Search This Blog

Showing posts with label SOLVED PAPERS. Show all posts
Showing posts with label SOLVED PAPERS. Show all posts

Saturday, March 21, 2015

IBPS Bank Clerk CWE Solved Paper -2012 (Exam Held on 14-12-2012)

1. If you wish to extend the length of the network without having the signal degrade, you would use a– 
(A) resonance (B) router (C) gateway (D) switch (E) repeater
Ans : (E)

2. A repair for a known software bug, usually available at no charge on the internet, is called a– 
(A) version (B) patch (C) tutorial (D) FAQ (E) rectifier
Ans : (B)

3. URL stands for– 
(A) Universal Research List (B) Universal Resource List 
(C) Uniform Research List (D) Uniform Research Locator
(E) Uniform Resource Locator
Ans : (D)

4. When data changes in multiple lists and all lists are not updated, this causes– 
(A) data redundancy (B) information overload (C) duplicate data (D) data inconsistency (E) data repetition
Ans : (D)

5. What is a backup?
(A) Restoring the information backup (B) An exact copy of a system’s information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these (E) None of these
Ans : (D)

6. The Internet is– 
(A) a large network of networks (B) an internal communication system for a business
(C) a communication system for the Indian government (D) a communication system for some states of India
(E) a communication system for some cities of Indian
Ans : (A)

7. Computers that are portable and convenient for users who travel are known as– 
(A) supercomputers (B) planners (C) minicomputers (D) file servers (E) laptops
Ans : (E)

8. What is the storage area for email messages called?
(A) A folder (B) A mailbox (C) A directory (D) The hard disk (E) None of these
Ans : (B)

9. One advantage of dial-up Internet access is– 
(A) it utilizes broadband technology (B) it is Indian
(C) it uses a router for security (D) modem speeds are very fast
(E) it utilizes existing telephone service
Ans : (E)

10. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) configuration (B) download (C) storage (D) upload (E) installation
Ans : (E)

11. Which process checks to ensure the components of the computer are operating and connected properly?
(A) Booting (B) Processing (C) Saving (D) Editing (E) Starting
Ans : (A)

12. A means of capturing an image (drawing or photo) so that it can be stored on a computer is– 
(A) Modem (B) Software (C) Scanner (D) Keyboard (E) Mouse
Ans : (C)

13. An error in a computer porgram–
(A) Crash (B) Power Failure (C) Bug (D) Virus (E) Fatal error
Ans : (C)

14. Access control based on a person’s fingerprints is an example of– 
(A) biometric identification (B) characteristic identification 
(C) characteristics security (D) fingerprint security
(E) logistics
Ans : (A)

15. The patterns of printed lines on most products are called– 
(A) prices (B) striping (C) scanners (D) OCR (E) barcodes
Ans : (E)

16. Most mail programs automatically complete the following two parts in an e-mail– 
(A) From : and Body (B) From : and Date (C) From : and To (D) From : and Subject (E) None of these
Ans : (B)

17. The computer’s capability of distinguishing spoken words is called–
(A) voice analysis (B) speech acknowledgment
(C) voice recognition (D) speech interpretation
(E) vocalization
Ans : (C)

18. Which of the following is an advantage of mounting an application on the Web?
(A) the possibility of 24 hours access for users (B) creating a system that can extend globally
(C) scandalizing the design of the interface (D) All of these
(E) None of these
Ans : (D)

19. The first page of a Web site is called the– 
(A) Homepage (B) Index (C) Java Script (D) Book mark (E) Intro Page
Ans : (A)

20. ERP is an acronym for– 
(A) Enterprise Retirement Planning (B) Enterprise Relationship Planning
(C) Enterprise Resource Planning (D) Enterprise Reorder Planning
(E) Enterprise Retention Planning
Ans : (C)

21. The software that allows users to surf the Internet is called a/an– 
(A) Search engine (B) Internet Service Provider (ISP)
(C) Multimedia application (D) Browser
(E) Internet Surfing Provider
Ans : (D)

22. The issues that deal with the collection and use of data about individuals is– 
(A) access (B) publicity (C) accuracy (D) property (E) privacy
Ans : (E)

23. Aterm relating to sending data to a satellite is– 
(A) downlink (B) modulate (C) demodulate (D) uplink (E) Interrelate
Ans : (D)

24. On-line documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with relation information are called– 
(A) hypermedia (B) hypertext (C) HTML (D) URL (E) FTP
Ans : (B)

25. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and—security is concerned with protecting software from unauthorized tampering or damage.
(A) data (B) cyber (C) Internet (D) metaphysical (E) publicity
Ans : (A)

26. Hackers– 
(A) all have the same motive (B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage (D) are people who are allergic to computers
(E) break into other people’s computers
Ans : (E)

27. Unauthorized copying of software to be used for personal gain instead of for personal backups is called– 
(A) program thievery (B) data snatching (C) software piracy (D) program looting (E) data looting
Ans : (C)

28. Junk e-mail is also called– 
(A) Spam (B) spoof (C) cookie crumb (D) sniffer script (E) Spill
Ans : (A)

29. What is usually used for displaying information at public places?
(A) Monitors (B) Overhead Projections (C) Monitors and Overhead Projections (D) Touch Screen Kiosks (E) Loud Speakers
Ans : (B)

30. What is MP3?
(A) A mouse (B) A Printer (C) A Sound format (D) A Scanner (E) A Mobile Phone
Ans : (C)

31. What is the most popular hardware for multimedia creations?
(A) PCs (B) Minicomputers (C) Mainframe Computers (D) WANs (E) Super Computers
Ans : (A)

32. For sound recording what is necessary?
(A) Speaker (B) Microphone (C) Talker (D) Mouse (E) Telephone
Ans : (D)

33. The life-span of a CD-ROM is– 
(A) approximately one year (B) approximately two years (C) approximately five years 
(D) approximately twenty-five years (E) almost unlimited
Ans : (C)

34. The................settings are automatic and standard.
(A) default (B) CPU (C) peripheral (D) user friendly (E) defaulter
Ans : (A)

35. What are the two parts of an e-mail address?
(A) User name and street address (B) Legal name and phone number 
(C) User name and domain name (D) Initials and password
(E) User Name and Recipient Name
Ans : (C)

36. Participants can see and hear each other in a/ an– 
(A) electronic mail system (B) message system (C) teleconference (D) bulletin board (E) None of these
Ans : (C)

37. Magnetic tape is not practical for applications where data must be quickly recalled because tape is–
(A) A random-access medium (B) Expensive
(C) A read-only medium (D) Fragile and easily damaged
(E) A sequential-access medium
Ans : (E)

38. Why should you delete unknown e-mail attachments?
(A) You could go to jail (B) the person could track you down and hurt you
(C) it is bad manners (D) it might contain a virus that could hurt your computer
(E) None of these
Ans : (D)

39. Which of the following will you require to hear music on your computer?
(A) Video Card (B) Tape Recorder (C) Mouse (D) Joy Stick (E) Sound Card 
Ans : (E)

40. The signal that a computer is waiting for a command from the user– 
(A) prompt (B) event (C) time slice (D) interrupt (E) None of these
Ans : (A)

Sunday, July 1, 2012

IBPS Probationary Officers' Exam 2011

Computer Knowledge

(Exam Held On: 18-09-2011)

1. Computer uses the_________number system to store data and perform calculations.

(A) binary
(B) octal
(C) decimal
(D) hexadecimal
(E) None of these
Ans : (A)

2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is_______________

(A) Memory-only
(B) Write-only
(C) Once-only
(D) Run-only
(E) Read-only
Ans : (E)

3. Which of the following can be used to select the entire document ?

(A) CTRL+A
(B) ALT+F5
(C) SHIFT+A
(D) CTRL+K
(E) CTRL+H
Ans : (A)

4___________are 'attempts by individuals to obtain confidential information from you by falsifying their identity.

(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above
Ans : (A)

5. Part number, part description, and number of parts ordered are examples of__________

(A) control
(B) output
(C) processing
(D) feedback
(E) input
Ans : (E)

6. A Web site's main page is called its______________

(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these
Ans : (A)

7. The simultaneous processing of two or more programs by multiple processors is_____________

(A) multiprogramming
(B) multitasking
(C) time-sharing
(D) multiprocessing
(E) None of these
Ans : (D)


 

8. Codes consisting of lines of varying widths or lengths that are computer-readable are known as____________

(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
(E) None of these
Ans : (D)

9. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to AutoFit Contents.

