Search This Blog

Tuesday, November 20, 2012

IBPS CLERKS EXAM COMPUTER KNOWLEDGE PRACTICE MCQs


1. Which of the following is a disadvantage of machine language?
1) Machine Dependent
2) Slower Execution
3) Machine Independent
4) It requires Translation
5) None of these

2. Android Operating system is an example of which kind of Source Model?
1) Open Source
2) Vertical Market Software
3) Horizontal Market Software
4) Shareware
5) None of these

3. Cache memory is an example of which of the following?
1) Virtual Memory
2) Non Volatile Memory
3) Static Random Access Memory
4) Secondary Memory
5) None of these

4. A software that is not protected by copyright or trademark is ......
1) Vertical Market Software
2) Public Domain Software
3) Shareware Software
4) Trialware
5) Adware

5. Which of the following programming languages is associated with Artificial Intelligence?
1) C
2) B
3) C++
4) JAVA
5) PROLOG

6. AltaVista is a(n)
1) Windows Utility
2) Search engine
3) Program
4) Antivirus
5) None of these

7. The term Hard copy is related to:
1) Storing data on Hard Disk
2) Output displayed on Monitor
3) Scanned Image
4) Printouts
5) None of the above

8. MIME is an acronym for ....
1) Multiprogramming Internet Mail Extension
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension
4) Multipurpose Internet Mail Extension
5) None of these

9. Any crime that involves a Computer and a Network is called:
1) Virus
2) Malware
3) Trojan Horse
4) Cyber crime
5) Identity Theft

10. Which of the following generation computers is referred to an expert system?
1) 2nd
2) 1st
3) 4th
4) 3rd
5) 5th



11. ......... is a set of instructions.
1) Hardware
2) Code
3) Language
4) Program
5) All the above

12. Which of the following is the keyboard short-cut for permanent deletion of a file/folder in windows?
1) Del.
2) Shift + Del.
3) Ctrl + Del.
4) Alt + Enter
5) None of these

13. Which of the following is an Object Oriented Programming Language?
1) C
2) Java
3) C++
4) Both 2 and 3
5) Both 1 and 2

14. The popular name for “Information Super Highway” is:
1) Intranet
2) Extranet
3) Virtual Private Network
4) MAN
5) Internet

15. Encryption is primarily used in:
1) Computer Processing
2) File retention
3) Data communication
4) Data Storage
5) None of these

16. The main folder on a storage device is called .....
1) Root directory
2) Interface
3) Device driver
4) Platform
5) Main directory

17. To protect the computer from hacker intrusions, ..... must be installed.
1) Firewall
2) Mailer
3) Script
4) Yahoo Messenger
5) None of these

18. Which of the following is used to read handwritten or printed text to make a digital image that is stored in memory?
1) Printer
2) Laser beam
3) Scanner
4) Touchpad
5) None of these

19. A program designed to destroy data on the computer which can travel to infect other computers is called a .....
1) Hurricane
2) Infector
3) Disease
4) Virus
5) None

20. Thesaurus option is available in ..... menu.
1) Page layout
2) References
3) Review
4) View
5) Layout

21. Blu-Ray disk is an example of a(n) ....
1) Hard disk
2) Magnetic Disk
3) Optical Disk
4) Output Device
5) None of these

22. Which of the following is true about Name box?
1) It appears at the left of the formula bar
2) It appears below the menu bar
3) It shows the locations of the active cell.
4) Both 1 and 3
5) Both 2 and 3

23. Which of the following is known as non volatile memory?
1) Hard Disk
2) Floppy Disk
3) CD-ROM
4) DVD-ROM
5) All the above

24. Auto correct function option is present in ..... menu of MS Word.
1) View
2) Insert
3) Format
4) Tools
5) Table

25. Which of the following is another name for pre-programmed formula in Excel?
1) Range
2) Graph
3) Function
4) Cell
5) None of these

26. ALU works on the instructions held in .......
1) Notebook
2) Registers
3) Notepad
4) Clipboard
5) I/O Devices

27. To see the document before the printout is taken, use .......
1) Insert Table
2) Paste
3) Format Painter
4) Cut
5) Print Preview

28. .... helps create, manipulate and analyze data arranged in rows and columns?
1) Application Package
2) Word Processing Package
3) Outlining Package
4) Outline Processors
5) Spreadsheet Package

29. A register that keeps track of the next instruction to be executed is called a(n):
1) Data Register
2) Instruction Register
3) Action Register
4) Program Counter
5) None of these

