Wednesday 23 November 2011

IBPS CWE COMPUTER KNOWLEDGE MODEL PAPER

1. Programs from the same developer, sold bundled together, that provide better integration and share common features, toolbars and menus are known as?
1) software suites
2) integrated software
3) software processing
4) personal information
5) none of these

2. A data warehouse is which of the following?
1) Can be updated by the users
2) Contains numerous conventions and formats
3) Organized around subject areas
4) Contains only current data
5) None of these

3. _____ servers store and manages files for network users.
1) Authentication
2) Main
3) Web
4) File
5) None of these

4. All of the following are examples of real security and privacy risks except?
1) hackers
2) spam
3) viruses
4) identify theft
5) None of these

5. Loading Operating System onto RAM is called?
1) Printing
2) Saving
3) Booting
4) Staring
5) None of these

6. In MICR, C stands for?
1) Code
2) Colour
3) Computer
4) Character
5) None of these

7. System software is the set of programs that enables your computer's hardware devices and ____ software to work together?
1) management
2) processing
3) utility
4) application
5) None of these

8. _____ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat?
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these

9. The following are all computing devices, except?
1) notebook computers
2) cellular telephones
3) digital scanners
4) personal digital assistants
5) None of these

10. In a ring topology, the computer in possession of the _____ can transmit data?
1) packet
2) data
3) access method
4) token
5) None of these

11. This part of operating system manages the essential peripherals, such as the keyboard, screen, disk drives and parallel and serial ports ______
1) basic input/output
2) secondary system
3) peripheral system
4) marginal system
5) None of these

12. The bar at the top of a window that bears the name of the window is known as?
1) control panel
2) task bar
3) menu bar
4) status bar
5) title bar

13. ______ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
1) The platform
2) Application software
3) Operating system
4) The motherboard
5) None of these

14. Servers are computers that provide resources to other computers connected to a?
1) mainframe
2) network
3) super computer
4) client
5) None of these

15. A device that operates under the control of another device is called?
1) Stem
2) Slave
3) Simulator
4) Emulator
5) None of these

16. URL stands for?
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator
4) Uniform Research Locator
5) None of these

17. A database management system (DBMS) is a?
 1) hardware system used to create, maintain and provide controlled access to a data- base
2) hardware system used to create, maintain, and provide uncontrolled access to a database.
3) software system used to create, maintain, and provide uncontrolled access to a database.
4)software system used to create, maintain and provide controlled access to a database.
5)None of these

18. The design of the network is called the network?
1) architecture
2) server
3) transmission
4) type
5) None of these

19.A Proxy server is used for which of the following?
1)To provide security against unauthorized users
2)To process client requests for web pages
3)To provide TCP/IP
4)To process client requests for database access
5) None of these

20.When data changes in multiple lists and all lists are not updated, this causes?
1) data redundancy
2) information overload
3) duplicate data
4) data inconsistency
5) None of these

21._____ are words that a programming language has set aside for its own use?
1) Control words
2) Reserved words
3) Control structures
4) Reserved keys
5) None of these

22.The most frequently used instru-ctions of a computer program are likely to be fetched from?
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these

23.What is the shortcut key to "Undo" the last action in a document?
1) Ctrl + X
2) Ctrl + Y
3) Ctrl + Z
4) Ctrl + U
5) None of these

24.You must install a(n) ________ on a network if you want to share a broadband Internet connection.
1) router
2) modem
3) node
4) cable
5) None of these

25.The errors that can be pointed out by the compiler are?
1) Syntax errors
2) Semantic errors
3) Logic errors
4) System errors
5) None of these

26.Granting an outside organization access to internet web pages is often implemented using a(n)?
1) extranet
2) intranet
3) internet
4) hacker
5) None of these

27.Which term identifies a specific computer on the web and the main page of the entire site?
1) URL
2) Web site address
3) Hyperlink
4) Domain name
5) None of these

28.The code that relational database management systems use to perform their database task is referred to as?
1) QBE
2) SQL
3) OLAP
4) Sequel Server
5) None of these

29.Chip is a common nickname for a(n)?
1) transistor
2) resistor
3) integrated circuit
4) semiconductor
5) None of these

30.Programs such as Internet Explorer that serve as navigable windows into the Web are called
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these

31.What menu is selected to cut, copy and paste?
1) File
2) Tools
3) Special
4) Edit
5) None of these

32.The most important or powerful computer in a typical network is?
1) desktop
2) network client
3) network server
4) network station
5) None of these

33.The primary purpose of software is to turn data into?
1) Web sites
2) information
3) programs
4) objects
5) None of these

34.The ability to find an individual item in a file immediately _______ is used?
1) file allocation table
2) directory
3) sequential access
4) direct access
5) None of these

35.To make a notebook act as a desktop model, the notebook can be connected to a ______
which is connected to a monitor and other devices?
1) bay
2) docking station
3) port
4) network
5) None of these

36.You can use the tab key to?
1) move cursor across the screen
2) indent a paragraph
3) move the cursor down the screen
4) Only (1) and (2)
5) None of these

37.A collection of related files is called a?
1) character
2) field
3) database
4) adjusting
5) None of these

38.Storage that retains its data after the power is turned off is referred to as?
1) volatile storage
2) non-volatile storage
3) sequential storage
4) direct storage
5) None of these

39.Which of the following is an example of connectivity?
1) Internet
2) floppy disk
3) power card
4) data
5) None of these

40._______ is the process of finding errors in software code?
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these

41.A _______ contains specific rules and words that express the logical steps of an algorithm?
1) syntax
2) programming structure
3) programming language
4) logic chart
5) None of these

42.Changing an existing document is called ______ the document?
1) creating
2) editing
3) modifying
4) adjusting
5) None of these

43.Virtual memory is?
1) memory on the hard disk that the CPU uses an extended RAM
2) in RAM
3) only necessary if you do not have any RAM in your computer
4) a back up device for floppy disks
5) None of these

44.Computers use the ________ number system to store data and perform calculations?
1) decimal
2) hexadecimal
3) octal
4) binary
5) None of these

45.The ______ key will launch the start buttons?
1) esc
2) shift
3) windows
4) shortcut
5) None of these

46.To move to the beginning of a line of text, press the _____ key?
1) home
2) a
3) page up
4) enter
5) None of these

47.When sending an e-mail, the ______ line describes the contents of the message?
1) to
2) subject
3) contents
4) CC
5) None of these

48.Which groupings do you work with when formatting text in Word?
1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs
4) Indexes, characters and tables
5) None of these

49.Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these

50.The ______ tells the computer how to use its components?
1) utility
2) network
3) operating system
4) application program
5) None of these

ANSWERS:

1. (1) 2. (3) 3. (4) 4. (2) 5. (3) 6. (4) 7. (4) 8. (2) 9. (3) 10. (4)
11. (1) 12. (5) 13. (3) 14. (2) 15. (2) 16. (3) 17. (4) 18. (1) 19. (2) 20. (4)
21. (2) 22. (2) 23. (3) 24. (1) 25. (1) 26. (1) 27. (1) 28. (2) 29. (3) 30. (4)
31. (4) 32. (3) 33. (2) 34. (3) 35. (2) 36. (4) 37. (3) 38. (2) 39. (1) 40. (2)
41. (1) 42. (2) 43. (1) 44. (4) 45. (3) 46. (1) 47. (2) 48. (1) 49. (1) 50. (3)

IBPS CWE COMPUTER KNOWLEDGE MODEL QUESTIONS


1.A normal CD-ROM usually can store up to ..........
1) 680 KB   
2) 680 Bytes
3) 680 MB   
4) 680 GB
5) None of these

2.Which programming languages are classified as low level languages ?
1) Basic, COBOL, FORTRAN
2) Prolog 2, Expert Systems
3) Knowledge based Systerms
4) Assembly Languages
5) None of these

3.Which of the following devices have a limitation that we can only store information to it but cannot erase or modify it ?
1) Floppy Disk   
2) Hard Disk
3) Tape Drive   
4) CDROM
5) None of these

