Showing posts with label MODEL PAPER. Show all posts
Showing posts with label MODEL PAPER. Show all posts

Saturday, 10 March 2012

BANK EXAMS COMPUTER KNOWLEDGE MCQs


1. Which function calculates the largest value in a set of numbers ?
 (1) Average
 (2) Count
 (3) Minimum
 (4) Maximum
 (5) None of these
 Ans: (4)
2. What do you use to create a chart ?
 (1) Pie Wizard    
 (2) Excel Wizard
 (3) Data Wizard    
 (4) Chart Wizard
 (5) None of these
 Ans: (4)
3. What displays the content of the active cell ?
 (1) Name box    
 (2) Row Headings
 (3) Formulabar    
 (4) Taskpane
 (5) None of these
 Ans: (3)

34. By default, your documents print in _ mode.
 (1) Landscape    
 (2) Portrait
 (3) Page Setup    
 (4) Print View
 (5) None of these
 Ans: (2)
5. What is the best way to have a data and the slide number appear on every slide ?
 (1) choose Tools, Header and Footer, click Slide tab, select the desired options, click Apply to All
 (2) choose Insert, Header and Footer, click Slide tab, select the desired options, click Apply to All
 (3) chouse View, Header and Footer, click Slide tab, select the desired options, click Apply to All
 (4) choose File, Header and Footer, click Slide tab, select the desired options, click Apply to All
 (5) None of these
 Ans: (2)
6. To move to the bottom of a document, press _ .
 (1) Insert key    
 (2) Home key
 (3) Ctrl key + End key     
(4) End key
 (5) None of these
 Ans: (3)
7. Which one of the following four words is odd?
 (1) Application
 (2) Peripheral
 (3) Programme
 (4) Software
 (5) None of these
 Ans: (2)
8. If formation of computer, the hardwares..........are used.
 (1) Monitor, Central Processing Unit (CPU), Keyboard, Mouse, Software and Network
 (2) Monitor, Central Processing Unit (CPU), Keyboard, Mouse Programme and Network
 (3) Monitor, Central Processing Unit (CPU), Keyboard, Mouse, Printer and Modem
 (4) Monitor, Central Processing Unit (CPU), Keyboard, Mouse, Application and Network
 (5) None of these
 Ans: (3)
9. In page preview mode-
 (1) You can see all pages of your document
 (2) You can only see the page you are currently working
 (3) You can only see pages that do not contain graphics
 (4) You can only see the title page of your document
 (5) None of these
 Ans: (1)
10. A CPU contains-
 (1) a card reader and a printing device
 (2) an analytical engine and a control unit
 (3) a control unit and an arithmetic logic unit
 (4) an arithmetic logic unit and a card reader
 (5) None of these
 Ans: (3)

11. Which of the following controls the process of interaction between the user and the operating system?
 (1) User interface
 (2) Language translator
 (3) Platform
 (4) Screen saver
 (5) None of these
 Ans: (1)

12. You will work on which groupings, while formating the text in word?
 (1) Table, paragraph and index
 (2) Paragraph, index and section
 (3) Character, paragraph and section
 (4) Index, character and table
 (5) None of these
 Ans: (2)

13. When you want to move some text from one page to a different page, the best method is-
 (1) drag and drop
 (2) cut and paste
 (3) delete and retype
 (4) find and replace
 (5) None of these
 Ans: (2)

14. The first computers were programmed using-
 (1) assembly language
 (2) machine language
 (3) source code
 (4) object code
 (5) spaghetti code
 Ans: (2)

15. How many are the margins on page?
 (1) Two (header and footer)
 (2) Four (Upper, lower, right, left)
 (3) Two (Landscape, portrait)
 (4) Two (Upper and lower)
 (5) None of these
 Ans: (2)

16. An is a combination of hardware and software that facilitates the sharing of information between computing devices.
 (1) network
 (2) peripheral
 (3) expansion board
 (4) digital device
 (5) None of these
 Ans: (1)

17. The settings are automatic and standard.
 (1) icon
 (2) default
 (3) CPU
 (4) peripheral
 (5) None of these
 Ans: (2)

18. Coded entries which are used to gain access to a computer system are called- 
(1) Entry codes
 (2) Passwords
 (3) Security commands
 (4) Code words
 (5) None of these
 Ans: (2)

19. To view information on the web you must have a-
 (1) cable modem
 (2) web browser
 (3) Domain Name Server
 (4) hypertext viewer
 (5) None of these
 Ans: (2)

20. Which of the following commands is given to reboot the computer ?
1) Ctrl + Alt + Del
 2) Ctrl + Shift + ?
 3) Ctrl + Shift + Del
 4) Ctrl +Alt + shift
 5) Ctrl + Alt + Tab
 Ans: (1)
21. By default, your documents print in _ mode.
1) Landscape   
 2) Portrait
 3) Page Setup   
 4) Print View
 5) None of these
 Ans: (2)
22. To find and load a file that has been saved _.
1) select the Close command
 2) select the New command
 3) select the Save command
 4) select the Open command
 5) None of these
 Ans: (4)
23. Which function calculates the largest value in a set of numbers ?
1) Average
 2) Count
 3) Minimum
 4) Maximum
 5) None of these
 Ans: (4)
24. Which of the following statements is true ?
1) Minicomputer works faster than Microcomputer
 2) Microcomputer works faster than Minicomputer
 3) Speed of both the computers is the same
 4) The speeds of both these computers. cannot be compared with the speed of advanced computer
 5) None of these
 Ans: (1)

COMPUTER KNOWLEDGE PRACTICE MCQs


1. Selection of command-
(A) Opens the copy of the document in preview 
(B) Prints the copy of displayed document
 (C) Brings change in expansion of displayed document
(D) Saves the copy of displayed document
(E) None of these
Ans: (C)

2. You organize files by storing them in-
(A) archives
(B) folders
(C) indexes    
(D) lists
(E) None of these
Ans: (B)

3. How many different documents can you have open at anyone time ?
(A) No more than three
(B) Only one
(C) As many as your computer memory will hold
(D) No more than you taskbar can display
(E) None of these
Ans: (C)

4. What type of resource is most likely to be a shared common resource in a computer network ?
(A) Printers
(B) Speakers
(C) Floppy disk drives
(D) Keyboards
(E) None of these
Ans: (A)

5. Directory in directory is called-
(A) Mini directory
(B) Junior directory
(C) Part directory
(D) Sub-directory
(E) None of these
Ans: (D)

6. Such a pre-made document, which has coordinating font, layout and background, is-
(A) Guide    
(B) Model
(C) Ruler    
(D) Template
(E) None of these
Ans: (D)

7. In order to create columnar data in Word you need to-
(A) Tab consecutively until your cursor reaches the desired place
(B) Set tabs or use the Table menu
(C) You need to use Excel
(D) Press the space bar until your cursor reaches the desired place
(E) None of these
Ans: (E)

8. Saving is a process-
(A) To copy the document from memory to stroage medium
(B) To bring change in present status of the document
(C) To change the face or entire form
(D) To develop the document by recording the text with the use of keyboard
(E) None of these
Ans: (A)

9. To insert a word into the middle of a sentence-
(A) move the cursor to the desired location in the sentence and type the new word
(B) move the cursor to the desired location in the sentence, press Enter key, and type the new word
(C) move the cursor to the beginning of the sentence and start typing
(D) retype the whole sentence
(E) None of these
Ans: (A)

10. A(n) .............. is a combination of hardware and software that facilitates the sharing of information between computing devices.
(A) network
 (B) peripheral
 (C) expansion board
 (D) digital device
 (E) None of these
 Ans: (A)


 11. In word you can force a page break-
 (A) By positioning your cursor at the appropriate place and pressing the F1 key
 (B) By using the Insert/Section Break
 (C) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
 (D) By changing the font size of your document
(E) None of these
Ans: (C)

