

44. For viewing video CDs, you would use………………
(A) CD Player
(B) Windows Media Player
(C) Windows Video Player
(D) Windows Movie Player
(E) None of these
Ans : (B)

45. Executing more than one program concurrently by one user on one computer is known as ………………
(A) multi-programming
(B) multi-processing
(C) time-sharing
(D) multi-tasking
(E) multi-action
Ans : (D)

46. Which of the following controls the manner of interaction between the user and the operating system ?
(A) language translator
(B) platform
(C) user interface
(D) icon
(E) None of these
Ans : (C)

47. You can keep your personal flies / folders in ………………
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text
(E) My Collection
Ans : (B)

48. Three types of compact disks include CD-ROM, CD-R, and ………………
(A) CD-W
(B) CD-RAM
(C) CD-DVD
(D) CD-RW
(E) None of these
Ans : (D)

49. All computers must have ………………
(A) Word processing software
(B) An operating system
(C) A printer attached
(D) A virus checking program
(E) None of these
Ans : (B)

50. Collecting personal information and effectively posing as another individual is known as the crime of ………………
(A) spooling
(B) spoofing
(C) hacking
(D) identity theft
(E) None of these
Ans : (D)
 

Friday 27 April 2012

Allahabad Bank Clerk (Second Shift) Exam., 2011



 Computer Knowledge

(Exam Held on 8-5-2011)


