Sunday 22 March 2015

IBPS Bank Clerk CWE Solved Paper -2013 (Exam Held on 29-09-2013)

1. Which of the following groups consist of only input devices ?
(A) Mouse, Keyboard, Monitor (B) Mouse, Keyboard, Monitor
(C) Mouse, Keyboard, Plotter (D) Mouse, Keyboard, Scanner
(E) None of these
Ans : (D)

2. A menu contains a list of–
(A) commands (B) data (C) objects (D) reports (E) None of these
Ans : (A)

3. What is output ?
(A) What the processor takes from the user (B) What the user gives to the processor
(C) What the processor gets from the user (D) What the processor gives to the user
(E) None of these
Ans : (D)

4. An error is also known as–
(A) bug (B) debug (C) cursor (D) icon (E) None of these 
Ans : (A)

5. Computer ........ is whatever is typed, submitted, or transmitted to a computer system.
(A) input (B) output (C) data (D) circuitry (E) None of these
Ans : (A)

6. Which process checks to ensure the components of the computer are operating and connected properly ?
(A) Booting (B) Processing (C) Saving (D) Editing (E) None of these
Ans : (A)

7. Unsolicited commercial email is commonly known as–
(A) spam (B) junk (C) hoaxes (D) hypertent (E) None of these
Ans : (A)

8. ....... is processed by the computer into information.
(A) numbers (B) processor (C) input (D) data (E) None of these
Ans : (D)

9. A web site address is a unique name that identifies a specific ............ on the web.
(A) web browser (B) web site (C) PDA (D) link (E) None of these
Ans : (B)

10. A device that connects to a network without the use of cables is said to be–
(A) distributed (B) centralised (C) open source (D) wireless (E) None of these
Ans : (D)

11. Editing a document consists of reading through the document you've created, then–
(A) correcting your errors (B) printing it (C) saving it (D) deleting it (E) None of these
Ans : (A)

12. The Internet allows you to–
(A) send electronic mail (B) view web pages
(C) connect to servers all around the world (D) All of these
(E) None of these
Ans : (D)

13. Most mail program automatically complete the following two parts in an e-mail– 
(A) From : and Body : (B) From : and Date : (C) From : And To : (D) From : and Subject : (E) None of these
Ans : (B)

14. Where is the disk put in a computer ?
(A) in the modem (B) in the hard drive (C) into the CPU (D) in the disk drive (E) None of these
Ans : (D)

15. The name a user assigns to a document is called a (n)–
(A) filename (B) program (C) record (D) data (E) None of these
Ans : (A)

16. An e-mail address typically consists of a user ID followed by the ..... sign and the name of the e-mail server that manages the user's electronic post office box.
(A) @ (B) # (C) & (D) « (E) None of these
Ans : (A)

17. A personal computer is designed to meet the computing needs of a(n)– 
(A) individual (B) department (C) company (D) city (E) None of these
Ans : (A)

18. Ctrl, shift and alt are called ........ keys.
(A) adjustment (B) function (C) modifier (D) alphanumeric (E) None of these
Ans : (B)

19. File ....... shrinks the size of a file so it requires less storage space.
(A) scanning (B) synthesizing (C) defragmenting (D) compression (E) None of these
Ans : (D)

20. In addition to the basic typing keys, desktop and notebook computer keyboards include a (n) ..... keypad to efficiently move the screenbased insertion point.
(A) editing (B) number (C) locked (D) docked (E) None of these
Ans : (B)

21. To insert a new slide in a presentation, press–
(A) CTRL+N (B) CTRL+M (C) CTRL+O (D) CTRL+S (E) CTRL+F
Ans : (B)

22. Drop Cap offers ................ positions in settings
(A) 3 (B) 6 (C) 2 (D) 5 (E) 1
Ans : (A)

23. The feature of Word that automatically adjusts the amount of space between certain combination of characters so that an entire word looks more evenly spaced is termed as–
(A) Spacing (B) Kerning (C) Positioning (D) Scaling (E) Justifying
Ans : (B)