4.Which of the following is the largst manufacturer of Hard Disk Drives ?
1) IBM   
2) Seagate
3) Microsoft   
4) 3M
5) None of these

5. The programs which are as permanent as hardware and stored in ROM is known as
1) Hardware   
2) Software
3) Firmware   
4) ROM ware
5) None of these

6.To save a document in different location use :
1) Save   
2) Save as
3) Save as web page   
4) All of above
5) None of these

7.Which of the following is not an manufacturer of Hard Disk drives ?
1) Samsung   
2) Interl
3) Seagate   
4) Western Digital
5) None of these

8.The two basic types of record - access methods are
1) Sequential and random
2) Sequential and indexed
3) Direct and immediate
4) On-line and real time
5) None of these

9.A disadvantage of the laser printer is :
1) It is  quieter than an impact printer
2) It is very slow
3) The output is of a lower quality
4) All of the above
5) None of these

10.Different components on the motherboard of a PC processor unit are linked together by sets or parallel electrical conducting lines. What are these lines called ?
1) Conductors   
2) Buses
3) Connectors   
4) Connectively
5) None of these

11.Which of the following professions has been affected by personal computers ?
1) Medical  
2) Clerical and law
3) Accounting   
4) All of the above
5) None of these

12. What is meant by a dedicated computer ?
1) Which is used by one person only
2) Which is assigned one and only one task
3) Which uses one kind of software
4) Which is meant for application software
5) None of these

13.A computer program that translates one program instructions at a time into machine language is called a / an
1) Interpreter   
2) CPU
3) Compiler   
4) Simulator
5) None of these

14.Instructions and memory address are represented by
1) Character code   
2) Binary codes
3) Binary word   
4) Partiy bit
5) None of these

15.As compared to diskettes, the hard disks are
1) More expensive   
2) More portable
3) Less rigid   
4) Slowly accessed
5) None of these

16.The secondary storage devices can only store data but they cannot perform
1) Arithmetic Operation
2) Logic operation
3) Fetch operstions
4) Either of the above
5) None of these

17.A physical connection between the microsprocessor memory and other parts of the microcomputer is known as
1) Path   
2) Address bus
3) Router   
4) All of the above
5) None of these

18. A group of magnetic tapes, videos or terminals usually under the control of one master is
1) Cyinder   
2) Surface
3) Track   
4) Cluster
5) None of these

19.Each model of a computer has a unique
1) Assembly of a computer
2) Machine language
3) High level language
4) All of the above
5) None of these

20.Which company is the biggest player in the microprocessor industry ?
1) Motorola   
2) IBM
3) Intel   
4) AMD
5) None of these

21.Which computer memory is used for storing programs and data currently being processed by the CPU ?
1) Mass memory   
2) Internal memory
3) Non-volatile memory
4) PROM   
5) None of these

22.Microprocessors can be used t make
1) Computer   
2) Digital systems
3) Calculators   
4) All of the above
5) None of these

23.The subject of cybernetics deals with the science of
1) Genetics   
2) Control and communications
3) Molecular biology
4) Biochemistry
5) None of these

24.A term associated with the comparison of processing speeds of different computer system is :
1) EFTS   
2) MPG
3) MIPS   
4) CFPS
5) None of these

25.An integrated circuit is
1) A complicated circuit
2) An integrating device
3) Much costlier than a single transistor
4) Fabricated on a tiny silicon chip
5) None of these

26.Which command is used to set a name to a disk in DOS ?
1) VOLUME   
2) VOL
3) LABEL   
4) DISKLABEL
5) None of these

27.Which file starts MS Word ?
1) Winword.exe   
2) Word.exe
3) Msword.exe   
4) Word2003.exe
5) None of these

28.To get to the 'Symbol' dialog box, click on the ......... menu and choose 'Symbol'.
1) Insert   
2) Format
3) Tools  
4) Table
5) None of these

29.Superscript, subscript, outline, emboss, engrave are known as
1) font styles   
2) font effects
3) word art   
4) text effects
5) None of these

30.Shimmer, Sparkle text, Blinkng Background etc. are known as
1) font styles   
2) font effects
3) word art   
4) text effects
5) None of these

31.Which of the following is not availabel in Font Spacing ?
1) Normal   
2) Loosely
3) Condensed   
4) Expanded
5) None of these

32.Bold, Itali, Regular are known as
1) font styles   
2) font effects
3) word art   
4) text effects
5) None of these

33.If you begin typing an entry into acell and then realize that you don't want your entry placed into a cell, you :
1) Press the Erase key
2) Press esc
3) Press the Enter button
4) Press the Edit Formula button
5) None of these

34.Which of the following will not cut information?
1) Pressing Ctrl + C   
2) Selecting Edit > Cut. from the menu
3) Clicking the cut button ont he standard
4) Pressing Ctrl + X
5) None of these

35.Computer connected to a LAN (Local Area Network) can
1) run faster   
2) go on line
3) share information and / or share peripheral equipment
4) E-mail   
5) None of these

36.A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is ........
1) Bug   
2) Vice
3) Lice   
4) Worm
5) None of these

37.Unwanted repetitious messages, such as unsolicited bulk - e-mail is known as
1) Spam   
2) Trash
3) Calibri   
4) Courier
5) None of these

38.COBOL is widely used in ........... applications
1) Commericial   
2) Scientific
3) Space   
4) mathematical
5) None of these

39.VDU is also called
1) Screen   
2) Monitor
3) Both 1 & 2   
4) printer
5) None of these

40.What kind of software would you most likely use to keep track of billing account ?
1) Word Processing   
2) Electronic Publishing
3) Spreadsheet  
4) Web authoring
5) None of these

41.Test the validity of the statements ?
1) 1 KB = 1024 BYTES
2) 1 MB = 2048 BYTES
3) 1MB = 100 KILOBYTES
4) 1 KB = 1000 BYTES
5) None of these

42.Which of the following is not a computer language ? <br/>
1) BASIC   
2) C++
3) C#   
4) Java
5) Microsoft

43.Which among the following is a correct definition of "Digital Divide"?
1) gap between people having access to mobile and internet access
2) gap between people having access to internet / IT and no internet / IT
3) gap between people having access to broadband and narrowband internet
4) gap between people having access to internet banking and normal banking
5) gap between the people having an email account and no email account

44.Now a days Vishing has become a criminal practice of using social engineering over which of the following ?
1) Social networking sites
2) Mobile Phones   
3) E-mail   
4) Cyber cafes   
5) All of the above

45.What is the fullform of W3C?
1) World Wide Web Consortium
2) World Wide Web Company
3) World Wide Web Center
4) World Wide Web Command
5) None of these

46.Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider ?
1) Version   
2) Update
3) Help   
4) Patch
5) Syntax

47.In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits ?
1) City   
2) Bank
3) Branch   
4) Account Type
5) None of the above

48.Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry ?
1) Virtual keyboard   
2) Finger Touching
3) Touchscreen   
4) Shape Writer
5) Dasher

49.ADSL data communications technology uses which of the following for faster data transmission ?
1) Voiceband modem   
2) Wireless Modem
3) Copper telephone Lines
4) Sockets
5) None of the above

50.What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode ?
1) Reduce Power consumption
2) Back UP
3) To write contents of RAM to hard disc
4) To improve download speed
5) None of thea above

ANSWERS:
    1) 3    2) 4    3) 4    4) 2    5) 3    6) 2        7) 2    8) 1    9) 5    10) 2   
11) 4    12) 2    13) 1    14) 2    15) 1    16) 4    17) 2    18) 4    19) 2    20) 3   
21) 2    22) 4    23) 2    24) 4        25) 4    26) 3    27) 1    28) 1    29) 2    30) 4       
31) 2    32) 1    33) 2    34) 1    35) 3    36) 4  37) 1    38) 1    39) 3    40) 3   
41) 1    42) 5    43) 2    44) 2    45) 1    46) 4    47) 1    48) 1    49) 3    50) 1

