Sunday 22 March 2015

IBPS Bank Clerk CWE Solved Paper -2012 (Exam Held on 14-12-2012)

1. If you wish to extend the length of the network without having the signal degrade, you would use a– 
(A) resonance (B) router (C) gateway (D) switch (E) repeater
Ans : (E)

2. A repair for a known software bug, usually available at no charge on the internet, is called a– 
(A) version (B) patch (C) tutorial (D) FAQ (E) rectifier
Ans : (B)

3. URL stands for– 
(A) Universal Research List (B) Universal Resource List 
(C) Uniform Research List (D) Uniform Research Locator
(E) Uniform Resource Locator
Ans : (D)

4. When data changes in multiple lists and all lists are not updated, this causes– 
(A) data redundancy (B) information overload (C) duplicate data (D) data inconsistency (E) data repetition
Ans : (D)

5. What is a backup?
(A) Restoring the information backup (B) An exact copy of a system’s information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these (E) None of these
Ans : (D)

6. The Internet is– 
(A) a large network of networks (B) an internal communication system for a business
(C) a communication system for the Indian government (D) a communication system for some states of India
(E) a communication system for some cities of Indian
Ans : (A)

7. Computers that are portable and convenient for users who travel are known as– 
(A) supercomputers (B) planners (C) minicomputers (D) file servers (E) laptops
Ans : (E)

8. What is the storage area for email messages called?
(A) A folder (B) A mailbox (C) A directory (D) The hard disk (E) None of these
Ans : (B)

9. One advantage of dial-up Internet access is– 
(A) it utilizes broadband technology (B) it is Indian
(C) it uses a router for security (D) modem speeds are very fast
(E) it utilizes existing telephone service
Ans : (E)

10. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) configuration (B) download (C) storage (D) upload (E) installation
Ans : (E)

11. Which process checks to ensure the components of the computer are operating and connected properly?
(A) Booting (B) Processing (C) Saving (D) Editing (E) Starting
Ans : (A)

12. A means of capturing an image (drawing or photo) so that it can be stored on a computer is– 
(A) Modem (B) Software (C) Scanner (D) Keyboard (E) Mouse
Ans : (C)

13. An error in a computer porgram–
(A) Crash (B) Power Failure (C) Bug (D) Virus (E) Fatal error
Ans : (C)

14. Access control based on a person’s fingerprints is an example of– 
(A) biometric identification (B) characteristic identification 
(C) characteristics security (D) fingerprint security
(E) logistics
Ans : (A)

15. The patterns of printed lines on most products are called– 
(A) prices (B) striping (C) scanners (D) OCR (E) barcodes
Ans : (E)

16. Most mail programs automatically complete the following two parts in an e-mail– 
(A) From : and Body (B) From : and Date (C) From : and To (D) From : and Subject (E) None of these
Ans : (B)

17. The computer’s capability of distinguishing spoken words is called–
(A) voice analysis (B) speech acknowledgment
(C) voice recognition (D) speech interpretation
(E) vocalization
Ans : (C)

18. Which of the following is an advantage of mounting an application on the Web?
(A) the possibility of 24 hours access for users (B) creating a system that can extend globally
(C) scandalizing the design of the interface (D) All of these
(E) None of these
Ans : (D)

19. The first page of a Web site is called the– 
(A) Homepage (B) Index (C) Java Script (D) Book mark (E) Intro Page
Ans : (A)

20. ERP is an acronym for– 
(A) Enterprise Retirement Planning (B) Enterprise Relationship Planning
(C) Enterprise Resource Planning (D) Enterprise Reorder Planning
(E) Enterprise Retention Planning
Ans : (C)

21. The software that allows users to surf the Internet is called a/an– 
(A) Search engine (B) Internet Service Provider (ISP)
(C) Multimedia application (D) Browser
(E) Internet Surfing Provider
Ans : (D)

22. The issues that deal with the collection and use of data about individuals is– 
(A) access (B) publicity (C) accuracy (D) property (E) privacy
Ans : (E)

23. Aterm relating to sending data to a satellite is– 
(A) downlink (B) modulate (C) demodulate (D) uplink (E) Interrelate
Ans : (D)

24. On-line documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with relation information are called– 
(A) hypermedia (B) hypertext (C) HTML (D) URL (E) FTP
Ans : (B)

25. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and—security is concerned with protecting software from unauthorized tampering or damage.
(A) data (B) cyber (C) Internet (D) metaphysical (E) publicity
Ans : (A)

26. Hackers– 
(A) all have the same motive (B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage (D) are people who are allergic to computers
(E) break into other people’s computers
Ans : (E)

27. Unauthorized copying of software to be used for personal gain instead of for personal backups is called– 
(A) program thievery (B) data snatching (C) software piracy (D) program looting (E) data looting
Ans : (C)