24. While recording a macro, the third step will be–
(A) Using your mouse or key-board, perform the task you want to automate
(B) Assign a keyboard shortcut to the macro (C) Give the macro a name
(D) Start recording (E) Select the location of macro on toolbar
Ans : (B)

25. ............ is not available on the Ruler of MS Word screen
(A) Centre Indent (B) Right Indent (C) Left Indent (D) Tab stop box (E) None of these
Ans : (A)

26. Which cannot be used to close the Word application– 
(A) ALT+ F4 (B) File-> Close (C) File-> Exit (D) X button in the word window (E) None of these
Ans : (B)

27. Excel workbook contains–
(A) Workbooks (B) Worksheets (C) Worksheets and charts (D) Work areas (E) All of these
Ans : (C)

28. Conslidate option does not offer ......... function
(A) AVERAGE (B) MAX (C) PMT (D) SUM (E) StDev
Ans : (C)

29. To see first row and first column in an excel sheet at all times even if you scroll till the end of sheet– 
(A) Use workbook views feature (B) Use switch windows feature
(C) Use freeze panes feature (D) Use freeze row and freeze column option
(E) Use headings
Ans : (D)

30. NOW0 returns– 
(A) Current date (B) Current time (C) Current year (D) Current date and time (E) Current month
Ans : (D)

31. Default header of a warksheet– 
(A) Username (B) Date and time (C) Sheet name (D) Workspace name (E) None of these
Ans : (E)

32. Which of these language uses both interpreter and compiler–
(A) COBOL (B) CASIC (C) JAVA (D) C++ (E) All of these
Ans : (C)

33. ................. is a type of memory organization or image file format used to store digital images
(A) Pixmap (B) GUI (C) Pixel (D) Resolution (E) Vector graphics
Ans : (A)

34. .............. file format used for data compression and archiving
(A) .EXE (B) .INI (C) .COM (D) .ZIP (E) .WIN
Ans : (D)

35. In second generation, ........ language were introduced after binary language
(A) Assembly level language (B) High level language 
(C) Low level language (D) Data definition language 
(E) Structured query language
Ans : (A)

36. Which layer of the OSI model performs segmentation of a data stream–
(A) Application layer (B) Network layer (C) Physical layer (D) Transport layer (E) Presentation layer
Ans : (D)

37. ............ is a combination of software and hardware
(A) Firmware (B) Shareware (C) Freeware (D) Netware (E) Software
Ans : (A)

38. SCSI is related to–
(A) Network (B) Storage (C) Data transfer (D) Images (E) Resolution
Ans : (B)

39. The amount of the data, CPU can transmit at a time to main memory and to input and output devices–
(A) Data width (B) Bus width (C) Memory width (D) Capacity (E) None of these
Ans : (B)

40. The daily processing of corrections to customer accounts can be simplified into a processing mode of–
(A) Time-sharing (B) Centralized processing (C) Batch processing (D) Real-time processing (E) None of the above
Ans : (C)

IBPS Bank Clerk CWE Solved Paper -2012 (Exam Held on 14-12-2012)

1. If you wish to extend the length of the network without having the signal degrade, you would use a– 
(A) resonance (B) router (C) gateway (D) switch (E) repeater
Ans : (E)

2. A repair for a known software bug, usually available at no charge on the internet, is called a– 
(A) version (B) patch (C) tutorial (D) FAQ (E) rectifier
Ans : (B)

3. URL stands for– 
(A) Universal Research List (B) Universal Resource List 
(C) Uniform Research List (D) Uniform Research Locator
(E) Uniform Resource Locator
Ans : (D)

4. When data changes in multiple lists and all lists are not updated, this causes– 
(A) data redundancy (B) information overload (C) duplicate data (D) data inconsistency (E) data repetition
Ans : (D)

5. What is a backup?
(A) Restoring the information backup (B) An exact copy of a system’s information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these (E) None of these
Ans : (D)