12. Junk e-mail is also called-
(A) spam
(B) spoof
(C) sniffer script
(D) spool
(E) None of these
Ans: (A)

13. Hackers-
(A) all have the same motive
(B) break into other people's computers
(C) may legally break into computers as long as they do not do any damage
(D) are people who are allergic to computers
(E) None of these
Ans: (B)

14. What type of computers are client computers (most of the time) in a client-server system ?
(A) Mainframe
(B) Mini-computer
(C) Microcomputer
(D) PDA
(E) None of these
Ans: (C)

15. A computer cannot 'boot' if it does not have the-
(A) Compiler
(B) Loader
(C) Operating System
(D) Assembler
(E) None of these
Ans: (C)

16. The amount of vertical space between lines of text in a document is called-
(A) double-space
(B) line spacing
(C) single space
(D) vertical spacing
(E) None of these
Ans: (B)

17. Example of non-numeric data is-
(A) Employee address
(B) Examination score
(C) Bank balance
(D) All of these
(E) None of these
Ans: (A)

18. What is embedded system ?
(A) The programme which arrives by being wrapped in box.
(B) The programme which is the permanent part of the computer
(C) The computer which is the part of a big computer
(D) The computer and software system that control the machine
(E) None of these
Ans: (D)

19. First page of Website is termed as-
(A) Homepage
(B) Index
(C) JAVA script
(D) Bookmark
(E) None of these
Ans: (A)

20. ..................... is the appearance of typed characters.
(A) Size    
(B) Format
(C) Point    
(D) Colour
(E) None of these
Ans: (B)

21. When a file is saved for the first time- (A) a copy is automatically printed
(B) it must be given a name to identify it
(C) it does not need a name
(D) it only needs a name if it is not going to be printed
(E) None of these
Ans: (B)

22. Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate-
(A) CAN
(B) LAN
(C) DAN
(D) WAN
(E) TAN
Ans: (D)

23. Where are data and programme stored when the processor uses them ?
(A) Main memory
(B) Secondary memory
(C) Disk memory
(D) Programme memory
(E) None of these
Ans: (A)

24. ............... represents raw facts, where- as ................. is data made meaningful.
(A) Information, reporting
(B) Data, information
(C) Information, bits
(D) Records, bytes
(E) Bits, bytes
Ans: (B)

25. Which keystroke will take you at the beginning or the end of a long document ?
(A) Ctrl + PageUp and Ctrl + PageOown
(B) Shift + Home and Shift + End
(C) Ctrl + Home and Ctrl + End
(D) The only way is by using the right scroll bar
(E) None of these
Ans: (C)

26. What characteristic of read-only memory (ROM) makes it useful ?
 (A) ROM information can be easily updated.
 (B) Data in ROM is nonvolatile, that is, it remains there even without electrical power.
 (C) ROM provides very large amounts of inexpensive data storage.
 (D) ROM chips are easily swapped between different brands of computers.
 (E) None of these
 Ans: (B)

27. In page preview mode-
 (A) You can see all pages of your document
 (B) You can only see the page you are currently working
 (C) You can only see pages that do not contain graphics
 (D) You can only see the title page of your document
 (E) None of these
 Ans: (A)

28. If the file saved earlier is edited, then-
(A) It is essential to save the file again to store the change
 (B) The change will automatically be saved in the file
 (C) If the length is more than a page, the file will be needed to be saved
 (D) The name will be needed to be changed
 (E) None of these
 Ans: (A)

29. When creating a word-processed document, this step involves the user changing how words on the page appear, both on the screen and in printed form-
(A) Editing text
 (B) Inserting tables and indexes
 (C) Formatting text
 (D) Proofing documents
 (E) None of these
 Ans: (C)

30. Aligning of text in column is-
(A) Justified
 (B) Right
 (C) Centre    
 (D) Left
 (E) None of these
 Ans: (A)
 

Wednesday, 8 February 2012

BANK EXAMS COMPUTER KNOWLEDGE MODEL QUESTIONS

1. URL stands for
(a) Universal Research List
(b) Universal Resource List
(c) Uniform Resource Locator
(d) Uniform Research Locator
(e) None of the above

ANSWER: (c)
2. Which of the following is NOT a goal of Transaction processing system?
(a) Capture, process and store transactions
(b) Produce a variety of documents related to Routine business activities
(c) Reduce manual effort associated with Processing business transactions
(d) Produce standard reports used for Management decision making
(e) None of the above

ANSWER: (b)
3.When data changes in multiple lists and all lists are not updated, this causes
(a) Data redundancy
(b) Information overload
(c) Duplicate data
(d) Data inconsistency
(e) None of the above

ANSWER: (d)
4. Data becomes _ when it is presented in a format that people can understand and use.
(1) Processed
(2) Graphs
(3) Information
(4) Presentation
(5) None of these

ANSWER (3)
5. The term _ designates equipment that might be added to a computer system to enhance its functionality.
(1) Digital device
(2) System add-on
(3) Disk pack
(4) Peripheral device
(5) None of these

ANSWER (4)
6. What is the primary difference between viruses and a worm?
(a) A worm has the ability to self-propagate From an infected user’s computer to other Computers
(b) A worm is usually written by a cracker: Script bunnies do not have the skills to Develop a worm program
(c) A virus is very harmful to the computers it Infects: a worm is not a serious, a problem
(d) Anti-virus software is effective in fighting Viruses but not worms
(e) None of the above

ANSWER: (c)
7. You must install this on a network if you want to Share a broadband Internet connection.
(a) router
(b) Modem
(c) Node
(d) Cable
(e) None of these

ANSWER: (a)
8. ______________ is the ability of a device to ‘jump” directly to the requested data.
(1) Sequential access
(2) Random access
(3) Quick access
(4) All of these
(5) None of these

ANSWER (1)
9. Granting an outside organisation access to Internet web pages is often implemented using a (an)
(a) Extranet
(b) Intranet
(c) Internet
(d) Hacker
(e) None of these

ANSWER: (a)
10. The code that relational database management Systems use to perform their database task is Referred to as
(a) QBE
(b) SQL
(c) OLAP
(d) Sequel Server
(e) None of these

ANSWER: (b)
11. The purpose of the primary key in a database is to
(a) Unlock the database
(b) Provide a map of the data
(c) Uniquely identify a record
(d) Establish constraints on database operations
(e) None of the above

ANSWER: (c)
12. The instructions that tell a computer how to carry out the processing tasks are referred to as computer
(1) Programs
(2) Processors
(3) Input devices
(4) Memory modules
(5) None of these

ANSWER (1)
13. The ________________ is the amount of data that a storage device can move from the storage medium to the
computer per second.
(1) Data migration rate
(2) Data digitizing rate
(3) Data transfer rate
(4) Data access rate
(5) None of these

ANSWER (3)
14. C, BASIC, COBOL and Java examples of _languages.
(1) Low-level
(2) Computer
(3) System programming
(4) High-level
(5) None of the above

ANSWER (2)
15. A______________ is a microprocessor-based computing device.
(1) Personal computer
(2) Mainframe
(3) Workstation
(4) Server
(5) None of these

ANSWER (1)
16. The design of the network is called the network
(a) Architecture
(b) Server
(c) Transmission
(d) Type
(e) None of these

ANSWER: (a)
17. A _____________ converts all the statements in a program in a single batch and the resulting collection of Instructions is placed in a new file.
(1) Converter
(2) Compiler
(3) Interpreter
(4) Instruction
(5) None of these

ANSWER (2)
18. It uses pictures (called icons) and menus Displayed on the screen to send commands to the Computer system
(a) command-based user interface
(b) GUI
(c) System utility
(d) API
(e) None of the above

ANSWER: (b)
19. It contains data descriptions and defines the Name, data type, and length of each field in the Database
(a) Data dictionary
(b) Data table
(C) Data record
(d) Data field
(e) None of these

ANSWER: (a)
20. A is an additional set of commands that the computer displays after you make a selection from the main menu.
(1) Dialog box
(2) Submenu
(3) Menu selection
(4) All of these
(5) None of these