1. Information on a computer is stored as what ?
(A) Analog data
(B) Digital data
(C) Modem data
(D) Watts data
(E) None of these
Ans : (B)
2. C, BASIC, COBOL and Java are examples of ……… languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)
3. Most Web sites have a main page, the ………, which acts as a doorway to the rest of the Web site pages.
(A) search engine
(B) home page
(C) browser
(D) URL
(E) None of these
Ans : (B)
4. An email account includes a storage area, often called a(n)—
(A) attachment
(B) hyperlink
(C) mailbox
(D) IP address
(E) None of these
Ans : (C)
5. The ……… is the box that houses the most important parts of a computer system.
(A) software
(B) hardware
(C) input device
(D) system unit
(E) None of these
Ans : (D)
6. What type of computer could be found in a digital watch ?
(A) Mainframe computer
(B) Supercomputer
(C) Embedded computer
(D) Notebook computer
(E) None of these
Ans : (C)
7. What is a modem connected to ?
(A) Processor
(B) Mother board
(C) Printer
(D) Phone line
(E) None of these
Ans : (D)
8. A(n) ……… is a collection of information that determines which files you can access and which settings you use.
(A) network
(B) user account
(C) operating system
(D) file system
(E) None of these
Ans : (B)
9. The space in your computer that loads and works with data—
(A) cache memory
(B) CPU
(C) megabyte
(D) RAM memory
(E) ROM memory
Ans : (D)
10. ……… hard drives are permanently located inside the system unit and are not designed to be removed, unless they need to be repaired or replaced.
(A) Static
(B) Internal
(C) External
(D) Remove
(E) None of these
Ans : (B)
11. A computer ……… consists of two or more computers and other devices that are connected for the purpose of sharing data and programs.
(A) network
(B) system
(C) workstation
(D) device
(E) None of these
Ans : (A)
12. The taskbar is located—
(A) on the Start menu
(B) at the bottom of the screen
(C) on the Quick Launch toolbar
(D) at the top of the screen
(E) None of these
Ans : (B)
13. Once information is input into a computer, it becomes—
(A) objects
(B) data
(C) ideas
(D) facts
(E) None of these
Ans : (B)
14. Generally, you access the Recycle Bin through an icon located—
(A) on the desktop
(B) on the hard drive
(C) on the shortcut menu
(D) in the Properties dialog box
(E) None of these
Ans : (A)
15. Computer programs are written in a high-level programming language; however, the humanreadable version of a program is called—
(A) cache
(B) instruction set
(C) source code
(D) word size
(E) None of these
Ans : (C)
16. The Recycle Bin stores discarded items until—
(A) another user logs on
(B) the computer is shut down
(C) the end of the day
(D) you empty it
(E) None of these
Ans : (D)
17. A ……… is a collection of information saved as a unit.
(A) folder
(B) file
(C) path
(D) file extension
(E) None of these
Ans : (B)
18. Input, output, and processing devices grouped together represent a(n)—
(A) mobile device
(B) information processing cycle
(C) circuit board
(D) computer system
(E) None of these
Ans : (D)
19. One thousand bytes is a—
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (E)
20. What part of the computer provides only temporary storage of files ?
(A) ROM memory
(B) RAM memory
(C) Hard drive
(D) Mother board
(E) Processor
Ans : (B)
21. A(n) ……… backup contains a copy of every program, data, and system file on a computer.
(A) restoration
(B) bootstrap
(C) differential
(D) full
(E) None of these
Ans : (D)
22. Every component of your computer is either—
(A) application software or system software
(B) software or CPU/RAM
(C) hardware or software
(D) input devices or output devices
(E) None of these
Ans : (C)
23. A blinking symbol on the screen that shows where the next character will appear—
(A) delete key
(B) arrow key
(C) cursor
(D) return key
(E) Esc key
Ans : (C)
24. Being ……… means being familiar enough with computers that you understand their capabilities and limitations.
(A) computer literate
(B) computer competent
(C) computer savvy
(D) technology literate
(E) None of these
Ans : (A)
25. Which of the following could you do to remove a paragraph from a report you had written ?
(A) Delete and edit
(B) Copy and paste
(C) Cut and paste
(D) Undo typing
(E) Highlight and delete
Ans : (E)
26. The computer monitor is which type of device ?
(A) Scanning
(B) Input
(C) Processor
(D) Software
(E) Output
Ans : (E)
27. The arrow keys can be used to—
(A) delete text
(B) move the cursor in the text that has already been entered
(C) save the document
(D) move the cursor while deleting text
(E) None of these
Ans : (B)
28. Numbers in table columns are usually—
(A) right-aligned
(B) left-aligned
(C) justified
(D) centered
(E) None of these
Ans : (A)
29. To indent the first paragraph of your report, you should use this key—
(A) esc
(B) space bar
(C) return key
(D) shift key
(E) tab key
Ans : (E)
30. Each box in a spreadsheet is called a—
(A) cell
(B) empty space
(C) record
(D) field
(E) table
Ans : (A)
31. A small picture that represents something on your screen…such as a(n)—
(A) table
(B) application
(C) photo
(D) modem
(E) icon
Ans : (E)
32. When a file is saved for the first time—
(A) a copy is automatically printed
(B) file name and folder name must be the same
(C) it does not need a name
(D) it only needs a name if it is not going to be printed
(E) it must be given a name to identify it
Ans : (E)
33. Example of non-numeric data is—
(A) Employee Name
(B) Test score
(C) Bank Account No.
(D) All of these
(E) None of these
Ans : (A)
34. Which type of file is created by word processing programs ?
(A) Database file
(B) Storage file
(C) Worksheet file
(D) Document file
(E) Graphical file
Ans : (D)
35. The information you put into the computer is called—
(A) directory
(B) facts
(C) data
(D) files
(E) output
Ans : (C)
36. This can be another word for program—
(A) peripheral
(B) disk
(C) floppy
(D) hardware
(E) software
Ans : (E)
37. If a previously saved file is edited—
(A) it cannot be saved again
(B) the changes will automatically be saved in the file
(C) the file will only have to be saved again if it is more than one page in length
(D) its name must be changed
(E) the file must be saved again to store the changes
Ans : (E)
38. Mr. XYZ wants to send an electronic message to a friend. He should use this type of application—
(A) word processing
(B) email
(C) spreadsheet
(D) paper and pencil
(E) None of these
Ans : (B)
39. To print a document—
(A) select the Print command and then select OK
(B) select the Ready Printer command then select OK
(C) type PRINT and then press Enter
(D) close the document, select the Print command, then select OK
(E) None of these
Ans : (A)
40. Each ……… on a menu performs a specific action.
(A) client
(B) server
(C) node
(D) command
(E) folder
Ans : (D)

Wednesday 14 March 2012

IBPS CWE-CLERKS EXAM SOLVED PAPER

COMPUTER KNOWLEDGE
(EXAM HELD ON: 04-12-11)

1.  Assembly language is ...........
    1) Machine language
    2) High-level programming language
    3) A low-level programming language
    4) Language for assembling computers
    5) None of these

2. Which of the following is not one of the syntax rules ?
    1) The order in which you list the function's arguments
    2) The proceduence of the arguments
    3) Whether or not the function has arguments
    4) Properly spelling the function's name
    5) None of these

