Search This Blog
Tuesday, November 20, 2012
IBPS CLERKS EXAM COMPUTER KNOWLEDGE PRACTICE MCQs
1. Which of the following is a disadvantage of machine language?
1) Machine Dependent
2) Slower Execution
3) Machine Independent
4) It requires Translation
5) None of these
2. Android Operating system is an example of which kind of Source Model?
1) Open Source
2) Vertical Market Software
3) Horizontal Market Software
4) Shareware
5) None of these
3. Cache memory is an example of which of the following?
1) Virtual Memory
2) Non Volatile Memory
3) Static Random Access Memory
4) Secondary Memory
5) None of these
4. A software that is not protected by copyright or trademark is ......
1) Vertical Market Software
2) Public Domain Software
3) Shareware Software
4) Trialware
5) Adware
5. Which of the following programming languages is associated with Artificial Intelligence?
1) C
2) B
3) C++
4) JAVA
5) PROLOG
6. AltaVista is a(n)
1) Windows Utility
2) Search engine
3) Program
4) Antivirus
5) None of these
7. The term Hard copy is related to:
1) Storing data on Hard Disk
2) Output displayed on Monitor
3) Scanned Image
4) Printouts
5) None of the above
8. MIME is an acronym for ....
1) Multiprogramming Internet Mail Extension
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension
4) Multipurpose Internet Mail Extension
5) None of these
9. Any crime that involves a Computer and a Network is called:
1) Virus
2) Malware
3) Trojan Horse
4) Cyber crime
5) Identity Theft
10. Which of the following generation computers is referred to an expert system?
1) 2nd
2) 1st
3) 4th
4) 3rd
5) 5th
11. ......... is a set of instructions.
1) Hardware
2) Code
3) Language
4) Program
5) All the above
12. Which of the following is the keyboard short-cut for permanent deletion of a file/folder in windows?
1) Del.
2) Shift + Del.
3) Ctrl + Del.
4) Alt + Enter
5) None of these
13. Which of the following is an Object Oriented Programming Language?
1) C
2) Java
3) C++
4) Both 2 and 3
5) Both 1 and 2
14. The popular name for “Information Super Highway” is:
1) Intranet
2) Extranet
3) Virtual Private Network
4) MAN
5) Internet
15. Encryption is primarily used in:
1) Computer Processing
2) File retention
3) Data communication
4) Data Storage
5) None of these
16. The main folder on a storage device is called .....
1) Root directory
2) Interface
3) Device driver
4) Platform
5) Main directory
17. To protect the computer from hacker intrusions, ..... must be installed.
1) Firewall
2) Mailer
3) Script
4) Yahoo Messenger
5) None of these
18. Which of the following is used to read handwritten or printed text to make a digital image that is stored in memory?
1) Printer
2) Laser beam
3) Scanner
4) Touchpad
5) None of these
19. A program designed to destroy data on the computer which can travel to infect other computers is called a .....
1) Hurricane
2) Infector
3) Disease
4) Virus
5) None
20. Thesaurus option is available in ..... menu.
1) Page layout
2) References
3) Review
4) View
5) Layout
21. Blu-Ray disk is an example of a(n) ....
1) Hard disk
2) Magnetic Disk
3) Optical Disk
4) Output Device
5) None of these
22. Which of the following is true about Name box?
1) It appears at the left of the formula bar
2) It appears below the menu bar
3) It shows the locations of the active cell.
4) Both 1 and 3
5) Both 2 and 3
23. Which of the following is known as non volatile memory?
1) Hard Disk
2) Floppy Disk
3) CD-ROM
4) DVD-ROM
5) All the above
24. Auto correct function option is present in ..... menu of MS Word.
1) View
2) Insert
3) Format
4) Tools
5) Table
25. Which of the following is another name for pre-programmed formula in Excel?
1) Range
2) Graph
3) Function
4) Cell
5) None of these
26. ALU works on the instructions held in .......
1) Notebook
2) Registers
3) Notepad
4) Clipboard
5) I/O Devices
27. To see the document before the printout is taken, use .......
1) Insert Table
2) Paste
3) Format Painter
4) Cut
5) Print Preview
28. .... helps create, manipulate and analyze data arranged in rows and columns?