28. Junk e-mail is also called– 
(A) Spam (B) spoof (C) cookie crumb (D) sniffer script (E) Spill
Ans : (A)

29. What is usually used for displaying information at public places?
(A) Monitors (B) Overhead Projections (C) Monitors and Overhead Projections (D) Touch Screen Kiosks (E) Loud Speakers
Ans : (B)

30. What is MP3?
(A) A mouse (B) A Printer (C) A Sound format (D) A Scanner (E) A Mobile Phone
Ans : (C)

31. What is the most popular hardware for multimedia creations?
(A) PCs (B) Minicomputers (C) Mainframe Computers (D) WANs (E) Super Computers
Ans : (A)

32. For sound recording what is necessary?
(A) Speaker (B) Microphone (C) Talker (D) Mouse (E) Telephone
Ans : (D)

33. The life-span of a CD-ROM is– 
(A) approximately one year (B) approximately two years (C) approximately five years 
(D) approximately twenty-five years (E) almost unlimited
Ans : (C)

34. The................settings are automatic and standard.
(A) default (B) CPU (C) peripheral (D) user friendly (E) defaulter
Ans : (A)

35. What are the two parts of an e-mail address?
(A) User name and street address (B) Legal name and phone number 
(C) User name and domain name (D) Initials and password
(E) User Name and Recipient Name
Ans : (C)

36. Participants can see and hear each other in a/ an– 
(A) electronic mail system (B) message system (C) teleconference (D) bulletin board (E) None of these
Ans : (C)

37. Magnetic tape is not practical for applications where data must be quickly recalled because tape is–
(A) A random-access medium (B) Expensive
(C) A read-only medium (D) Fragile and easily damaged
(E) A sequential-access medium
Ans : (E)

38. Why should you delete unknown e-mail attachments?
(A) You could go to jail (B) the person could track you down and hurt you
(C) it is bad manners (D) it might contain a virus that could hurt your computer
(E) None of these
Ans : (D)

39. Which of the following will you require to hear music on your computer?
(A) Video Card (B) Tape Recorder (C) Mouse (D) Joy Stick (E) Sound Card 
Ans : (E)

40. The signal that a computer is waiting for a command from the user– 
(A) prompt (B) event (C) time slice (D) interrupt (E) None of these
Ans : (A)

Sunday 25 January 2015

COMPUTER AWARENESS PRACTICE MCQs FOR ALL BANK EXAMS

1. What is the responsibility of the logical unit in the CPU of a computer?
a) Producing result
b) Comparing numbers
c) Controlling flow of information
d) Performing mathematical operations
e) Controlling flow of data

2. Abacus was the first ___
a) Electronic computer
b) Mechanical computer
c) Electronic calculator
d) Mechanical calculator
e) Electronic chip

3. If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be ___
a) 216
b) 65,536
c) 64K
d) 128K
e) 135K

4. Instructions and memory address are represented by ___
a) Character code
b) Binary code
c) Binary word
d) Parity bit
e) Bite code

5. The terminal device that functions as a cash register, computer terminal and OCR reader is:
a) Data collection terminal
b) OCR register terminal
c) Video Display terminal
d) POS terminal
e) None of the above

6. A set of flip flops integrated together is called ____
a) Counter
b) Adder
c) Register
d) Flip flop
e) All of the above

7. People often call ______ as the brain of computer system.
a) Control Unit
b) Arithmetic Logic Unit
c) Central Processing Unit
d) Storage Unit
e) Store data

8. Which of the following is used for manufacturing chips?
a) Bus
b) Control unit
c) Semiconductors
d) a and b only
e) None of the above

9. The value of each bead in heaven is ___
a) 1
b) 3
c) 5
d) 7
e) 8

10. The first computer introduced in Nepal was ___
a) IBM 1400
b) IBM 1401
c) IBM 1402
d) IBM 1406
e) IBM 1405

11. Bluetooth is a type of radio wave information transmission system that is good for about:
a) 30 feet
b) 30 yards
c) 30 miles
d) 300 miles
e) 3000 miles

12. The telephone is an example of a(n)____ signal.
a) analog
b) digital
c) modulated
d) demodulated
e) compiler

13. Acredit card-sized expansion board that is inserted into portable computers that connects the modem
to the telephone wall jack is:
a) Internal modem
b) External modem
c) PC Card modem
d) Wireless modem
e) Wired modem

14. A modem that is contained within the system unit is called:
a) External
b) Internal
c) Wireless
d) Wi-Fi
e) Bluetooth

15. A modem that doesn't need to be connected to a telephone line is the ___ modem.
a) external
b) internal
c) wireless
d) DSL
e) NSL

16. Aspecial high-speed line used by large corporations to support digital communications is known as:
a) satellite/air connection service lines
b) cable modems
c) digital subscriber lines
d) T1, T2, T3 and T4 lines
e) None of the above