30. Which of the following is the feature that keeps track of the right margin?
1) Find and Replace
2) Dragged Right
3) Ruler
4) Right Justified
5) Left Justified

31. A network which connects cities or states is known as:
1) LAN
2) CAN
3) PAN
4) VPN
5) MAN

32. Which of the following allows you to insert graphics into a word document?
1) Callouts
2) Flowcharts
3) Basic Shapes
4) All of the above
5) None of these

33. An email address consists of:
1) Domain name 2) User name
3) Username followed by password
4) Domain name followed by user name
5) Username followed by domain name

34. ERP is an acronym for:
1) Enterprise Retirement Planning
2) Enterprise Relationship Planning
3) Enterprise Resource Planning
4) Enterprise Reorder Planning
5) None of these

35. ...... is the storage area for e-mails.
1) Folder
2) Mail box
3) Directory
4) Hard Disk
5) None of these

36. Three types of Compact disks include CD-ROM, CD-R and ......
1) CD-W
2) CD-RAM
3) CD-DVD
4) CD-RW
5) None of these

37. Collecting personal information and effectively posing as another individual is known as:
1) Spooling
2) Spoofing
3) Hacking
4) Identity Theft
5) None of these

38. Which of the following controls the manner of interaction between the user and the operating system?
1) Language Translator
2) Platform
3) User Interface
4) Icon
5) None of these

39. Which of the following best defines Embedded system?
1) A program that comes wrapped in a box
2) A program that is permanent part of a computer
3) A computer that is a part of a larger computer
4) A computer and software system that controls a machine
5) None of these

40. The ........... settings are automatic and standard.
1) Default
2) CPU
3) Peripheral
4) User-friendly
5) None of these

ANSWERS:

1-1; 2-1; 3-3; 4-2; 5-5; 6-2; 7-4; 8-4; 9-4; 10-5;
11-4; 12-2; 13-4; 14-5; 15-3; 16-1; 17-1; 18-3; 19-4; 20-3;
21-3; 22-4; 23-5; 24-4; 25-3; 26-2; 27-5; 28-5; 29-2; 30-4;
31-5; 32-4; 33-5; 34-3; 35-2; 36-4; 37-2; 38-3; 39-4; 40-1.

Tuesday, November 6, 2012

IBPS CLERKS CWE COMPUTER KNOWLEDGE QUESTIONS


1. The Title and Page number of a document can be displayed using which of the following options?
1) Insert table
2) Spelling and Grammar
3) Header and Footer
4) Thesaurus
5) File

2. Which of the following is the advantage of Assembly language over Machine language?
1) Easy to use
2) Easy to understand
3) Easy to modify
4) Only 1 and 3
5) All the above

3. Pop-ups are a form of ..... on the World Wide Web?
1) Instant Messaging
2) Search Engines
3) Browsers
4) Mark-up Languages
5) Online Advertising

4. Which of the following is not used to align text in a document?
1) Left
2) Right
3) Center
4) Diagonal
5) Justify

5. Which of the following characteristics is/are used to compute the results from excel data?
1) Goto
2) Table
3) Diagram
4) Formula and Function
5) None of these

6. ....... is a combination of text, audio, still images, animation, video.
1) Multiplexer
2) Multiplier
3) Multimedia
4) Multiuser
5) None of these

7. Which of the following refers to the process of trading goods over the internet?
1) E-seva
2) E-Trading
3) E-Finance
4) E-Sales
5) E-Commerce

8. Multiple autonomous computers communicating through a computer network to achieve a common goal is called .......
1) Centralized Computing
2) Co-operative Computing
3) Distributed Computing
4) Connected Computing
5) None of these

9. In order to change page margins in a word document:
1) Drag the scroll box on the scroll bars.
2) Delete the margin boundaries on the ruler
3) Right Click on the ruler
4) Drag the margin boundaries on the ruler
5) None of these

10. USB 3.0 is the second major revision of the Universal Serial Bus standard for Computer Connectivity. Which of the following is true about USB 3.0?
1) It is more than 10 times as fast as USB 2.0
2) Its Data transfer rate is up to 5 Gbits/sec
3) Power consumption is less than USB 2.0
4) All the above
5) None of the above



11. MICR is exclusively used in:
1) Libraries
2) Super markets
3) Stock markets
4) Banking Industry
5) None of these

12. A communication system which provides communication in both directions, but not simultaneously is known as:
1) Half-Duplex
2) Full-Duplex
3) Broadcast
4) Only 1 and 2
5) None of these

