Sunday 22 March 2015

IBPS Bank Clerk CWE Solved Paper -2013 (Exam Held on 29-09-2013)

1. Which of the following groups consist of only input devices ?
(A) Mouse, Keyboard, Monitor (B) Mouse, Keyboard, Monitor
(C) Mouse, Keyboard, Plotter (D) Mouse, Keyboard, Scanner
(E) None of these
Ans : (D)

2. A menu contains a list of–
(A) commands (B) data (C) objects (D) reports (E) None of these
Ans : (A)

3. What is output ?
(A) What the processor takes from the user (B) What the user gives to the processor
(C) What the processor gets from the user (D) What the processor gives to the user
(E) None of these
Ans : (D)

4. An error is also known as–
(A) bug (B) debug (C) cursor (D) icon (E) None of these 
Ans : (A)

5. Computer ........ is whatever is typed, submitted, or transmitted to a computer system.
(A) input (B) output (C) data (D) circuitry (E) None of these
Ans : (A)

6. Which process checks to ensure the components of the computer are operating and connected properly ?
(A) Booting (B) Processing (C) Saving (D) Editing (E) None of these
Ans : (A)

7. Unsolicited commercial email is commonly known as–
(A) spam (B) junk (C) hoaxes (D) hypertent (E) None of these
Ans : (A)

8. ....... is processed by the computer into information.
(A) numbers (B) processor (C) input (D) data (E) None of these
Ans : (D)

9. A web site address is a unique name that identifies a specific ............ on the web.
(A) web browser (B) web site (C) PDA (D) link (E) None of these
Ans : (B)

10. A device that connects to a network without the use of cables is said to be–
(A) distributed (B) centralised (C) open source (D) wireless (E) None of these
Ans : (D)

11. Editing a document consists of reading through the document you've created, then–
(A) correcting your errors (B) printing it (C) saving it (D) deleting it (E) None of these
Ans : (A)

12. The Internet allows you to–
(A) send electronic mail (B) view web pages
(C) connect to servers all around the world (D) All of these
(E) None of these
Ans : (D)

13. Most mail program automatically complete the following two parts in an e-mail– 
(A) From : and Body : (B) From : and Date : (C) From : And To : (D) From : and Subject : (E) None of these
Ans : (B)

14. Where is the disk put in a computer ?
(A) in the modem (B) in the hard drive (C) into the CPU (D) in the disk drive (E) None of these
Ans : (D)

15. The name a user assigns to a document is called a (n)–
(A) filename (B) program (C) record (D) data (E) None of these
Ans : (A)

16. An e-mail address typically consists of a user ID followed by the ..... sign and the name of the e-mail server that manages the user's electronic post office box.
(A) @ (B) # (C) & (D) « (E) None of these
Ans : (A)

17. A personal computer is designed to meet the computing needs of a(n)– 
(A) individual (B) department (C) company (D) city (E) None of these
Ans : (A)

18. Ctrl, shift and alt are called ........ keys.
(A) adjustment (B) function (C) modifier (D) alphanumeric (E) None of these
Ans : (B)

19. File ....... shrinks the size of a file so it requires less storage space.
(A) scanning (B) synthesizing (C) defragmenting (D) compression (E) None of these
Ans : (D)

20. In addition to the basic typing keys, desktop and notebook computer keyboards include a (n) ..... keypad to efficiently move the screenbased insertion point.
(A) editing (B) number (C) locked (D) docked (E) None of these
Ans : (B)

21. To insert a new slide in a presentation, press–
(A) CTRL+N (B) CTRL+M (C) CTRL+O (D) CTRL+S (E) CTRL+F
Ans : (B)

22. Drop Cap offers ................ positions in settings
(A) 3 (B) 6 (C) 2 (D) 5 (E) 1
Ans : (A)

23. The feature of Word that automatically adjusts the amount of space between certain combination of characters so that an entire word looks more evenly spaced is termed as–
(A) Spacing (B) Kerning (C) Positioning (D) Scaling (E) Justifying
Ans : (B)

24. While recording a macro, the third step will be–
(A) Using your mouse or key-board, perform the task you want to automate
(B) Assign a keyboard shortcut to the macro (C) Give the macro a name
(D) Start recording (E) Select the location of macro on toolbar
Ans : (B)

25. ............ is not available on the Ruler of MS Word screen
(A) Centre Indent (B) Right Indent (C) Left Indent (D) Tab stop box (E) None of these
Ans : (A)

26. Which cannot be used to close the Word application– 
(A) ALT+ F4 (B) File-> Close (C) File-> Exit (D) X button in the word window (E) None of these
Ans : (B)

