Showing posts with label IBPS. Show all posts
Showing posts with label IBPS. Show all posts

Saturday 5 November 2011

BANK EXAMS COMPUTER KNOWLEDGE STUDY MATERIAL

1. Which of the following are the major components in a computer
a) CPU, CD_Rom, Mouse, Keyboard
b) Memory, Video card, Monitor
c) Modem, Printer, Screen
d) CPU, Memory, System bus, Input H/w, Output H/w

2. How the information is transformed from one component to another component in a system?
a) System bus
b) Memory
c) Keyboard
d) Monitor

3. MS-Access, MS-Foxpro is the examples of what type of software?
a) Spread Sheet
b) Presentation Software
c) Database Management
d) None of the above

4. Windows operating system have
a) Graphical User Interface
b) Command based Interface
c) Both a and b
d) None of the above

5. ___ Allows more data to be stored on a disk?
a) Data Compression
b) Disk Defragmentation
c) Both a and b
d) None of the above

6. A text-based language with codes or tags used for developing web pages is called?
a) Java
b) HTML
c) Both a and b
d) None of the above

7. CASE stands for?
a) Computer Aided Software Engineering
b) Common Aided Software Engineering
c) Computer Access Software Engineering
d) Computer Aided Software Engine

8. The primary job of the information system is?
a) Data collection
b)Data transfer
c) Transform inputs to information
d) None of the above

9. ___ Is the software that allows the computer to interact with users and hardware?
a) System Software
b) Application software
c) Development software
d) None of the above

10. This type of boot occurs when the computer is already on, and you restart it without turning off the power?
a) Generic boot
b) Live boot
c) Warm boot
d) Cold boot

11. A concentric ring on a hard disk is referred to as a?
a) Track
b) Sector
c) Table
d) None of the above

12. Which of the following best describes the purpose of generating a flowchart as part of the design of a computer program?
a) To test and maintain the efficiency of the overall program
b) To present the steps needed to solve the programming problem
c) To ensure that all methods are appropriately linked
d) To determine the necessary number of global and local variables

13. Which of the following would best facilitate the expansion of a computer program?
a) Incorporation of diagrams into the design documents
b) Minimal use of global variables in the source code
c) Construction of methods that are highly dependent on one another
d) Extensive use of functions, that support the debugging process

14. ___ Is/are the steps that tell the computer how to perform a particular task?
a) Data
b) Instructions
c) Information
d) Documentation

15. A computer contain many electric, electronic, and mechanical components known as?
a) Software
b) Input devices
c) Output devices
d) Hardware

16. ___ Is the most widely used coding scheme used to represent data
a) ASCII
b) Unicode
c) EBCDIC
d) Multi code

17. ___ Is the most common type of volatile memory?
a) ROM
b) CMOS
c) Flash Memory
d) RAM

18. A ___ is equal to approximately 1 million bytes?
a) Kilobytes
b) Mega bytes
c) Giga bytes
d) Tera bytes

19. Two categories of software are?
a) Operating System & System Software
b) Utility Programs
c) System software and Utility Programs
d) System software and Application Software

20. Notebook computers?
a) Can run on batteries or standard power supply
b) Are less expensive than a desktop with similar capabilities
c) Facilities are less
d) None of the above

21. The world's largest computer network is?
a) Internet
b) Intranet
c) LAN
d) MAN

22. Transaction Processing Systems are the basic business systems that serve which level of the organization?
a) Middle level
b) Senior level
c) Operational level
d) None of the above

23. In batch processing?
a) Transactions are processed immediately in batches
b) Transactions are accumulated in batches until it is time to process them
c) Both a and b
d) None of the above

24. Which of the following is the most powerful computer?
a) Mainframe computer
b) Micro computer
c) Super computer
d) Mini computer

25. A program written in a machine language is called ___ program?
a) Object
b) Computer
c) Assembler
d) High level

26. A collection of wires that connects several devices is called?
a) Link
b) Bus
c) Cable
d) Port

27. The fastest type of memory is?
a) Tape
b) Semi conductor memory
c) Disk memory
d) Bubble memory

28. Which of the following translator program coverts assembly level language program to object program?
a) Assembler
b) Complier
c) Micro processor
d) Linker

29. Barcodes stores information by using?
a) Dots b) Thick and thin lines
c) Both a and b
d) None of the above

30. Which of the following are the main problems in File Management System?
a) Data redundancy
b) Difficulty in updating
c) Both a and b
d) None of the above

31. In a database related fields are grouped to form?
a) Record
b) File
c) Both a and b
d) None of the above

32. Which of the following parts of a computer is necessary to enable it to play music?
a) Sound cards
b) CD-Ram
c) MIDI interface
d) Serial interface

33. Which one of the following printers is suitable for printing sprocket fed carbon copies?
a) Laser
b) Dot matrix
c) Ink jet
d) None of the above

34. To be effective a virus checker should be?
a) Replaced regularly
b) Never updated
c) Updated regularly
d) None of the above

35. Passwords enable users to?
a) Get into the system quickly
b) Make efficient use of time
c) Retain confidentiality of files
d) Simplify file structure

36. Automated transaction for the purchase of goods over the Internet is called?
a) E-Shopping
b) Web-Purchase
c) E-Commerce
d) Web-Shopping

37. Which one of the following would be the best to use to produce hundreds of letters at a time with same matter to different addresses?
a) Personal information
b) Email group
c) DTP
d) Mail merge

38. A:\ refers to?
a) A file name
b) Root directory
c) Hard drive
d) None of the above

39. Which of the following input device would be best suited to capturing images for use with a personal computer?
a) Digital camera
b) Graphics tablet
c) Touch Screen
d) Optical Mark Reader

40. The concept of "Zero Administ-ration" is associated with?
a) Network computer
b) Mini computer
c) Micro computer
d) None of the above

ANSWERS:
1) d 2) a 3) c 4) a 5) a 6) b 7) a 8) c 9) a 10) c 11) a 12) b 13) b 14) b 15) d 16) a 17) d 18) b
19) d 20) a 21) a 22) c 23) c 24) c 25) a 26) b 27) b 28) a 29) b 30) c 31) b 32) a 33) b 34) c
35) c 36) c 37) d 38) b 39) d 40) a

Monday 24 October 2011

IBPS COMPUTER KNOWLEDGE PRACTICE QUESTIONS


1. ___Key combination that lets you toggle between open windows
a) ALT+SHIFT+TAB
b) ALT+CTRL+TAB
c) ALT+CTRL
d) ALT+TAB

2. When more than one window is open, to switch to the next win-dow___is the key combination
a) CTRL+F5
b) CTRL+F6
c) CTRL+F7
d) CTRL+F8

3. To select or unselect one word to the right
a) CTRL+SHIFT
b) CTRL+SHIFT+Down Arrow
c) CTRL+SHIFT+Right Arrow
d) None of the above

4. To maximize or restore a selected window
a) CTRL+F7
b) CTRL+F10
c) CTRL+F8
d) CTRL+F9

5. To Copy a picture of the selected window to the clipboard
a) ALT+TAB
b) ALT+Print Screen
c) Both (a) and (b)
d) None of the above

6. ___Is the key to close a selected drop-down list; cancel a comm-and and close a dialog box
a) TAB
b) SHIFT
c) ESC
d) None of the above

7. ___Is the key we use to run the selected command
a) SHIFT
b) TAB
c) ENTER
d) CTRL