Tuesday 22 November 2011

IBPS CWE COMPUTER KNOWLEDGE MODEL PAPER

1.Which command devides the surface of the blank disk into sectors and assign a unique address to each one
1) Ver   
2) Format
3) Fat   
4) Chkdsk
5) None of these

2.If you need to duplicate the entire disk, which command will you use ?
1) Copy   
2) Diskcopy
3) Chkdsk   
4) Format
5) None of these

3.A .............. sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk
1) system virus   
2) Trojan horse virus
3) file virus   
4) macro virus
5) None of these

4.A result of a computer virus can not lead to ......
1) Disk Crash   
2) Mother Board Crash
3) Corruption o f program
4) Deletion of files   
5) None of these

5.Every computer connected to an intranet or extranet must have a distinct .......
1) firewall   
2) proxy server
3) IP address   
4) domain name
5) None of these

6.Programming language built into user programs such as Word and Excel are known as ......
1) 4GLs    
2) Macro languages
3) object-oriented languages
4) visual programming languages
5) None of these

7.Firewalls are used to protect against .......
1) unauthorized Attacks   
2) virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) None of these

8.Which of the following extensions suggest that the file is a backup copy
1) Bak   
2) Bas
3) Com   
4) Txt
5) None of these

9.Computer programs are written in a high - level programming language; however, the human readable version of a program is called .......
1) cache   
2) instruction set
3) source code   
4) word size
5) None of these

10.The software tools that enable a user to interact with a computer for specific purposes are known as .......
1) Hardware   
2) Networked Software
3) Shareware   
4) Applications
5) None of these

11............... proessing is used when a large mail-order company accumulates orders and processes them together in one large set
1) Batch   
2) Online
3) Real-time   
4) Group
5) None of these

12.When a file contains instructions that can be carried out by the computer, it is often called a(n) ...... file
1) data   
2) information
3) executable   
4) application
5) None of these

13.A complier translates a program written in a high - level language into ........
1) Machine language       
2) An algorithm
3) A debugged program   
4) Java
5) None of these

14.A set of step - by - step procedures for accomplishing a task is known as a(n) .....
1) algorithm   
2) hardware program
3) software bug   
4) firmware program
5) None of these

15.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) ......
1) Workstation   
2) CPU
3) Magnetic disk   
4) Integrated circuit
5) None of these

16.A saved document is referred to as a .....
1) file   
2) word
3) folder   
4) project
5) None of these

17.What is output ?
1) What the processor takes from the user
2) What the user gives to the processor
3) What the processor gets from the user
4) What the processor gives to the user
5) None of these

18.When you turn on the computer, the boot routine will perform this test ........
1) RAM test   
2) Disk drive test
3) Memory test   
4) Power - on self-test
5) None of these

19.Which of the following storage media provides sequential access only ?
1) Floppy disk   
2) Magnetic disk
3) Magnetic tape   
4) Optical disk
5) None of these

20.In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ........
1) copy and paste   
2) copy, cut and paste
3) cut, copy and paste
4) cut and paste
5) None of these

21. Hardware includes ..........
1) all devices used to input data into a computer
2) sets of instructions that  a computer runs or executes
3) the computer and all the devices connected to it that are used to input and output data
4) all devices involved in processing information including the central processing unit, memory and storage
5) None of these

22.The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ....... command
1) Replace   
2) Find
3) Lookup   
4) Search
5) None of these

23.The term 'user interface' refers to ............
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to user commands
3) the means by which the user interacts with the peripheral devices on the computer
4) the monitor that is available for the computer
5) None of these

24.For creating a document, you use ........ command at File Menu.
1) Open   
2) Close
3) New   
4) Save
5) None of these

25.The .............. becomes different shapes depending on the task you are performing
1) Active tab   
2) Insertion point
3) Mouse pointer   
4) Ribbon
5) None of these

26.Specilizd programs that asist users in locating information on the Web are called ....
1) Information engines   
2) Search engines
3) Web browsers   
4) Resource locators
5) None of these

27.The background of any Word document ......
1) Is always white colour
2) Is the colour you presect under the Options menu
3) Is always the same for the entire document
4) Can have any colour you choose
5) None of these

28.Correcting errors in a program is referred to as .........
1) debugging   
2) bugging
3) rectifying   
4) modifying
5) None of these

29.Any letter, number, or symbol found on the keyboard that you can type into the computer ..........
1) output   
2) character
3) type   
4) print
5) font

30.A symbol or question on the screen that prompts you to take action and tell the computer what to do next ........
1) scanner   
2) questionnaire
3) prompt and dialog box
4) information seeker   
5) None of these

31.Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs .....
1) menu bar   
2) tool bar
3) user friendly   
4) word processor
5) None of these

32.The primary device that a computer uses to store information ......
1) monitor   
2) memory
3) disk   
4) hard drive
5) None of these

33.A file extension is separated from the main file name with a(n) ......, but no spaces
1) questiion nark   
2) exclamation mark
3) underscore   
4) period
5) None of these

34.Application software is designed to accomplish .......
1) real -w orld tasks   
2) computer-centric tasks
3) gaming tasks
4) operating system tasks
5) None of these

35.A ...... is a device that not only provdes surge protection, but also furnishes your computer with battery backup power during a power outage
1) surge strip   
2) USB
3) UPS   
4) battery strip
5) None of these

36.The term ............. designates equipment that might be added to a computer system to enhance, its functionality
1) digitial device   
2) system add-on
3) disk pack   
4) peripheral device
5) None of these

37........... this is the act of copying or downloading a program from a network and making multiple copies of it.
1) Network piracy   
2) Plagiarism
3) Software piracy   
4) Site-license piracy
5) None of these

38.When installing ............., the user must copy and usually decompress program files from a CDROM or other medium to the hard disk
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these

39.Which one of the following would be considered as a way that a computer virus can enter a computer system ?
1) Opening an application previously installed on the computer
2) Borrowed an illegal copy of software
3) Viewing a website without causing any additional transctions
4) Running antivirus programs
5) None of these

40.Programs such as Mozila Firefox that serve as navigable windows into the Web are called ..........
1) Hypertext  
2) Networks
3) Internet   
4) Web browsers
5) None of these

41.What is the main difference between a mainframe and a super computer ?
1) Super computer is much larger than mainframe computers
2) Super computers are much smaller than mainframe computers
3) Supercomputers are focused to execute few programs as fast as possible while mainframe uses its power to execute as many programs concurrently
4) Supercomputers are focused to execute as many programs as possible while mainframe uses its power to execute few programs as fast as possible
5) None of these

42.What is the function of Recycle Bin ?
1) Store deleted file   
2) Store temporary file
3) Store corrupted file   
4) Store Document file
5) None of these

43.Which is the latest version of MS Office ?
1) Office XP   
2) Windows XP
3) Office 2007   
4) Office 2010
5) None of these

44.Which device can not be shared in network ?
1) Floppy   
2) Keyword
3) Computer   
4) Printer
5) None of these

45.What is the purpose of query ?
1) Input data   
2) Output data
3) Sort & filter   
4) All of above
5) None of these

46.Which port doesn't exist in computer ?
1) USB   
2) Parallel
3) Com1 / Com2  
4) RAW
5) None of these

47.What is the name of exel files ?
1) Workbook   
2) Worksheet
3) Spreadsheet   
4) Spread book
5) None of these

48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
4) All of he above
5) None of these

49.Synonym can be reviewed with
1) Spelling and grammar
2) Thesaurus   
3) Both   
4) Synonym viewer   
5) None of these

50.Which command allows you to reduce fragments of file and optimize the performance of disk ?
1) Scandisk   
2) Diskcomp
3) Chkdsak   
4) Defrag
5) None of these

ANSWERS:
    1) 2    2) 2    3) 5    4) 2    5) 2    6) 4        7) 1    8) 1    9) 3    10) 4   
11) 1    12) 3    13) 1    14) 1    15) 4    16) 1    17) 4    18) 2        19) 2   20) 4   
21) 4    22) 2    23) 1    24) 3        25) 3    26) 2    27) 4    28) 1    29) 2    30) 3       
31) 1    32) 4    33) 5    34) 4    35) 3    36) 4  37) 3    38) 1    39) 2    40) 4  
41) 3    42) 1   43) 4    44) 2    45) 4    46) 4    47) 1    48) 1        49) 2    50) 4

