Search This Blog

Tuesday, November 6, 2012

IBPS CLERKS CWE COMPUTER KNOWLEDGE QUESTIONS


1. The Title and Page number of a document can be displayed using which of the following options?
1) Insert table
2) Spelling and Grammar
3) Header and Footer
4) Thesaurus
5) File

2. Which of the following is the advantage of Assembly language over Machine language?
1) Easy to use
2) Easy to understand
3) Easy to modify
4) Only 1 and 3
5) All the above

3. Pop-ups are a form of ..... on the World Wide Web?
1) Instant Messaging
2) Search Engines
3) Browsers
4) Mark-up Languages
5) Online Advertising

4. Which of the following is not used to align text in a document?
1) Left
2) Right
3) Center
4) Diagonal
5) Justify

5. Which of the following characteristics is/are used to compute the results from excel data?
1) Goto
2) Table
3) Diagram
4) Formula and Function
5) None of these

6. ....... is a combination of text, audio, still images, animation, video.
1) Multiplexer
2) Multiplier
3) Multimedia
4) Multiuser
5) None of these

7. Which of the following refers to the process of trading goods over the internet?
1) E-seva
2) E-Trading
3) E-Finance
4) E-Sales
5) E-Commerce

8. Multiple autonomous computers communicating through a computer network to achieve a common goal is called .......
1) Centralized Computing
2) Co-operative Computing
3) Distributed Computing
4) Connected Computing
5) None of these

9. In order to change page margins in a word document:
1) Drag the scroll box on the scroll bars.
2) Delete the margin boundaries on the ruler
3) Right Click on the ruler
4) Drag the margin boundaries on the ruler
5) None of these

10. USB 3.0 is the second major revision of the Universal Serial Bus standard for Computer Connectivity. Which of the following is true about USB 3.0?
1) It is more than 10 times as fast as USB 2.0
2) Its Data transfer rate is up to 5 Gbits/sec
3) Power consumption is less than USB 2.0
4) All the above
5) None of the above



11. MICR is exclusively used in:
1) Libraries
2) Super markets
3) Stock markets
4) Banking Industry
5) None of these

12. A communication system which provides communication in both directions, but not simultaneously is known as:
1) Half-Duplex
2) Full-Duplex
3) Broadcast
4) Only 1 and 2
5) None of these

13. Which of the following uses computers and data communication to transmit data electronically between computers?
1) EDI
2) Physical Media
3) Printing a paper
4) DTE
5) None

14. Which key, when toggled off, causes keyed characters to override existing characters?
1) Delete
2) Insert
3) Page up
4) Page down
5) Down arrow

15. An act of unauthorized copying of computer software is called:
1) Network Piracy
2) License Piracy
3) Plagiarism
4) Software Piracy
5) None of these

16. .... are attempts by individuals to obtain confidential information from the user by falsifying their identity.
1) Phishing Trips
2) Computer Virus
3) Spyware Scams
4) Viruses
5) None of these

17. The default view in Excel is:
1) Work
2) Auto
3) Normal
4) Roman
5) None of these

18. Bus topology is also known as ........
1) Multipoint network
2) Multi drop network
3) Broadcasting network
4) All of these
5) None of these

19. Which of the following is not an advantage of multiprocessor system?
1) Low Cost
2) High Reliability
3) Increased Throughput
4) All of these
5) None of these

20. Data redundancy can be eliminated by using:
1) Networking
2) DBMS
3) Operating System
4) Processing the data manually
5) None of these

21. System bus is also known as :
1) Internal bus
2) Information bus
3) RTA bus
4) Component bus
5) None of these

22. Which memory is normally used between RAM and CPU?
1) Cache
2) Register
3) Virtual
4) Disk
5) None of these

23. ...... is a computer software designed to help people involved in a common task to achieve goals.
1) Shareware
2) Software
3) Freeware
4) Collaborative Software
5) None

24. The CPU of a computer ?
1) understands only assembly language
2) understands machine language and high-level languages
3) understands only machine language
4) understands only high-level language
5) does not understand machine language

25. Which of the following is not a term related to the World Wide Web?
1) Hyperlink
2) Hypertext
3) Website
4) Homepage
5) Keyboard

26. ..... is the process of getting access to the computer.
1) Switch on
2) Login
3) Logoff
4) Enter
5) None

27. Display bar that lists all the open folders and active applications is.......
1) Menubar
2) Toolbar
3) Task bar
4) Window list
5) None of these