8. ___Is the functional key to display save as box
a) F5
b) F6
c) F9
d) F12

9. ___Is the combination of keys to switch between the last four places that you have edited
a) ALT+CTRL+Z
b) ALT+CTRL+Y
c) ALT+TAB+Z
d) ALT+SHIFT+Z

10. To delete one word to the right
a) CTRL+SHIFT
b) CTRL+TAB
c) CTRL+DEL
d) CTRL+Z

11. ___Is the combination of keys we use to hide rows
a) CTRL+9
b) CTRL+8
c) CTRL+7
d) CTRL+6

12. To hide the columns___is the functional key
a) CTRL+3
b) CTRL+2
c) CTRL+1
d) CTRL+0

13. ___Is the shortcut key to delete cells, rows or columns
a) CTRL+ Minus Sign
b) CTRL+ Plus Sign
c) CTRL+ Star Sign
d) CTRL+ Greater than Sign

14. To insert cells, rows or columns -___the keyboard shortcut key
a) CTRL+ Minus Sign
b) CTRL+SHIFT+ Plus Sign
c) CTRL+ Star Sign
d) CTRL+ Greater than Sign

15. ___Is the keyboard shortcut key to insert auto sum
a) ALT
b) ALT=
c) ALT+
d) ALT-

16. ___Is the shortcut key to move to the next worksheet
a) CTRL+Pagedown
b) CTRL+Pageup
c) CTRL+Right arrow
d) CTRL+Left arrow

17. ___Is the shortcut key to move to the previous worksheet
a) CTRL+Pagedown
b) CTRL+Pageup
c) CTRL+Right arrow
d) CTRL+Left arrow

18. ___Key we use to select row
a) SHIFT+TAB
b) SHIFT+ Spacebar
c) CTRL+ Spacebar
d) SHIFT+ Enter

19. ___Key we use to select column
a) SHIFT+TAB
b) SHIFT+ Spacebar
c) CTRL+ Spacebar
d) SHIFT+ Enter

20. ___Is the key to exit from excel
a) ALT+F2
b) ALT+F3
c) ALT+F4
d) ALT+F5

21. A device, which is not connected to CPU, is called as ---
a) On-line device
b) Off-line device
c) Device
d) None of the above

22. What is the other name for programmed chip?
a) RAM
b) ROM
c) LSIC
d) None of the above

23. On-line real time systems become popular in___generation
a) First Generation
b) Second Generation
c) Third Generation
d) Fourth Generation

24. EDVAC stands for
a) Electronic Discrete Variable Automatic Computer
b) Electronic Discrete Value Automatic Computer
c) Electronic Device Variable Automatic Computer
d) Electronic Discrete Variable Advanced Computer

25. EDSAC stands for
a) Electronic Delay Storage Advanced Computer
b) Electronic Data Storage Automatic Computer
c) Electronic Delay Strong Automatic Computer
d) Electronic Delay Storage Automatic Computer

26. LSIC stands for
a) Large Scale Inner Circuits
b) Large Scale Integrated Computer
c) Large Scale Integrated Circuits
d) Large Storage Integrated Circuits

27. The task of performing operations like arithmetic and logical operations is called ___
a) Processing
b) Storing
c) Editing
d) Sorting

28. The ALU and Control Unit jointly known as
a) RAM
b) ROM
c) CPU
d) None of the above

29. RAM is an example of
a) Secondary memory
b) Primary memory
c) Both (a) and (b)
d) None of the above

30. Magnetic disk is an example of
a) Secondary memory
b) Primary memory
c) Both (a) and (b)
d) None of the above

31. A bit is an acronym for
a) Digit
b) Binary digit
c) Number
d) None of the above

32. Each memory cell has a unique number, assigned to it is called as the ___ of the cell
a) Address
b) Register
c) Number
d) None of the above

33. RAM is also called as
a) Read/Write Memory
b) Long Memory
c) Permanent Memory
d) None of the above

34. ___Store data or information temporarily and pass it on as directed by the control unit
a) Address
b) Register
c) Number
d) None of the above

35. The secondary storage memory is also called as
a) Auxiliary Memory
b) Attractive Memory
c) Chip Memory
d) None of the above


ANSWERS:
1) a 2) b 3) c 4) b 5) b 6) c 7) c 8) d 9) a 10) c 11) a 12) d 13) a 14) b 15) b
16) a 17) b 18) b 19) c 20) c 21) b 22) b 23) c 24) a 25) d 26) c 27) a 28) c 29) b
30) a 31) b 32) a 33) a 34) b 35) a 

Thursday 20 October 2011

IBPS COMPUTER KNOWLEDGE MCQs

1. In a network, the computer that stores the files and process the data is named as
a) Server
b) Terminal
c) Modem
d) All of the above

2. Viruses are called that because
a) They are viruses
b) They can copy themselves and spread
c) Both (a) and (b)
d) None of the above

3. Which of the can't spread virus
a) An e-mail with attachment
b) A plain text mail
c) Downloading files over the web
d) None of the above

4. There is a new anti-virus software update available, when it is downloaded to your computer
a) Everyday
b) Only in the night
c) When you next switch on your computer
d) All of the above

5. Numbers are stored and transmitted inside a computer in
a) Binary form
b) ASCII code form
c) Alphabets form
d) Numerical form

6. CPU capacity can be measured in
a) BPS
b) MIPS
c) MHz
d) MPI

7. MPIS stands for
a) Million Instructions Per Second
b) Million Instructions Per Season
c) Monthly Instructions Per Second
d) Million Inputs Per Second

8. LAN speeds are measured in
a) BPS
b) KBPS
c) MBPS
d) MIPS

9. Modem speeds are measured in
a) BPS
b) KBPS
c) MBPS
d) MIPS

10. BPS stands for
a) Bits Per Second
b) Bits Per Season
c) Bytes Per Second
d) Bits Per System

11. In processing cheques which of the following I/O techniques have banks traditionally followed?
a) OCR
b) MICR
c) Barcode
d) VRT

12. What is object of UPS?
a) Using for storage
b) To increase the speed of a computer
c) Provides backup power
d) All of the above

13. QWERTY is used with reference to
a) Monitor
b) Printer
c) Keyboard
d) Mouse


14. "Zipping" a file means
a) Encrypting the message
b) Compressing the message
c) Transfer the message
d) All of the above

15. Integrated Circuits (IC) chips used in computers are made with
a) Gold
b) Silver
c) Silicon
d) Coper

16. What is the Super Computer developed in India
a) CRAY
b) PARAM
c) Both (a) and (b)
d) None of the above

17. Which of the following is different from other
a) Internet
b) Windows
c) Unix
d) Linux

18. What is the full form of WWW?
a) World Wide Web
b) World With Web
c) Work Wide Web
d) World Wide Wet

19. Which of the following Command is required to reboot the computer
a) CTRL+ALT+DEL
b) CTRL+ALT+TAB
c) CTRL+ALT+SHIFT
d) CTRL+SHIFT+DEL

20. Select the ODD one
a) Operating system
b) Interpreter
c) Compiler
d) Assembler

21. PC stands for
a) Practical Computer
b) Personal Computer
c) Private Computer
d) Personal Contact

22. The computer code for interchange of information between terminals is
a) BCDIC
b) BCD
c) ASCII
d) None of the above

23. The retrieval of information from the computer is defined as
a) Data processing
b) Input
c) Output
d) All of the above