27. Excel workbook contains–
(A) Workbooks (B) Worksheets (C) Worksheets and charts (D) Work areas (E) All of these
Ans : (C)

28. Conslidate option does not offer ......... function
(A) AVERAGE (B) MAX (C) PMT (D) SUM (E) StDev
Ans : (C)

29. To see first row and first column in an excel sheet at all times even if you scroll till the end of sheet– 
(A) Use workbook views feature (B) Use switch windows feature
(C) Use freeze panes feature (D) Use freeze row and freeze column option
(E) Use headings
Ans : (D)

30. NOW0 returns– 
(A) Current date (B) Current time (C) Current year (D) Current date and time (E) Current month
Ans : (D)

31. Default header of a warksheet– 
(A) Username (B) Date and time (C) Sheet name (D) Workspace name (E) None of these
Ans : (E)

32. Which of these language uses both interpreter and compiler–
(A) COBOL (B) CASIC (C) JAVA (D) C++ (E) All of these
Ans : (C)

33. ................. is a type of memory organization or image file format used to store digital images
(A) Pixmap (B) GUI (C) Pixel (D) Resolution (E) Vector graphics
Ans : (A)

34. .............. file format used for data compression and archiving
(A) .EXE (B) .INI (C) .COM (D) .ZIP (E) .WIN
Ans : (D)

35. In second generation, ........ language were introduced after binary language
(A) Assembly level language (B) High level language 
(C) Low level language (D) Data definition language 
(E) Structured query language
Ans : (A)

36. Which layer of the OSI model performs segmentation of a data stream–
(A) Application layer (B) Network layer (C) Physical layer (D) Transport layer (E) Presentation layer
Ans : (D)

37. ............ is a combination of software and hardware
(A) Firmware (B) Shareware (C) Freeware (D) Netware (E) Software
Ans : (A)

38. SCSI is related to–
(A) Network (B) Storage (C) Data transfer (D) Images (E) Resolution
Ans : (B)

39. The amount of the data, CPU can transmit at a time to main memory and to input and output devices–
(A) Data width (B) Bus width (C) Memory width (D) Capacity (E) None of these
Ans : (B)

40. The daily processing of corrections to customer accounts can be simplified into a processing mode of–
(A) Time-sharing (B) Centralized processing (C) Batch processing (D) Real-time processing (E) None of the above
Ans : (C)

IBPS Bank Clerk CWE Solved Paper -2012 (Exam Held on 14-12-2012)

1. If you wish to extend the length of the network without having the signal degrade, you would use a– 
(A) resonance (B) router (C) gateway (D) switch (E) repeater
Ans : (E)

2. A repair for a known software bug, usually available at no charge on the internet, is called a– 
(A) version (B) patch (C) tutorial (D) FAQ (E) rectifier
Ans : (B)

3. URL stands for– 
(A) Universal Research List (B) Universal Resource List 
(C) Uniform Research List (D) Uniform Research Locator
(E) Uniform Resource Locator
Ans : (D)

4. When data changes in multiple lists and all lists are not updated, this causes– 
(A) data redundancy (B) information overload (C) duplicate data (D) data inconsistency (E) data repetition
Ans : (D)

5. What is a backup?
(A) Restoring the information backup (B) An exact copy of a system’s information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these (E) None of these
Ans : (D)

6. The Internet is– 
(A) a large network of networks (B) an internal communication system for a business
(C) a communication system for the Indian government (D) a communication system for some states of India
(E) a communication system for some cities of Indian
Ans : (A)

7. Computers that are portable and convenient for users who travel are known as– 
(A) supercomputers (B) planners (C) minicomputers (D) file servers (E) laptops
Ans : (E)

8. What is the storage area for email messages called?
(A) A folder (B) A mailbox (C) A directory (D) The hard disk (E) None of these
Ans : (B)

9. One advantage of dial-up Internet access is– 
(A) it utilizes broadband technology (B) it is Indian
(C) it uses a router for security (D) modem speeds are very fast
(E) it utilizes existing telephone service
Ans : (E)

10. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) configuration (B) download (C) storage (D) upload (E) installation
Ans : (E)

11. Which process checks to ensure the components of the computer are operating and connected properly?
(A) Booting (B) Processing (C) Saving (D) Editing (E) Starting
Ans : (A)

12. A means of capturing an image (drawing or photo) so that it can be stored on a computer is– 
(A) Modem (B) Software (C) Scanner (D) Keyboard (E) Mouse
Ans : (C)

13. An error in a computer porgram–
(A) Crash (B) Power Failure (C) Bug (D) Virus (E) Fatal error
Ans : (C)

14. Access control based on a person’s fingerprints is an example of– 
(A) biometric identification (B) characteristic identification 
(C) characteristics security (D) fingerprint security
(E) logistics
Ans : (A)