17. An affordable technology that uses existing telephone lines to provide high-speed connections
is called ________.
a) ISDN
b) microwave
c) cable modem
d) DSL
e) ALU

18. The capacity of a communication channel is measured in ___
a) Bandwidth
b) Bit capacity
c) Baud rate
d) Data flow
e) Store data

19. A relatively new technology that allows wireless connectivity:
a) Bluetooth
b) Black tooth
c) Blue band
d) Broadband
e) Wi- fi

20. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software product?
a) MS
b) DOS
c) MS DOS
d) 5.0
e) 4.2.0

21. A page fault:
a) Is an error in a specific page
b) Occurs when a program accesses a page of memory
c) Is an access to a page not currently in memory
d) None of the above
e) All of the above

22. The process of transferring data intended for a peripheral device into a disk or intermediate store so that it can be transferred to peripheral at a more convenient time or in bulk, is known as ___.
a) Multiprogramming
b) Spooling
c) Caching
d) Virtual programming
e) Code programming

23. An instruction in a programming language that is replaced by a sequence of instructions prior to assembly or compiling:
a) Procedure
b) Macro
c) Label
d) Literal
e) External

24. Banker's algorithm for resource allocation deals with:
a) Deadlock prevention
b) Deadlock avoidance
c) Deadlock recovery
d) Mutual exclusion
e) Data recovery

25. The state of a process after it encounters an I/O instruction is _____.
a) Ready
b) Blocked/ Waiting
c) Idle
d) Running
e) Compiling

26. The number of processes completed per unit time is known as__.
a) Output
b) Throughput
c) Efficiency
d) Capacity
e) Input

27. Which of the following file name extension suggests that the file is Backup copy of another file?
a) TXT
b) COM
c) BAS
d) BAK
e) BAT

ANSWERS:
1) b; 2) d; 3) b; 4) b; 5) d; 6) c; 7) c; 8) c; 9) c; 10) b
11) a; 12) a; 13) c; 14) b; 15) c; 16) d; 17) d; 18) a; 19) a; 20) d;
21) c; 22) b; 23) b; 24) b; 25) b; 26) b; 27) d.

Types of Computer

On the basis of working principle there are three types of computers.

a)Analog Computer
An analog computer (spelt analogue in British English) is a form of computer that uses continuous
physical phenomena such as electrical, mechanical or hydraulic quantities to model the problem being solved.
1. Thermometer
2. Speedometer
3. Petrol Pump Indicator
4. Multi meter

b) Digital Computer
Acomputer that performs calculations and logical operations with quantities represented as digits, usually in the binary number system.

c) Hybrid Computer (Analog + Digital)
A combination of computers those are capable of inputting and outputting in both digital and analog
signals. A hybrid computer system setup offers a cost effective method of performing complex simulations.

On the basis of Size..
a)Super Computer 
It is the fastest computer. Supercomputers are very expensive and are employed for specialized applications that require immense amounts of mathematical calculations.
For example, weather forecasting requires a supercomputer. Other uses of supercomputers
include animated graphics, fluid dynamic calculations and nuclear energy research and petroleum
exploration.
The major difference between a supercomputer and a mainframe is that a supercomputer channels
all its power into executing a few programs as fast as possible, whereas a mainframe uses itspower to execute many programs concurrently.

b)Mainframe Computer
A very large and expensive computer capable of supporting hundreds and even thousands of users
simultaneously. In the hierarchy that starts with a simple microprocessor (Eg: in watches) at the
bottom and moves to supercomputers at the top, mainframes are just below supercomputers. In
some ways, mainframes are more powerful than supercomputers because they support more simultaneous programs. But supercomputers can execute a single program
faster than a mainframe.

c) Mini Computer
In size and power, minicomputers lie between workstations and mainframes. In the past decade, the distinction between large minicomputers and small mainframes has blurred, however, as has the
distinction between small minicomputers and workstations. But in general, a minicomputer is a
multiprocessing system capable of supporting from 4 to about 200
users simultaneously.

d)Micro Computer
i. Desktop Computer: A personal or micro-mini computer sufficient to fit on a desk.
ii. Laptop Computer: A portable computer complete with an integrated screen and keyboard. It is
generally smaller in size than a desktop computer and larger than
a notebook computer.
iii. Palmtop Computer/ Digital Diary/ Notebook / PDAs:Ahandsized computer. Palmtops have no keyboard but the screen serves both as an input and output device.

e)Workstations
It is a terminal or desktop computer in a network. In this context, workstation is just a generic term
for a user's machine (client machine) in contrast to a "server" or "mainframe."

Major brands of the computer:
a) IBM/ IBM Compatible Computers
b) Apple/ Macintosh.