24. Which one of the following is NOT a computer language?
a) MS-Excel
b) BASIC
c) COBOL
d) C++

25. "C" is
a) A letter
b) A word
c) A language
d) An alphabet

26. Difference Engine invented by
a) Charles Babbage
b) John McCarthy
c) Pascal
d) Newton

27. First generation computer systems used
a) Transistors
b) Vacuum Tubes
c) Both (a) and (b)
d) None of the above

28. A byte is made up of
a) Eight bytes
b) Eight binary digits
c) Two binary digits
d) Two decimal points

29. Doing research by using an on-line database instead of a printed set of similar information offers which of the following advantage
a) More current information
b) Easier to understand
c) Better charts
d) None of the above

30. Software programs that allow you to legally copy files and give them away at no cost are called which of the following
a) Time sharing
b) Public domain
c) Shareware
d) None of the above

31. The term that we use to describe physical components of the system
a) Hardware
b) Input
c) Software
d) None of the above

32. Which of the following is used to indicate the location on the computer monitor
a) Mouse
b) Cursor
c) Both (a) and (b)
d) None of the above

33. Mr. Saketh needs to design invitation card. What type of computer program is suitable?
a) MS-Word
b) Desktop Publishing
c) Simulation
d) None of the above

34. Which combination of keys needs to be pressed to make a percent sign?
a) Shift+2
b) Shift+3
c) Shift+4
d) Shift+5

35. What process should be used to recall a document saved previously?
a) Copy
b) Save
c) Retrieve
d) Enter

36. What term applies to a collection of related records in a database?
a) Field
b) File
c) Both (a) and (b)
d) None of the above

37. How are data organized in a spreadsheet?
a) Rows and Columns
b) Boxes
c) Tables
d) None of the above

38. Which of the following mode we use to deliver e-mail
a) Postal
b) Courier
c) Computer
d) Fax

39. VIRUS stands for
a) Vital Information Recourse Under Siege
b) Vital Information Reason Under Siege
c) Vital Information Recourse Under System
d) Virus Information Recourse Under Siege

40. ------ Is known as unauthorized access into others system
a) Hacking
b) Encryption
c) Decryption
d) None of the above

ANSWERS:

 1. a    2. b    3. b    4. c    5. b    6. b    7. a    8. c    9. a    10. a       
11. b    12. c    13. c    14. b    15. c    16. b    17. a    18. a    19. a   
20. a   21. b     22. c    23. c    24. a    25. c    26. a    27. b    28. b   
29. a    30. b        31. a    32. b    33. b    34. d    35. c    36. b    37. a   
38. c    39. a    40. a

Wednesday 12 October 2011

IBPS CLERKS EXAM PRACTICE MCQs


1. A passive threat to computer security is—
(1) Malicious Intent
(2) Sabotage
(3) Accident Errors
(4) Espionage Agents
(5) None of these

2. The Secure Electronic Transaction (SET) specification—
(1) is a notice, issued and verified by a certificate authority, that guarantees a user      or Web site is legitimate
(2) provides private-key encryption of all data that passes between a client and a      server
(3) allows users to choose an encryption scheme for the data that passes between      a client and a server
(4) uses a public-key encryption to secure credit-card transaction systems
(5) None of these

3. ……………allows wireless mobile devices to access the Internet and its services such as the Web and e-mail—
(1) TCP/IP
(2) Ethernet
(3)WAP
(4) Token ring
(5) None of these

4. 'DOS' floppy disk does not have—
(1) A Boot Record
(2) A File Allocation Table
(3) A Root Directory
(4) Virtual Memory
(5) BIOS

5. 'MICR' technology used for clearance of cheques by banks refers to—
(1) Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition
(5) None of these

6. All the information collected during database development is stored in a—
(1) repository
(2) data warehouse
(3) RAD
(4) CASE
(5) None of these

7. The……………….component is used by the data analyst to create the queries that access the database.
(1) data extraction
(2) end-user query tool
(3) end-user presentation tool
(4) data store
(5) None of these

8. A (n)…………….allows network users to share a single copy of software, which resides on the network server.
(1) single-user license agreement
(2) network site license
(3) end-user license agreement
(4) business software license
(5) None of these

9. A polymorphic virus—
(1) modifies its program code each time it attaches itself to another program or file
(2) is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains
(3) a malicious-logic program that hides within or looks like a legitimate program
(4) infects a program file, but still reports the size and creation date of the original, uninfected program
(5) None of these

10. Microwave transmission is used in environments where installing physical transmission media is—
(1) difficult or impossible and where line-of-sight transmission is unavailable
(2) easy or promising and where line-of-sight transmission is unavailable
(3) difficult or impossible and where line-of-sight transmission is available
(4) easy or promising and where line-of-sight transmission is available
(5) None of these

11. Which is NOT a good Web security strategy?
(1) Restrict access to the Web server; keep a minimum number of ports open
(2) Limit the users who can load software, edit or add files.
(3) Add demo programs, so users can test system without accessing production data.
(4) Remove unnecessary compilers and interpreters.
(5) None of these

12. The altering of data so that it is not usable unless the changes are undone is—
(1) Biometrics
(2) Compression
(3) Encryption
(4) Ergonomics
(5) None of these

13. The word FIP stands for—
(1) File Translate Protocol
(2) File Transit Protocol
(3) File Typing Protocol
(4) File Transfer Protocol
(5) None of these

14. Voice mail—
(1) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet
(2) permits users to converse in real time with each other via the computer while connected to the Internet
(3) functions much like an answering machine, allowing callers to leave a voice message for the called party
(4) involves using video and computer technology to conduct a meeting between participants at geographically separate locations
(5) None of these

15. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is—
(1) Bridge
(2) Gateway
(3) Router
(4) Modem
(5) All of these

16. Which of the following is a general-purpose programming language, designed by Sun Microsystems, and well suited for use on the Web?
(1) VB Script
(2) Java Script
(3) CSS
(4) Java
(5) None of these

17. This.............tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
(1) Client
(2) Applications/Web server
(3) Enterprise server
(4) DBA
(5) None of these

18. RSA is—
(1) Symmetric Cryptosystem
(2) Asymmetric Cryptosystem
(3) Block Cypher
(4) Digital Signature
(5) None of these

19. A DVD-RAM is similar to a………………except it has storage capacities up to 5.2 GB.
(1) CD-R
(2) floppy disk
(3) CD-RW
(4) hard disk
(5) None of these

20. When you are selecting a mouse for a particular computer system, what is the most important consideration?
(1) The type of drivers that come with the mouse
(2) The length of the mouse cord
(3) The type of connector the mouse is equipped with
(4) The number of buttons the mouse has
(5) None of these

21. How is power supplied to a low-power USB device?
(1) Through a power cable
(2) From an external power supply
(3) Directly from the computer's power supply
(4) Through the USB cable
(5) None of these

22. All of the following are basic principles of net works,except—
(1) each computer must have a network card
(2) there must be communications media connecting the network hardware devices
(3) there must be at least one connecting device
(4) each computer must have software that supports the movement of information
(5) None of these

23. The………….data mining technique derives rules from real-world case examples.
(1) Rule discover
(2) Signal processing
(3) Neural nets
(4) Case-based reasoning
(5) None of these

24. …………….are used to identify a user who returns to a Website.
(1) Cookies
(2) Plug-ins
(3) Scripts
(4) ASPs
(5) None of these

25. Which one of the following objects is passed to a Java Bean when one of its properties is set via a JSP action?
(1) Servlet Request
(2) Http Servlet Request
(3) Servlet Response
(4) Http Servlet Response
(5) None of these

26. _ _ _ _ _ _ _ _ _ translates and executes program at run time line by line
1) Compiler
2) Interpreter
3) Linker
4) Loader
5) None