ANSWER (2)
21. Which of the following is NOT a type of Broadband internet connection?
(a) Cable
(b) DSL
(c) Dial-up
(d) Satellite
(e) None of these

ANSWER: (c)
22. in making a field this property show that it Cannot be left blank
(a) Numeric
(b) Required
(c) Calculated
(d) Validated
(e) None of these

ANSWER: (b)
23. There are viruses that are triggered by the Passage of time or on a certain date
(a) Boot-sector viruses
(b) Macro viruses
(c) Time bombs
(d) Worms
(e) None of these

ANSWER: (c)
24. What is a backup?
(a) Restoring the information backup
(b) An exact copy of a system’s information
(c) The ability to get a system up and running In the event of a system crash or failure
(d) All of the above
(e) None of the above

ANSWER: (d)
25. The internet is
(a) A large network of networks
(b) An internal communication system for a Business
(c) A communication system for the Indian Government
(d) All of the above
(e) None of the above

ANSWER: (d)

Wednesday, 14 December 2011

COMPUTER KNOWLEDGE PRACTICE QUESTIONS

1. What type of network connection is NOT a way of connecting to the Internet?
a. TCP/IP
b. Dial-up
c. ISDN
d. T1
e. T3
 
2. Which of the following is the correct syntax for a URL?
a. john@xyz.com
b. c:\windows
c. index.html
d. aol.com
e. All of the Above.
 
3. A “High Resolution” computer monitor will have:
a. High dpi, e.g. .31 dpi
b. Low dpi, e.g. .26 dpi
c. 256 colors
d. Resolution isn’t measured in dpi or colors
e. The same resolution as your printer.
 
4. Computer Memory is normally measured in:
a. Kilobytes
b. Megabytes
c. Gigabytes
d. Terabytes
e. None of the Above
 
5. In Microsoft Excel, which of the following formulas is incorrect?
a. =SUM(A1,B1,B2,C2)
b. =ROUND(SUM(A1:C2),2)
c. =ROUND(A1:C2,2)
d. =SUM(ROUND(A1:B1,B2:C2))
e. All of the Above
 
6. A world wide web contains web pages 
a. residing in many computers 
b. created using HTML 
c. with links to other web pages 
d. residing in many computers linked together using HTML
 
7. By an intranet we mean
a. a LAN of an organization
b. a Wide Area Network connecting all branches of an organization
c. a corporate computer network
d. a network connecting all computers of an organization and using the internet protocol
 
8.  Internet uses
a. Packet switching
b. Circuit switching
c. Telephone switching
d. Telex switching
 
9.  Internet is
a. a local computer network
b. a world wide network of computers
c. an interconnected network of computers
d. a world wide interconnected network of computers which use a common protocol to communicate with one another
 
10.  ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
 
11. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
 
12. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
 
13. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
 
14. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
 
15. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
 
16. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
 
17. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
 
18.____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
 
19. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
 
20. Which of the following is NOT a necessary characteristic of computer fluency?
A. Understanding the capabilities and limitations of computers
B. Being able to write computer programs
C. Becoming comfortable with the use of computers
D. Understanding the legal, ethical, and societal implications of computing
 
21. According to the U.S. Department of Labor, approximately ____________ % of American workers used computers on the job as of 2001.
A. 20
B. 40
C. 50
D. 70
 
22. Retail employees typically use ____________ terminals to process sales transactions.
A. sales processing
B. transaction point
C. automatic teller
D. point of sale
 
23. The process of ____________ involves automated study of consumer buying patterns in order to support marketing, inventory replenishment, and pricing decisions.
A. transaction processing
B. data mining
C. simulation
D. information processing
 
24. The engineering discipline that involves construction of molecularly-sized computing devices is called:
A. nanotechnology.
B. molecular processing.
C. silicon grafting.
D. nanoscience.
 
25. The prefix that stands for â•Å“billionthâ•• is:
A. giga. B. tera. C. nano. D. peta.
 
26. A small biomedical device currently on the market that can be implanted underneath the skin for identification purposes is called the:
A. Identitron.
B. Verichip.
C. Digicard.
D. Nanoguard.
 
27. The four main functions of a computer are:
A. input, processing, output, and storage.
B. learning, thinking, intelligence, and virtuosity.
C. data, information, bits, and bytes.
D. hardware, software, modeling, and operations.
 
28. The primary purpose of a computer is to process _____________ and convert it into information.
A. electricity
B. data
C. raw material
D. a bit
 
29. Bit refers to a:
A. computer language.
B. CPU instruction.
C. 0 or 1 value.
D. digital representation of an alphabetic character.
 
30. There are ____________ bits in a byte.
A. two
B. four
C. six
D. eight
 
31. In computer language, each letter, number, and an array of special characters consists of:
A. 8 kilobytes.
B. 8 bytes.
C. a bit.
D. 8 bits.
 
32. Which of the following is the correct sequence of smallest to largest unit of storage size?
A. megabyte ? terabyte ? gigabyte ? kilobyte ? petabyte
B. kilobyte ? megabyte ? gigabyte ? terabyte ? petabyte
C. kilobyte ? megabyte ? gigabyte ? petabyte ? terabyte
D. kilobyte ? megabyte ? petabyte ? terabyte ? gigabyte
 
33. The prefix kilo refers to approximately:
A. one thousand.
B. one million.
C. one hundred.
D. one billion.
 
34. Computers work in:
A. machine linguistics.
B. binary language.
C. HTML code.
D. bit language.
 
35. The metal or plastic case that houses the physical components of a computer together is called the:
A. central processing unit .
B. storage device.
C. motherboard.
D. system unit.
 
36. The brains of the computer which executes the instructions, is called the:
A. CPU.
B. RAM.
C. motherboard.
D. system unit.
 
37. Instructions and data that are about to be processed by the CPU are located in:
A. a CD-ROM.
B. RAM.
C. the hard disk.
D. the motherboard.
 
38. The circuitry that includes the CPU and memory chips is located on the:
A. system unit.
B. operating system.
C. motherboard.
D. computer platform.
 
39. All of the following are considered to be storage devices EXCEPT
a: A. floppy disk.
B. CPU.
C. CD.
D. hard disk drive.
 
40. What is the correct association between a hardware component and a computer function?
A. Monitor ? input
B. Mouse ? input
C. CPU ? storage
D. Hard disk ? processing
 
41. The main difference between application and system software is that:
A. application software is composed of program instructions but system software is not.
B. application software is stored in memory whereas system software is only in the CPU.
C. system software is unnecessary whereas application software must be present on the computer.
D. system software manages hardware whereas application software performs user tasks.
 
42. A document created in a word processing program or a budget created in a spreadsheet are both examples of documents created in:
A. application software.
B. system software.
C. an operating system.
D. a Windows platform.
 
43. Which of the following is an example of system software?
A. Word processor
B. Operating system
C. Management information system
D. Spreadsheet
 
44. The term that refers to computers that provide resources to other computers in a network is:
A. server.
B. mainframe.
C. platform.
D. resource provider.
 