1) Application Package
2) Word Processing Package
3) Outlining Package
4) Outline Processors
5) Spreadsheet Package
29. A register that keeps track of the next instruction to be executed is called a(n):
1) Data Register
2) Instruction Register
3) Action Register
4) Program Counter
5) None of these
30. Which of the following is the feature that keeps track of the right margin?
1) Find and Replace
2) Dragged Right
3) Ruler
4) Right Justified
5) Left Justified
31. A network which connects cities or states is known as:
1) LAN
2) CAN
3) PAN
4) VPN
5) MAN
32. Which of the following allows you to insert graphics into a word document?
1) Callouts
2) Flowcharts
3) Basic Shapes
4) All of the above
5) None of these
33. An email address consists of:
1) Domain name 2) User name
3) Username followed by password
4) Domain name followed by user name
5) Username followed by domain name
34. ERP is an acronym for:
1) Enterprise Retirement Planning
2) Enterprise Relationship Planning
3) Enterprise Resource Planning
4) Enterprise Reorder Planning
5) None of these
35. ...... is the storage area for e-mails.
1) Folder
2) Mail box
3) Directory
4) Hard Disk
5) None of these
36. Three types of Compact disks include CD-ROM, CD-R and ......
1) CD-W
2) CD-RAM
3) CD-DVD
4) CD-RW
5) None of these
37. Collecting personal information and effectively posing as another individual is known as:
1) Spooling
2) Spoofing
3) Hacking
4) Identity Theft
5) None of these
38. Which of the following controls the manner of interaction between the user and the operating system?
1) Language Translator
2) Platform
3) User Interface
4) Icon
5) None of these
39. Which of the following best defines Embedded system?
1) A program that comes wrapped in a box
2) A program that is permanent part of a computer
3) A computer that is a part of a larger computer
4) A computer and software system that controls a machine
5) None of these
40. The ........... settings are automatic and standard.
1) Default
2) CPU
3) Peripheral
4) User-friendly
5) None of these
ANSWERS:
1-1; 2-1; 3-3; 4-2; 5-5; 6-2; 7-4; 8-4; 9-4; 10-5;
11-4; 12-2; 13-4; 14-5; 15-3; 16-1; 17-1; 18-3; 19-4; 20-3;
21-3; 22-4; 23-5; 24-4; 25-3; 26-2; 27-5; 28-5; 29-2; 30-4;
31-5; 32-4; 33-5; 34-3; 35-2; 36-4; 37-2; 38-3; 39-4; 40-1.
Tuesday, November 6, 2012
IBPS CLERKS CWE COMPUTER KNOWLEDGE QUESTIONS
1. The Title and Page number of a document can be displayed using which of the following options?
1) Insert table
2) Spelling and Grammar
3) Header and Footer
4) Thesaurus
5) File
2. Which of the following is the advantage of Assembly language over Machine language?
1) Easy to use
2) Easy to understand
3) Easy to modify
4) Only 1 and 3
5) All the above
3. Pop-ups are a form of ..... on the World Wide Web?
1) Instant Messaging
2) Search Engines
3) Browsers
4) Mark-up Languages
5) Online Advertising
4. Which of the following is not used to align text in a document?
1) Left
2) Right
3) Center
4) Diagonal
5) Justify
5. Which of the following characteristics is/are used to compute the results from excel data?
1) Goto
2) Table
3) Diagram
4) Formula and Function
5) None of these
6. ....... is a combination of text, audio, still images, animation, video.
1) Multiplexer
2) Multiplier
3) Multimedia
4) Multiuser
5) None of these
7. Which of the following refers to the process of trading goods over the internet?
1) E-seva
2) E-Trading
3) E-Finance
4) E-Sales
5) E-Commerce
8. Multiple autonomous computers communicating through a computer network to achieve a common goal is called .......
1) Centralized Computing
2) Co-operative Computing
3) Distributed Computing
4) Connected Computing
5) None of these
9. In order to change page margins in a word document:
1) Drag the scroll box on the scroll bars.
2) Delete the margin boundaries on the ruler
3) Right Click on the ruler
4) Drag the margin boundaries on the ruler
5) None of these
10. USB 3.0 is the second major revision of the Universal Serial Bus standard for Computer Connectivity. Which of the following is true about USB 3.0?
1) It is more than 10 times as fast as USB 2.0
2) Its Data transfer rate is up to 5 Gbits/sec
3) Power consumption is less than USB 2.0
4) All the above
5) None of the above
11. MICR is exclusively used in:
1) Libraries
2) Super markets
3) Stock markets
4) Banking Industry
5) None of these
12. A communication system which provides communication in both directions, but not simultaneously is known as:
1) Half-Duplex
2) Full-Duplex
3) Broadcast
4) Only 1 and 2
5) None of these
13. Which of the following uses computers and data communication to transmit data electronically between computers?
1) EDI
2) Physical Media
3) Printing a paper
4) DTE
5) None
14. Which key, when toggled off, causes keyed characters to override existing characters?
1) Delete
2) Insert
3) Page up
4) Page down
5) Down arrow
15. An act of unauthorized copying of computer software is called:
1) Network Piracy
2) License Piracy
3) Plagiarism
4) Software Piracy
5) None of these
16. .... are attempts by individuals to obtain confidential information from the user by falsifying their identity.