27. _ _ _ _ _ _ _ _ is an OOP principle
1) Structured programming
2) Procedural programming
3) Inheritance
4) Linking
5) None

28. COBOL is widely used in _ _ _ _ _ _ _ applications
1) Commercial
2) Scientific
3) Space
4) Mathematical
5) None

29. RAM stands for
1) Random origin money
2) Random only memory
3) Read only memory
4) Random access memory
5) None

30. 1 Byte = ?
1) 8 bits
2) 4 bits
3) 2 bits
4) 9 bits
5) None

31. SMPS stands for
1) Switched mode power supply
2) Start mode power supply
3) Store mode power supply
4) Single mode power supply
5) None

32. The device used to carry digital data on analog lines is called as
1) Modem
2) Multiplexer
3) Modulator
4) Demodulator
5) None

33. VDU is also called
1) Screen
2) Monitor
3) Both 1 & 2
4) printer
5) None

34. BIOS stands for
1) Basic Input Output system
2) Binary Input output system
3) Basic Input Off system
4) all the above
5) None

35. Father of ‘C’ programming language
1) Dennis Ritchie
2) Prof Jhon Kemeny
3) Thomas Kurtz
4) Bill Gates
5) None

36. The 16 bit Microprocessor means that it has
1) 16 address lines
2) 16 Buses
3) 16 Data lines

4) 16 routes 5) None

37. Data going into the computer is called
1) Output
2) algorithm
3) Input
4) Calculations
5) flow chart

38. Which of the following refers to a small, single-site network?
1) LAN
2) DSL
3) RAM
4) USB
5) CPU

39. Microsoft Office is
1) Shareware
2)Public domain software
3) Open-sourse software
4) A vertical market application
5) An application suite

40. How many options does a BINARY choice offer
1) None
2) One
3) Two
4) it depends on the amount of memory on the computer
5) It depends on the speed of the computer’s processor

41. A collection of program that controls how your computer system runs and processes information is called
1) Operating System
2) Computer
3) Office
4) Compiler
5) Interpreter

42. Computer connected to a LAN (Local Area Network) can
1) run faster
2) go on line
3) share information and /or share peripheral equipment
4) E-mail
5) None

43. Information travels between components on the mother board through
1) Flash memory
2) CMOS
3) Bays
4) Buses
5) Peripherals

44. How are data organized in a spreadsheet?
1) Lines & spaces
2) Layers & Planes
3) Height & Width
4) Rows & Columns
5) None

45. The blinking symbol on the computer screen is called the
1) mouse
2) logo
3) hand
4) palm
5) cursor


ANSWERS :


1. (1) 2. (4) 3. (3) 4. (4) 5. (1) 6. (2) 7. (2) 8. (2) 9. (1) 10. (4) 11. (4) 12. (3) 13. (1) 14. (3) 15. (2) 16. (2) 17. (1) 18. (4) 19. (3) 20. (3) 21. (4) 22. (2) 23. (3) 24. (1) 25. (3) 26. (2) 27. (1) 28. (3) 29. (1) 30. (3) 31. (1) 32. (3) 33. (3) 34. (1) 35. (3) 36. (1) 37. (3) 38. (4) 39. (1) 40. (3) 41. (4) 42. (3) 43. (4) 44. (4) 45. (5)

Tuesday 11 October 2011

IBPS CLERKS EXAM PRACTICE MCQs




1.Main memory is       
(A) Random Access Memory       
(B) Read only Memory
(C) Serial Access Memory       
(D) Read Access Memory
 (E) None of these
ANSWER: (A)

2. Program is    
    (A) a series of actions proposed in order to achieve a certain result
    (B) loosely, a routine
    (C) to design, write and test a program
    (D) loosely, to write a routine
    (E) None of these
ANSWER: (E)

3.     In MS-Access, a table can have ____ primary key / keys       
(A) One  
(B) Two   
(C) Three  
(D) Four  
(E) None of these
ANSWER: (A)

4.    As compared to the secondary memory, the primary memory of a computer is      
(A) Large  
(B) Cheap  
(C) Fast  
(D) Slow
(E) None of these
ANSWER: (C)

5.    Computer memory       
    (A) performs all calculations   
    (B) receives input data
    (C) is extremely limited
    (D) is better than human memory
    (E) None of these
ANSWER: (B)

6.     Multiprocessor is a computer system   
    (A) Where many CPU under a common control
    (B) Consisting of more than one input devices under common control.
    (C) Where many output devices under common control.
    (D) All of the above
    (E) None of these
ANSWER: (A)

7.    Technique to implement virtual memory where memory is divided into units of fixed size memory is        
(A) Paging  
(B) Defragments      
(C) Segmentation  
(D) activation
(E) None of these
ANSWER: (A)

8.    A VDU is used for       
    (A) Input device   
    (B) Output device
    (C) Vice data entry device
    (D) Both (A) and (B)
    (E) None of these
ANSWER: (D)

9.    IBM 7000 digital computer   
    (A) belongs to second generation
    (B) uses VLSI
    (C) employs semiconductor memory
    (D) has modular construction
    (E) None of these
ANSWER: (D)

10.     Which of the following is the smallest and fastest computer imitating brain working?  
(A) Supercomputer         
(B) Quantum Computer
(C) Param-10,000           
(D) IBM chips
(E) None of these
ANSWER: (B)

11.    The only things moving around inside a computer are
(A) 1s and 0s  
(B) electrons  
(C) bytes  
(D) proton
(E) All of the above
ANSWER: (B)

12.    Which part of the computer were is used for calculating and comparing?  
(A) Disk unit  
(B) Control unit
(C) ALU 
(D) Modem
(E) None of these
ANSWER: (C)

13.    How many full adders are needed to add two 4-bit numbers with a parallel adder?  
(A) 8  
(B) 4  
(C) 2  
(D) 16
(E) None of these
ANSWER: (B)

14.     What digits are representative of all binary numbers?       
    (A) 0    
    (B) 1
    (C) Both (A) and (B)
    (D) 3
    (E) None of these
ANSWER: (C)

15.     To locate a data items for storage is   
(A) Field   
(B) Feed
(C) Database  
(D) Fetch
(E) None of these
ANSWER: (D)

16.     Off-line operation is the operation of devices without the control of     
(A) Memory   
(B) CPU       
(C) ALU  
(D) Control unit       
(E) None of these
ANSWER: (B)

17.    How much megabit of data is typically stores in bubble device?       
(A) 6       
(B) 1
(C) 10      
(D) 4
(E) None of these
ANSWER: (B)

18.    A peripheral device in which a large number of cartridges or reels of magnetic tape are stored in cells in a storage matrix is    
(A) Key board             
(B) Monitor
(C) Printer           
(D) Automated tape library.
(E) None of these
ANSWER: (D)

19.     A device designd to read information encoded ito a small plastic card is      
(A) Light pen     
(B) Punched card
(C) Badge reader      
(D) Magnetic tape
(E) None of these
ANSWER: (C)

20.      A data structure consisting of several fields, some or all of which are instances of the same data structure is called as      
(A) Field        
(B) Bead
(C) Database      
(D) Data collection  
(E) None of these
ANSWER: (B)

21.     A type of line printer that uses an embossed steel band to form the letters printed on the pap      
(A) Golf ball printer  
(B) Dot-matrix printer  
(C) Laser printer  
(D) Band printer      
(E) None of these
ANSWER: (D)