(A) Fit to Form
(B) Format
(C) Autosize
(D) Contents
(E) AutoFit
Ans : (E)

10. Why is it unethical to share copyrighted files with your friends ?

(A) It is not unethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.
(E) It is not unethical-anyone can access a computer
Ans : (C)

11. Reusable optical storage will typica1ly have the acronym__________

(A) CO
(B) DVD
(C) ROM
(D) RW
(E) ROS
Ans : (D)

12. The most common type of storage devices are__________

(A) persistent
(B) optical
(C) magnetic
(D) flash
(E) steel
Ans : (D)

13. A device that connects to a network without the use of cables is said to be_________

(A) distributed
(B) free
(C) centralized
(D) open source
(E) None of these
Ans : (B)

14. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a______________

(A) hacker
(B) analyst
(C) instant messenger
(D) programmer
(E) spammer
Ans : (A)

15. To access properties of an object, the mouse technique to use is__________________

(A) dragging
(B) dropping
(C) right-clicking
(D) shift-clicking
(E) None of these
Ans : (C)

16. To change selected text to all capital letters, click the change case button, then click___________

(A) UPPERCASE
(B) UPPER ALL
(C) CAPS LOCK
(D) Lock Upper
(E) Large Size
Ans : (A)

17. The basic unit of a worksheet into which you enter data in Excel is called a______________

(A) tab
(B) cell
(C) box
(D) range
(E) None of these
Ans : (B)

18. You can keep your personal files / folders in____________________

(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Ans : (B)

19. In Word you can force a page break____________

(A) By positioning your cursor at the appropriate place and pressing the F1 key
(B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter
(C) By using the Insert/Section Break
(D) By changing the font size of your document
(E) None of these
Ans : (B)

20. A DVD is an example of a(n) ______________

(A) hard disk
(B) optical disc
(C) output device
(D) solid-state storage device
(E) None of these
Ans : (B)

21. The default view in Excel is___________view.

(A) Work
(B) Auto
(C) Normal
(D) Roman
(E) None of these
Ans : (C)

22. The process of transferring files from a computer on the Internet to your computer is called___________

(A) downloading
(B) uploading
(C) FTP
(D) JPEC
(E) downsizing
Ans : (A)

23.____________.is the process of dividing the disk into tracks and sectors.

(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
(E) None of these
Ans : (B)

24. Help Menu is available at which button ?

(A) End
(B) Staft
(C) Turnoff
(D) Restart
(E) Reboot
Ans : (B)

25. The contents of____________are lost when the computer turns off.

(A) storage
(B) input
(C) output
(D) memory
(E) None of these
Ans : (D)

26. When you save to this, your data will remain intact even when the computer is turned off________

(A) RAM
(B) Motherboard
(C) Secondary storage device
(D) Primary storage device
(E) None of these
Ans : (C)

27. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n)_________

(A) supercomputer
(B) minicomputer
(C) laptop
(D) server
(E) None of these
Ans : (D)

28. The_________folder retains copies of messages that you have started but are not yet ready to send.

(A) Drafts
(B) Outbox
(C) Address Book
(D) Sent Items
(E) Inbox
Ans : (B)

29. Grouping and processing all of a firm's transactions at one time is called_________

(A) a database management system
(B) batch processing
(C) a real-time system
(D) an on-line system
(E) None of these
Ans : (B)

30. The___________enables you to simultaneously keep multiple Web pages open in one browser window.

(A) tab box
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key
Ans : (C)

31. Which ports connect special types of music instruments to sound cards ?

(A) BUS
(B) CPU
(C) USB
(D) MIDI
(E) MINI
Ans : (C)

32. You can__________a search by providing more information the search engine can use to select a smaller, more useful set of results.

(A) refine
(B) expand
(C) load
(D) query
(E) slowdown
Ans : (A)

33. What is the permanent memory built into your computer called ?

(A) RAM
(B) Floppy
(C) CPU
(D) CO-ROM
(E) ROM
Ans : (E)

34. What displays the contents of the active cell in Excel ?

(A) Name box
(B) Row Headings
(C) Formula bar
(D) Task pane
(E) None of these
Ans : (A)

35. The piece of hardware that converts your computer's digital signal to an analog signal that can travel over telephone lines is called a_______

(A) red wire
(B) blue cord
(C) tower
(D) modem
(E) None of these
Ans : (D)

36. Video processors consist of________and________, which store and process images.

(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) None of these
Ans : (C)

37. If you want to connect to your own computer through the Internet from another location, you can use_________

(A) e-mail
(B) FTP
(C) instant message
(D) Telnet
(E) None of these
Ans : (D)