13. Which of the following uses computers and data communication to transmit data electronically between computers?
1) EDI
2) Physical Media
3) Printing a paper
4) DTE
5) None

14. Which key, when toggled off, causes keyed characters to override existing characters?
1) Delete
2) Insert
3) Page up
4) Page down
5) Down arrow

15. An act of unauthorized copying of computer software is called:
1) Network Piracy
2) License Piracy
3) Plagiarism
4) Software Piracy
5) None of these

16. .... are attempts by individuals to obtain confidential information from the user by falsifying their identity.
1) Phishing Trips
2) Computer Virus
3) Spyware Scams
4) Viruses
5) None of these

17. The default view in Excel is:
1) Work
2) Auto
3) Normal
4) Roman
5) None of these

18. Bus topology is also known as ........
1) Multipoint network
2) Multi drop network
3) Broadcasting network
4) All of these
5) None of these

19. Which of the following is not an advantage of multiprocessor system?
1) Low Cost
2) High Reliability
3) Increased Throughput
4) All of these
5) None of these

20. Data redundancy can be eliminated by using:
1) Networking
2) DBMS
3) Operating System
4) Processing the data manually
5) None of these

21. System bus is also known as :
1) Internal bus
2) Information bus
3) RTA bus
4) Component bus
5) None of these

22. Which memory is normally used between RAM and CPU?
1) Cache
2) Register
3) Virtual
4) Disk
5) None of these

23. ...... is a computer software designed to help people involved in a common task to achieve goals.
1) Shareware
2) Software
3) Freeware
4) Collaborative Software
5) None

24. The CPU of a computer ?
1) understands only assembly language
2) understands machine language and high-level languages
3) understands only machine language
4) understands only high-level language
5) does not understand machine language

25. Which of the following is not a term related to the World Wide Web?
1) Hyperlink
2) Hypertext
3) Website
4) Homepage
5) Keyboard

26. ..... is the process of getting access to the computer.
1) Switch on
2) Login
3) Logoff
4) Enter
5) None

27. Display bar that lists all the open folders and active applications is.......
1) Menubar
2) Toolbar
3) Task bar
4) Window list
5) None of these

28. A picture / image file which is displayed in the background of the computer screen is called ..........
1) Wall Paper
2) Screen Saver
3) Windows Theme
4) Photo Desktop
5) None of these

29. Which of the following operating systems does not exist?
1) Windows 7
2) Mac OS X
3) Windows CE
4) Windows 12
5) Ubuntu

30. Which of the following is true about Operating System?
1) It is an interface between user and the computer.
2) It manages all resources
3) It does all Memory management and Process management tasks
4) All are true
5) None of these

31. ....... is a software for personal computers that combines the most commonly used functions of many productivity software programs into one application.
1) Integrated Software
2) Application Software
3) System Software
4) Software Suite
5) None of these

32. Expand RDBMS.
1) Relative Database Management System
2) Rational Database Minimize System
3) Relational Database Management System
4) Relational Database Maximize System
5) None of these

33. ..... is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law.
1) CID
2) Cryptography
3) Steganography
4) Computer Forensics
5) None of these

34. Find the odd one out.
1) Scanner
2) Mouse
3) Keyboard
4) Printer
5) Barcode Reader

35. Which of the following is not a logic gate?
1) AND
2) OR
3) NOT
4) KNOT
5) None of these

36. DSL is an example of a ...... connection
1) Broadband
2) Dialup
3) Both 1 and 2
4) Computer
5) None of these

37. ...... is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
1) Encryption
2) Cryptography
3) Steganography
4) Forensics
5) None of these

38. 'Bespoke Software' is also known as:
1) Legacy Software
2) Respoke Software
3) System Software
4) Custom Software
5) None of these

39. Which of the following is not a utility program?
1) File copying
2) Listing files
3) Sending files to printer
4) File conversion
5) None of these

40. Which of the following is an audio input device?
1) Microphone
2) Webcam
3) MIDI keyboard
4) Only 1 & 2
5) Only 1 & 3

ANSWERS:

1-3; 2-5; 3-5; 4-4; 5-4; 6-3; 7-5; 8-3; 9-4; 10-4;
11-4; 12-1; 13-1; 14-2; 15-4; 16-1; 17-3; 18-4; 19-5; 20-2;
21-1; 22-1; 23-4; 24-3; 25-5; 26-2; 27-3; 28-1; 29-4; 30-4;
31-1; 32-3; 33-4; 34-4; 35-4; 36-1; 37-3; 38-4; 39-5; 40-5.