28. A picture / image file which is displayed in the background of the computer screen is called ..........
1) Wall Paper
2) Screen Saver
3) Windows Theme
4) Photo Desktop
5) None of these

29. Which of the following operating systems does not exist?
1) Windows 7
2) Mac OS X
3) Windows CE
4) Windows 12
5) Ubuntu

30. Which of the following is true about Operating System?
1) It is an interface between user and the computer.
2) It manages all resources
3) It does all Memory management and Process management tasks
4) All are true
5) None of these

31. ....... is a software for personal computers that combines the most commonly used functions of many productivity software programs into one application.
1) Integrated Software
2) Application Software
3) System Software
4) Software Suite
5) None of these

32. Expand RDBMS.
1) Relative Database Management System
2) Rational Database Minimize System
3) Relational Database Management System
4) Relational Database Maximize System
5) None of these

33. ..... is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law.
1) CID
2) Cryptography
3) Steganography
4) Computer Forensics
5) None of these

34. Find the odd one out.
1) Scanner
2) Mouse
3) Keyboard
4) Printer
5) Barcode Reader

35. Which of the following is not a logic gate?
1) AND
2) OR
3) NOT
4) KNOT
5) None of these

36. DSL is an example of a ...... connection
1) Broadband
2) Dialup
3) Both 1 and 2
4) Computer
5) None of these

37. ...... is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
1) Encryption
2) Cryptography
3) Steganography
4) Forensics
5) None of these

38. 'Bespoke Software' is also known as:
1) Legacy Software
2) Respoke Software
3) System Software
4) Custom Software
5) None of these

39. Which of the following is not a utility program?
1) File copying
2) Listing files
3) Sending files to printer
4) File conversion
5) None of these

40. Which of the following is an audio input device?
1) Microphone
2) Webcam
3) MIDI keyboard
4) Only 1 & 2
5) Only 1 & 3

ANSWERS:

1-3; 2-5; 3-5; 4-4; 5-4; 6-3; 7-5; 8-3; 9-4; 10-4;
11-4; 12-1; 13-1; 14-2; 15-4; 16-1; 17-3; 18-4; 19-5; 20-2;
21-1; 22-1; 23-4; 24-3; 25-5; 26-2; 27-3; 28-1; 29-4; 30-4;
31-1; 32-3; 33-4; 34-4; 35-4; 36-1; 37-3; 38-4; 39-5; 40-5.

Wednesday, October 31, 2012

IBPS CWE COMPUTER KNOWLEDGE PRACTICE QUESTIONS


1. Digital Camera is an?
1) Input Device
2) Output Device
3) Storage Device
4) Controller Device
5) None

2. Adwords is a(n)?
1) Advertising Service by Microsoft
2) Advertising Service by Google
3) Advanced Search Engine
4) Automatic words Search Engine by Yahoo
5) Advertising Service by Yahoo

3. When a computer is switched on, during which process POST is performed?
1) In booting process
2) In integrity process
3) During reliability test
4) In shut down process
5) None

4. Which of the following is the largest storage?
1) Mega Byte 
2) Kilo Byte
3) Giga Byte
4) Byte
5) Tera Byte

5. Application software contains programs designed for a(n)?
1) Computer Administrator
2) Computer Programmer
3) Initiator
4) End User
5) None

6. System Software includes which of the following?
1) Linkers
2) Debuggers
3) Loaders
4) Compilers
5) All the above

7. Which of the following best defines batch processing?
1) Sharing of a computing resource among many users
2) Execution of bulk jobs at a time
3) Allocation of computer system and its resources to more than one user
4) Execution of series of jobs on a computer without manual intervention
5) None

8. Which of the following is true about RAM and ROM?
1) They belong to internal storage
2) They are directly accessible
3) They are read only memories
4) All of these
 5) Only 1 and 2

9. The secret code that restricts entry to some programs / software is:
1) Password
2) Pass code
3) Entry - code
4) Access code
5) None

10. Which of the following is true about CPU?
1) It contains electronic circuits that cause processing to occur
2) It makes the information resulting from processing available for use
3) It allows data, programs, commands to be entered into a computer
4) It is comprised of electronic components that store data
5) None


11. Which of the following keys on keyboard cannot work independently and should be used in combination with another key to perform a task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None

12. The commonly used name for Malicious Software is?
1) Badware
2) Malware
3) Malicious Software
4) Unethical ware
5) Harmful ware