38. To reload a Web page, press the___________.button.

(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh
Ans : (E)

39. This first step in the transaction processing cycle captures business data through various modes such as optical scanning or at an electronic commerce website__________

(A) Document and report generation
(B) Database maintenance
(C) Transaction processing startup
(D) Data Entry
(E) None of these
Ans : (D)

40. A(n)_____________is a special visual and audio effect applied in Power-point to text or content.

(A) animation
(B) flash
(C) wipe
(D) dissolve
(E) None of these
Ans : (A)

41. When the pointer is positioned on a__________it is shaped like a hand.

(A) grammar error
(B) Formatting error
(C) Screen Tip
(D) Spelling error
(E) hyperlink
Ans : (E)

42. Personal computers can be connected together to form a__________

(A) server
(B) supercomputer
(C) network
(D) enterprise
(E) None of these
Ans : (C)

43. A______________is the term used when a search engine returns a Web page that matches the search criteria.

(A) blog
(B) hit
(C) link
(D) view
(E) success
Ans : (E)

44. ___________are words that a programming language has set aside for its own use.

(A) Control words
(B) Control structures
(C) Reserved words
(D) Reserved keys
(E) None of these
Ans : (C)

45. Mobile Commerce is best described as___________

(A) The use of Kiosks in marketing
(B) Transporting products
(C) Buying and selling goods/services through wireless handheld devices
(D) Using notebook PC's in marketing
(E) None of the above
Ans : (C)

46. Which of, the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information__________

(A) floppy diskette
(B) hard disk
(C) permanent disk
(D) optical disk
(E) None of these
Ans : (B)

47. The computer abbreviation KB usually means___________

(A) Key Block
(B) Kernel Boot
(C) Key Byte
(D) Kit Bit
(E) Kilo Byte
Ans : (E)

48. What is the process of copying software programs from secondary storage media to the hard disk called?

(A) Configuration
(B) Download
(C) Storage
(D) Upload
(E) Installation
Ans : (D)

49. In Excel____________allows users to bring together copies of work-books that other users have worked on independently.

(A) Copying
(B) Merging
(C) Pasting
(D) Compiling
(E) None of these
Ans : (B)

50. Which of the following are advantages of CD-ROM as a storage media?

(A) CD-ROM is an inexpensive way to store large, amount of data and information
(B) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) An of the above
(E) None of these
Ans : (D)

Wednesday, May 30, 2012

Indian Overseas Bank Probationary Officers’ Exam., 2011


Computer Knowledge
(Held on May 2011)

1. If you wish to extend the length of the network without having the signal degrade, you would use a ………………
(A) resonance
(B) router
(C) gateway
(D) switch
(E) repeater
Ans : (E)

2. A repair for a known software bug, usually available at no charge on the Internet, is called a ………………
(A) version
(B) patch
(C) tutorial
(D) FAQ
(E) rectifier
Ans : (B)

3. URL stands for ………………
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Research List
(D) Uniform Research Locator
(E) Uniform Resource Locator
Ans : (E)

4. When data changes in multiple lists and all lists are not updated, this causes ………………
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) data repetition
Ans : (D)

5. What is a backup ?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
(E) None of these
Ans : (B)

6. The Internet is ………………
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) a communication system for some states of India
(E) a communication system for some cities of India
Ans : (A)

7. Computers that are portable and convenient for users who travel are known as ………………
(A) supercomputers
(B) planners
(C) minicomputers
(D) file servers
(E) laptops
Ans : (E)


8. What is the storage area for e-mail messages called ?
(A) A folder
(B) A mailbox
(C) A directory
(D) The hard disk
(E) None of these
Ans : (B)

9. One advantage of dial-up Internet access is
(A) it utilises broadband technology
(B) it is Indian
(C) it uses a router for security
(D) modem speeds are very fast
(E) it utilises existing telephone service
Ans : (E)

10. What is the process of copying software programs from secondary storage media to the hard disk called ?
(A) configuration
(B) download
(C) storage
(D) upload
(E) installation
Ans : (E)

11. Which process checks to ensure that the components of the computer are operating and connected properly ?
(A) Booting
(B) Processing
(C) Saving
(D) Editing
(E) Starting
Ans : (A)

12. A means of capturing an image (drawing or photo) so that it can be stored on a computer is………………
(A) Modem
(B) Software
(C) Scanner
(D) Keyboard
(E) Mouse
Ans : (C)