45. If a large business is going to use a single computer to execute many programs for hundreds of users at the same time, performing relatively simple operations and transactions, the type of computer will probably be a
A. Supercomputer
B. PC
C. Mainframe
D. ISP

Saturday, 3 December 2011

IBPS CWE COMPUTER KNOWLEDGE MODEL PAPER


1. One megabyte equals approximately
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes

2. Data going into the computer is called?
1) Output
2) Algorithm
3) Input
4) Calculations
5) Flowchart

3. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU

4. When you are working on a document on PC, where is the document temporarily stored?
1) RAM
2) ROM
3) The CPU
4) Flash memory
5) The CD-Rom

5. Information travels between components on the mother board through-
1) Flash memory
2) CMOS
3)Bays
4) Buses
5) Peripherals

6. How are data organised in a spreadsheet?
1) Lines and spaces
2) Layers and planes
3) Height and width
4) Rows and columns
5) None of these

7. Which of the following is true?
1) Byte is a single digit in a binary number
2) Bit represents a grouping of digital numbers
3) Eight-digit binary number is called a byte
4) Eight-digit binary number is called a bit
5) None of these

8. Transformation of input into output is performed by?
1) Peripherals
2) Memory
3) Storage
4) The Input-Output unit
5) The CPU

9. How many options does a binary choice offer?
1) None
2) One
3) Two
4) It depends on the amount of memory in the computer
5) It depends on the speed of the computer's processor

10. .....is collection of web pages and ......is the very first page that we see on opening of a web-site
1) Home-page, Web-page
2) Web-site, Home-page
3) Web-page, Home-page
4) Web-page, Web-site
5) None of these

11. When the pointer is positioned on a _____ it is shaped like a hand.
1) Grammar error
2) Hyperlink
3) Screen tip
4) Spelling error
5) Formatting error

12. The _____ of a system includes the programs or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these

13. 'www' stands for _____
1) World Word Web
2) World Wide Web
3) World White Web
4) World Work Web
5) None of these

14. What menu is selected to cut, copy, and paste?
1) File
2) Tools
3) Special
4) Edit
5) None

15. You can use the tab key to
1) Move a cursor across the screen
2) Indent a paragraph
3) Move the cursor down the screen
4) Only (1) and (2)
5) None of these

16. The most important or powerful computer in a typical network is _____
1) Desktop
2) Network client
3) Network server
4) Network station
5) None of these

17. Which of the following is an example of connectivity?
1) Internet
2) Floppy disk
3) Power cord
4) Data
5) None of these

18. The ability to find an individual item in a file immediately _____ is used.
1) File allocation table
2) Directory
3) Sequential access
4) Direct access
5) None of these

19. The primary purpose of software is to turn data into _____
1) Web sites
2) Information
3) Programs
4) Objects
5) None of these

20. To what temporary area can you store text and other data, and later paste them to another location?
1) The clipboard
2) ROM
3) CD-ROM
4) The hard disk
5) None of these

21. Storage that retains its data after the power is tuned off is referred to as
1) volatile storage
2) non-volatile storage
3) sequential storage
4) direct storage
5) None of these

22. _____is the science that attempts to produce machines that display the same type of intelligence that humans do.
1) Nano science
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None of these

23. Changing an existing document is called _____ the document.
1) Creating
2) Editing
3) Modifying
4) Adjusting
5) None of these

24. Computers use the _____ number system to store data and perform calculations.
1) Decimal
2) Hexadecimal
3) Octal
4) Binary
5) None of these

25. Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these

26. The _____ key will launch the start buttons.
1) Esc
2) Shift
3) Windows
4) Shortcut
5) None of these

27. _____is the process of finding errors in software code.
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these

28. To move to the beginning of a line of text, press the _____ key.
1) Home
2) A
3) Page-up
4) Enter
5) None of these

29. Virtual memory is
1) Memory on the hard disk that the CPU uses as an extended RAM
2) RAM
3) Only necessary if you do not have any RAM in your computer
4) A back up device for floppy disks
5) None of these

30. A _____ contains specific rules and words that express the logical steps of an algorithm.
1) Syntax
2) Programming structure
3) Programming language
4) Logic chart
5) None of these

31. When sending an e-mail, the _____ line describes the contents of the message.
1) to
2) subject
3) contents
4) CC
5) None of these

32. The _____ tells the computer how to use its components.
1) Utility
2) Network
3) Operating system
4) Application program
5) None of these

33. Which grouping do you work with when formatting text in word?
1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs
4) Indexes, characters and tables
5) None of these

34. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these

35. Network components are connected to the same cable in the _____ topology.
1) Star
2) Ring
3) Bus
4) Mesh
5) Mixed

36. This component is required to process data into information and consists of integrated circuits.
1) Hard disk
2) RAM
3) CPU
4) ROM
5) None of these

37. One advantage of dial-up-internet access is ___
1) It utilises broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast
5) None of these

38. What is the term for unsolicited e-mail?
1) News group
2) Use net
3) Backbone
4) Flaming
5) Spam

39. Two or more computers connected to each other of sharing information form a _____
1) Network
2) Router
3) Server
4) Tunnel
5) Pipeline

40. Computers that are portable and convenient for users who travel are known as _____
1) Super computers
2) Lap tops
3) Mini computers
4) File servers
5) None of these

41. A computer checks the _____ of user names and passwords for a match before granting access.
1) Website
2) Network
3) Backup file
4) Data base
5) None of these

42. Office LANs that are spread geographically apart on a large scale can be connected using a corporate _____
1) CAN
2) LAN
3) DAN
4) WAN
5) TAN

43. The code for a Web page is written using _____
1) A fifth generation language
2) Win Zip
3) Peripherals
4) Hypertext Markup Language
5) URL

44. What is the process of copying software programs from secondary storage media to the hard disk called?
1) Configuration
2) Download
3) Storage
4) Upload
5) Installation

45. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as _____
1) Flash
2) Spiders
3) Cookies
4) Applets
5) Sparks

46. The first computers were programmed using _____
1) Assembly language
2) Machine language
3) Source code
4) Object code
5) Spaghetti code

47. Which process checks to ensure the components of the computer and operating are connected properly?
1) Booting
2) Processing
3) Saving
4) Editing
5) None of these

48. In a relational database, this is a data structure that organizes the information about a single topic into rows and columns.
1) Block
2) Record
3) Tuple
4) Table
5) Command line interface

49. How can the user determine what programs are available on a computer?
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the operating system for a list of installed programs.
4) Checking the existing files saved on the disk
5) None of these

50. When we run a program in HTML coding _____ is used as backend and ____ works as front-end.
1) Notepad - Internet-Explorer
2) Notepad - Msn-messenger
3) MS-Word - Internet Explorer
4) Both (1) and (2)
5) None of these

ANSWERS:

1)3 2)3 3)1 4)1 5)4 6)3 7)3 8)5 9)3 10)2 11)2 12)4 13)2 14)4 15)2 16)3 17)1 18)1 19)2 20)1 21)2 22)4 23)2 24)4 25)4 26)3 27)4 28)1 29)2 30)3 31)2 32)3 33)1 34)2 35)2 36)3 37)2 38)5 39)1 40)2 41)4 42)4 43)4 44)5 45)4 46)2 47)1 48)4 49)4 50)1

Wednesday, 23 November 2011

IBPS CWE COMPUTER KNOWLEDGE MODEL QUESTION PAPER

1.What is the ultimate purpose of Defragmentation ?
1) Make the PC faster   
2) Create More Free Space
3) Delete temporary files
4) Reduce Power consumption
5) All of the above

2.Computers process data into information by working exclusively with :
1) multimedia   
2) words
3) characters  
4) numbers
5) None of these

3.You must install a (n) ......... on a network if you want to share a broadband Internet connection
1) router   
2) modem
3) node   
4) cable
5) None of these

4.The purpose of the primary key in a database is to :
1) unlock the database
2) provide a map of the data
3) uniquely identify a record
4) establish constraints on database operations
5) None of these

5.The design of the network is called the network
1) architecture  
2) server
3) transmission   
4) type
5) None of these

6.The most frequently used instructions of a computer program are likely to be fetched from:
1) the hard disk   
2) cache memory
3) RAM   
4) registers
5) None of these

7.Personal logs or journal entries posted on the Web are known as :
1) listservs   
2) Webcasts
3) blogs   
4) subject directories
5) None of these

8.Which of the following is NOT a type of broad band internet connection ?
1) Cable   
2) DSL
3) Dial-up   
4) Satellite
5) None of these

9.Linux is a(n) ........ operating system
1) open-source   
2) Microsoft
3) Windows   
4) Mac
5) None of these