6. The Internet is– 
(A) a large network of networks (B) an internal communication system for a business
(C) a communication system for the Indian government (D) a communication system for some states of India
(E) a communication system for some cities of Indian
Ans : (A)

7. Computers that are portable and convenient for users who travel are known as– 
(A) supercomputers (B) planners (C) minicomputers (D) file servers (E) laptops
Ans : (E)

8. What is the storage area for email messages called?
(A) A folder (B) A mailbox (C) A directory (D) The hard disk (E) None of these
Ans : (B)

9. One advantage of dial-up Internet access is– 
(A) it utilizes broadband technology (B) it is Indian
(C) it uses a router for security (D) modem speeds are very fast
(E) it utilizes existing telephone service
Ans : (E)

10. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) configuration (B) download (C) storage (D) upload (E) installation
Ans : (E)

11. Which process checks to ensure the components of the computer are operating and connected properly?
(A) Booting (B) Processing (C) Saving (D) Editing (E) Starting
Ans : (A)

12. A means of capturing an image (drawing or photo) so that it can be stored on a computer is– 
(A) Modem (B) Software (C) Scanner (D) Keyboard (E) Mouse
Ans : (C)

13. An error in a computer porgram–
(A) Crash (B) Power Failure (C) Bug (D) Virus (E) Fatal error
Ans : (C)

14. Access control based on a person’s fingerprints is an example of– 
(A) biometric identification (B) characteristic identification 
(C) characteristics security (D) fingerprint security
(E) logistics
Ans : (A)

15. The patterns of printed lines on most products are called– 
(A) prices (B) striping (C) scanners (D) OCR (E) barcodes
Ans : (E)

16. Most mail programs automatically complete the following two parts in an e-mail– 
(A) From : and Body (B) From : and Date (C) From : and To (D) From : and Subject (E) None of these
Ans : (B)

17. The computer’s capability of distinguishing spoken words is called–
(A) voice analysis (B) speech acknowledgment
(C) voice recognition (D) speech interpretation
(E) vocalization
Ans : (C)

18. Which of the following is an advantage of mounting an application on the Web?
(A) the possibility of 24 hours access for users (B) creating a system that can extend globally
(C) scandalizing the design of the interface (D) All of these
(E) None of these
Ans : (D)

19. The first page of a Web site is called the– 
(A) Homepage (B) Index (C) Java Script (D) Book mark (E) Intro Page
Ans : (A)

20. ERP is an acronym for– 
(A) Enterprise Retirement Planning (B) Enterprise Relationship Planning
(C) Enterprise Resource Planning (D) Enterprise Reorder Planning
(E) Enterprise Retention Planning
Ans : (C)

21. The software that allows users to surf the Internet is called a/an– 
(A) Search engine (B) Internet Service Provider (ISP)
(C) Multimedia application (D) Browser
(E) Internet Surfing Provider
Ans : (D)

22. The issues that deal with the collection and use of data about individuals is– 
(A) access (B) publicity (C) accuracy (D) property (E) privacy
Ans : (E)

23. Aterm relating to sending data to a satellite is– 
(A) downlink (B) modulate (C) demodulate (D) uplink (E) Interrelate
Ans : (D)

24. On-line documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with relation information are called– 
(A) hypermedia (B) hypertext (C) HTML (D) URL (E) FTP
Ans : (B)

25. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and—security is concerned with protecting software from unauthorized tampering or damage.
(A) data (B) cyber (C) Internet (D) metaphysical (E) publicity
Ans : (A)

26. Hackers– 
(A) all have the same motive (B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage (D) are people who are allergic to computers
(E) break into other people’s computers
Ans : (E)

27. Unauthorized copying of software to be used for personal gain instead of for personal backups is called– 
(A) program thievery (B) data snatching (C) software piracy (D) program looting (E) data looting
Ans : (C)