22.     Which of the following statement is wrong 
(A) Windows XP is an operating system  
(B) Linux is owned and sold by Microsoft
(C) Photoshop is a graphical design tool by Adobe
(D) Linux is free and open source software
(E) None of these
ANSWER: (B)

23.     Operating system of a computer   
(A) Enables the programmer to draw a flow chart
 (B) Links a program with subroutine with references  
(C) Provides a layer, user friendly interface  
(D) All of the above 
(E) None of these
ANSWER: (C)

24.     ENIAC belonged to which generation of computer            
(A) First  
(B) Third     
(C) Second  
(D) Fourth  
(E) None of these
ANSWER: (A)

25.     The term ‘Operating System’ means   
    (A) A set of programs which control computer working
    (B) The way a user operates the computer system
    (C) Conversion of high level language to machine language
    (D) The way computer operator works
    (E) None of these
ANSWER: (A)

26.     Wild card operators specifies   
    (A) can be used when writing into multiple files
    (B) allows several files to be read simultaneously
    (C) Provide an easy way of groups of related files
    (D) Are only used when printing the contents of a file
    (E) None of these
ANSWER: (C)

27.    The time interval between successive elements of a discrete time signal is  
(A) Access time 
(B) Seek time
(C) Real time  
(D) Epoch
(E) None of these
ANSWER: (D)

28.    An error in computer data is called    
(A) Chip  
(B) Bug  
(C) Bit  
(D) Byte  
(E) All of these
ANSWER: (B)

29.    A code that is written into a serially accessed memory is       
(A) Gray code  
(B) EOD  
(C) Bar code  
(D) Gray code 
(E) None of these
ANSWER: (B)

30.    Which of the following is form of semi conductor memory in which it is possible to change the contents of selected memory locations by applying suitable electrical signals.
(A) CAM  
(B) ROM    
(C) EAROM  
(D) ANACUS 
(E) None of these
ANSWER: (C)

31.    A connection between two end points, either physical or logical, over which data may travel in both directions simultaneously is called...  
(A) Dump point  
(B) Datalink  
(C) Duplex  
(D) Networks
(E) None of these
ANSWER: (C)

32.    Which of the following is a machine for reading documents that are encoded in a way that is readable by person and machine.   
(A) Document reader          
(B) Distributed system      
(C) Artificial intelligence          
(D) Document sorter  
(E) None of these
ANSWER: (A)

33.    A compiler means       
    (A) A person who compiles source programs
    (B) The same thing as a programmer
    (C) Key punch operator
    (D) A program which translates source program into object program
    (E) None of these
ANSWER: (D)

34.    An assembler is a      
    (A) Program   
    (B) Person who assemble the parts
    (C) Symbol   
    (D) Language
    (E) None of these
ANSWER: (A)

35.     Which of the following languages is not well suited for computation?       
(A) PASCAL  
(B) FORTRAN
(C) Machine  
(D) C
(E) None of these
ANSWER: (C)

36.    Which one of the following is not a broadband communication medium     
(A) Microwave  
(B) Fibre optic cable
(C) Twisted pair   
(D) Coaxial cable
(E) None of these
ANSWER: (C)

37.    Which of the following performs modulation and demodulation       
(A) Coaxial cable  
(B) Satellite       
(C) Modem   
(D) Optical fibre
(E) None of these
ANSWER: (C)

38.    Which one of the following is not an application software package     
    (A) Redhat Linux    
    (B) Microsoft Office
    (C) Adobe PageMaker
    (D) Open Office
    (E) None of these
ANSWER: (A)

39.    Can you tell what passes into and out from the computer via its ports?     
(A) Data 
(B) Bytes
(C) Graphics 
(D) Pictures
(E) None of these
ANSWER: (B)

40.    The ALU of a computer responds to the commands coming from      
    (A) primary memory   
    (B) control section
    (C) external memory       
    (D) cache memory
    (E) None of these
ANSWER: (B)

41.    The act of retrieving existing data from memory is called
(A) read-out  
(B) read from   
(C) read  
(D) All of the above
(E) None of these
ANSWER: (D)

42.     A directly accessible appointment calendar is a feature of a ……. resident package.  
(A) CPU  
(B) memory       
(C) Buffer   
(D) ALU      
(E) None of these
ANSWER: (B)

243.     Perforated paper used as input or output media is known as     
(A) Paper tape       
(B) Magnetic tape           
(C) Punched paper tape
(D) Card punch          
(E) None of these
ANSWER: (A)

44.    Which of the following is another name fortape transport       
(A) Core memory  
(B) Card punch  
(C) Tape drive unit  
(D) Magnetic disk 
(E) None of these
ANSWER: (C)

45.    Control of computer system or subsystem operation byan operator who may intervene at arbitary times is        
(A) Manual control 
(B) Mapping   
(C)  Shift register    
(D) ALU   
(E) None of these
ANSWER: (A)

46.    A device that both transmits and receives data, is   
(A) Transducer    
(B) Trapdoor      
(C) Translator      
(D) Transceiver  
(E) None of these
ANSWER: (D)

47.    A memory that is capable of determining whether a given datum is contained in one of its addresses is  
(A) ROM     
(B) PROM     
(C) CAM     
(D) RAM  
(E) None of these
ANSWER: (C)

48.     The invention of the slide rule is attributed to 
(A) Babbage   
(B) Oughtred      
(C) Pascal  
(D) Napier       
(E) None of these
ANSWER: (B)

49.     Each model of a computer has a unique  
(A) Assembly language       
(B) Machine language  
(C) High level language   
(D) All of the above  
(E) None of these
ANSWER: (B)

50. Which of the following circuit is used as a ‘Memory device’ in computers?  
(A) Rectifier   
(B) Flip-Flop       
(C) Comparator   
(D) Attenuator  
(E) None of these
ANSWER: (B)

Monday 26 September 2011

IBPS CLERKS COMPUTER KNOWLEDGE PRACTICE MCQs


1. ______Is the most widely used medium for telecommunications
a) Twisted Pair
b) Coaxial Cable
c) Optical Fiber
d) None

2. ______Is widely used medium of communication for cable television systems
a) Twisted Pair
b) Coaxial Cable
c) Optical fiber
d) None

3. ______Cable consists of one or more filaments of glass fiber wrapped in protective layers that carries data by means of pulses of light
a) Twisted Pair
b) Coaxial Cable
c) Optical fiber
d) None

4. ______Is a computer network used for communications among computers and different inform-ation technological devices close to one person
a) Personal Area Network
b) Local Area Network
c) Metropolitan Area Network
d) Wide Area Network

5. ______Is a collection of concep-tual tools for describing data, data relationships, data semantics and constraints
a) Data base
b) Data Model
c) E_R Model
d) None

6. Association among two or more entities called
a) Entity
b) Entity set
c) Relationship
d) Degree of relation

7. DDL stands for
a) Data Definition Language
b) Data Delete Language
c) Data Device Language
d) Database Definition Language

8. SDL stands for
a) Storage Definition Language
b) Save Definition Language
c) Storage Database Language
d) Shortcut Definition Language

9. DML stands for
a) Date Manipulation Language
b) Database Manipulation Language
c) Data Manuscript Language
d) Data Manipulation Language

10. ____Is the language that enable user to access or manipulate data as organized by appropriate data model
a) DML
b) SDL
c) DDL
d) All of the above

11. ____Is the language to specify the internal schema. (This language may specify the mapping between two schemas)
a) DML
b) SDL
c) DDL
d) None of the above

12. All candidate keys excluding the primary key are known as
a) Compound key
b) Partial key
c) Alternative key
d) None of the above