13. An error in a computer program………………
(A) Crash
(B) Power Failure
(C) Bug
(D) Virus
(E) Fatal error
Ans : (C)

14. Access-control based on a person's fingerprints is .an example of………………
(A) biometric identification
(B) characteristic identification
(C) characteristic security
(D) fingerprint security
(E) logistics
Ans : (A)

15. The patterns of printed lines on most products are called………………
(A) prices
(B) striping
(C) scanners
(D) OCR
(E) barcodes
Ans : (E)

16. Most mail programs automatically complete the following two parts in an e-mail ………………
(A) From: and Body :
(B) From: and Date :
(C) From: and To :
(D) From: and Subject :
(E) None of these
Ans : (B)

17. The computer's capability of distinguishing spoken words is called ………………
(A) voice analysis
(B) speech acknowledgement
(C) voice recognition
(D) speech interpretation
(E) vocalisation
Ans : (C)

18. Which of the following is an advantage of mounting an application on the Web ?
(A) The possibility of 24-houraccess for users
(B) Creating a system that can extend globally
(C) Standardising the design of the interface
(D) All of these
(E) None of these
Ans : (D)

19. The first page of a Website is called the ………………
(A) Homepage
(B) Index
(C) Java Script
(D) Bookmark
(E) Intro Page
Ans : (A)

20. ERP is an acronym for ………………
(A) Enterprise Retirement Planning
(B) Enterprise Relationship Planning
(C) Enterprise Resource' Planning
(D) Enterprise Reorder Planning
(E) Enterprise Retention Planning
Ans : (C)

21. The software that allows users to surf the Internet is called a/an ………………
(A) Search Engine
(B) Internet Service Provider (ISP)
(C) Multimedia Application
(D) Browser
(E) Internet Surfing Provider
Ans : (D)

22. The issues that deal with the collection and use of data about individuals is ………………
(A) access
(B) publicity
(C) accuracy
(D) property
(E) privacy
Ans : (E)

23. A term related to sending data to a satellite is ………………
(A) downlink
(B) modulate
(C) demodulate
(D) uplink
(E) interrelate
Ans : (D)

24. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with related information is called ………………
(A) hypermedia
(B) hypertext
(C) HTML
(D) URL
(E) FTP
Ans : (B)

25. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and ………………security is concerned with protecting software from unauthorized tampering or damage.
(A) data
(B) cyber
(C) Internet
(D) metaphysical
(E) publicity
Ans : (A)

26. Hackers ………………
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) are people who are allergic to computers
(E) break into other people's computers
Ans : (E)

27. Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
(E) data looting
Ans : (C)

28. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
(E) spill
Ans : (A)

29. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) Loud Speakers
Ans : (B)

30. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
(E) A Mobile Phone
Ans : (C)

31. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
(E) Super Computers
Ans : (A)

32. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
(E) Telephone
Ans : (B)

33. The life-span of a CD-ROM is………………
(A) approximately one year
(B) approximately two years
(C) approximately five years
(D) approximately twenty-five years
(E) almost unlimited
Ans : (C)

34. The ……………… settings are automatic and standard.
(A) default
(B) CPU
(C) peripheral
(D) user frien9ly
(E) defaulter
Ans : (A)

35. What are the two parts of an E-mail address ?
(A) User name and street address
(B) Legal name and phone number
(C) User name and domain name
(D) Initials and password
(E) User name and Recipient name
Ans : (C)

36. Participants can see and hear each other in a/an ………………
(A) electronic mail system
(B) message system
(C) tele-conference
(D) bulletin board
(E) None of these
Ans : (C)

37. Magnetic tape is not practical for applications where data must be quickly recalled because tape is ………………
(A) a random-access medium
(B) expensive
(C) a read-only medium
(D) fragile and easily damaged
(E) a sequential-access medium
Ans : (E)

38. Why should you delete unknown e-mail attachments ?
(A) You could go to jail
(B) The person could track you down and hurt you
(C) It is bad manners
(D) It might contain a virus that could hurt your computer
(E) None of these
Ans : (D)

39. How is it possible that both programs and data can be stored on the same floppy disk ?
(A) A floppy disk has two sides, one for data and one for programs
(B) A floppy disk has to be formatted for one or for the other
(C) Programs and data are both software, and both can be stored on any memory device
(D) Floppy disks can only store data, not programs
(E) Floppy disks are better than CDs
Ans : (C)

