Search This Blog

Tuesday, November 22, 2011

IBPS CWE COMPUTER KNOWLEDGE MODEL QUESTIONS


1.A normal CD-ROM usually can store up to ..........
1) 680 KB   
2) 680 Bytes
3) 680 MB   
4) 680 GB
5) None of these

2.Which programming languages are classified as low level languages ?
1) Basic, COBOL, FORTRAN
2) Prolog 2, Expert Systems
3) Knowledge based Systerms
4) Assembly Languages
5) None of these

3.Which of the following devices have a limitation that we can only store information to it but cannot erase or modify it ?
1) Floppy Disk   
2) Hard Disk
3) Tape Drive   
4) CDROM
5) None of these

4.Which of the following is the largst manufacturer of Hard Disk Drives ?
1) IBM   
2) Seagate
3) Microsoft   
4) 3M
5) None of these

5. The programs which are as permanent as hardware and stored in ROM is known as
1) Hardware   
2) Software
3) Firmware   
4) ROM ware
5) None of these

6.To save a document in different location use :
1) Save   
2) Save as
3) Save as web page   
4) All of above
5) None of these

7.Which of the following is not an manufacturer of Hard Disk drives ?
1) Samsung   
2) Interl
3) Seagate   
4) Western Digital
5) None of these

8.The two basic types of record - access methods are
1) Sequential and random
2) Sequential and indexed
3) Direct and immediate
4) On-line and real time
5) None of these

9.A disadvantage of the laser printer is :
1) It is  quieter than an impact printer
2) It is very slow
3) The output is of a lower quality
4) All of the above
5) None of these

10.Different components on the motherboard of a PC processor unit are linked together by sets or parallel electrical conducting lines. What are these lines called ?
1) Conductors   
2) Buses
3) Connectors   
4) Connectively
5) None of these

11.Which of the following professions has been affected by personal computers ?
1) Medical  
2) Clerical and law
3) Accounting   
4) All of the above
5) None of these

12. What is meant by a dedicated computer ?
1) Which is used by one person only
2) Which is assigned one and only one task
3) Which uses one kind of software
4) Which is meant for application software
5) None of these

13.A computer program that translates one program instructions at a time into machine language is called a / an
1) Interpreter   
2) CPU
3) Compiler   
4) Simulator
5) None of these

14.Instructions and memory address are represented by
1) Character code   
2) Binary codes
3) Binary word   
4) Partiy bit
5) None of these

15.As compared to diskettes, the hard disks are
1) More expensive   
2) More portable
3) Less rigid   
4) Slowly accessed
5) None of these

16.The secondary storage devices can only store data but they cannot perform
1) Arithmetic Operation
2) Logic operation
3) Fetch operstions
4) Either of the above
5) None of these

17.A physical connection between the microsprocessor memory and other parts of the microcomputer is known as
1) Path   
2) Address bus
3) Router   
4) All of the above
5) None of these

18. A group of magnetic tapes, videos or terminals usually under the control of one master is
1) Cyinder   
2) Surface
3) Track   
4) Cluster
5) None of these

19.Each model of a computer has a unique
1) Assembly of a computer
2) Machine language
3) High level language
4) All of the above
5) None of these

20.Which company is the biggest player in the microprocessor industry ?
1) Motorola   
2) IBM
3) Intel   
4) AMD
5) None of these

21.Which computer memory is used for storing programs and data currently being processed by the CPU ?
1) Mass memory   
2) Internal memory
3) Non-volatile memory
4) PROM   
5) None of these

22.Microprocessors can be used t make
1) Computer   
2) Digital systems
3) Calculators   
4) All of the above
5) None of these

23.The subject of cybernetics deals with the science of
1) Genetics   
2) Control and communications
3) Molecular biology
4) Biochemistry
5) None of these

24.A term associated with the comparison of processing speeds of different computer system is :
1) EFTS   
2) MPG
3) MIPS   
4) CFPS
5) None of these

25.An integrated circuit is
1) A complicated circuit
2) An integrating device
3) Much costlier than a single transistor
4) Fabricated on a tiny silicon chip
5) None of these

26.Which command is used to set a name to a disk in DOS ?
1) VOLUME   
2) VOL
3) LABEL   
4) DISKLABEL
5) None of these