13. The user commands that are used to interact with a database is called as
a) Query
b) Interaction
c) Command
d) Instruction

14. The updates that are applied to database before it becomes effective in real world
a) Retroactive update
b) Proactive update
c) Simultaneous update
d) All of the above

15. The updates that are applied to database after it becomes effective in real world
a) Retroactive update
b) Proactive update
c) Simultaneous update
d) All of the above

16. The updates that are applied to database at the same time when it becomes effective in real world?
a) Retroactive update
b) Proactive update
c) Simultaneous update
d) All of the above

17. Match the following (select the test by using the key board)
a) A word from its beginning to its end
b) A paragraph from its begging to its end
c) The entire document
1. CTRL+ DOWN ARROW
2. CTRL+LEFT ARROW
3.CTRL+SHIFT+RIGHTARROW
a) a-3,b-1,c-2
b) a-3,b-2,c-3
c) a-3,b-2,c-1
d) a-2,b-3,c-1

18. Match the following (Move through your document)
a) One character to the left
b) One character to the right
c) One word to the left
d) One word to the right
1. CTRL+RIGHT ARROW
2. CTRL+LEFT ARROW
3. RIGHT ARROW
4. LEFT ARROW
a) a-4,b-3,c-2,d-1
b) a-4,b-2,c-3,d-1
c) a-1,b-3,c-4,d-2
d) a-2,b-1,c-3,d-4

19. Match the following (To move)
a) One paragraph down
b) To the beginning of a document
c) To the end of a document
d) Up one screen at a line
e) Down one screen at a time
1. CTRL+END
2. PAGE DOWN
3. CTRL+HOME
4. CTRL+DOWN ARROW
5. PAGE UP
a) a-5,b-3,c-1,d-4,e-2
b) a-4,b-3,c-2,d-5,e-1
c) a-3,b-4,c-1,d-5,e-2
d) a-4,b-3,c-1,d-5,e-2

20. In a word document Red underline indicates
a) Possible spelling error/word doesn't recognize a word
b) Word thinks that grammar should be revised
c) A word is spelled correctly, but does not seem to be the correct word sentence
d) All of the above

21. In a word document Green underline indicates
a) Possible spelling error/word doesn't recognize a word
b) Word thinks that grammar should be revised
c) A word is spelled correctly, but does not seem to be the correct word sentence
d) All of the above

22. In a word document Blue underline indicates?
a) Possible spelling error/word doesn't recognize a word
b) Word thinks that grammar should be revised
c) A word is spelled correctly, but does not seem to be the correct word sentence
d) All of the above

23. By default the Microsoft word document will be saved into a folder called
a) Desktop
b) My documents
c) D drive
d) Personal folder

24. What is the default file name for the word document?
a) Taken from the text at the start of the document
b) Word document
c) Both (a) and (b)
d) None of the above

25. In word-2010____is the key to see numbers and letters displayed over icons, tabs or commands towards the top of your screen?
a) Ctrl key
b) Tab key
c) Alt key
d) None of the above

26. ____ Is the keyboard shortcut key to close the word program
a) Alt+F4
b) Alt+F5
c) Alt+F6
d) Alt+F7

27. How will you remove all formatting added to your documents (such as bold, italics, and underline etc.)
a) Save
b) Save as plain text file
c) Save as
d) All of the above

28. _____Is the file format we can use to distribute the document to some one using totally different word processing program from a different software manufacturer, such as word perfect
a) Word document (.doc)
b) Rich Text Format (.RTF)
c) Both (a) and (b)
d) None of the above

29. _____Is the Icon to magnify or reduce the display
a) Print layout
b) Zoom
c) View
d) All of the above

30. Match the following
a) Cut 1. CTRL+C
b) Copy 2. CTRL+V
c) Paste 3. CTRL+X
a) a-1, b-3, c-2
b) a-2, b-1, c-3
c) a-3, b-1, c-2
d) a-3, b-2, c-1

31. What is text formatting?
a) Formatting characters and words with in a document
b) Saving the word document
c) Both (a) and (b)
d) None of the above

32. By default MS-Word 2010 uses a font called
a) Arial
b) Times New roman
c) Tahoma
d) Caliber

33. Superscript refers to____
a) Characters displayed below the line of the normal text
b) Characters displayed above the line of the normal text
c) Both (a) and (b)
d) None

34. Subscript refers to ___
a) Characters displayed below the line of the normal text
b) Characters displayed above the line of the normal text
c) Both (a) and (b)
d) None

35. (a+b)2 is an example for ----
a) Subscript
b) Superscript
c) Both (a) and (b)
d) None

36. CO2 is an example for ---
a) Subscript
b) Superscript
c) Both (a) and (b)
d) None

37. You need to find a particular word or phrase and replace this item with alternative text, what is the keyboard shortcut key
a) Ctrl+G
b) Ctrl+P
c) Ctrl+H
d) Ctrl+F

38. _____Is the path to create Header/Footer
a) Insert/Header & Footer
b) File/Header & Footer
c) Edit/Header & Footer
d) None of the above

39. __ Is the path to create footnotes
a) References/footnote
b) Insert/footnote
c) Edit/footnote
d) None

40. _____ Is the path to save a document in PDF format
a) Edit/Save as/PDF/Save
b) File/Save as/PDF/Save
c) Both (a) and (b)
d) None of the above

ANSWERS:
1) a 2) b 3) c 4) a 5) b 6) c 7) a 8) a 9) d 10) a 11) b 12) c 13) a 14) b 15) a 16) c 17) a 18) a 19) d 20) a 21) b 22) c 23) b 24) a 25) c 26) a 27) b 28) b 29) b 30) c 31) a 32) d 33) b 34) a 35) b 36) a 37) c 38) a 39) a 40) b

Sunday 25 September 2011

IBPS CLERKS COMPUTER KNOWLEDGE MCQs


1. Assembly language is–
1. Low-level programming language
2. High level programming language
3. Machine language
4. All of the above
5. None of these

2. In Assembly language–
1. Mnemonics are used to code operations
2. Alphanumeric symbols are used for addresses
3. Language lies between high-level language and machine
4. All of the above
5. None of these

3. The following computer ’s memory is characterized by low cost per bit stored–
1. Primary
2. Secondary
3. Hard disk
4. All of the above
5. None of these

4. The following is true for Auxiliary Storage–
1. It has an operating speed far slower than that of the primary storage.
2. It has an operating speed faster than that of the primary storage.
3. It has an operating speed equivalent than that of the primary storage.
4. All of the above
5. None of these

5. Following is true for Bandwidth–
1. The narrow the bandwidth of a communications system the less data it can transmit in a given period of time.
2. The narrow then bandwidth of a communications system the more data it can transmit in a given period of time.
3. The wider the bandwidth of a communications system the less data it can transmit in a given period of time.
4. All of the above
5. None is true

6. Acknowledgement from a computer that a packet of data has been received and verified is known as–
1. ACK
2. BCK
3. ECK
4. All of the above
5. None of these

7. The following is a communications device (modem) which allows an ordinary telephone to be used with a computer device for data transmission–
1. Keyboard
2. Acoustic coupler
3. Mobile phone
4. All of the above
5. None of these

8. ALGOL is the
1. High-level language
2. Low level language
3. Machine language 4. All of the above
5. None of these

9. A high level programming language named after Ada Augusta, coworker with Charles Babbage–
1. Augustan
2. Babbage
3. Ada 4. Charlie
5. All of the above