Monday 21 November 2011

IBPS CWE COMPUTER KNOWLEDGE MODEL PAPER

1. Which operation is not performed by computer
1) Inputting   
2) Processing
3) Controlling   
4) Understanding
5) thinking

2. The computer that process both analog and digital is called
1) Analog computer   
2) Digital computer
3) Hybrid computer   
4) Mainframe computer
5) Super computer

3.A right click ont he desktop itself will ........
1) open the Display Properties dialog box
2) show a context - sensitive menu
3) open the Control Panel
4) minimize all open applications
5) None of these

4. The window which shows icons for things like the mouse, sound, and display is .......
1) My Computer  
2) Explorer
3) Control Panel   
4) Taskbar
5) Programs

5. ........... refers to a computer's ability to configure nd use a device without human interaction
1) CPU   
2) Plug and Play
3) Cache   
4) ALU
5) Format

6. This type of memory improves processing by acting as a temporary high - speed holding area between the memory and the CPU.
1) RAM   
2) ROM
3) Cache memory   
4) Flash memory
5) Virtual memory

7.These provide expansion capacbility for a computer system
1) sockets   
2) slot
3) ports   
4) both 2 and 3
5) all 1, 2, and 3

8. When was teh first Windows operating system launched ?
1) 1984   
2) 1985
3) 1988   
4) 1989
5) 1990

9.Today's computer giant IBM was earlier known by different name which was changes in 1924. What was that name ?
1) Tabulator Machine Co.
2) Computing Tabulating Recording Co.
3) The Tabulator Ltd.
 4) International Computer Ltd.
5) None of these

10.    The process of starting a or restarting a compute system by loading instructions from a secondary sstorage device into the computer memory is called
1) Duping   
2) Booting
3) Padding   
4) CPS
5) None of these

11.What does the disk drive of a computer do ?
1) Rotate the disk   
2) Read the disk
3) Load a program from the disk into the memory
4) Both 2 and 3   
5) All 1, 2, & 3

12.IBM launched its first personal computer called IBM-PC in 1981. It had chips from Intel, disk drives from Tandon, operatng system from Microsoft, the printer from Epson and the application software from everywhere. Can you name the country which contributed the video display ?
1) India   
2) China
3) Germany    
4) Taiwan
5) Japan

13.In H2O the figure 2 appeared lowered. Which effect has been applied ?
1) Superscript   
2) Lowered
3) Subscript   
4) Laid down
5) None

14. A talptop or Notebook marked 802.11n in its feature, it means device support
1) Bluetooth   
2) WiMAX
3) USB   
4) Wi-Fi LAN
5) 3G

15.You Tube service fo streaming videos online is provided by
1) Google   
2) Mirosoft
3) IBM   
4) APPle
5) Sony

16. When using charaters in Windows, what code does Windows use ?
1) ASCII   
2) UNICODE
 3) MORSE   
4) IDBC
5) WESTRN

17.Which is the latest type of primter interface ?
1) Serial   
2) DVI
3) Parallel   
4) USB
5) none

18.To produce a high - quality graphics (hardcopy) in color, you would want to use a
1) Virtual Printer   
 2) Laser Printer
3) Ink - jet Printer   
4) Plotter
5) RGB Monitor

19.What is Mail-Merge ?
1) a web based e-mail service with no spam
2) a name of Yahoo! MINDSET search feature
3) a new virus-hoax which can delete data fro mail-inbox
4) a feature of MS-Word used to create multiple documents like letters, mailing labels, name tags etc.
5) None

20.The process of checking the validity of information held in a trasncation file is
1) Verification   
2) Test data
3) Validation   
4) Updating
5) None

21. A .......... shares hardware, software, and data among authorized users.
1) network   
2) protocol
3) hyperlink   
4) transmitter
5) None of these

22.Which of the following is not a function of teh control unit ?
1) Read instructions   
2) Execute instructions
3) Interpret instructions   
4) Direct operations
5) None of these

23.Software for organizing storage and retrieval of information is a(n) ..........
1) operating system   
2) database
3) database program   
4) data warehouse
5) None of these

24.Which of the following is not true about RAM?
1) RAM is a temporary storage area
2) RAM is the same as hard disk storage
3) RAM is volatile
 4) Information stored in RAM is gone when you turn the computer off
5) None of these

25.The main directory of a disk is called the ...... directory
1) root   
2) sub
3) folder   
4) network
5) None of these

26.SUM (B1 : B8) is an example of a .........
1) function   
2) formula
3) cell address   
4) value
5) None of these

27.The most common input devices include .............. & .............
1) Monitor and keyboard
2) Monitor and mouse
3) Mouse and keyboard
4) Printer and mouse
5) None of these

28.What is the differene between a CD-ROM and a CD-RW ?
1) They are the same; just two different terms used by different manufacturers
2) A D-ROM can be written to and a CD-RW cannot
3) A CD-RW can be writen to, but a CD-ROM can only be read from
4) A CD-ROM holds more information than a CD-RW
5) None of these

29.Holding the mouse button down while moving an object or text is known as :
1) Moving   
2) Dragging
3) Dropping   
4) Highlighting
5) None of these

30. A ........ is a professionally designed document that can be adapted to the user's needs.
1) file   
2) guide
3) template   
4) user guide file
5) None of these

31.What is the intersection of a column and a row on a worksheet called ?
1) Column   
2) Value
3) Address   
4) Cell
5) None of these

32. ........ are often delivered to a PC through an e-mail attachment and are often designed to do harm
1) Viruses   
2) Spam
3) Portals   
4) Email messages
5) None of these

33.Documents converted to .......... can be published to the Web.
1) .doc file   
2) http
3) machine language   
4) HTML
5) None of these

34.All are included in removable media except the following
1) CD-ROMs   
2) Diskette
3) DVDs   
4) High disk drive
5) None of these

35.If you open some menu and then decide that you do not want to select soe option, then click the menu title again or press the key to layout the menu
1) shift   
2) tab
3) escape   
4) F1
 5) None of these

36. Straight and Uniform margins on both the sides indicate that there is ....... in the document
1) full justification   
2) full alignment
3) left justification   
4) right justification
5) None of these

37.Which of the following terms is used for the form in which the word will appear on the page?
1) Text formatting   
2) Character formatting
3) Point size   
4) Type face
5) Layout

38................ Key combination that lets you toggle between open windows
1) ALT+SHIFT+TAB   
2) ALT+CTRL+TAB
3) ALT+CTRL   
4) ALT+TAB
5) None of these

39.The secondary storage memory is also called as
1) Auxiliary Memory   
2) Attractive Memory
3) Chip Memory   
4) Read Only Memory
5) None of these

40......... is known as unauthorized access into others system
1) Hacking   
2) Encryption
3) Decryption   
4) Trafficking
5) None of these

41. VIRUS stands for
1) Vital Information Recourse Under Siege
2) Vital Infomation Reason Under Siege
3) Vital Information Recourse Under System
4) Virus Information Recourse Under Siege
5) None of these

42.Which of the following mode we use to deliver e-mail
1) Postal   
2) Courier
3) Computer   
4) Fax
5) None of these

43.A person needs to design invitation card. What type of computer program is suitable ?
1) MS-Word   
2) Desktop Publishing
3) Simulation   
4) Accounting
5) None of these

44.The term that we use to describe physical components of the system
1) Hardware   
2) Input
3) Software   
4) Output
5) None of these

45.Which of the following is different from other ?
1) Internet   
2) WIndows
3) Unix   
4) Linux
5) None of these

46.QWERTY is used with reference to :
1) Monitor   
2) Printer
3) Keyboard   
4) Mouse
5) None of these

47.What is object of UPS ?
1) Using for storage
2) To increase the speed of a computer
 3) Provids backup power
4) All of these
5) None of these