10.Which of the following places the common data elements in order from smallest to largest
1) character, file, record, field, database
2) character, record, field, database, file
3) character, field, record, file, database
4) Bit, byte, character, record, field, file, database
5) None of these

11.The internet is ..........
1) a large network of networkds
2) an internal communication system for a business
3) a communications system for the Indian government
4) All of these
5) None of these

12.Which of the following statements is FALSE concenring file names ?
1) Files may share the same name or the same extension but not both
2) Every file in the same foldr must have a unique, name
3) File extension is another name for file type
4) The file extension comes before the dot (.) followed by the file name
5) None of these

13.Which of the following would most likely NOT be a symptom of a virus ?
1) Existing program files and icons disappear
2) The CD-ROM stops functioning
3) THe Web browser opens to an unusual home page
4) Odd messages or images are displayed on the screen
5) None of these

14.What is a back up ?
1) Restoring the information backup
2) An exact copy of a system's information
3) The ability to get a system u and runnign in the event of a system crash or failure
4) All of these
5) None of these

15. ............ are lists of commands that appear on the screen
1) GUIs   
2) Icons
3) Menus   
4) Windows
5) None of these

16.What is the correct association between a hardware component and a computer function?
1) Monitor > input   
2) Mouse > input
3) CPU > storage   
4) Hard disk > processing
5) None of these

17.What is the function of Drop Cap ?
1) It does not allow capital letters to be used in the documents
2) It makes first letter of each word capital letter in the documents
3) It lets you begin a paragraph witha  large dropped initial capital letter
4) In automatically starts all paragraphs and sentences with capital letters
5) None of these

18.The errors that can be pointed out by the compiler are :
1) Syntax error  
2) Symantic error
3) Logical error   
4) Internal error
5) None of these

19. The move to the bottom of a document, press ........
1) Auto summarize  
2) Home key
3) Ctrl + Home key   
4) End key
5) Ctrl + End key

20.By default, your documents print in ..... mode
1) Landscape   
2) Portrait
3) Page setup   
4) Print preview
5) None of these

21.Select the odd one out :
1) Interpreter   
2) Operating system
3) Compiler   
4) Assembler
5) Programmer

22.For viewing video CDs, you would use ......
1) CD Player    
2) Windows Media Player
3) WIndows Video Player
4) WIndows Movie Player
5) None of these


23. What's the name for the program or service that lets you view e-mail messages ?
1) Web browser   
2) E-mail clients
3) E-mail ID   
4) Internet
5) None of these

24. What does the SMTP in an SMTP server stand for ?
1) Simple Mail Transfer Protocol
2) Serve Message Text Process
3) Short Messaging Text Process
4) Short Messaging Transfer Protocol
5) None of these

25.What's considered the 'backbone' of the World Wide Web ?
1) Uniform resource locator (URL)
2) Hypertext mark-up language (HTML)
3) Hypertext transfer protocol (HTTP)
 4) File transfer protocol (FTP)
5) None of these

26. We access the World Wide Web using :
1) Browsers
2) Instant messaging applications
3) High bandwidth   
4) Search engine
5) None of these

27.The Internet began with the development of
1) USENET   
2) ARPANET
3) Ethernet   
4) Intranet
5) None of these

28.A wireless network uses .......... waves to transmit signals
1) mechanical  
2) radio
3) sound   
4) magnetic
5) None of these

29.What device includes an adapter that decodes data sent in radio signals ?
1) modem   
2) digital translator
3) router   
4) switch
5) None of these

30.Network components are connected to the same cable in the .......... topology
1) star   
2) ring
3) bus   
4) mesh
5) None of these

31.Small application programs that run on a Web page and may ensure a form is completed properly or provide animation are known as ......
1) flash   
2) spiders
3) cookies   
4) applets
5) None of these

32.Which of the following is Not a characteristic of a compluter ?
1) Intelligence   
2) Speed
3) Versatility   
4) Automation
5) None of these

33.The WWW standard allows programs on many different computer platforms to show the information on a server. Such programs are called :
1) ISP   
2) Web Browsers
3) Web Servers   
4) Web Modular
5) None of these

34. Outlook Express is a
1) E-mail client   
2) Scheduler
3) Address book   
4) All of the above
5) None of these

35.Which of the following is not a network ?
1) Local Area Network
2) Wide Area Network
3) Optical Fibre   
4) All are networks
5) None of these

36.Which of the following is Not a characteristic of E-mail ?
1) Low cost    
2) Record maintenance in database
3) High speed  
4) Waste reduction
5) None of these

37. ........... is the science that attempts to produce machines that display the same type of intelligence that humans do
1) nanoscience   
2) Nanotechnology
3) Simulation   
4) Artificial intelligence
5) None of these

38.Who designed the first electronic computer - ENIAC ?
1) Van Neuman   
2) Joseph M Jacquard
3) J presper Eckert and John W mauchly
4) Both 1 and 2   
5) None of these

39............. is a collection of web - pages and .......... is the very first page that we see on opening of a website
1) Home page, Web page
2) Website, Home page
3) Web page, Home page
4) Web page, Website
5) None of these

40.When we run progra in HTML coding, ......... is used as back-end and ........... works as front-end
1) Notepad, Internet Explorer
2) Notepad, MSN messenger
3) MS Word, Internet Explorer
4) Both 1 and 3
5) None of these

41.The server on the internet is also known as :
1) Repeater   
2) Host
3) Gateway   
4) AND Gate
5) None of these

42.Website is a collection of :
1) HTML documents   
2) Graphic files
3) Audio and Video files
4) All of the above
5) None of these

43. ........... is a method in which multiple communicatioin devices are connected to one another efficiently
1) Switching   
2) Redundancy
3) Capacity   
4) Detecting
5) None of these

44. One computer that is nto considered a portable computer is .......
1) Mini computer   
2) A Laptop
3) Micro computer   
4) All of the above
5) None of these

45.The sharing of a medium and its path by 2 or more devices is called ..........
1) Modulation   
2) Encoding
3) Line discipline   
4) Multiplexing
5) None of these

46.Device drivers are :
1) time power cords for external storage devices
2) experts who know to maximise the performance of device
3) small, special purpose programs
4) the innermost part of the operating system
5) None of these

47. Array is ............
1) linear data structure
2) non-linear data structure
3) complex data structure
4) simple data structure
5) None of these

48.A stored link to a webpage, in order to have a quick and easy access to it later, it called :
1) Bookmark  
2) WP-link
3) Favourite   
4) Both 1 and 3
5) None of these

49.Which input device cannot be used to work in MS Office ?
1) Sanner  
2) Mouse
3) Keyboard   
4) Joy stick
5) Lightpen

50................ is an animated character that gives help in MS Office ?
1) Office worker   
2) Comic assistant
3) Office assistant   
4) All of the above
5) None of these

ANSWERS:
    1) 2    2) 4    3) 1    4) 2    5) 1    6) 2        7) 3    8) 3    9) 1    10) 3  
11) 1    12) 4     13) 2    14) 4    15) 3    16) 2    17) 3    18) 1        19) 5    20) 2  
21) 2    22) 2    23) 2    24) 1        25) 3    26) 1    27) 2    28) 2    29) 3    30) 1       
31) 1    32) 1    33) 2    34) 4    35) 3    36) 2     37) 4    38) 1    39) 2    40) 1   
41) 2    42) 4   43) 1    44) 1    45) 4    46) 3    47) 1    48) 4        49) 4    50) 3

IBPS CWE COMPUTER KNOWLEDGE MODEL PAPER

1. Programs from the same developer, sold bundled together, that provide better integration and share common features, toolbars and menus are known as?
1) software suites
2) integrated software
3) software processing
4) personal information
5) none of these

2. A data warehouse is which of the following?
1) Can be updated by the users
2) Contains numerous conventions and formats
3) Organized around subject areas
4) Contains only current data
5) None of these

3. _____ servers store and manages files for network users.
1) Authentication
2) Main
3) Web
4) File
5) None of these