10. Following is a logic circuit capable of forming the sum of two or more quantities–
1. Adder
2. Multiplier
3. Address
4. Access
5. None of these

11. To identification particular location in storage area one have a–
1. Address
2. Password
3. Logic
4. Mouse
5. None of these

12. A local storage register in the CPU which contains the address of the next instruction to be executed is referred as–
1. Key register
2. Address register
3. Password
4. All of the above
5. None of these

13. A sequence of precise and unambiguous instructions for solving a problem in a finite number of operations is referred as–
1. Address
2. Algorithm
3. Advice
4. All of the above
5. None of these

14. A character set that contains letters, digits, and other special characters such as $, @, +„ % etc. is referred as–
1. Numeric
2. Alphanumeric
3. Alphabetic
4. All of the above
5. None of these

15. One of the components of central Processing Unit (CPU) of the computer that performs mathematical and logical operations is–
1. ALU (Arithmetic Logic Unit)
2. Address register
3. Analog
4. All of the above
5. None of these

16. A standard intended to connect relatively lowspeed devices such as keyboards, mouse, modems and printers is–
1. Access bus
2. Access time
3. Connector
4. All of the above
5. None of these

17. The concept that one can disconnect peripherals and plug them in without letting computer shut down or reconfigure the system is referred as–
1. Hot plugging
2. Cold plugging
3. Access bus
4. All of the above
5. None of these

18. The time interval between the instant at which data is called from a storage device and the rust delivery begins in–
1. Access time
2. Delivery time
3. Service time
4. All of the above
5. None of these

19. The automatic execution of lower-priority (background) computer programs when higherpriority (foreground) programs are not using the system resources is referred as–
1. Background processing
2. Foreground processing
3. Null processing
4. All of the above
5. None of these

20. A form of access to a computer or network with specified user name and password is referred as–
1. Account
2. Address
3. Algorithm
4. All of the above
5. None of these

21. A local storage area also called a register, in which the result of an arithmetic or logic operation is formed, is–
1. Accumulator
2. Address
3. Algorithm
4. All of the above
5. None of these

22. Computer that operates on data which is in the form of continuously variable physical quantities–
1. Digital computer
2. Analog computer
3. Mechanical computer
4. All of the above
5. None of these

23. Anonymous FTP is the–
1. Internet file transfer protocol
2. Protocol that requires password
3. None access files
4. None of these

24. EFF sites allows anonymous FTP that–
1. Do not require a password or access
2. Requires password or access
3. Is a none access file
4. All of the above
5. None of these

25. ANSI is–
1. American National Standards Institute
2. A USA based national organization that establishes uniform standards in several fields of computers.
3. 1. and 2. both are true
4. All of the above
5. None is true

26. APL is–
1. A high level language for specifying complex algorithms.
2. A real-time language primarily for scientific applications.
3. Only 1. is true
4. Both 1. and 2. are true
5. None of these

27. The overall design, construction, organization and interconnecting of the various components
of a computer system is referred as–
1. Computer Architecture
2. Computer Flow chart
3. Computer Algorithm
4. All of the above
5. None of these

28. Asynchronous communication is–
1. Communication between indepen-dently operating units
2. Communication between dependent operating units
3. Communication between independent and dependent operating units
4. All of the above
5. None of these

29. Audio response is–
1. Output medium
2. Produces verbal responses from the computer system
3. Both 1. and 2. are true
4. Only A is true
5. None is true

30. Automated Office refers to the merger of ............... in an office environment.
1. Computers
2. Office
3. Telecommunications
4. All of the above
5. None is true

31. Auxiliary storage is
1. Secondary storage
2. Primary storage
3. Processing device
4. All of the above
5. None of these

32. Archive is–
1. Backup storage
2. Forward operation
3. Primary storage
4. All of the above
5. None of these

33. A branch of computer science that deals with computers that possess reasoning, learning and
thinking capabilities that resemble those of human beings is recognized as–
1. Software engineering
2. Artificial intelligence
3. Hardware engineering
4. All of the above
5. None of these

34. ASCII is–
1. A standard coding system for computers
2. Hardware device
3. Software
4. All of the above
5. None of these

35. Following is true for Bandwidth–
1. The wider the bandwidth of a communication system the more data it can transmit in a given period of time.
2. The narrow the bandwidth of a communication system the more data it can transmit in a given period of time.
3. The wider the bandwidth of a communication system the less data it can transmit in a given period of time.
4. All of the above
5. None is true

36. ASCII-8 is–
1. An extended version of ASCII-7
2. Is a 8-bit code
3. Both 1. and 2. are true
4. Both 1. and 2. are false
5. None of these

37. ASCII File is–
1. Document file in the universally recognized text format
2. Word processor
3. System file
4. All of the above
5. None of these

38. A program that translates mnemonic statements into executable instructions is referred as–
1. Software
2. Assembler
3. Translator
4. All of the above
5. None of these

39. An assembler is–
1. Translator
2. Hardware
3. Assembly language
4. All of the above
5. None of these

40. Following is not true for Backup files–
1. These are the files which are generated automatically in when one save a document.
2. These files help in protecting the document due to out of order of the computer or power failure
3. These files delete as soon computer is off
4. All of the above
5. None of these

41. An algebra that deals with logical propositions which are either true or false is referred as–
1. Boolean algebra
2. Modern Algebra
3. Abstract Algebra
4. All of the above
5. None of these

42. Bandwidth is–
1. The range of frequencies available for data transmission
2. Data transmission rate
3. Alternate for rubber band
4. All of the above
5. None is true

43. A coding structure in which characters are represented by means of a series of parallel bars is–
1. Bar code
2. Menu bar
3. Numeric bar
4. All of the above
5. None of these

44. In Broadband system or a network system
1. Several analog signals share the same physical network channel
2. Only digital signals share the same physical network channel
3. Single analog signals share the same physical network channel
4. All of the above
5. None of these

45. Bit stands for–
1. Binary digit
2. One binary piece of information
3. Both 1. and 2. are true
4. All of the above
5. None is true

46. Broadband channel is the–
1. The fastest carriers where data transfer rates is of 1 million baud (bits/second) or more.
2. The slower carriers where data transfer rates
is of 56k baud
3. Musical channel
4. All of the above
5. None of these

47. BLOB is–
1. Binary Large Object
2. A long bit string representing complex data
3. Object oriented language
4. Only 1. and 2. are true
5. None of these

48. A group of related items/section of program oding treated as a unit is referred as–
1. Block
2. Duplex
3. Street
4. All of the above
5. None of these

49. An operation in which data is moved to a different location is referred as–
1. Block move
2. Street move
3. Delete
4. All of the above
5. None of these

50. The following is responsible for number of logical records in a physical record–
1. Blocking factor
2. Block
3. Boolean algebra
4. All of the above
5. None of these

ANSWERS:
1. (1) 2. (4) 3. (2) 4. (1) 5. (1) 6. (1) 7. (2) 8. (1) 9. (3) 10. (1)
11. (1) 12. (2) 13. (2) 14. (2) 15. (1) 16. (1) 17. (1) 18. (1) 19. (1) 20. (1)
21. (1) 22. (2) 23. (1) 24. (1) 25. (3) 26. (4) 27. (1) 28. (1) 29. (3) 30. (4)
31. (1) 32. (1) 33. (2) 34. (1) 35. (1) 36. (1) 37. (1) 38. (2) 39. (1) 40. (3)
41. (1) 42. (1) 43. (1) 44. (1) 45. (3) 46. (1) 47. (4) 48. (1) 49. (1) 50. (1)