48. CPU capacity can be measured in
1) BPS   
2) MIPS
3) MHz   
4) MPI
5) KHz

49.In processing cheques which of the following I/O techniques have banks traditionally followed ?
1) OCR   
2) MICR
3) Barcode  
4) VRT
5) None of these

50. "Zipping" a fie means
1) Encrypting the message
2) Compressing the message
3) Transfer the message
4) All of these   
5) None of these

ANSWERS:
    1) 4    2) 3    3) 1    4) 3    5) 2    6) 3        7) 4    8) 2    9) 2    10) 2  
11) 4    12) 4    13) 3    14) 4    15) 1    16) 2    17) 4    18) 4        19) 4   
20) 3    21) 1    22) 4    23) 3    24) 2    25) 1    26) 2    27) 3    28) 3    29) 2    30) 3       
31) 4    32) 1    33) 4    34) 4    35) 3    36) 1   37) 1    38) 4    39) 1    40) 1   
41) 1    42) 3  43) 3    44) 2    45) 1    46) 3    47) 3    48) 3        49) 2    50) 2

IBPC CLERKS EXAM COMPUTER KNOWLEDGE MODEL PAPER


1.A normal CD-ROM usually can store up to ..........
1) 680 KB   
2) 680 Bytes
3) 680 MB   
4) 680 GB
5) None of these

2.Which programming languages are classified as low level languages ?
1) Basic, COBOL, FORTRAN
2) Prolog 2, Expert Systems
3) Knowledge based Systerms
4) Assembly Languages
5) None of these

3.Which of the following devices have a limitation that we can only store information to it but cannot erase or modify it ?
1) Floppy Disk   
2) Hard Disk
3) Tape Drive   
4) CDROM
5) None of these

4.Which of the following is the largst manufacturer of Hard Disk Drives ?
1) IBM   
2) Seagate
3) Microsoft   
4) 3M
5) None of these

5. The programs which are as permanent as hardware and stored in ROM is known as
1) Hardware   
2) Software
3) Firmware   
4) ROM ware
5) None of these

6.To save a document in different location use :
1) Save   
2) Save as
3) Save as web page   
4) All of above
5) None of these

7.Which of the following is not an manufacturer of Hard Disk drives ?
1) Samsung   
2) Interl
3) Seagate   
4) Western Digital
5) None of these

8.The two basic types of record - access methods are
1) Sequential and random
2) Sequential and indexed
3) Direct and immediate
4) On-line and real time
5) None of these

9.A disadvantage of the laser printer is :
1) It is  quieter than an impact printer
2) It is very slow
3) The output is of a lower quality
4) All of the above
5) None of these

10.Different components on the motherboard of a PC processor unit are linked together by sets or parallel electrical conducting lines. What are these lines called ?
1) Conductors   
2) Buses
3) Connectors   
4) Connectively
5) None of these

11.Which of the following professions has been affected by personal computers ?
1) Medical   
2) Clerical and law
3) Accounting   
4) All of the above
5) None of these

12.What is meant by a dedicated computer ?
1) Which is used by one person only
2) Which is assigned one and only one task
3) Which uses one kind of software
4) Which is meant for application software
5) None of these

13.A computer program that translates one program instructions at a time into machine language is called a / an
1) Interpreter   
2) CPU
3) Compiler   
4) Simulator
5) None of these

14.Instructions and memory address are represented by
1) Character code   
2) Binary codes
3) Binary word   
4) Partiy bit
5) None of these

15.As compared to diskettes, the hard disks are
1) More expensive   
2) More portable
3) Less rigid   
4) Slowly accessed
5) None of these

16.The secondary storage devices can only store data but they cannot perform
1) Arithmetic Operation
2) Logic operation
3) Fetch operstions
4) Either of the above
5) None of these

17. A physical connection between the microsprocessor memory and other parts of the microcomputer is known as
1) Path   
2) Address bus
3) Router   
4) All of the above
5) None of these

18.A group of magnetic tapes, videos or terminals usually under the control of one master is
1) Cyinder   
2) Surface
3) Track   
4) Cluster
5) None of these

19. Each model of a computer has a unique
1) Assembly of a computer
2) Machine language
3) High level language
4) All of the above
5) None of these

20.Which company is the biggest player in the microprocessor industry ?
1) Motorola   
2) IBM
3) Intel   
4) AMD
5) None of these

21.Which computer memory is used for storing programs and data currently being processed by the CPU ?
1) Mass memory   
2) Internal memory
3) Non-volatile memory
4) PROM   
5) None of these

22.Microprocessors can be used t make
1) Computer   
2) Digital systems
3) Calculators   
4) All of the above
5) None of these

23.The subject of cybernetics deals with the science of
1) Genetics   
2) Control and communications
3) Molecular biology
4) Biochemistry
5) None of these

24.A term associated with the comparison of processing speeds of different computer system is :
1) EFTS   
2) MPG
3) MIPS   
4) CFPS
5) None of these

25.An integrated circuit is
1) A complicated circuit
2) An integrating device
3) Much costlier than a single transistor
4) Fabricated on a tiny silicon chip
5) None of these

26.Which command is used to set a name to a disk in DOS ?
1) VOLUME   
2) VOL
3) LABEL   
4) DISKLABEL
5) None of these

27. Which file starts MS Word ?
1) Winword.exe   
2) Word.exe
3) Msword.exe   
4) Word2003.exe
5) None of these

28.To get to the 'Symbol' dialog box, click on the ......... menu and choose 'Symbol'.
1) Insert   
2) Format
3) Tools   
4) Table
5) None of these

29.Superscript, subscript, outline, emboss, engrave are known as
1) font styles   
2) font effects
3) word art   
4) text effects
5) None of these

30.Shimmer, Sparkle text, Blinkng Background etc. are known as
1) font styles   
2) font effects
3) word art   
4) text effects
5) None of these

31.Which of the following is not availabel in Font Spacing ?
1) Normal   
2) Loosely
3) Condensed   
4) Expanded
5) None of these

32.Bold, Itali, Regular are known as
1) font styles   
2) font effects
3) word art   
4) text effects
5) None of these

33.If you begin typing an entry into acell and then realize that you don't want your entry placed into a cell, you 1) Press the Erase key
2) Press esc
3) Press the Enter button
4) Press the Edit Formula button
5) None of these

34.Which of the following will not cut information?
1) Pressing Ctrl + C    
2) Selecting Edit > Cut. from the menu
3) Clicking the cut button ont he standard
4) Pressing Ctrl + X
5) None of these

35.Computer connected to a LAN (Local Area Network) can
1) run faster   
2) go on line
3) share information and / or share peripheral equipment
4) E-mail   
5) None of these

36.A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is ........
1) Bug   
2) Vice
3) Lice   
4) Worm
5) None of these

37.Unwanted repetitious messages, such as unsolicited bulk - e-mail is known as
1) Spam   
2) Trash
3) Calibri   
4) Courier
5) None of these

38.COBOL is widely used in ........... applications
1) Commericial   
2) Scientific
3) Space   
4) mathematical
5) None of these

39.VDU is also called
1) Screen   
2) Monitor
3) Both 1 & 2   
4) printer
5) None of these

40.What kind of software would you most likely use to keep track of billing account ?
1) Word Processing   
2) Electronic Publishing
3) Spreadsheet   
4) Web authoring
5) None of these

41.Test the validity of the statements ?
1) 1 KB = 1024 BYTES
2) 1 MB = 2048 BYTES
3) 1MB = 100 KILOBYTES
4) 1 KB = 1000 BYTES
5) None of these

42.Which of the following is not a computer language ? <br/>
1) BASIC   
2) C++
3) C#   
4) Java
5) Microsoft

43.Which among the following is a correct definition of "Digital Divide"?
1) gap between people having access to mobile and internet access
2) gap between people having access to internet / IT and no internet / IT
3) gap between people having access to broadband and narrowband internet
4) gap between people having access to internet banking and normal banking
5) gap between the people having an email account and no email account