27.Which file starts MS Word ?
1) Winword.exe   
2) Word.exe
3) Msword.exe   
4) Word2003.exe
5) None of these

28.To get to the 'Symbol' dialog box, click on the ......... menu and choose 'Symbol'.
1) Insert   
2) Format
3) Tools  
4) Table
5) None of these

29.Superscript, subscript, outline, emboss, engrave are known as
1) font styles   
2) font effects
3) word art   
4) text effects
5) None of these

30.Shimmer, Sparkle text, Blinkng Background etc. are known as
1) font styles   
2) font effects
3) word art   
4) text effects
5) None of these

31.Which of the following is not availabel in Font Spacing ?
1) Normal   
2) Loosely
3) Condensed   
4) Expanded
5) None of these

32.Bold, Itali, Regular are known as
1) font styles   
2) font effects
3) word art   
4) text effects
5) None of these

33.If you begin typing an entry into acell and then realize that you don't want your entry placed into a cell, you :
1) Press the Erase key
2) Press esc
3) Press the Enter button
4) Press the Edit Formula button
5) None of these

34.Which of the following will not cut information?
1) Pressing Ctrl + C   
2) Selecting Edit > Cut. from the menu
3) Clicking the cut button ont he standard
4) Pressing Ctrl + X
5) None of these

35.Computer connected to a LAN (Local Area Network) can
1) run faster   
2) go on line
3) share information and / or share peripheral equipment
4) E-mail   
5) None of these

36.A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is ........
1) Bug   
2) Vice
3) Lice   
4) Worm
5) None of these

37.Unwanted repetitious messages, such as unsolicited bulk - e-mail is known as
1) Spam   
2) Trash
3) Calibri   
4) Courier
5) None of these

38.COBOL is widely used in ........... applications
1) Commericial   
2) Scientific
3) Space   
4) mathematical
5) None of these

39.VDU is also called
1) Screen   
2) Monitor
3) Both 1 & 2   
4) printer
5) None of these

40.What kind of software would you most likely use to keep track of billing account ?
1) Word Processing   
2) Electronic Publishing
3) Spreadsheet  
4) Web authoring
5) None of these

41.Test the validity of the statements ?
1) 1 KB = 1024 BYTES
2) 1 MB = 2048 BYTES
3) 1MB = 100 KILOBYTES
4) 1 KB = 1000 BYTES
5) None of these

42.Which of the following is not a computer language ? <br/>
1) BASIC   
2) C++
3) C#   
4) Java
5) Microsoft

43.Which among the following is a correct definition of "Digital Divide"?
1) gap between people having access to mobile and internet access
2) gap between people having access to internet / IT and no internet / IT
3) gap between people having access to broadband and narrowband internet
4) gap between people having access to internet banking and normal banking
5) gap between the people having an email account and no email account

44.Now a days Vishing has become a criminal practice of using social engineering over which of the following ?
1) Social networking sites
2) Mobile Phones   
3) E-mail   
4) Cyber cafes   
5) All of the above

45.What is the fullform of W3C?
1) World Wide Web Consortium
2) World Wide Web Company
3) World Wide Web Center
4) World Wide Web Command
5) None of these

46.Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider ?
1) Version   
2) Update
3) Help   
4) Patch
5) Syntax

47.In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits ?
1) City   
2) Bank
3) Branch   
4) Account Type
5) None of the above

48.Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry ?
1) Virtual keyboard   
2) Finger Touching
3) Touchscreen   
4) Shape Writer
5) Dasher

49.ADSL data communications technology uses which of the following for faster data transmission ?
1) Voiceband modem   
2) Wireless Modem
3) Copper telephone Lines
4) Sockets
5) None of the above

50.What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode ?
1) Reduce Power consumption
2) Back UP
3) To write contents of RAM to hard disc
4) To improve download speed
5) None of thea above

ANSWERS:
    1) 3    2) 4    3) 4    4) 2    5) 3    6) 2        7) 2    8) 1    9) 5    10) 2   
11) 4    12) 2    13) 1    14) 2    15) 1    16) 4    17) 2    18) 4    19) 2    20) 3   
21) 2    22) 4    23) 2    24) 4        25) 4    26) 3    27) 1    28) 1    29) 2    30) 4       
31) 2    32) 1    33) 2    34) 1    35) 3    36) 4  37) 1    38) 1    39) 3    40) 3   
41) 1    42) 5    43) 2    44) 2    45) 1    46) 4    47) 1    48) 1    49) 3    50) 1