28. Junk e-mail is also called– 
(A) Spam (B) spoof (C) cookie crumb (D) sniffer script (E) Spill
Ans : (A)

29. What is usually used for displaying information at public places?
(A) Monitors (B) Overhead Projections (C) Monitors and Overhead Projections (D) Touch Screen Kiosks (E) Loud Speakers
Ans : (B)

30. What is MP3?
(A) A mouse (B) A Printer (C) A Sound format (D) A Scanner (E) A Mobile Phone
Ans : (C)

31. What is the most popular hardware for multimedia creations?
(A) PCs (B) Minicomputers (C) Mainframe Computers (D) WANs (E) Super Computers
Ans : (A)

32. For sound recording what is necessary?
(A) Speaker (B) Microphone (C) Talker (D) Mouse (E) Telephone
Ans : (D)

33. The life-span of a CD-ROM is– 
(A) approximately one year (B) approximately two years (C) approximately five years 
(D) approximately twenty-five years (E) almost unlimited
Ans : (C)

34. The................settings are automatic and standard.
(A) default (B) CPU (C) peripheral (D) user friendly (E) defaulter
Ans : (A)

35. What are the two parts of an e-mail address?
(A) User name and street address (B) Legal name and phone number 
(C) User name and domain name (D) Initials and password
(E) User Name and Recipient Name
Ans : (C)

36. Participants can see and hear each other in a/ an– 
(A) electronic mail system (B) message system (C) teleconference (D) bulletin board (E) None of these
Ans : (C)

37. Magnetic tape is not practical for applications where data must be quickly recalled because tape is–
(A) A random-access medium (B) Expensive
(C) A read-only medium (D) Fragile and easily damaged
(E) A sequential-access medium
Ans : (E)

38. Why should you delete unknown e-mail attachments?
(A) You could go to jail (B) the person could track you down and hurt you
(C) it is bad manners (D) it might contain a virus that could hurt your computer
(E) None of these
Ans : (D)

39. Which of the following will you require to hear music on your computer?
(A) Video Card (B) Tape Recorder (C) Mouse (D) Joy Stick (E) Sound Card 
Ans : (E)

40. The signal that a computer is waiting for a command from the user– 
(A) prompt (B) event (C) time slice (D) interrupt (E) None of these
Ans : (A)

Sunday 25 January 2015

COMPUTER AWARENESS PRACTICE MCQs FOR ALL BANK EXAMS

1. What is the responsibility of the logical unit in the CPU of a computer?
a) Producing result
b) Comparing numbers
c) Controlling flow of information
d) Performing mathematical operations
e) Controlling flow of data

2. Abacus was the first ___
a) Electronic computer
b) Mechanical computer
c) Electronic calculator
d) Mechanical calculator
e) Electronic chip

3. If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be ___
a) 216
b) 65,536
c) 64K
d) 128K
e) 135K

4. Instructions and memory address are represented by ___
a) Character code
b) Binary code
c) Binary word
d) Parity bit
e) Bite code

5. The terminal device that functions as a cash register, computer terminal and OCR reader is:
a) Data collection terminal
b) OCR register terminal
c) Video Display terminal
d) POS terminal
e) None of the above

6. A set of flip flops integrated together is called ____
a) Counter
b) Adder
c) Register
d) Flip flop
e) All of the above

7. People often call ______ as the brain of computer system.
a) Control Unit
b) Arithmetic Logic Unit
c) Central Processing Unit
d) Storage Unit
e) Store data

8. Which of the following is used for manufacturing chips?
a) Bus
b) Control unit
c) Semiconductors
d) a and b only
e) None of the above

9. The value of each bead in heaven is ___
a) 1
b) 3
c) 5
d) 7
e) 8

10. The first computer introduced in Nepal was ___
a) IBM 1400
b) IBM 1401
c) IBM 1402
d) IBM 1406
e) IBM 1405

11. Bluetooth is a type of radio wave information transmission system that is good for about:
a) 30 feet
b) 30 yards
c) 30 miles
d) 300 miles
e) 3000 miles