44.Now a days Vishing has become a criminal practice of using social engineering over which of the following?
1) Social networking sites
2) Mobile Phones   
3) E-mail   
4) Cyber cafes   
5) All of the above

45.What is the fullform of W3C?
1) World Wide Web Consortium
2) World Wide Web Company
3) World Wide Web Center
4) World Wide Web Command
5) None of these

46.Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider ?
1) Version   
2) Update
3) Help   
4) Patch
5) Syntax

47.In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits ?
1) City   
2) Bank
3) Branch   
4) Account Type
5) None of the above

48.Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry ?
1) Virtual keyboard   
2) Finger Touching
3) Touchscreen   
4) Shape Writer
5) Dasher

49.ADSL data communications technology uses which of the following for faster data transmission ?
1) Voiceband modem   
2) Wireless Modem
3) Copper telephone Lines
4) Sockets
5) None of the above

50.What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode ?
1) Reduce Power consumption
2) Back UP
3) To write contents of RAM to hard disc
4) To improve download speed
5) None of thea above

ANSWERS:

1) 3    2) 4    3) 4    4) 2    5) 3    6) 2        7) 2    8) 1    9) 5    10) 2   
11) 4    12) 2    13) 1    14) 2    15) 1    16) 4    17) 2    18) 4        19) 2    20) 3  
21) 2    22) 4    23) 2    24) 4        25) 4    26) 3    27) 1    28) 1    29) 2    30) 4       
31) 2    32) 1    33) 2    34) 1    35) 3    36) 4      37) 1    38) 1    39) 3    40) 3   
41) 1    42) 5   43) 2    44) 2    45) 1    46) 4    47) 1    48) 1        49) 3    50) 1

IBPS COMPUTER KNOWLEDGE PRACTICE MCQs

1. Who amongst the following is called the father of modern computing?    
(A) charles babbage   
(B) hollerith   
(C) gottfried von leibnitz   
(D) joesph M. jacquard       
(E) None of these
ANSWER: (A)


2. Which of the following is a circuit that issue signals at regular intervals...
(A) Circuit board   
(B) Clock
(C) Circuit card   
(D) Gates
(E) None of these
ANSWER: (B) 


3. ________ controls the way in which the computer system functions and provides a means by which users can interact with the computer           
(A) The platform    
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
ANSWER: (C) 


4. Paper tape is an old-established method of storing data, which replaced.....in many application.    
(B) Magnetic tape
(B) Punched card   
(C) Cartridge tape
(D) Magnetic disk
(E) None of these
ANSWER: (B) 


5. A set of related programms are...
(A) File       
(B) Arrays
(C) Package   
(D) Subscripts
(E) None of these
ANSWER: (C) 


6.Which of the following is a list-processing high-level language...       
(A) APL       
(B) LISP
(C) PROLOG   
(D) ADA
(E) None of these
ANSWER: (B) 


7. The 0 and 1 in the binary numbering system are called binary digits or ....
(A) bytes        
(B) kilobytes
(C) decimal bytes    
(D) bits        
(E) nibbles
ANSWER: (D) 


8. A monitor's ... is the distance between the holes in the mask behind the screen. This helps determine how sharp the dots appear.            
(A) refresh rate    
(B) dot pitch    
(C) resolution   
(D) colour depth
(E) None of these
ANSWER: (B) 


9.All of the following are examples of real security and privacy risks Except _
(A) hackers   
(B) spam
(C) viruses   
(D) identify theft
(E) None of these
ANSWER: (B) 


10. A directly accessible appointment calendar is a feature of a ... resident package.
(A) CPU   
(B) memory    
(C) Buffer    
(D) ALU
(E) None of these
ANSWER: (B) 


11.Which of the following code used in present day computing was developed by IBM corporation?  
(A) ASCII   
(B) Hollerith Code   
(C) Baudot Code   
(D) EBCDIC Code
(E) None of these
ANSWER: (D) 


12.The first generation computer system used...               
(A) Vacuum tubes   
(B) Transistors   
(C) Registers    
(D) Magnetic cores
(E) Silicon chip 
ANSWER: (A) 

 
13. A term associated with the comparision of processing speeds of different computer system is...        
(A) EFTS   
(B) MPG   
(C) MIPS   
(D) CFPS   
(E) None of these
ANSWER: (C) 


14. Accessing data on tapes is much ....... than that accessing data on disks.
(A) Slower   
(B) Faster   
(C) Same   
(D) All of the above
(E) None of these
ANSWER: (A) 


15. A standard intended to connect relatively lowspeed devices such as keyboards, mice, modems and printers is   
(A) Access bus   
(B) Access time
(C) Connector   
(D) Access story
(E) None of these
ANSWER: (A) 


16.The hardware in which data may be stored for a computer system is called    
(A) Registers   
(B) Bus       
(C) Control unit   
(D) Memory
(E) Chip
ANSWER: (D) 


17.A byte consists of one group of 8 bits put together. What is the largest decimal number which can be represented by a byte?
(A) 128       
(B) 256
(C) 255       
(D) 118
(E) None of these
ANSWER: (C) 


18. The 7-bit ASCII code widely used         
(A) For data communication work
(B) In IBM mainframe models
(C) For coding external memory
(D) In large machines produced by non-IBM vendors
(E) None of the above
ANSWER: (A) 


19. Perforated paper used as input or output media is known as...      
(A) Paper tape    
(B) Magnetic tape
(C) Punched paper tape
(D) Card punch
(E) None of these
ANSWER: (A) 


20. The ____ directory is mandatory for every disk.           
(A) Root   
(B) Base   
(C) Sub       
(D) Case   
(E) None of these
ANSWER: (A) 


21. The invention of the slide rule is attributed to..          
(A) Babbage   
 (B) Oughtred        
(C) Pascal   
(D) Napier        
(E) None of these
ANSWER: (B) 


22. Which of the following is not an advantage of magnetic disk storage.  

(A) The access time of magnetic disk is much less than that of magnetic tape   
(B) Disk storage is longer lasting than magnetic tape
(C) Disk storage is less expensive than tape storage
(D) All of the above
(E) None of these
ANSWER: (E) 


23. Zip disks are referred as....   
(A) Primary memory       
(B) Secondary memory     
(C) Register   
(D) All of the above
(E) None of these
ANSWER: (B)  


24. Two write a data one uses...    
(A) CD-ROM drive   
(B) CD-R drive   
(C) Record player    
(D) All of the above
(E) None of these
ANSWER: (B) 


25. The memory sizes in mainframe computers and advanced technology micro computer are expressed as   
(A) Bytes    
(B) Kilo-bytes
(C) Bits   
(D) Megabytes
(E) None of these
ANSWER: (D) 


26.A byte is comprised of   
(A) One bit   
(B) Four bits
(C) Eight bits   
(D) Sixteen bits
(E) None of these
ANSWER: (C) 


27.A hard copy would be prepared on a    
(A) Line printer   
(B) Dot matrix printer
(C) Type writer terminal   
(D) Plotter
(E) All of the above       
ANSWER: (E) 


28.A prefix for billion which is equal to .... is called as billi.       
(A) 100            
(B) 10000
(C) 1000        
(D) 10
(E) None of these
ANSWER: (D) 


29. Which of the following animations cannot be done in PowerPoint ?  
(A) bullet list, revealed one bullet point at a time
(B) clip art - Fly in from the bottom
(C) table, revealed row by row
(D) chart, revealed by series
(E) None of these
ANSWER: (C) 


30. In MS-Excel, what displays the contents of the active cell ?    
(A) Namebox    
(B) RowHeadings
(C) Formulabar    
(D) Taskpane
(E) None of these
ANSWER: (C) 


31. Several views are available in MS Front Page. Which one of the following is NOT a valid view ?      
(A) Design View     
(B) Folders View   
(C) Navigation View
(D) Web Server View
(E) None of these
ANSWER: (D)
 
32. An electronic device that is capable of accepting encoded data at its input and generating unencoded data at its output is
(A) Modem   
(B) Joystick   
(C) Decoder   
(D) Plotter
(E) None of these
ANSWER: (C) 