3. The binary system is a number system to the base .............
    1) 2   
     2) 4
    3) 8   
    4) 10
    5) 16

4. Which of the following is not an example of hardware ?
    1) Scanner   
      2) Printer
    3) Monitor   
     4) Mouse
    5) Interpreter

5. Which contents are lost when the computer turns off ?
    1) storage   
    2) input
    3) output   
    4) memory
    5) None of these

6. Which of the following is hardware and not software ?
    1) Excel   
    2) Printer driver
    3) Operating System   
   4) Power Point
    5) CPU

7. On a CD-RW you can
    1) read and write information
    2) only read information
    3) only write information
    4) read, write and rewrite information
    5) None of these

8. To be able to 'boot', the computer must have a(n) ..........
    1) Compiler   
      2) Loader
    3) Operating System   
    4) Assembler
    5) None of these

9.This is not a function category in Excel ......
    1) Logical   
      2) Data Series
    3) Financial   
    4) Text
    5) None of these

10. In Excel, this is a prerecorded formula that provides a shortcut for complex calculations .........
    1) Value   
      2) Data Series
    3) Function   
    4) Field
    5) None of these

11.The following computer's meory is characterised by low cost per bit stored ......
    1) Primary   
    2) Secondary
    3) Hard Disk   
   4) All of these
    5) None of these

12.What happens when we try to delete the fries on the floppy ?
    1) The files get moved to the Recycle Bin
    2) Files on a floppy cannot be deleted
    3) The files get deleted and can be restored again from Recycle Bin
    4) The files get deleted and cannot be restored again
    5) The file gets copied on the Hard disk

13.In word, replace option is available on ......
    1) File Menu   
    2) View Menu
    3) Edit Menu   
   4) Format Menu
    5) None of these

14.In word, you can change Page Margins by ......
    1) Dragging the scroll box on the scroll bars
    2) Deleting the margin boundaries on the Ruler
    3) Dragging the margin boundaries on the Ruler
    4) Clicking the right mouse button on the Ruler
    5) None of these

15.What type of keys are 'ctrl and shift' ?
    1) adjustment   
     2) function
    3) modifier   
     4) alphanumeric
    5) None of these

16. A word ges selected by clicking it to select a word, in word ..........
    1) once   
      2) twice
    3) three times   
    4) four times
    5) None of these

17. To reverse the effect of your last action in word, ...........
    1) Use the cut command
    2) Use the Undo command
    3) Press the delte key
    4) Use the Redo command
    5) None of these

18.Your position in the text is shown by a ..........
    1) Blinker   
      2) Cursor
    3) Causer   
    4) Pointer
    5) None of these

19. The time for the actual data transfer after receiving the request for data from secondary storage is referred to as the disk's ........
    1) transfer time   
      2) movement-time
    3) access time   
   4) data input time
    5) None of these

20.Which of the following categories would include a keyboard ?
    1) Printing Device   
      2) Output Device
    3) Pointing Device  
    4) Storage Device
    5) Input Device

21.Using output devices one can ............
    1) input data   
     2) store data
    3) scan data   
    4) view or print data
    5) None of these

22.Why is the Caps Lock key referred to as a toggle key ?
    1) Because its function goes back and forth every time it is pressed
    2) Because it cannot be used for entering numbers
    3) Because it cannot be used to delete
    4) Because it cannot be used to insert
    5) None of these

23.Using Print Preview is useful when you want to ......
    1) Colour the document
    2) Save the document
    3) Delete the document
    4) Copy the document
    5) View how the document will appear when printed

24. Which of the following can input graphical images and pictures for a computer ?
    1) Plotter   
    2) Scanner
    3) Mouse  
   4) Printer
    5) Keyboard

25.When a chart is placed on this, it is much larger and there is no other data on it .......
    1) Chart sheet   
      2) Exclusive sheet
    3) Primary sheet   
     4) Reference sheet
    5) None of these

26.The process of trading goods over the Internet is known as ..............
    1) e-selling-n-buying   
     2) e-trading
    2) e-finance  
    4) e-salemanship
    5) e-commerce

27.Information that comes from an external source and fed into compute software is called ................
    1) Output   
      2) Input
    3) Throughput   
    4) Reports
    5) None of these

28. The main system board of a computer is caleld the ..........
    1) integrated circuit   
    2) motherboard
    3) processor   
    4) microship
    5) None of these

29.This dialog box specifies or modifies the worksheet cell range containing data to be charted ............
    1) Chart Location   
    2) Chart Style
    3) Chart Options   
    4) Chart Source Data
    5) None of these