4. All of the following are examples of real security and privacy risks except?
1) hackers
2) spam
3) viruses
4) identify theft
5) None of these

5. Loading Operating System onto RAM is called?
1) Printing
2) Saving
3) Booting
4) Staring
5) None of these

6. In MICR, C stands for?
1) Code
2) Colour
3) Computer
4) Character
5) None of these

7. System software is the set of programs that enables your computer's hardware devices and ____ software to work together?
1) management
2) processing
3) utility
4) application
5) None of these

8. _____ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat?
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these

9. The following are all computing devices, except?
1) notebook computers
2) cellular telephones
3) digital scanners
4) personal digital assistants
5) None of these

10. In a ring topology, the computer in possession of the _____ can transmit data?
1) packet
2) data
3) access method
4) token
5) None of these

11. This part of operating system manages the essential peripherals, such as the keyboard, screen, disk drives and parallel and serial ports ______
1) basic input/output
2) secondary system
3) peripheral system
4) marginal system
5) None of these

12. The bar at the top of a window that bears the name of the window is known as?
1) control panel
2) task bar
3) menu bar
4) status bar
5) title bar

13. ______ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
1) The platform
2) Application software
3) Operating system
4) The motherboard
5) None of these

14. Servers are computers that provide resources to other computers connected to a?
1) mainframe
2) network
3) super computer
4) client
5) None of these

15. A device that operates under the control of another device is called?
1) Stem
2) Slave
3) Simulator
4) Emulator
5) None of these

16. URL stands for?
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator
4) Uniform Research Locator
5) None of these

17. A database management system (DBMS) is a?
 1) hardware system used to create, maintain and provide controlled access to a data- base
2) hardware system used to create, maintain, and provide uncontrolled access to a database.
3) software system used to create, maintain, and provide uncontrolled access to a database.
4)software system used to create, maintain and provide controlled access to a database.
5)None of these

18. The design of the network is called the network?
1) architecture
2) server
3) transmission
4) type
5) None of these

19.A Proxy server is used for which of the following?
1)To provide security against unauthorized users
2)To process client requests for web pages
3)To provide TCP/IP
4)To process client requests for database access
5) None of these

20.When data changes in multiple lists and all lists are not updated, this causes?
1) data redundancy
2) information overload
3) duplicate data
4) data inconsistency
5) None of these

21._____ are words that a programming language has set aside for its own use?
1) Control words
2) Reserved words
3) Control structures
4) Reserved keys
5) None of these

22.The most frequently used instru-ctions of a computer program are likely to be fetched from?
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these

23.What is the shortcut key to "Undo" the last action in a document?
1) Ctrl + X
2) Ctrl + Y
3) Ctrl + Z
4) Ctrl + U
5) None of these

24.You must install a(n) ________ on a network if you want to share a broadband Internet connection.
1) router
2) modem
3) node
4) cable
5) None of these

25.The errors that can be pointed out by the compiler are?
1) Syntax errors
2) Semantic errors
3) Logic errors
4) System errors
5) None of these

26.Granting an outside organization access to internet web pages is often implemented using a(n)?
1) extranet
2) intranet
3) internet
4) hacker
5) None of these

27.Which term identifies a specific computer on the web and the main page of the entire site?
1) URL
2) Web site address
3) Hyperlink
4) Domain name
5) None of these

28.The code that relational database management systems use to perform their database task is referred to as?
1) QBE
2) SQL
3) OLAP
4) Sequel Server
5) None of these

29.Chip is a common nickname for a(n)?
1) transistor
2) resistor
3) integrated circuit
4) semiconductor
5) None of these

30.Programs such as Internet Explorer that serve as navigable windows into the Web are called
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these

31.What menu is selected to cut, copy and paste?
1) File
2) Tools
3) Special
4) Edit
5) None of these

32.The most important or powerful computer in a typical network is?
1) desktop
2) network client
3) network server
4) network station
5) None of these

33.The primary purpose of software is to turn data into?
1) Web sites
2) information
3) programs
4) objects
5) None of these

34.The ability to find an individual item in a file immediately _______ is used?
1) file allocation table
2) directory
3) sequential access
4) direct access
5) None of these

35.To make a notebook act as a desktop model, the notebook can be connected to a ______
which is connected to a monitor and other devices?
1) bay
2) docking station
3) port
4) network
5) None of these

36.You can use the tab key to?
1) move cursor across the screen
2) indent a paragraph
3) move the cursor down the screen
4) Only (1) and (2)
5) None of these

37.A collection of related files is called a?
1) character
2) field
3) database
4) adjusting
5) None of these

38.Storage that retains its data after the power is turned off is referred to as?
1) volatile storage
2) non-volatile storage
3) sequential storage
4) direct storage
5) None of these

39.Which of the following is an example of connectivity?
1) Internet
2) floppy disk
3) power card
4) data
5) None of these

40._______ is the process of finding errors in software code?
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these

41.A _______ contains specific rules and words that express the logical steps of an algorithm?
1) syntax
2) programming structure
3) programming language
4) logic chart
5) None of these

42.Changing an existing document is called ______ the document?
1) creating
2) editing
3) modifying
4) adjusting
5) None of these

43.Virtual memory is?
1) memory on the hard disk that the CPU uses an extended RAM
2) in RAM
3) only necessary if you do not have any RAM in your computer
4) a back up device for floppy disks
5) None of these

44.Computers use the ________ number system to store data and perform calculations?
1) decimal
2) hexadecimal
3) octal
4) binary
5) None of these

45.The ______ key will launch the start buttons?
1) esc
2) shift
3) windows
4) shortcut
5) None of these

46.To move to the beginning of a line of text, press the _____ key?
1) home
2) a
3) page up
4) enter
5) None of these

47.When sending an e-mail, the ______ line describes the contents of the message?
1) to
2) subject
3) contents
4) CC
5) None of these

48.Which groupings do you work with when formatting text in Word?
1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs
4) Indexes, characters and tables
5) None of these

49.Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these

50.The ______ tells the computer how to use its components?
1) utility
2) network
3) operating system
4) application program
5) None of these

ANSWERS:

1. (1) 2. (3) 3. (4) 4. (2) 5. (3) 6. (4) 7. (4) 8. (2) 9. (3) 10. (4)
11. (1) 12. (5) 13. (3) 14. (2) 15. (2) 16. (3) 17. (4) 18. (1) 19. (2) 20. (4)
21. (2) 22. (2) 23. (3) 24. (1) 25. (1) 26. (1) 27. (1) 28. (2) 29. (3) 30. (4)
31. (4) 32. (3) 33. (2) 34. (3) 35. (2) 36. (4) 37. (3) 38. (2) 39. (1) 40. (2)
41. (1) 42. (2) 43. (1) 44. (4) 45. (3) 46. (1) 47. (2) 48. (1) 49. (1) 50. (3)

IBPS CWE COMPUTER KNOWLEDGE MODEL QUESTIONS


1.A normal CD-ROM usually can store up to ..........
1) 680 KB   
2) 680 Bytes
3) 680 MB   
4) 680 GB
5) None of these

2.Which programming languages are classified as low level languages ?
1) Basic, COBOL, FORTRAN
2) Prolog 2, Expert Systems
3) Knowledge based Systerms
4) Assembly Languages
5) None of these

3.Which of the following devices have a limitation that we can only store information to it but cannot erase or modify it ?
1) Floppy Disk   
2) Hard Disk
3) Tape Drive   
4) CDROM
5) None of these

4.Which of the following is the largst manufacturer of Hard Disk Drives ?
1) IBM   
2) Seagate
3) Microsoft   
4) 3M
5) None of these

5. The programs which are as permanent as hardware and stored in ROM is known as
1) Hardware   
2) Software
3) Firmware   
4) ROM ware
5) None of these

6.To save a document in different location use :
1) Save   
2) Save as
3) Save as web page   
4) All of above
5) None of these