12. The telephone is an example of a(n)____ signal.
a) analog
b) digital
c) modulated
d) demodulated
e) compiler

13. Acredit card-sized expansion board that is inserted into portable computers that connects the modem
to the telephone wall jack is:
a) Internal modem
b) External modem
c) PC Card modem
d) Wireless modem
e) Wired modem

14. A modem that is contained within the system unit is called:
a) External
b) Internal
c) Wireless
d) Wi-Fi
e) Bluetooth

15. A modem that doesn't need to be connected to a telephone line is the ___ modem.
a) external
b) internal
c) wireless
d) DSL
e) NSL

16. Aspecial high-speed line used by large corporations to support digital communications is known as:
a) satellite/air connection service lines
b) cable modems
c) digital subscriber lines
d) T1, T2, T3 and T4 lines
e) None of the above

17. An affordable technology that uses existing telephone lines to provide high-speed connections
is called ________.
a) ISDN
b) microwave
c) cable modem
d) DSL
e) ALU

18. The capacity of a communication channel is measured in ___
a) Bandwidth
b) Bit capacity
c) Baud rate
d) Data flow
e) Store data

19. A relatively new technology that allows wireless connectivity:
a) Bluetooth
b) Black tooth
c) Blue band
d) Broadband
e) Wi- fi

20. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify the software product?
a) MS
b) DOS
c) MS DOS
d) 5.0
e) 4.2.0

21. A page fault:
a) Is an error in a specific page
b) Occurs when a program accesses a page of memory
c) Is an access to a page not currently in memory
d) None of the above
e) All of the above

22. The process of transferring data intended for a peripheral device into a disk or intermediate store so that it can be transferred to peripheral at a more convenient time or in bulk, is known as ___.
a) Multiprogramming
b) Spooling
c) Caching
d) Virtual programming
e) Code programming

23. An instruction in a programming language that is replaced by a sequence of instructions prior to assembly or compiling:
a) Procedure
b) Macro
c) Label
d) Literal
e) External

24. Banker's algorithm for resource allocation deals with:
a) Deadlock prevention
b) Deadlock avoidance
c) Deadlock recovery
d) Mutual exclusion
e) Data recovery

25. The state of a process after it encounters an I/O instruction is _____.
a) Ready
b) Blocked/ Waiting
c) Idle
d) Running
e) Compiling

26. The number of processes completed per unit time is known as__.
a) Output
b) Throughput
c) Efficiency
d) Capacity
e) Input

27. Which of the following file name extension suggests that the file is Backup copy of another file?
a) TXT
b) COM
c) BAS
d) BAK
e) BAT

ANSWERS:
1) b; 2) d; 3) b; 4) b; 5) d; 6) c; 7) c; 8) c; 9) c; 10) b
11) a; 12) a; 13) c; 14) b; 15) c; 16) d; 17) d; 18) a; 19) a; 20) d;
21) c; 22) b; 23) b; 24) b; 25) b; 26) b; 27) d.

Types of Computer

On the basis of working principle there are three types of computers.

a)Analog Computer
An analog computer (spelt analogue in British English) is a form of computer that uses continuous
physical phenomena such as electrical, mechanical or hydraulic quantities to model the problem being solved.
1. Thermometer
2. Speedometer
3. Petrol Pump Indicator
4. Multi meter

b) Digital Computer
Acomputer that performs calculations and logical operations with quantities represented as digits, usually in the binary number system.

c) Hybrid Computer (Analog + Digital)
A combination of computers those are capable of inputting and outputting in both digital and analog
signals. A hybrid computer system setup offers a cost effective method of performing complex simulations.