30.    If you change Windows 98 to Windows XP, you are actually performing ...........
    1) upstart   
2) upgrade
    3) update   
4) patch
    5) None of these

31. The operating system that is self-contained in a device and resident in the ROM is .......
    1) Batch Operating System
    2) Real - time Operating System
    3) Embedded Operating System
    4) Multi Operating System
    5) None of these

32.To make a copy of the current document to disk ........
    1) Use the 'Save' command
    2) This cannot be done
    3) Use the 'duplicate' command
    4) Copy the document
    4) Use the 'save as' command

33.............. is the process of carrying out comands
    1) Fetching   
   2) Storing
    3) Decoding  
   4) Executing
    5) None of these

34.In the formula, B1/B2 + B3, which of the following is the correct precedence ?
    10 Addition higher precedence than division
    20 Equal precedence among the two operators; proceed rights to left
    3) Equal procedence among the two operators; proceed left to right
    4) Division higher precedence than additon
    5) None of these

35.POST stands for ...........
    1) Power on Self Test
    2) Program on Self Test
    3) Power on System Test
    4) Program on System Test
    5) Power Off System Test

36. In word, you can use Styles to ..............
    1) Make copies of documents
    2) Save changes to documents
    3) Delete text in-documents
    4) Format your documents
    5) None of these

37. How many megabytes make a gigabyte ?
    1) 1024   
      2) 128
    3) 256   
     4) 512
    5) 64

38.An educational institution would generally have the following in its domain name ......
    1) .org   
    2) .edu
    3) .inst   
   4) .com
    5) .sch

39. Which of the following is not a term pertaining to the Internet ?
    1) Keyboard  
     2) Link
    3) Browser   
   4) Search Engine
    5) Hyperlink

40. Which of the following is used by the browser to connect to the location of the Internet resources ?
    1) Linkers   
    2) Protocol
    3) Cable   
   4) URL
    5) None of these

41.Excel would evaluate the formula, = 20*10/4*8, and return the answer ............
    1) 400   
   2) 40
    3) 625   
   4) 232
    5) 600

42. Which of the following is the fastest type of computer ?
    1) Laptop   
    2) Notebook
    3) Personal computer   
    4) Workstation
    5) Supercomputer

43.Linux is a type of ............ software
    1) Shareware   
    2) Commercial
    3) Proprietary   
    4) Open Source
    5) Hidden type

44. In a web site, the 'home' page refer to ........
    1) the best page   
     2) the last page
    3) the first page   
    4) the most recent page
    5) the oldest page

45.Which key is used to delete one character to the left of the current position of the cursor ?
    1) Backspace   
    2) Delete
    3) Insert  
    4) Esc
    5) Ctrl

46.Which part of the computer helps to store information ?
    1) Monitor   
    2) Keyboard
    3) Disk - drive  
    4) Printer
    5) Plotter

47.    To restart the computer the following combination of keys is used .........
    1) Del + Ctrl   
2) Backspace + Ctrl
    3) Esc + Ctrl   
4) Insert + Esc
    5) Ctrl + Alt + Del

48.ASCII stands for .........
    1) American Special Computer for Information Interaction
    2) American Standard Computer for Information  Interchange
    3) American Special Code for Information Interchange
    4) American Special Computer for Information  Interchange
    5) American Standard Code for Information Interchange

49.In word, when you indent a paragraph, you ....
    1) push the text in with respect to the margin
    2) change the margins on the page
    3) move the text up by one line
    4) move the text down by one line
    5) None of these

50.Which keys enable the input of numbers quickly ?
    1) ctrl, shift and alt   
    2) function keys
    3) the numeric keypad   
    4) arrow keys
    5) None of these

Answers

1) 3   2) *    3) 1    4) 5        5) 4    6) 5    7) 4    8) 3    9) 1    10) 3       11) 2    12) 4    13) 3    14) 4   
15) 3    16) 2        17) 2    18) 2    19) 3    20) 5    21) 4    22) 1     23) 5    24) 2    25) 4    26) 5  
 27) 2    28) 2        29) 1    30) 2    31) 3    32) 5    33) 4    34) *      35) 1    36) 4    37) 1    38) 2   
39) 1    40) 4        41) 3    42) 5    43) 4    44) 3    45) 1    46) 3        47) 5    48) 5    49) 1    50) 3