Monday, November 21, 2011

IBPS CWE COMPUTER KNOWLEDGE MODEL PAPER

1.Which command devides the surface of the blank disk into sectors and assign a unique address to each one
1) Ver   
2) Format
3) Fat   
4) Chkdsk
5) None of these

2.If you need to duplicate the entire disk, which command will you use ?
1) Copy   
2) Diskcopy
3) Chkdsk   
4) Format
5) None of these

3.A .............. sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk
1) system virus   
2) Trojan horse virus
3) file virus   
4) macro virus
5) None of these

4.A result of a computer virus can not lead to ......
1) Disk Crash   
2) Mother Board Crash
3) Corruption o f program
4) Deletion of files   
5) None of these

5.Every computer connected to an intranet or extranet must have a distinct .......
1) firewall   
2) proxy server
3) IP address   
4) domain name
5) None of these

6.Programming language built into user programs such as Word and Excel are known as ......
1) 4GLs    
2) Macro languages
3) object-oriented languages
4) visual programming languages
5) None of these

7.Firewalls are used to protect against .......
1) unauthorized Attacks   
2) virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) None of these

8.Which of the following extensions suggest that the file is a backup copy
1) Bak   
2) Bas
3) Com   
4) Txt
5) None of these

9.Computer programs are written in a high - level programming language; however, the human readable version of a program is called .......
1) cache   
2) instruction set
3) source code   
4) word size
5) None of these

10.The software tools that enable a user to interact with a computer for specific purposes are known as .......
1) Hardware   
2) Networked Software
3) Shareware   
4) Applications
5) None of these

11............... proessing is used when a large mail-order company accumulates orders and processes them together in one large set
1) Batch   
2) Online
3) Real-time   
4) Group
5) None of these

12.When a file contains instructions that can be carried out by the computer, it is often called a(n) ...... file
1) data   
2) information
3) executable   
4) application
5) None of these

13.A complier translates a program written in a high - level language into ........
1) Machine language       
2) An algorithm
3) A debugged program   
4) Java
5) None of these

14.A set of step - by - step procedures for accomplishing a task is known as a(n) .....
1) algorithm   
2) hardware program
3) software bug   
4) firmware program
5) None of these

15.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) ......
1) Workstation   
2) CPU
3) Magnetic disk   
4) Integrated circuit
5) None of these

16.A saved document is referred to as a .....
1) file   
2) word
3) folder   
4) project
5) None of these

17.What is output ?
1) What the processor takes from the user
2) What the user gives to the processor
3) What the processor gets from the user
4) What the processor gives to the user
5) None of these

18.When you turn on the computer, the boot routine will perform this test ........
1) RAM test   
2) Disk drive test
3) Memory test   
4) Power - on self-test
5) None of these

19.Which of the following storage media provides sequential access only ?
1) Floppy disk   
2) Magnetic disk
3) Magnetic tape   
4) Optical disk
5) None of these

20.In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ........
1) copy and paste   
2) copy, cut and paste
3) cut, copy and paste
4) cut and paste
5) None of these

21. Hardware includes ..........
1) all devices used to input data into a computer
2) sets of instructions that  a computer runs or executes
3) the computer and all the devices connected to it that are used to input and output data
4) all devices involved in processing information including the central processing unit, memory and storage
5) None of these

22.The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ....... command
1) Replace   
2) Find
3) Lookup   
4) Search
5) None of these

23.The term 'user interface' refers to ............
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to user commands
3) the means by which the user interacts with the peripheral devices on the computer
4) the monitor that is available for the computer
5) None of these

24.For creating a document, you use ........ command at File Menu.
1) Open   
2) Close
3) New   
4) Save
5) None of these

25.The .............. becomes different shapes depending on the task you are performing
1) Active tab   
2) Insertion point
3) Mouse pointer   
4) Ribbon
5) None of these

26.Specilizd programs that asist users in locating information on the Web are called ....
1) Information engines   
2) Search engines
3) Web browsers   
4) Resource locators
5) None of these

27.The background of any Word document ......
1) Is always white colour
2) Is the colour you presect under the Options menu
3) Is always the same for the entire document
4) Can have any colour you choose
5) None of these