On the basis of Size..
a)Super Computer 
It is the fastest computer. Supercomputers are very expensive and are employed for specialized applications that require immense amounts of mathematical calculations.
For example, weather forecasting requires a supercomputer. Other uses of supercomputers
include animated graphics, fluid dynamic calculations and nuclear energy research and petroleum
exploration.
The major difference between a supercomputer and a mainframe is that a supercomputer channels
all its power into executing a few programs as fast as possible, whereas a mainframe uses itspower to execute many programs concurrently.

b)Mainframe Computer
A very large and expensive computer capable of supporting hundreds and even thousands of users
simultaneously. In the hierarchy that starts with a simple microprocessor (Eg: in watches) at the
bottom and moves to supercomputers at the top, mainframes are just below supercomputers. In
some ways, mainframes are more powerful than supercomputers because they support more simultaneous programs. But supercomputers can execute a single program
faster than a mainframe.

c) Mini Computer
In size and power, minicomputers lie between workstations and mainframes. In the past decade, the distinction between large minicomputers and small mainframes has blurred, however, as has the
distinction between small minicomputers and workstations. But in general, a minicomputer is a
multiprocessing system capable of supporting from 4 to about 200
users simultaneously.

d)Micro Computer
i. Desktop Computer: A personal or micro-mini computer sufficient to fit on a desk.
ii. Laptop Computer: A portable computer complete with an integrated screen and keyboard. It is
generally smaller in size than a desktop computer and larger than
a notebook computer.
iii. Palmtop Computer/ Digital Diary/ Notebook / PDAs:Ahandsized computer. Palmtops have no keyboard but the screen serves both as an input and output device.

e)Workstations
It is a terminal or desktop computer in a network. In this context, workstation is just a generic term
for a user's machine (client machine) in contrast to a "server" or "mainframe."

Major brands of the computer:
a) IBM/ IBM Compatible Computers
b) Apple/ Macintosh.

Monday 22 December 2014

COMPUTER AWARENESS PRACTICE QUESTIONS

1. UNIVAC stands for?
A) Universal Automatic Computer
B) Universal Array Computer
C) Unique Automatic Computer
D) Unvalued Automatic Computer
E) None of these

2. The basic operation performed by a computer is ____
A) Arithmetic operation
B) Logical operation
C) Storage and relative
D) All the above
E) None of these

3. The two major types of computer chips are:
A) External memory chip
B) Primary memory chip
C) Microprocessor chip
D) Both b and c
E) Both a and b

4. Microprocessors as switching devices are for which generation computers?
A) First Generation
B) Second Generation
C) Third Generation
D) Fourth Generation
E) None of the above

5. What is the main difference between a mainframe and a super computer?
A) Super computer is much larger than mainframe computers
B) Super computers are much smaller than mainframe computers
C) Super computers are focused to execute few programs as fast as possible while mainframe
uses its power to execute as many programs concurrently
D) Super computers are focused to execute as many programs as possible while mainframe
uses its power to execute few programs as fast as possible
E) None of the above

6. ASCII and EBCDIC are the popular character coding systems. What does EBCDIC stand for?
A) Extended Binary Coded Decimal Interchange Code
B) Extended Bit Code Decimal Interchange Code
C) Extended Bit Case Decimal Interchange Code
D) Extended Binary Case Decimal Interchange Code
E) None of the above

7. The brain of any computer system is ___
A) ALU
B) Memory
C) CPU
D) Control unit
E) Keyboard

8. Storage capacity of magnetic disk depends on ___
A) tracks per inch of surface
B) bits per inch of tracks
C) disk pack in disk surface
D) All of the above
E) Only A and B

9. The two kinds of main memory are:
A) Primary and Secondary
B) Random and Sequential
C) ROM and RAM
D) All of the above
E) None of these

10. A storage area used to store data to compensate for the difference in speed at which the different units can handle data is ___
A) Memory
B) Buffer
C) Accumulator
D) Address
E) None of these

11. Computer is free from tiresome and boardroom. We call it ___
A) accuracy
B) reliability
C) diligence
D) versatility
E) programmability

12. Integrated Circuits (ICs) are related to which generation of computers?
A) First generation
B) Second generation
C) Third generation
D) Fourth generation
E) Fifth generation

13. CD-ROM is a ___
A) Semiconductor memory
B) Memory register
C) Magnetic memory
D) All of the above
E) None of the above