7.Which of the following is not an manufacturer of Hard Disk drives ?
1) Samsung   
2) Interl
3) Seagate   
4) Western Digital
5) None of these

8.The two basic types of record - access methods are
1) Sequential and random
2) Sequential and indexed
3) Direct and immediate
4) On-line and real time
5) None of these

9.A disadvantage of the laser printer is :
1) It is  quieter than an impact printer
2) It is very slow
3) The output is of a lower quality
4) All of the above
5) None of these

10.Different components on the motherboard of a PC processor unit are linked together by sets or parallel electrical conducting lines. What are these lines called ?
1) Conductors   
2) Buses
3) Connectors   
4) Connectively
5) None of these

11.Which of the following professions has been affected by personal computers ?
1) Medical  
2) Clerical and law
3) Accounting   
4) All of the above
5) None of these

12. What is meant by a dedicated computer ?
1) Which is used by one person only
2) Which is assigned one and only one task
3) Which uses one kind of software
4) Which is meant for application software
5) None of these

13.A computer program that translates one program instructions at a time into machine language is called a / an
1) Interpreter   
2) CPU
3) Compiler   
4) Simulator
5) None of these

14.Instructions and memory address are represented by
1) Character code   
2) Binary codes
3) Binary word   
4) Partiy bit
5) None of these

15.As compared to diskettes, the hard disks are
1) More expensive   
2) More portable
3) Less rigid   
4) Slowly accessed
5) None of these

16.The secondary storage devices can only store data but they cannot perform
1) Arithmetic Operation
2) Logic operation
3) Fetch operstions
4) Either of the above
5) None of these

17.A physical connection between the microsprocessor memory and other parts of the microcomputer is known as
1) Path   
2) Address bus
3) Router   
4) All of the above
5) None of these

18. A group of magnetic tapes, videos or terminals usually under the control of one master is
1) Cyinder   
2) Surface
3) Track   
4) Cluster
5) None of these

19.Each model of a computer has a unique
1) Assembly of a computer
2) Machine language
3) High level language
4) All of the above
5) None of these

20.Which company is the biggest player in the microprocessor industry ?
1) Motorola   
2) IBM
3) Intel   
4) AMD
5) None of these

21.Which computer memory is used for storing programs and data currently being processed by the CPU ?
1) Mass memory   
2) Internal memory
3) Non-volatile memory
4) PROM   
5) None of these

22.Microprocessors can be used t make
1) Computer   
2) Digital systems
3) Calculators   
4) All of the above
5) None of these

23.The subject of cybernetics deals with the science of
1) Genetics   
2) Control and communications
3) Molecular biology
4) Biochemistry
5) None of these

24.A term associated with the comparison of processing speeds of different computer system is :
1) EFTS   
2) MPG
3) MIPS   
4) CFPS
5) None of these

25.An integrated circuit is
1) A complicated circuit
2) An integrating device
3) Much costlier than a single transistor
4) Fabricated on a tiny silicon chip
5) None of these

26.Which command is used to set a name to a disk in DOS ?
1) VOLUME   
2) VOL
3) LABEL   
4) DISKLABEL
5) None of these

27.Which file starts MS Word ?
1) Winword.exe   
2) Word.exe
3) Msword.exe   
4) Word2003.exe
5) None of these

28.To get to the 'Symbol' dialog box, click on the ......... menu and choose 'Symbol'.
1) Insert   
2) Format
3) Tools  
4) Table
5) None of these

29.Superscript, subscript, outline, emboss, engrave are known as
1) font styles   
2) font effects
3) word art   
4) text effects
5) None of these

30.Shimmer, Sparkle text, Blinkng Background etc. are known as
1) font styles   
2) font effects
3) word art   
4) text effects
5) None of these

31.Which of the following is not availabel in Font Spacing ?
1) Normal   
2) Loosely
3) Condensed   
4) Expanded
5) None of these

32.Bold, Itali, Regular are known as
1) font styles   
2) font effects
3) word art   
4) text effects
5) None of these

33.If you begin typing an entry into acell and then realize that you don't want your entry placed into a cell, you :
1) Press the Erase key
2) Press esc
3) Press the Enter button
4) Press the Edit Formula button
5) None of these

34.Which of the following will not cut information?
1) Pressing Ctrl + C   
2) Selecting Edit > Cut. from the menu
3) Clicking the cut button ont he standard
4) Pressing Ctrl + X
5) None of these

35.Computer connected to a LAN (Local Area Network) can
1) run faster   
2) go on line
3) share information and / or share peripheral equipment
4) E-mail   
5) None of these

36.A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is ........
1) Bug   
2) Vice
3) Lice   
4) Worm
5) None of these

37.Unwanted repetitious messages, such as unsolicited bulk - e-mail is known as
1) Spam   
2) Trash
3) Calibri   
4) Courier
5) None of these

38.COBOL is widely used in ........... applications
1) Commericial   
2) Scientific
3) Space   
4) mathematical
5) None of these

39.VDU is also called
1) Screen   
2) Monitor
3) Both 1 & 2   
4) printer
5) None of these

40.What kind of software would you most likely use to keep track of billing account ?
1) Word Processing   
2) Electronic Publishing
3) Spreadsheet  
4) Web authoring
5) None of these

41.Test the validity of the statements ?
1) 1 KB = 1024 BYTES
2) 1 MB = 2048 BYTES
3) 1MB = 100 KILOBYTES
4) 1 KB = 1000 BYTES
5) None of these

42.Which of the following is not a computer language ? <br/>
1) BASIC   
2) C++
3) C#   
4) Java
5) Microsoft

43.Which among the following is a correct definition of "Digital Divide"?
1) gap between people having access to mobile and internet access
2) gap between people having access to internet / IT and no internet / IT
3) gap between people having access to broadband and narrowband internet
4) gap between people having access to internet banking and normal banking
5) gap between the people having an email account and no email account

44.Now a days Vishing has become a criminal practice of using social engineering over which of the following ?
1) Social networking sites
2) Mobile Phones   
3) E-mail   
4) Cyber cafes   
5) All of the above

45.What is the fullform of W3C?
1) World Wide Web Consortium
2) World Wide Web Company
3) World Wide Web Center
4) World Wide Web Command
5) None of these

46.Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider ?
1) Version   
2) Update
3) Help   
4) Patch
5) Syntax

47.In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits ?
1) City   
2) Bank
3) Branch   
4) Account Type
5) None of the above

48.Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry ?
1) Virtual keyboard   
2) Finger Touching
3) Touchscreen   
4) Shape Writer
5) Dasher

49.ADSL data communications technology uses which of the following for faster data transmission ?
1) Voiceband modem   
2) Wireless Modem
3) Copper telephone Lines
4) Sockets
5) None of the above

50.What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode ?
1) Reduce Power consumption
2) Back UP
3) To write contents of RAM to hard disc
4) To improve download speed
5) None of thea above

ANSWERS:
    1) 3    2) 4    3) 4    4) 2    5) 3    6) 2        7) 2    8) 1    9) 5    10) 2   
11) 4    12) 2    13) 1    14) 2    15) 1    16) 4    17) 2    18) 4    19) 2    20) 3   
21) 2    22) 4    23) 2    24) 4        25) 4    26) 3    27) 1    28) 1    29) 2    30) 4       
31) 2    32) 1    33) 2    34) 1    35) 3    36) 4  37) 1    38) 1    39) 3    40) 3   
41) 1    42) 5    43) 2    44) 2    45) 1    46) 4    47) 1    48) 1    49) 3    50) 1

Tuesday, 22 November 2011

IBPS CWE COMPUTER KNOWLEDGE MODEL PAPER

1.Which command devides the surface of the blank disk into sectors and assign a unique address to each one
1) Ver   
2) Format
3) Fat   
4) Chkdsk
5) None of these

2.If you need to duplicate the entire disk, which command will you use ?
1) Copy   
2) Diskcopy
3) Chkdsk   
4) Format
5) None of these