33. A communication protocol that converts noisy data links into communication channels free of transmission errors is known as           
(A) Data link protocol   
(B) Data link
(C) Data medium       
(D) Data model
(E) None of these
ANSWER: (A) 


34. One of the components of central processing unit (CPU) of the computer that performs mathematical and logical operations is ...       
(A) ALU (arithmetic logical unit)       
(B) Address register   
(C) Analog   
(D) All of the above
(E) None of these
ANSWER: (A) 


35. In Assembly language....    
(A) Mnemonics are used to code operations   
(B) Alphanumeric symbols are used for addresses
(C) Language lies between high-level language and machine language   
(D) All of the above
(E) None of these
ANSWER: (D) 

Sunday 20 November 2011

IBPS COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1.The instructions that tell a computer how to carry out the processing tasks are referred to as computer .........
1) programs 
2) processors
 3) input devices 
4) memory modules
5) None of these


2.An area of a computer that temporarily holds data waiting to be processed is ..........
1) CPU
2) Memory
3) Storage 
4) File
5) None of these

3. To select or unselect one word to the right
1) CTRL + SHIFT 
2) CTRL + SHIFT + UP Arrow
3) CTRL + SHIFT + Down Arrow
4) CTRL + SHIFT + Right Arrow
5) None of these

4. To maximize or restore a selected window
1) CTRL + F7 
2) CTRL + F10
3) CTRL + F8 
4) CTRL + F9
5) None of these

5. To Copy a picture of the selected window to the clipboard
1) ALT + TAB 
 2) Ctrl + TAB
3) ALT + Print Screen
4) Both (1) and (2)
5) None of these

6. .......... is the key to close a selected drop - down list; cancel a comm-and and close a dialog box.
1) TAB 
2) SHIFT
3) ESC 
4) F10
5) None of these

7.  ......... is the key we use to run the selected command.
1) SHIFT 
2) TAB
3) ENTER 
4) CTRL
5) None of these

8. ............ is the functional key to display save-as box.
1) F5 
2) F6
3) F9 
4) F12
5) None of these

9. ............ is the combination of keys to switch between the last four places that you have edited
1) ALT + CTRL + Z 
2) ALT + CTRL + Y
3) ALT + TAB + Z 
4) ALT + SHIFT + Z
5) None of these

10. ............ is the Keyboard shortcut key to insert auto sum
1) ALT 
2) ALT=
3) ALT+ 
4) ALT–
5) ALT+CTRL

11.Data becomes ................ when it is presented in a format that people can understand and use
1) processed 
2) graphs
3) information
4) presentation
5) None of these

12. The term ............. designates equipment that might be added to a computer system to enhance its functionality.
1) digital device 
2) system add-on
3) disk pack 
4) peripheral device
5) None of these

13.    A ............ is a microprocessor - based computing device.
1) personal computer
2) mainframe
3) workstation   
4) server
5) None of these

14.    RAM can be thought of as the ......... for the computer's processor
1) factory 
2) operating room
3) waiting room 
4) planning room
5) None of these

15.    Which of the following are the functions of a operating system
1) Allocates resources
 2) Monitors Activities
3) Manages disks and files
4) All of the above
5) Only 1 and 2

16.    To move a copy of file from one computer to another over a communication channel is called ?
1) File transfer 
2) File encryption
3) File modification 
4) File copying
5) None of these

17.    The primary function of the ............ is to set up the hardware and load and start an operating system
1) System Programs 
2) BIOS
3) CP 
4) Memory
5) None of these

18.    What kind of memory is both static and non - volatile ?
1) RAM 
2) ROM
3) BIOS 
4) CACHE
5) 5) None of these

19.    .......... is computer software designed to operate the computer hardware and to provide platform for running application software
1) Application software
2) System software
3) Software 
4) Operating system
5) None of these

20.    The ......... is the amount of data that a storage device can move from the storage medium to the Computer per second
1) data migration rate 
2) data digitizing rate
3) data transfer rate
4) data access rate
5) None of these

21.    A device, which is not connected to CPU, is called as .......
1) land-line device 
2) On-line device
3) Off-line device 
4) Device
5) None of the above

22.    What is the other name for programmed chip?
1) RAM
2) ROM
3) LSIC 
4) PROM
5) None of these

23.    On-line real time systems become popular in ........... generation
1) First Generation 
2) Second Generation
3) Third Generation 
4) FOurth Generation
5) None of thes

24.    You use a(n) ....., such as a keyboard or mouse, to input information
1) output device 
2) input device
3) storage device 
4) processing device
5) None of these

25.    ............ is the ability of a device to "jump" directly to the requested data
1) Sequential access
2) Random access
3) Quick access 
4) All of the above
5) None of these

26.    ............ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously
1) Multitasking 
2) Multithreading
3) Multiprocessing 
4) Multicoputing
5) None of these

27.    The task of performing operations like arithmetic and logical operations is called ......
1) Processing 
2) Storing
3) Editing 
4) Sorting
5) None of these

28.    The ALU and Control Unit joinly known as
1) RAM 
2) ROM
3) CPU 
4) PC
5) None of these

29.    RAM is an example of
1) Secondary memory
2) Primary memory
3) Main memory     
4) Both (1) and (2)
5) None of these

30.    Magnetic disk is an example of
1) Secondary memory
2) Primary meory
3) Main memory   
4) Botha (1) and (2)
5) None of these

31.    Which one of the following is NOT a computer language /
1) MS-Excel 
2) BASIC
3) COBOL 
4) C++
5) None of these

32.    Each memory cell has a unique number, assigned to it is called as the ....... of the cell
1) Address  
2) Register
3) Number 
4) Path
5) None of these

33.    RAm is also called as
1) Read / Write Memory
2) Long Memory
3) Permanent Memory
4) Primary Memory
5) None of these

34.    ............ Store data or information temporarily and pass it on as directed by the control unit
1) Address 
2) Register
3) Number 
4) Memory
5) None of these

35.    Select the Odd one
1) Operating system 
2) Interpreter
3) Compiler 
4) Assembler
5) None of these

36.    A ............ is an additional set of commands that the computer displays after you make a selection from the main menu
1) dialog box 
2) submenu
3) menu selection 
4) All of the above
5) None of these

37.    COBOL is an acronym for .............
1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these

38.    All of the following are examples of real security and privacy risks EXCEPT
1) hackers 
2) Spam
3) viruses 
4) identity theft
5) None of these

39.    Which of the following is NOT one of the four major data processing functions of a computer?
1) gathering data
2) processing data into information
3) analyzing the data or information
4) storing the data or information
5) None of these

40.    All of the following are examples of storage devices EXCEPT :
1) hard disk drives 
2) printers
3) floppy disk drives 
4) CD drives 
5) Pen drives

41.    The CPU and memory are located on the :
1) expansion board 
2) motherboard
3) storage device 
4) output device
5) display board

42.    .............. is the science that attempts to produce machines that display the same type of intelligence that humans do
1) Nanoscience 
2) Nanotechnology
3) Simulation
4) Aritificial intelligence (Al)
5) None of these

43.    Servers are computers that provide resources to other computers connected to a :
1) networkd 
2) mainframe
3) supercomputer 
4) client
5) internet

44.    When creating a computer program, the ......... designs the structure of the program
1) End user 
2) System Analyst
3) Programmer 
4) All of the above
5) None of these

45.    A computer program that converts an entire program into machine language at one time is called a/ an
1) interpreter 
2) simulator
3) characters 
4) numbers
5) None of these

46.    Computers process data into information by working exclusively with :
1) multimedia 
2) words
3) characters 
4) numbers
5) None of these

47.    The difference between people with access to computers and the Internet and those without this access is known as the :
1) digital divide 
2) Internet divide
3) Web divide 
4) broadband divide
5) None of these

48.    Computers manipulate data in many ways, and this manipulation is calld ......
1) upgrading  
2) processing
3) batching  
4) utilizing
5) None of these