13. Raja wants to print his music notes sheet from a document. He used the keyboard shortcut Ctrl + P. The document, by default is printed in .... mode.
1) Landscape
2) Portrait
3) Page Setup
4) Print View
5) None

14. Which of the following computers is most powerful?
1) Mini Computers
2) Mainframe Computers
3) Super Computers
4) Micro Computers
5) None

15. Word Processing softwares are used to create:
1) Databases
2) Documents
3) Spreadsheets
4) Slides
5) None

16. Which of the following is not a packaged software?
1) MS - PowerPoint
2) MS - Excel
3) MS - Access
4) Adobe Photoshop
5) None

17. The number of distinct pixels in each dimension that can be displayed is called
1) Quality
2) Correctness
3) Resolution
4) Repetition
5) Projection

18. The amount of space that has been used up and the remaining free space of the hard disk is known to the user by?
1) Viewing the properties
2) Opening it
3) Renaming it
4) Moving it to trash / Recyclebin
5) None

19. Which of the following device is used to send and receive information printed on a paper through telephone line?
1) Scanner
2) Printer
3) Fax Machine
4) e - mail
5) MICR

20. Which of the following is a data - entry device?
1) Barcode Reader
2) MICR
3) OMR
4) OCR
5) All of these

21. In Computer terminology, Choices are usually referred to as?
1) Options
2) Exits
3) Sources
4) Codes
5) None

22. Which of the following contains Only input devices?
1) Scanner, Printer, Monitor
2) Keyboard, Printer, Monitor
3) Mouse, Printer, Monitor
4) Plotter, Printer, Monitor
5) None

23. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group?
1) Printer
2) Scanner
3) Mouse
4) Monitor
5) Windows

24. What is the function of a Drop Cap in MS - Word?
1) It does not allow capital letters to be used in the documents.
2) It turns the first letter of each word into Upper Case
3) It lets you begin a paragraph with a large dropped Initial capital letter
4) It automatically starts all paragraphs and sentences with capital letters
5) None

25. Network Components are connected to the same cable in the ...... topology.
1) Star
2) Ring
3) Bus
4) Mesh
5) None

26. When computer processes the data, the intermediate data is stored in?
1) RAM
2) ROM
3) Hard Disk
4) CD
5) BIOS

27. The Process of sending data to a number of stations at the same time is known as ?
1) Broadcasting
2) Unicasting
3) Bicasting
4) Synchronization
5) None

28. Which of the following is not a web browser?
1) Mozilla
2) IE
3) CE
4) Opera
5) Safari

29. What is the maximum storage capacity of a CD?
1) 700 MB
2) 1000 MB
3) 1024 MB
4) 2000 MB
5) 100 MB

30. Which of the following is not a network protocol?
1) HTTP
2) SMTP
3) FTP
4) html
5) None

31. html is a kind of ?
1) Programming Language
2) Mark-up language
3) Scripting Language
4) Query Language
5) Internet Language

32. 'Mark as Final' in MS Word is used to:
1) Make the document Editable by everybody
2) Make the document Read Only
3) Make the document Editable by authorized persons only
4) Make the document available on the web
5) None of these

33. The backspace key is most often used to?
1) Delete a character to the right of the cursor
2) Delete a character to the left of the cursor
3) Delete a character above the cursor
4) Delete a character below the cursor
5) None

34. Which of the following keyboard shortcuts is used to view the properties of a selected object?
1) Alt + Space
2) Ctrl + Space
3) Alt + Enter
4) Ctrl + Enter
5) None

35. Expand VPN.
1) Virtual Personal Network
2) Very Private Network
3) Virtual Private Network
4) Vicious Personal Network
5) None

36. The example of character user interface is:
1) DOS
2) Windows XP
3) Macintosh
4) Both 1 and 2
5) None

37. What is the short-cut key to display save-as dialog box in MS-Word?
1) F1
2) Alt + F1
3) F12
4) F5
5) None

38. The internet service that provides a multimedia interface to available resources is called:
1) FTP
2) World Wide Web
3) Telnet
4) VPN
5) None

ANSWERS:

1-1; 2-2; 3-1; 4-5; 5-4; 6-5; 7-1;
8-5; 9-1; 10-2; 11-2; 12-2; 13-2; 14-3; 15-2;
16-5; 17-3; 18-1; 19-3; 20-5; 21-1; 22-5;
23-5; 24-3; 25-3; 26-1; 27-1; 28-3; 29-1; 30-4;
31-2; 32-2; 33-2; 34-3; 35-3; 36-1; 37-3; 38-2.