3.A .............. sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk
1) system virus   
2) Trojan horse virus
3) file virus   
4) macro virus
5) None of these

4.A result of a computer virus can not lead to ......
1) Disk Crash   
2) Mother Board Crash
3) Corruption o f program
4) Deletion of files   
5) None of these

5.Every computer connected to an intranet or extranet must have a distinct .......
1) firewall   
2) proxy server
3) IP address   
4) domain name
5) None of these

6.Programming language built into user programs such as Word and Excel are known as ......
1) 4GLs    
2) Macro languages
3) object-oriented languages
4) visual programming languages
5) None of these

7.Firewalls are used to protect against .......
1) unauthorized Attacks   
2) virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) None of these

8.Which of the following extensions suggest that the file is a backup copy
1) Bak   
2) Bas
3) Com   
4) Txt
5) None of these

9.Computer programs are written in a high - level programming language; however, the human readable version of a program is called .......
1) cache   
2) instruction set
3) source code   
4) word size
5) None of these

10.The software tools that enable a user to interact with a computer for specific purposes are known as .......
1) Hardware   
2) Networked Software
3) Shareware   
4) Applications
5) None of these

11............... proessing is used when a large mail-order company accumulates orders and processes them together in one large set
1) Batch   
2) Online
3) Real-time   
4) Group
5) None of these

12.When a file contains instructions that can be carried out by the computer, it is often called a(n) ...... file
1) data   
2) information
3) executable   
4) application
5) None of these

13.A complier translates a program written in a high - level language into ........
1) Machine language       
2) An algorithm
3) A debugged program   
4) Java
5) None of these

14.A set of step - by - step procedures for accomplishing a task is known as a(n) .....
1) algorithm   
2) hardware program
3) software bug   
4) firmware program
5) None of these

15.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) ......
1) Workstation   
2) CPU
3) Magnetic disk   
4) Integrated circuit
5) None of these

16.A saved document is referred to as a .....
1) file   
2) word
3) folder   
4) project
5) None of these

17.What is output ?
1) What the processor takes from the user
2) What the user gives to the processor
3) What the processor gets from the user
4) What the processor gives to the user
5) None of these

18.When you turn on the computer, the boot routine will perform this test ........
1) RAM test   
2) Disk drive test
3) Memory test   
4) Power - on self-test
5) None of these

19.Which of the following storage media provides sequential access only ?
1) Floppy disk   
2) Magnetic disk
3) Magnetic tape   
4) Optical disk
5) None of these

20.In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ........
1) copy and paste   
2) copy, cut and paste
3) cut, copy and paste
4) cut and paste
5) None of these

21. Hardware includes ..........
1) all devices used to input data into a computer
2) sets of instructions that  a computer runs or executes
3) the computer and all the devices connected to it that are used to input and output data
4) all devices involved in processing information including the central processing unit, memory and storage
5) None of these

22.The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ....... command
1) Replace   
2) Find
3) Lookup   
4) Search
5) None of these

23.The term 'user interface' refers to ............
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to user commands
3) the means by which the user interacts with the peripheral devices on the computer
4) the monitor that is available for the computer
5) None of these

24.For creating a document, you use ........ command at File Menu.
1) Open   
2) Close
3) New   
4) Save
5) None of these

25.The .............. becomes different shapes depending on the task you are performing
1) Active tab   
2) Insertion point
3) Mouse pointer   
4) Ribbon
5) None of these

26.Specilizd programs that asist users in locating information on the Web are called ....
1) Information engines   
2) Search engines
3) Web browsers   
4) Resource locators
5) None of these

27.The background of any Word document ......
1) Is always white colour
2) Is the colour you presect under the Options menu
3) Is always the same for the entire document
4) Can have any colour you choose
5) None of these

28.Correcting errors in a program is referred to as .........
1) debugging   
2) bugging
3) rectifying   
4) modifying
5) None of these

29.Any letter, number, or symbol found on the keyboard that you can type into the computer ..........
1) output   
2) character
3) type   
4) print
5) font

30.A symbol or question on the screen that prompts you to take action and tell the computer what to do next ........
1) scanner   
2) questionnaire
3) prompt and dialog box
4) information seeker   
5) None of these

31.Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs .....
1) menu bar   
2) tool bar
3) user friendly   
4) word processor
5) None of these

32.The primary device that a computer uses to store information ......
1) monitor   
2) memory
3) disk   
4) hard drive
5) None of these

33.A file extension is separated from the main file name with a(n) ......, but no spaces
1) questiion nark   
2) exclamation mark
3) underscore   
4) period
5) None of these

34.Application software is designed to accomplish .......
1) real -w orld tasks   
2) computer-centric tasks
3) gaming tasks
4) operating system tasks
5) None of these

35.A ...... is a device that not only provdes surge protection, but also furnishes your computer with battery backup power during a power outage
1) surge strip   
2) USB
3) UPS   
4) battery strip
5) None of these

36.The term ............. designates equipment that might be added to a computer system to enhance, its functionality
1) digitial device   
2) system add-on
3) disk pack   
4) peripheral device
5) None of these

37........... this is the act of copying or downloading a program from a network and making multiple copies of it.
1) Network piracy   
2) Plagiarism
3) Software piracy   
4) Site-license piracy
5) None of these

38.When installing ............., the user must copy and usually decompress program files from a CDROM or other medium to the hard disk
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these

39.Which one of the following would be considered as a way that a computer virus can enter a computer system ?
1) Opening an application previously installed on the computer
2) Borrowed an illegal copy of software
3) Viewing a website without causing any additional transctions
4) Running antivirus programs
5) None of these

40.Programs such as Mozila Firefox that serve as navigable windows into the Web are called ..........
1) Hypertext  
2) Networks
3) Internet   
4) Web browsers
5) None of these

41.What is the main difference between a mainframe and a super computer ?
1) Super computer is much larger than mainframe computers
2) Super computers are much smaller than mainframe computers
3) Supercomputers are focused to execute few programs as fast as possible while mainframe uses its power to execute as many programs concurrently
4) Supercomputers are focused to execute as many programs as possible while mainframe uses its power to execute few programs as fast as possible
5) None of these

42.What is the function of Recycle Bin ?
1) Store deleted file   
2) Store temporary file
3) Store corrupted file   
4) Store Document file
5) None of these

43.Which is the latest version of MS Office ?
1) Office XP   
2) Windows XP
3) Office 2007   
4) Office 2010
5) None of these

44.Which device can not be shared in network ?
1) Floppy   
2) Keyword
3) Computer   
4) Printer
5) None of these

45.What is the purpose of query ?
1) Input data   
2) Output data
3) Sort & filter   
4) All of above
5) None of these

46.Which port doesn't exist in computer ?
1) USB   
2) Parallel
3) Com1 / Com2  
4) RAW
5) None of these

47.What is the name of exel files ?
1) Workbook   
2) Worksheet
3) Spreadsheet   
4) Spread book
5) None of these

48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
4) All of he above
5) None of these

49.Synonym can be reviewed with
1) Spelling and grammar
2) Thesaurus   
3) Both   
4) Synonym viewer   
5) None of these

50.Which command allows you to reduce fragments of file and optimize the performance of disk ?
1) Scandisk   
2) Diskcomp
3) Chkdsak   
4) Defrag
5) None of these

ANSWERS:
    1) 2    2) 2    3) 5    4) 2    5) 2    6) 4        7) 1    8) 1    9) 3    10) 4   
11) 1    12) 3    13) 1    14) 1    15) 4    16) 1    17) 4    18) 2        19) 2   20) 4   
21) 4    22) 2    23) 1    24) 3        25) 3    26) 2    27) 4    28) 1    29) 2    30) 3       
31) 1    32) 4    33) 5    34) 4    35) 3    36) 4  37) 3    38) 1    39) 2    40) 4  
41) 3    42) 1   43) 4    44) 2    45) 4    46) 4    47) 1    48) 1        49) 2    50) 4