15. The patterns of printed lines on most products are called– 
(A) prices (B) striping (C) scanners (D) OCR (E) barcodes
Ans : (E)

16. Most mail programs automatically complete the following two parts in an e-mail– 
(A) From : and Body (B) From : and Date (C) From : and To (D) From : and Subject (E) None of these
Ans : (B)

17. The computer’s capability of distinguishing spoken words is called–
(A) voice analysis (B) speech acknowledgment
(C) voice recognition (D) speech interpretation
(E) vocalization
Ans : (C)

18. Which of the following is an advantage of mounting an application on the Web?
(A) the possibility of 24 hours access for users (B) creating a system that can extend globally
(C) scandalizing the design of the interface (D) All of these
(E) None of these
Ans : (D)

19. The first page of a Web site is called the– 
(A) Homepage (B) Index (C) Java Script (D) Book mark (E) Intro Page
Ans : (A)

20. ERP is an acronym for– 
(A) Enterprise Retirement Planning (B) Enterprise Relationship Planning
(C) Enterprise Resource Planning (D) Enterprise Reorder Planning
(E) Enterprise Retention Planning
Ans : (C)

21. The software that allows users to surf the Internet is called a/an– 
(A) Search engine (B) Internet Service Provider (ISP)
(C) Multimedia application (D) Browser
(E) Internet Surfing Provider
Ans : (D)

22. The issues that deal with the collection and use of data about individuals is– 
(A) access (B) publicity (C) accuracy (D) property (E) privacy
Ans : (E)

23. Aterm relating to sending data to a satellite is– 
(A) downlink (B) modulate (C) demodulate (D) uplink (E) Interrelate
Ans : (D)

24. On-line documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with relation information are called– 
(A) hypermedia (B) hypertext (C) HTML (D) URL (E) FTP
Ans : (B)

25. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and—security is concerned with protecting software from unauthorized tampering or damage.
(A) data (B) cyber (C) Internet (D) metaphysical (E) publicity
Ans : (A)

26. Hackers– 
(A) all have the same motive (B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage (D) are people who are allergic to computers
(E) break into other people’s computers
Ans : (E)

27. Unauthorized copying of software to be used for personal gain instead of for personal backups is called– 
(A) program thievery (B) data snatching (C) software piracy (D) program looting (E) data looting
Ans : (C)

28. Junk e-mail is also called– 
(A) Spam (B) spoof (C) cookie crumb (D) sniffer script (E) Spill
Ans : (A)

29. What is usually used for displaying information at public places?
(A) Monitors (B) Overhead Projections (C) Monitors and Overhead Projections (D) Touch Screen Kiosks (E) Loud Speakers
Ans : (B)

30. What is MP3?
(A) A mouse (B) A Printer (C) A Sound format (D) A Scanner (E) A Mobile Phone
Ans : (C)

31. What is the most popular hardware for multimedia creations?
(A) PCs (B) Minicomputers (C) Mainframe Computers (D) WANs (E) Super Computers
Ans : (A)

32. For sound recording what is necessary?
(A) Speaker (B) Microphone (C) Talker (D) Mouse (E) Telephone
Ans : (D)

33. The life-span of a CD-ROM is– 
(A) approximately one year (B) approximately two years (C) approximately five years 
(D) approximately twenty-five years (E) almost unlimited
Ans : (C)

34. The................settings are automatic and standard.
(A) default (B) CPU (C) peripheral (D) user friendly (E) defaulter
Ans : (A)

35. What are the two parts of an e-mail address?
(A) User name and street address (B) Legal name and phone number 
(C) User name and domain name (D) Initials and password
(E) User Name and Recipient Name
Ans : (C)

36. Participants can see and hear each other in a/ an– 
(A) electronic mail system (B) message system (C) teleconference (D) bulletin board (E) None of these
Ans : (C)

37. Magnetic tape is not practical for applications where data must be quickly recalled because tape is–
(A) A random-access medium (B) Expensive
(C) A read-only medium (D) Fragile and easily damaged
(E) A sequential-access medium
Ans : (E)

38. Why should you delete unknown e-mail attachments?
(A) You could go to jail (B) the person could track you down and hurt you
(C) it is bad manners (D) it might contain a virus that could hurt your computer
(E) None of these
Ans : (D)

39. Which of the following will you require to hear music on your computer?
(A) Video Card (B) Tape Recorder (C) Mouse (D) Joy Stick (E) Sound Card 
Ans : (E)

40. The signal that a computer is waiting for a command from the user– 
(A) prompt (B) event (C) time slice (D) interrupt (E) None of these
Ans : (A)