28.Correcting errors in a program is referred to as .........
1) debugging   
2) bugging
3) rectifying   
4) modifying
5) None of these

29.Any letter, number, or symbol found on the keyboard that you can type into the computer ..........
1) output   
2) character
3) type   
4) print
5) font

30.A symbol or question on the screen that prompts you to take action and tell the computer what to do next ........
1) scanner   
2) questionnaire
3) prompt and dialog box
4) information seeker   
5) None of these

31.Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs .....
1) menu bar   
2) tool bar
3) user friendly   
4) word processor
5) None of these

32.The primary device that a computer uses to store information ......
1) monitor   
2) memory
3) disk   
4) hard drive
5) None of these

33.A file extension is separated from the main file name with a(n) ......, but no spaces
1) questiion nark   
2) exclamation mark
3) underscore   
4) period
5) None of these

34.Application software is designed to accomplish .......
1) real -w orld tasks   
2) computer-centric tasks
3) gaming tasks
4) operating system tasks
5) None of these

35.A ...... is a device that not only provdes surge protection, but also furnishes your computer with battery backup power during a power outage
1) surge strip   
2) USB
3) UPS   
4) battery strip
5) None of these

36.The term ............. designates equipment that might be added to a computer system to enhance, its functionality
1) digitial device   
2) system add-on
3) disk pack   
4) peripheral device
5) None of these

37........... this is the act of copying or downloading a program from a network and making multiple copies of it.
1) Network piracy   
2) Plagiarism
3) Software piracy   
4) Site-license piracy
5) None of these

38.When installing ............., the user must copy and usually decompress program files from a CDROM or other medium to the hard disk
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these

39.Which one of the following would be considered as a way that a computer virus can enter a computer system ?
1) Opening an application previously installed on the computer
2) Borrowed an illegal copy of software
3) Viewing a website without causing any additional transctions
4) Running antivirus programs
5) None of these

40.Programs such as Mozila Firefox that serve as navigable windows into the Web are called ..........
1) Hypertext  
2) Networks
3) Internet   
4) Web browsers
5) None of these

41.What is the main difference between a mainframe and a super computer ?
1) Super computer is much larger than mainframe computers
2) Super computers are much smaller than mainframe computers
3) Supercomputers are focused to execute few programs as fast as possible while mainframe uses its power to execute as many programs concurrently
4) Supercomputers are focused to execute as many programs as possible while mainframe uses its power to execute few programs as fast as possible
5) None of these

42.What is the function of Recycle Bin ?
1) Store deleted file   
2) Store temporary file
3) Store corrupted file   
4) Store Document file
5) None of these

43.Which is the latest version of MS Office ?
1) Office XP   
2) Windows XP
3) Office 2007   
4) Office 2010
5) None of these

44.Which device can not be shared in network ?
1) Floppy   
2) Keyword
3) Computer   
4) Printer
5) None of these

45.What is the purpose of query ?
1) Input data   
2) Output data
3) Sort & filter   
4) All of above
5) None of these

46.Which port doesn't exist in computer ?
1) USB   
2) Parallel
3) Com1 / Com2  
4) RAW
5) None of these

47.What is the name of exel files ?
1) Workbook   
2) Worksheet
3) Spreadsheet   
4) Spread book
5) None of these

48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
4) All of he above
5) None of these

49.Synonym can be reviewed with
1) Spelling and grammar
2) Thesaurus   
3) Both   
4) Synonym viewer   
5) None of these

50.Which command allows you to reduce fragments of file and optimize the performance of disk ?
1) Scandisk   
2) Diskcomp
3) Chkdsak   
4) Defrag
5) None of these

ANSWERS:
    1) 2    2) 2    3) 5    4) 2    5) 2    6) 4        7) 1    8) 1    9) 3    10) 4   
11) 1    12) 3    13) 1    14) 1    15) 4    16) 1    17) 4    18) 2        19) 2   20) 4   
21) 4    22) 2    23) 1    24) 3        25) 3    26) 2    27) 4    28) 1    29) 2    30) 3       
31) 1    32) 4    33) 5    34) 4    35) 3    36) 4  37) 3    38) 1    39) 2    40) 4  
41) 3    42) 1   43) 4    44) 2    45) 4    46) 4    47) 1    48) 1        49) 2    50) 4