Thursday 1 November 2012

IBPS CWE COMPUTER KNOWLEDGE PRACTICE QUESTIONS


1. Digital Camera is an?
1) Input Device
2) Output Device
3) Storage Device
4) Controller Device
5) None

2. Adwords is a(n)?
1) Advertising Service by Microsoft
2) Advertising Service by Google
3) Advanced Search Engine
4) Automatic words Search Engine by Yahoo
5) Advertising Service by Yahoo

3. When a computer is switched on, during which process POST is performed?
1) In booting process
2) In integrity process
3) During reliability test
4) In shut down process
5) None

4. Which of the following is the largest storage?
1) Mega Byte 
2) Kilo Byte
3) Giga Byte
4) Byte
5) Tera Byte

5. Application software contains programs designed for a(n)?
1) Computer Administrator
2) Computer Programmer
3) Initiator
4) End User
5) None

6. System Software includes which of the following?
1) Linkers
2) Debuggers
3) Loaders
4) Compilers
5) All the above

7. Which of the following best defines batch processing?
1) Sharing of a computing resource among many users
2) Execution of bulk jobs at a time
3) Allocation of computer system and its resources to more than one user
4) Execution of series of jobs on a computer without manual intervention
5) None

8. Which of the following is true about RAM and ROM?
1) They belong to internal storage
2) They are directly accessible
3) They are read only memories
4) All of these
 5) Only 1 and 2

9. The secret code that restricts entry to some programs / software is:
1) Password
2) Pass code
3) Entry - code
4) Access code
5) None

10. Which of the following is true about CPU?
1) It contains electronic circuits that cause processing to occur
2) It makes the information resulting from processing available for use
3) It allows data, programs, commands to be entered into a computer
4) It is comprised of electronic components that store data
5) None


11. Which of the following keys on keyboard cannot work independently and should be used in combination with another key to perform a task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None

12. The commonly used name for Malicious Software is?
1) Badware
2) Malware
3) Malicious Software
4) Unethical ware
5) Harmful ware

13. Raja wants to print his music notes sheet from a document. He used the keyboard shortcut Ctrl + P. The document, by default is printed in .... mode.
1) Landscape
2) Portrait
3) Page Setup
4) Print View
5) None

14. Which of the following computers is most powerful?
1) Mini Computers
2) Mainframe Computers
3) Super Computers
4) Micro Computers
5) None

15. Word Processing softwares are used to create:
1) Databases
2) Documents
3) Spreadsheets
4) Slides
5) None

16. Which of the following is not a packaged software?
1) MS - PowerPoint
2) MS - Excel
3) MS - Access
4) Adobe Photoshop
5) None

17. The number of distinct pixels in each dimension that can be displayed is called
1) Quality
2) Correctness
3) Resolution
4) Repetition
5) Projection

18. The amount of space that has been used up and the remaining free space of the hard disk is known to the user by?
1) Viewing the properties
2) Opening it
3) Renaming it
4) Moving it to trash / Recyclebin
5) None

19. Which of the following device is used to send and receive information printed on a paper through telephone line?
1) Scanner
2) Printer
3) Fax Machine
4) e - mail
5) MICR

20. Which of the following is a data - entry device?
1) Barcode Reader
2) MICR
3) OMR
4) OCR
5) All of these

21. In Computer terminology, Choices are usually referred to as?
1) Options
2) Exits
3) Sources
4) Codes
5) None

22. Which of the following contains Only input devices?
1) Scanner, Printer, Monitor
2) Keyboard, Printer, Monitor
3) Mouse, Printer, Monitor
4) Plotter, Printer, Monitor
5) None

23. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group?
1) Printer
2) Scanner
3) Mouse
4) Monitor
5) Windows

24. What is the function of a Drop Cap in MS - Word?
1) It does not allow capital letters to be used in the documents.
2) It turns the first letter of each word into Upper Case
3) It lets you begin a paragraph with a large dropped Initial capital letter
4) It automatically starts all paragraphs and sentences with capital letters
5) None

25. Network Components are connected to the same cable in the ...... topology.
1) Star
2) Ring
3) Bus
4) Mesh
5) None

26. When computer processes the data, the intermediate data is stored in?
1) RAM
2) ROM
3) Hard Disk
4) CD
5) BIOS

27. The Process of sending data to a number of stations at the same time is known as ?
1) Broadcasting
2) Unicasting
3) Bicasting
4) Synchronization
5) None

28. Which of the following is not a web browser?
1) Mozilla
2) IE
3) CE
4) Opera
5) Safari

29. What is the maximum storage capacity of a CD?
1) 700 MB
2) 1000 MB
3) 1024 MB
4) 2000 MB
5) 100 MB

30. Which of the following is not a network protocol?
1) HTTP
2) SMTP
3) FTP
4) html
5) None

31. html is a kind of ?
1) Programming Language
2) Mark-up language
3) Scripting Language
4) Query Language
5) Internet Language

32. 'Mark as Final' in MS Word is used to:
1) Make the document Editable by everybody
2) Make the document Read Only
3) Make the document Editable by authorized persons only
4) Make the document available on the web
5) None of these

33. The backspace key is most often used to?
1) Delete a character to the right of the cursor
2) Delete a character to the left of the cursor
3) Delete a character above the cursor
4) Delete a character below the cursor
5) None

34. Which of the following keyboard shortcuts is used to view the properties of a selected object?
1) Alt + Space
2) Ctrl + Space
3) Alt + Enter
4) Ctrl + Enter
5) None

35. Expand VPN.
1) Virtual Personal Network
2) Very Private Network
3) Virtual Private Network
4) Vicious Personal Network
5) None

36. The example of character user interface is:
1) DOS
2) Windows XP
3) Macintosh
4) Both 1 and 2
5) None

37. What is the short-cut key to display save-as dialog box in MS-Word?
1) F1
2) Alt + F1
3) F12
4) F5
5) None

38. The internet service that provides a multimedia interface to available resources is called:
1) FTP
2) World Wide Web
3) Telnet
4) VPN
5) None

ANSWERS:

1-1; 2-2; 3-1; 4-5; 5-4; 6-5; 7-1;
8-5; 9-1; 10-2; 11-2; 12-2; 13-2; 14-3; 15-2;
16-5; 17-3; 18-1; 19-3; 20-5; 21-1; 22-5;
23-5; 24-3; 25-3; 26-1; 27-1; 28-3; 29-1; 30-4;
31-2; 32-2; 33-2; 34-3; 35-3; 36-1; 37-3; 38-2.

2 comments:

  1. This site is admittedly fascinating i'm looking for is there any other examples? but anyway thank you noticeably as a result of I found that i used to be longing for.
    corrupt pst file

    ReplyDelete