14. A hybrid computer:
A) Resembles digital computer
B) Resembles analogue computer
C) Resembles both a digital and analogue computer
D) Converts digital to analog
E) None of the above

15. Which type of computers uses the 8-bit code called EBCDIC?
A) Mini computers
B) Micro computers
C) Mainframe computers
D) Super computer
E) None of these

16. The ALU of a computer responds to the commands coming from:
A) Primary memory
B) Control section
C) External memory
D) Cache memory
E) None of these

17. Chief component of first generation computer was ___
A) Transistors
B) Vacuum Tubes and Valves
C) Integrated Circuits
D) All of the above
E) None of the above

18. To produce high quality graphics (hardcopy) in color, you would want to use a/an ___
A) RGB monitors
B) Plotter
C) Ink-jet printer
D) Laser printer
E) None of these

19. What are the stages in the compilation process?
A) Feasibility study, system design and testing
B) Implementation and documentation
C) Lexical Analysis, syntax analysis, and code generation
D) Both A and B
E) None of the above

20. Which of the following IC was used in third generation of computers?
A) SSI
B) MSI
C) LSI
D) Both a and b
E) None of these

ANSWERS:
1) A 2) D 3) D 4) D 5) C 6) A 7) C 8) D 9) C 10) B
11) C 12) C 13) E 14) C 15) C 16) B 17) B 18) B 19) C 20) D

Friday 5 December 2014

COMPUTER AWARENESS PRACTICE MCQs FOR BANK EXAMS

1. The right click option of mouse is NOT used in which of the following?
1) To copy selected text into the clipboard
2) To rename file
3) To cut the selected text
4) To access properties of an object
5) None of these

2. .......... is the process of dividing the disk into tracks and sectors.
1) Tracking
2) Formatting
3) Crashing
4) Allotting
5) None of these

3. A place in the computer system where data and programs are temporarily stored is called....
1) paste
2) open
3) memory
4) pocket
5) None of these

4. Correcting errors in a program is referred to as...
1) debugging
2) bugging
3) rectifying
4) modifying
5) None of these

5. Graphical diagrams are used to represent multiple perspectives of a system which include
1) use-case, class and state diagrams
2) state, interaction and derivative diagrams
3) interaction, relationship and class diagrams
4) deployment, relationship and use-case diagrams
5) None of these

6. Which is the best view for representing your thoughts as a presentation of a computer?
1) Outline view
2) Notes page view
3) Slide sorter view
4) Slide view
5) None of these

7. What does SMPS stand for?
1) Switched Mode Power Supply
2) Single Mode Power Supply
3) Simple Mode Power Supply
4) Synchronous Mode Power Supply
5) None of these

8. RSA is........
1) Symmetric Cryptosystem
2) Digital Signature
3) Asymmetric Cryptosystem
4) Block Cypher
5) None of these

9. ......... hardware technology was used to fifth-generation computers.
1) Transistors
2) Valves
3) ICS
4) ULSI
5) VLSI

10. For each instruction in program memory the CPU goes through a ........
1) decode - fetch - execute sequence
2) fetch - decode - execute sequence
3) fetch - execute - decode sequence
4) execute - store - decode sequence
5) fetch - store - decode sequence

11. A proxy server is used for which of the following?
1) To provide security against unauthorised users
2) To process client requests for web pages
3) To process client requests for database access
4) To provide TCP / IP
5) None of these

12. A repair for a known software bug, usually available at no charge on the Internet, is called a(n).....
1) Version
2) Patch
3) Tutorial
4) FAQ
5) None of these

13. A modem performs.....
1) Modulation
2) Demodulation
3) Data compression
4) All of these
5) None of these

14. Which access method is used for obtaining a record from a cassette tape?
1) Direct
2) Sequential
3) Random
4) All of the above
5) None of these

15. A failure that occurs in an Oracle program when there is a logical failure in handling of a statement is called.........
1) Instance failure
2) Media failure
3) Process failure
4) Statement failure
5) User error