1) Phishing Trips
2) Computer Virus
3) Spyware Scams
4) Viruses
5) None of these
17. The default view in Excel is:
1) Work
2) Auto
3) Normal
4) Roman
5) None of these
18. Bus topology is also known as ........
1) Multipoint network
2) Multi drop network
3) Broadcasting network
4) All of these
5) None of these
19. Which of the following is not an advantage of multiprocessor system?
1) Low Cost
2) High Reliability
3) Increased Throughput
4) All of these
5) None of these
20. Data redundancy can be eliminated by using:
1) Networking
2) DBMS
3) Operating System
4) Processing the data manually
5) None of these
21. System bus is also known as :
1) Internal bus
2) Information bus
3) RTA bus
4) Component bus
5) None of these
22. Which memory is normally used between RAM and CPU?
1) Cache
2) Register
3) Virtual
4) Disk
5) None of these
23. ...... is a computer software designed to help people involved in a common task to achieve goals.
1) Shareware
2) Software
3) Freeware
4) Collaborative Software
5) None
24. The CPU of a computer ?
1) understands only assembly language
2) understands machine language and high-level languages
3) understands only machine language
4) understands only high-level language
5) does not understand machine language
25. Which of the following is not a term related to the World Wide Web?
1) Hyperlink
2) Hypertext
3) Website
4) Homepage
5) Keyboard
26. ..... is the process of getting access to the computer.
1) Switch on
2) Login
3) Logoff
4) Enter
5) None
27. Display bar that lists all the open folders and active applications is.......
1) Menubar
2) Toolbar
3) Task bar
4) Window list
5) None of these
28. A picture / image file which is displayed in the background of the computer screen is called ..........
1) Wall Paper
2) Screen Saver
3) Windows Theme
4) Photo Desktop
5) None of these
29. Which of the following operating systems does not exist?
1) Windows 7
2) Mac OS X
3) Windows CE
4) Windows 12
5) Ubuntu
30. Which of the following is true about Operating System?
1) It is an interface between user and the computer.
2) It manages all resources
3) It does all Memory management and Process management tasks
4) All are true
5) None of these
31. ....... is a software for personal computers that combines the most commonly used functions of many productivity software programs into one application.
1) Integrated Software
2) Application Software
3) System Software
4) Software Suite
5) None of these
32. Expand RDBMS.
1) Relative Database Management System
2) Rational Database Minimize System
3) Relational Database Management System
4) Relational Database Maximize System
5) None of these
33. ..... is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law.
1) CID
2) Cryptography
3) Steganography
4) Computer Forensics
5) None of these
34. Find the odd one out.
1) Scanner
2) Mouse
3) Keyboard
4) Printer
5) Barcode Reader
35. Which of the following is not a logic gate?
1) AND
2) OR
3) NOT
4) KNOT
5) None of these
36. DSL is an example of a ...... connection
1) Broadband
2) Dialup
3) Both 1 and 2
4) Computer
5) None of these
37. ...... is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
1) Encryption
2) Cryptography
3) Steganography
4) Forensics
5) None of these
38. 'Bespoke Software' is also known as:
1) Legacy Software
2) Respoke Software
3) System Software
4) Custom Software
5) None of these
39. Which of the following is not a utility program?
1) File copying
2) Listing files
3) Sending files to printer
4) File conversion
5) None of these
40. Which of the following is an audio input device?
1) Microphone
2) Webcam
3) MIDI keyboard
4) Only 1 & 2
5) Only 1 & 3
ANSWERS:
1-3; 2-5; 3-5; 4-4; 5-4; 6-3; 7-5; 8-3; 9-4; 10-4;
11-4; 12-1; 13-1; 14-2; 15-4; 16-1; 17-3; 18-4; 19-5; 20-2;
21-1; 22-1; 23-4; 24-3; 25-5; 26-2; 27-3; 28-1; 29-4; 30-4;
31-1; 32-3; 33-4; 34-4; 35-4; 36-1; 37-3; 38-4; 39-5; 40-5.
Labels
- ABBREVIATIONS
- Computer full form
- computer gk
- computer gk best part 1
- computer gk best part 2
- computer gk best part 3
- Computer Q&A
- COMPUTER TERMS
- Current Affairs
- History
- HISTORY OF COMPUTERS
- IBPS
- Input Devices
- mc
- MCQ
- MCQs
- MODEL PAPER
- Output Devices
- PRACTICE QUESTIONS
- SBI
- Science GK Trick
- SHORTCUTS
- SOLVED PAPERS
- TERMINOLOGY
- सॉफ्टवेयर
- हार्डवेयर