40. What is an embedded system ?
(A) A program that comes wrapped in a box
(B) A program that is permanently part of a computer
(C) A computer that is part of a larger computer
(D) A computer and software system that controls a machine or appliance
(E) None of these
Ans : (D)

41. Which of the following will you require to hear music on your computer ?
(A) Video Card
(B) Tape Recorder
(C) Mouse
(D) Joy Stick
(E) Sound Card
Ans : (E)

42. The signal that a computer is waiting for a command from the user is ………………
(A) prompt
(B) event
(C) time slice
(D) interrupt
(E) None of these
Ans : (A)

43. This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page ………………
(A) Web browser
(B) Web search engine
(C) Web homepage
(D) Web service
(E) None of these
Ans : (A)

44. For viewing video CDs, you would use………………
(A) CD Player
(B) Windows Media Player
(C) Windows Video Player
(D) Windows Movie Player
(E) None of these
Ans : (B)

45. Executing more than one program concurrently by one user on one computer is known as ………………
(A) multi-programming
(B) multi-processing
(C) time-sharing
(D) multi-tasking
(E) multi-action
Ans : (D)

46. Which of the following controls the manner of interaction between the user and the operating system ?
(A) language translator
(B) platform
(C) user interface
(D) icon
(E) None of these
Ans : (C)

47. You can keep your personal flies / folders in ………………
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text
(E) My Collection
Ans : (B)

48. Three types of compact disks include CD-ROM, CD-R, and ………………
(A) CD-W
(B) CD-RAM
(C) CD-DVD
(D) CD-RW
(E) None of these
Ans : (D)

49. All computers must have ………………
(A) Word processing software
(B) An operating system
(C) A printer attached
(D) A virus checking program
(E) None of these
Ans : (B)

50. Collecting personal information and effectively posing as another individual is known as the crime of ………………
(A) spooling
(B) spoofing
(C) hacking
(D) identity theft
(E) None of these
Ans : (D)
 

Friday, April 27, 2012

Allahabad Bank Clerk (Second Shift) Exam., 2011



 Computer Knowledge

(Exam Held on 8-5-2011)