49.    The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:
1) robotics   
2) simulation
3) computer forensics 
4) animation
5) None of these

50.    Where does most data go first with in a computer memory hierarchy ?
1) RAM 
2) ROM
3) BIOS 
4) CACHE
5) None of these

ANSWERS:
    1) 1    2) 2    3) 4    4) 2    5) 3    6) 3        7) 3    8) 4    9) 1    10) 2 
11) 3    12) 4    13) 1    14) 3    15) 4    16) 1    17) 2    18) 2        19) 2 
20) 3    21) 3    22) 2    23) 3    24) 2        25) 2    26) 1    27) 1    28) 3    29) 2    30) 1   
31) 1    32) 1    33) 1    34) 2    35) 1    36) 1   37) 1    38) 2    39) 3    40) 2 
41) 2    42) 4    43) 2    44) 2    45) 3    46) 4    47) 1    48) 2        49) 3    50) 1

Thursday 17 November 2011

COMPUTER KNOWLWDGE QUESTIONS FOR BANK EXAMS


1. The earliest calculating devices are?
a) Clock
b) Difference Engine
c) Abacus
d) Calculator

2. The basic operations performed by a computer are?
a) Arithmetic Operations
b) Logical Operations
c) Storage and relative
d) All of the above

3. The man who built the first Mec-hanical Calculator was?
a) Joseph Marie Jacquard
b) John Mauchly
c) Blaise Pascal
d) Harward Ailken

4. Punched cards were first introduced by?
a) Powers
b) Pascal
c) Jacquard
d) Herman Hollerith

5. LSTs(Large Integration) used in?
a) First generation
b) Second generation
c) Third generation
d) Fourth generation

6. What is MS Word?
a) A game
b) An Operating System
c) Word Processing Software
d) Typing tutor software

7. MS Excel is a?
a) Window based word processor package
b) Window based spreadsheet package
c) DOS based spreadsheet package
d) Window based accounting package

8. Power Point can display date from which of the following add-in software of MS-Office?
a) Equation Editor
b) Organization Chart
c) Photo Album
d) All of these

9. The first network that planted the seeds of Internet was?
a) ARPANET
b) NSF net
c) V net
d) I net

10. Abbreviation www in www.yahoo.com, stands for?
a) World Word in Wonder
b) World Wide Web
c) World Web is Widening
d) Wonderful World Web

11. What is Active Desktop?
a) A term that is synonymous with viewing your desktop as a web page
b) A feature to customize your desktop to display informat-ion you can update from the Internet.
c) Both (a) and (b) above mentioned.
d) Software

12. Active Window means?
a) The active window is designated by a different color toolbar than other open windows.
b) The window that currently open
c) Both (a) and (b) above mentioned
d) The window that is last used

13. A bitmap is?
a) Is a format which windows use for desktop wallpaper?
b) A graphic file format made up of small dots.
c) A specific kind of bitmap file with the BMP extention.
d) All of the above.

14. Which of the following printers generates character from a grid?
a) Inkjet
b) Laser
c) Daisy wheel
d) Dot matrix

15. Close Button?
a) When clicked will close the dialog box, document or program displayed in the window.
b) Is located at the right top end of the title bar of most Win-dows.
c) Implies for the small button with an X on it
d) All of the above

16. A dialog box is a one?
a) Which is a sort of on-screen from where you can fill in the blanks, make selections from lists and chose various combinations of options and settings.
b) In which you can connect to another Internet user and establish an audio and video contact using Microsoft Word.
c) In which you can give verbal commands to Microsoft Word menu
d) All of the above

17. A letter, memo, proposal or other file that is created using Microso-ft Word is called as?
a) Master
b) Slide
c) Document
d) Worksheet

18. The meaning of double-click is?
a) Pushing and releasing the main mouse button twice in rapid succession when the on-tree mouse pointer is positioned over the desired item
b) Appearance of an icon
c) To take a selection from the document and move it to the clipboard
d) All of the above

19. A folder: (A) is an organizational tool used to store files.(B) is synonymous with directory, but folder is the newer preferred term (C)contains data?

a) A only
b) B only
c) C only
d) None of the above

20. Commercially produced first computer?
a) IBM
b) MIPS
c) UNIVAC
d) EDSAC

21. Banks and other big organizations requiring large data storage use?
a) Laptop PC's
b) Desktop PC's
c) Mainframe Computer
d) Workstation

22. High Level Language useful for the beginners is?
a) BASIC
b) PASCAL
c) FORTRON
d) COBOL

23. For Scientific work the most popular language is?
a) PASCAL
b) FORTRON
c) COBOL
d) PROLOG

24. Which is not the portable computer?
a) Micro-processor
b) Calculator
c) Series Computes
d) Parallel Computers

25. OBJECT ORIENTED language is?
a) ADA
b) PROLOG
c) PASCAL
d) FORTRAN

26. Information is?
a) Summarization process of data
b) Data Information
c) Textual form of data
d) Facts and figures

27. Total memory of system can be known using?
a) DIR commands
b) MEM commands
c) Warm boot
d) TOT MEM commands

28. For running WINDOW minimum disk free space required is?
a) 8 MB
b) 10 MB
c) 16 MB
d) 32 MB

29. The first graphical web browser are?
a) Gopher
b) WAIS
c) CERN
d) Mosaic

30. The programs used to view web pages are called?
a) Clients
b) Server
c) Browser
d) Programmer

31. FTP means?
a) File Transfer Protocol
b) File Telnet Protocol
c) Fast Track Processing
d) Fine Tunning programs

32. Which among the following is faster than Main Memory?
a) RAM
b) ROM
c) Cache
d) None of the above

33. Semi Conductor Memory is known as?
a) RAM
b) ROM
c) PROM
d) EPROM

34. In which generation computers IC have been used?
a) First
b) Second
c) Third
d) Fourth

35. High level language is?
a) Machine Independent
b) Machine dependent
c) (a) And (b) are true
d) (a) And (b) are false

36. Hypertext is?
a) Text stored in the memory of the computer
b) Text displayed on the screen of the computer
c) Special text used in developing Internet developing package
d) A system of managing textual Information by creating associations between different documents

37. Information on a computer is sto-red in the form of?
a) Files
b) Folders
c) Directory
d) Data dictionary

38. TCP is?
a) Transfer control protocol
b) Transfer control process
c) Transmission control protocol
d) Transmission control process

39. Every computer on the Internet is known as?
a) Host
b) Client
c) Modem
d) Server

40. Fax machines are used to send documents through a?
a) Telephone line
b) Modems
c) Co-axial Wire
d) All of these

41.The term overflow means?
a) An excess of Internal storage
b) An excess of external storage
c) A situation where record cannot fit in to its right place
d) A device, which controls the level of humidity in the computer room.


42. In computer science, by Informa-tion we mean?
a) Any output coming out from computer
b) A report printed by computer
c) Processed data put in intelligent form
d) Plural of data

43. Which of the following are parts of the CPU?
a) Secondary Memory
b) Control unit
c) Input device
d) Printer

44. The purpose of an application program is to?
a) Meet specific user needs
b) Make equivalent run better
c) Allow the operating system to control resources better
d) Convert program written in high-level language to machine level language

45. Micro computers are?
a) 8 bit
b) 16 bit
c) 32 bit
d) Either 8 or 16 bit

ANSWERS:

1. (c) 2. (d) 3. (c) 4. (d) 5. (d) 6. (c) 7. (b) 8. (d) 9. (a) 10. (b)
11. (c) 12. (c) 13. (d) 14. (d) 15. (d) 16. (a) 17. (c) 18. (a) 19. (d) 20. (c)
21. (c) 22. (d) 23. (b) 24. (d) 25. (a) 26. (a) 27. (b) 28. (a) 29. (d) 30. (c)
31. (a) 32. (c) 33. (a) 34. (c) 35. (a) 36. (d) 37. (a) 38. (c) 39. (a) 40. (a)
41. (a) 42. (c) 43. (b) 44. (a) 45. (d)