Tuesday 20 September 2011

IBPS CLERKS EXAM PRACTICE QUESTIONS

1. Which of the following statements is FALSE concerning file names?
(a) Files may share the same name or same extension but not both
(b) Every file in the same folder must have a unique name
(c) File extension is another name for file type
(d) The file extension comes before the dot (.) followed by the file name
(e) None of the above
ANSWER: (d)

2. Which of the following would most likely NOT be a symptom of a virus ?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) The Web browser opens to an unusual home page
(d) Odd messages or images are displayed on the screen
(e) None of the above
ANSWER: (b)

3. Main memory is
(a) Random Access Memory
(b) Read only Memory
(c) Serial Access Memory
(d) Storage Memory
(e) None of the above
ANSWER: (a)

4. A compact disc (CD) is a data storage of the type
(a) Magnetic
(b) Optical
(c) Electrical
(d) Electromechanical
(e) None of these
ANSWER: (a)

5. What are the two basic types of memory that your computer uses ?
(a) RAM
(b) RW/ RAM
(C) ROM
(d) ERAM
(e) POST
ANSWER: (a)

6. A computer with CPU speed around 100 million Instructions per second with the word length of
Around 64 bits is known as
(a) Super computer
(b) Mini computer
(c) Micro computer
(d) Macro computer
(e) None of these
ANSWER: (a)

7. To locate a data items for storage is
(a) Field
(b) Feed
(c) Database
(d) Fetch
(e) None of these
ANSWER: (d)

8. A type of line printer that uses embossed steel band to form the letters printed on the paper is
(a) Golf ball printer
(b) Dot-matrix printer
(c) Laser printer
(d) Band printer
(e) None of these
ANSWER: (d)

9. The chip, used in computers, is made of
(a) Chromium
(b) Iron oxide
(c) Silica
(d) Silicon
(e) None of these
ANSWER: (d)

10. The size of commonly used Floppy disk is
(a) 4.5"
(b) 3.5"
(c) 3.25"
(d) 5.5"
(e) None of these
ANSWER: (b)

11. Operating system of a computer
(a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references
(c) Provides a layer, user friendly interface
(d) Hardware of computer
(e) None of the above
ANSWER: (c)

12. Wild card operators specifies
(a) Can be used when writing into multiple files
(b) Allows several files to be read simultaneously
(c) Provide an easy way of groups of related files
(d) Are only used when printing the contents of a file
(e) None of the above
ANSWER: (c)

13. Most Websites have a main page, the ...... which acts as a doorway to the rest of the Web side
pages.
(a) Search engine
(b) Home page
(C) Browser
(d) URL
(e) None of these
ANSWER: (b)

14. Which of the following is not true about Computer files?
(a) They are collections of data saved to a storage medium
(b) Every file has a file name
(c) A file extension is established by the user to indicate the file's contents
(d) Files usually contain data
(e) None of the above
ANSWER: (c)

15. What type of computer could be found in a digital watch?
(a) Mainframe computer
(b) Super computer
(c) Embedded computer
(d) Note book computer
(e) Micro computer
ANSWER: (e)

16. This process is used by large retailers to study trends.
(a) Data mining
(b) Data selection
(C) POS
(d) Data conversion
(e) None of the above
ANSWER: (a)

17. This system is a small, wireless handheld computer that scans an items tag and pulls up the
current price (and any special offers) as you shop.
(a) PSS
(b) POS
(C) Inventory
(d) Data mining
(e) None of these
ANSWER: (a)

18. Which of the following is NOT one of the four major data processing functions of a computer ?
(a) Gathering data
(b) Processing data into information
(c) Analyzing the data or information
(d) Storing the data or information
(e) None of the above
ANSWER: (c)

19. Surgeons can perform delicate operations by manipulating devices through computers instead
of manually. This technology is known as
(a) Robotics
(b) Computer forensics
(C) Simulation
(d) Forecasting
(e) None of these
ANSWER: (a)

20. It is the study of molecules and structures whose size ranges from 1 to 100 Nano metres
(a) Nano science
(b) Microelectrodes
(C) Computer forensics
(d) Artificial intelligence
(e) None of the above
ANSWER: (a)

Sunday 11 September 2011

IBPS POs COMPUTER KNOWLEDGE MCQs



1. All of the given following are examples of input devices of computers EXCEPT one.
A. scanner.
B. mouse.
C. keyboard.
D. printer.

2. Which of the following is an example of an Computers input device?
A. scanner
B. speaker
C. CD
D. printer

3. ____________ can be any part of the computer which you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application

4. The components that process data in computer are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.

5. The ____________, also called the brain of the computer & is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)

6. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte

7. Word processing, spreadsheet & photo-editing are examples of
A. application software.
B. system software.
C. operating system software.
D. platform software.

8. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte

9. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor

10. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.

11. The CPU & memory are located on the -
A. expansion board.
B. motherboard.
C. storage device.
D. output device.

12. The term bit is short for -
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.

13. System software is the set of programs that enables your computers hardware devices & ____________ software to work together.
A. management
B. processing
C. utility
D. application

14. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.


15. The PC & the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.

16. In the binary language each letter of the alphabet, each number & each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.

17. Apple Macintoshes (Mac) & PC use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices

18. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.

19. Servers are computers that provide resources to other computers connected to -
A. network.
B. mainframe.
C. supercomputer.
D. client.

20. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational

21. Smaller & less expensive PC based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes

22. After a picture has been taken with a digital camera & processed appropriately, the actual print of the picture is considered as:
A. data.
B. output.
C. input.
D. the process.

23. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes

24. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store

25. DSL is an example of a____________ connection.
A. network
B. wireless
C. slow
D. broadband

26. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.

27. The difference between people with access to computers & the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.

28. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information

29. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence

30. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)

31. Which of the following is the correct order of the four major functions of a computer?
A. Process – Output – Input – Storage
B. Input – Output – Process – Storage
C. Process – Storage – Input – Output
D. Input – Process – Output – Storage

32. ____________ is the study of molecules & structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence

33. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million

34. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.

35. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1

36. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as -
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.

37. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte

38. ____________ tags, when placed on an animal, can be used to record & track in a database all of the animal movements.
A. POS
B. RFID
C. PPS
D. GPS

39. ____________ controls the way in which the computer system functions & provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard

40. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information

41. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software

42. The ability to recover & read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.

43. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes

44. A ____________ system is a small, wireless handheld computer that scans an items tag & pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining

45. The steps & tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.

46. ____________terminals (formerly known as cash registers) are often connected to complex inventory & sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query

47. The two broad categories of software are:
A. word processing & spreadsheet.
B. transaction & application.
C. Windows & Mac OS.
D. system & application.

48. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion

49. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.

50. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft


Answers:
1. (D) 2. (A) 3. (A) 4. (C) 5. (D) 6. (C) 7. (A) 8. (C) 9. (B) 10. (B) 11. (B) 12. (C) 13. (D) 14. (C) 15. (A) 16. (D) 17. (C) 18. (D) 19. (A) 20. (C) 21. (D) 22. (B) 23. (B) 24. (B) 25. (D) 26. (B) 27. (A) 28. (D) 29. (A) 30. (D) 31. (D) 32. (A) 33. (A) 34. (B) 35. (B) 36. (A) 37. (C) 38. (B) 39. (B) 40. (C) 41. (C) 42. (C) 43. (B) 44. (A) 45. (A) 46. (B) 47. (C) 48. (A) 49. (A) 50. (B)