1. Information on a computer is stored as what ?
(A) Analog data
(B) Digital data
(C) Modem data
(D) Watts data
(E) None of these
Ans : (B)
2. C, BASIC, COBOL and Java are examples of ……… languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)
3. Most Web sites have a main page, the ………, which acts as a doorway to the rest of the Web site pages.
(A) search engine
(B) home page
(C) browser
(D) URL
(E) None of these
Ans : (B)
4. An email account includes a storage area, often called a(n)—
(A) attachment
(B) hyperlink
(C) mailbox
(D) IP address
(E) None of these
Ans : (C)
5. The ……… is the box that houses the most important parts of a computer system.
(A) software
(B) hardware
(C) input device
(D) system unit
(E) None of these
Ans : (D)
6. What type of computer could be found in a digital watch ?
(A) Mainframe computer
(B) Supercomputer
(C) Embedded computer
(D) Notebook computer
(E) None of these
Ans : (C)
7. What is a modem connected to ?
(A) Processor
(B) Mother board
(C) Printer
(D) Phone line
(E) None of these
Ans : (D)
8. A(n) ……… is a collection of information that determines which files you can access and which settings you use.
(A) network
(B) user account
(C) operating system
(D) file system
(E) None of these
Ans : (B)
9. The space in your computer that loads and works with data—
(A) cache memory
(B) CPU
(C) megabyte
(D) RAM memory
(E) ROM memory
Ans : (D)
10. ……… hard drives are permanently located inside the system unit and are not designed to be removed, unless they need to be repaired or replaced.
(A) Static
(B) Internal
(C) External
(D) Remove
(E) None of these
Ans : (B)
11. A computer ……… consists of two or more computers and other devices that are connected for the purpose of sharing data and programs.
(A) network
(B) system
(C) workstation
(D) device
(E) None of these
Ans : (A)
12. The taskbar is located—
(A) on the Start menu
(B) at the bottom of the screen
(C) on the Quick Launch toolbar
(D) at the top of the screen
(E) None of these
Ans : (B)
13. Once information is input into a computer, it becomes—
(A) objects
(B) data
(C) ideas
(D) facts
(E) None of these
Ans : (B)
14. Generally, you access the Recycle Bin through an icon located—
(A) on the desktop
(B) on the hard drive
(C) on the shortcut menu
(D) in the Properties dialog box
(E) None of these
Ans : (A)
15. Computer programs are written in a high-level programming language; however, the humanreadable version of a program is called—
(A) cache
(B) instruction set
(C) source code
(D) word size
(E) None of these
Ans : (C)
16. The Recycle Bin stores discarded items until—
(A) another user logs on
(B) the computer is shut down
(C) the end of the day
(D) you empty it
(E) None of these
Ans : (D)
17. A ……… is a collection of information saved as a unit.
(A) folder
(B) file
(C) path
(D) file extension
(E) None of these
Ans : (B)
18. Input, output, and processing devices grouped together represent a(n)—
(A) mobile device
(B) information processing cycle
(C) circuit board
(D) computer system
(E) None of these
Ans : (D)
19. One thousand bytes is a—
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (E)
20. What part of the computer provides only temporary storage of files ?
(A) ROM memory
(B) RAM memory
(C) Hard drive
(D) Mother board
(E) Processor
Ans : (B)
21. A(n) ……… backup contains a copy of every program, data, and system file on a computer.
(A) restoration
(B) bootstrap
(C) differential
(D) full
(E) None of these
Ans : (D)
22. Every component of your computer is either—
(A) application software or system software
(B) software or CPU/RAM
(C) hardware or software
(D) input devices or output devices
(E) None of these
Ans : (C)
23. A blinking symbol on the screen that shows where the next character will appear—
(A) delete key
(B) arrow key
(C) cursor
(D) return key
(E) Esc key
Ans : (C)
24. Being ……… means being familiar enough with computers that you understand their capabilities and limitations.
(A) computer literate
(B) computer competent
(C) computer savvy
(D) technology literate
(E) None of these
Ans : (A)
25. Which of the following could you do to remove a paragraph from a report you had written ?
(A) Delete and edit
(B) Copy and paste
(C) Cut and paste
(D) Undo typing
(E) Highlight and delete
Ans : (E)
26. The computer monitor is which type of device ?
(A) Scanning
(B) Input
(C) Processor
(D) Software
(E) Output
Ans : (E)
27. The arrow keys can be used to—
(A) delete text
(B) move the cursor in the text that has already been entered
(C) save the document
(D) move the cursor while deleting text
(E) None of these
Ans : (B)
28. Numbers in table columns are usually—
(A) right-aligned
(B) left-aligned
(C) justified
(D) centered
(E) None of these
Ans : (A)
29. To indent the first paragraph of your report, you should use this key—
(A) esc
(B) space bar
(C) return key
(D) shift key
(E) tab key
Ans : (E)
30. Each box in a spreadsheet is called a—
(A) cell
(B) empty space
(C) record
(D) field
(E) table
Ans : (A)
31. A small picture that represents something on your screen…such as a(n)—
(A) table
(B) application
(C) photo
(D) modem
(E) icon
Ans : (E)
32. When a file is saved for the first time—
(A) a copy is automatically printed
(B) file name and folder name must be the same
(C) it does not need a name
(D) it only needs a name if it is not going to be printed
(E) it must be given a name to identify it
Ans : (E)
33. Example of non-numeric data is—
(A) Employee Name
(B) Test score
(C) Bank Account No.
(D) All of these
(E) None of these
Ans : (A)
34. Which type of file is created by word processing programs ?
(A) Database file
(B) Storage file
(C) Worksheet file
(D) Document file
(E) Graphical file
Ans : (D)
35. The information you put into the computer is called—
(A) directory
(B) facts
(C) data
(D) files
(E) output
Ans : (C)
36. This can be another word for program—
(A) peripheral
(B) disk
(C) floppy
(D) hardware
(E) software
Ans : (E)
37. If a previously saved file is edited—
(A) it cannot be saved again
(B) the changes will automatically be saved in the file
(C) the file will only have to be saved again if it is more than one page in length
(D) its name must be changed
(E) the file must be saved again to store the changes
Ans : (E)
38. Mr. XYZ wants to send an electronic message to a friend. He should use this type of application—
(A) word processing
(B) email
(C) spreadsheet
(D) paper and pencil
(E) None of these
Ans : (B)
39. To print a document—
(A) select the Print command and then select OK
(B) select the Ready Printer command then select OK
(C) type PRINT and then press Enter
(D) close the document, select the Print command, then select OK
(E) None of these
Ans : (A)
40. Each ……… on a menu performs a specific action.
(A) client
(B) server
(C) node
(D) command
(E) folder
Ans : (D)