16. Which of the following represents the size of a floppy?
1) 3.5 inches
2) 5.25 inches
3) 8.0 inches
4) All the above
5) None of these

17. To format a number in date format, press..
1) Ctrl + Shift + @
2) Ctrl + Shift + #
3) Ctrl + Shift + %
4) Ctrl + Shift + $
5) Ctrl + Shift + ∗

18. ........ uses an embossed steel band to form the letters printed on the paper.
1) Laser printer
2) Dot-matrix printer
3) Daisy wheel printer
4) Band printer
5) Ink-jet printer

19. OR, XOR and AND functions can be performed by .............. of a computer in the CPU.
1) Memory
2) CU
3) Register
4) ALU
5) Processor

20. Internet provides....
1) Online communication
2) Software sharing
3) Customer support service
4) Online journals and magazines
5) All of the above

21. System software is the set of programs that enables your computer's hardware devices and ................ software to work together.
1) Management
2) Processing
3) Utility
4) Application
5) None of these

22. ............................ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these

23. SMPT, FTP and DNS are applications of the ............. layer.
1) data link
2) network
3) transport
4) application
5) None of these

24. According to which of the following, in a database, should information be organised and accessed?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these

25. WORM stands for ....
1) Wanted One Read Memory
2) Write Once Read Many
3) Write Original Read Many
4) All the above
5) None of these

26. Which of the following is separate software layer that acts as 'glue' between the client and the server parts of an application and provides a programming abstraction?
1) Freeware
2) Firmware
3) Shareware
4) User-supported software
5) Middleware

27. Which of the following is a must for a computer?
1) Chip
2) Data
3) Mouse
4) Processor
5) None of these

28. Disk can be used to store.......
1) Random files
2) Sequential files
3) Both (1) and (2)
4) Horizontal files
5) None of these

29. A derived class may also be called as.....
1) sub-class
2) super class
3) parent class
4) deprived class
5) None of these

30. The capacity of program counter is.......
1) 8 bits
2) 14 bits
3) 16 bits
4) 12 bits
5) 32 bits

31. In ........... generation computer the speed was measured in nanoseconds.
1) first
2) second
3) third
4) fourth
5) fifth

32. The process of transferring of files from your computer to the computer on the internet is called .......
1) downloading
2) uploading
3) FTP
4) JPEG
5) downsizing

33. Timing and control unit is a part of a(n)....
1) ALU
2) Processor
3) Memory
4) CMOS
5) BIOS

34. Chip is the common name for a(n)....
1) transistor
2) resistor
3) integrated circuit
4) semiconductor
5) None of these

35. ................. is developed specifically for a distinct industry.
1) Personal productivity software
2) Application software
3) Decision support system
4) Vertical market software
5) System software

36. Which of the following services is not provided by Internet service provider?
1) Internet transit
2) Domain name registration
3) Hosting
4) Dial-up access
5) None

37. A source program is written in a ............. language.
1) high-level
2) low-level
3) binary
4) All the above
5) None of these

38. The transfer rate of a standard USB 2.0 Device is .....
1) 100 M bit/s
2) 250 M bit/s
3) 480 M bit/s
4) 500 M bit/s
5) 1 G bit/s

39. The control part of a disk is known as
1) surface
2) hub
3) cylinder
4) cluster
5) None of these

40. Which of the following languages is used for process control?
1) ADA
2) COBOL
3) BASIC
4) PASCAL
5) LISP

ANSWERS:
1-5, 2-2, 3-3, 4-1, 5-1, 6-1, 7-1, 8-2, 9-4, 10-2
11-1, 12-2, 13-4, 14-2, 15-4, 16-4, 17-2, 18-4, 19-4, 20-5
21-4, 22-2, 23-4, 24-2, 25-2, 26-5, 27-4, 28-3, 29-1, 30-3
31-3, 32-2, 33-2, 34-3, 35-4, 36-5, 37-1, 38-3, 39-2, 40-1.