1. What are the measures taken by RBI to reduce liquidity in the banking system?
a) RBI increases the CRR. b) RBI increases the SLR
c) RBI increases the repo rate. d) RBI increases the bank rate.
e) All the above
2. LAF stands for .......
a) Loan Adjustment Fund
b) Liquidity Adjustment Facility
c) Long Awaited Funds
d) Loan Against Funds e) None of these
3. Open market operations, one of the measures taken by RBI in order to control credit
expansion in the economy, means ........
a) Sale or purchase of govt. securities
b) Issuance of different types of bonds
c) Auction of gold
d) To make available the direct finance to borrowers
e) None of these
4. Truncation of cheques means .........
a) The cheques in the paper form will be retained by the collecting banker and he
will submit only photograph image of cheque to the clearing house.
b) A trunk call will be booked by banks to the payee bank and requests them to clear
the cheque.
c) Cheques will be scanned and the electronic image, instead of physical cheque, will be transmitted in the clearing cycle.
d) Debiting the drawers account through internet banking.
e) None of these
5. Which of the following institution plays a major role in promotion of cross border trade and investment?
a) SIDBI b) IFCI c) NHB
d) EXIM Bank e) None of these
6. Forged cheque means ........
a) The cheque which is post dated cheque
b) The cheque in which the signature of the drawer of the cheque is not genuine.
c) A stale cheque
d) All of the above e) None of these
7. Amalgamation of Regional Rural Banks is recommended by?
a) K.C. Chakravarthy Committee
b) Usha Thorat Committee
c) Vyas Committee
d) C.V. Anand Bose Committee
e) None of these
8. Which of the following loan products is also known as 'teaser loans'?
a) Working capital loan b) Education loans
c) Jewel loans d) Home loans
e) Consumer durable products loans
9. Lending to customers with less than ideal credit status is known as?
a) sub-prime lending b) Banks don't lend
c) Ideal credit lending d) Risky lending
e) None of these
10. Expand NPA in the context of loan products?
a) Non-performing assets
b) New product ascendant
c) Net performing assets
d) Net profit on assets e) None of these
11. Loan period or term of loan in case of repo is ........
a) Greaterthan 365 days
b) Lessthan 30 days
c) Greaterthan 30 days
d) No limit in case of term in repo
e) None of these
12. Identify lending institution from the following .......
a) Exports and Imports Bank (EXIM Bank)
b) Small Industries Development Bank of India (SIDBI)
c) Housing Development Finance Corporation (HDFC)
d) All the above e) None of these
13. Advancing term loan or cash credit or working capital requirements is known as ......
a) Retail lending
b) Corporate financing
c) Multilateral lending
d) Company financing e) None of these
14. EXIM Bank's Line of credit preclude ...... for Indian exporters.
a) Credit risk b) Legal Risk
c) Systemic Risk and settlement Risk
d) Market Risk e) None of these
15. Money with the public and money with banks in form demand deposits and money
with RBI in other deposits is known as?
a) Narrow banking money or M2
b) Narrow Money or M1
c) Broad money or M3
d) High powered money or M0 e) None
16. The concept of classifying banks into weak banks and permitting them to invest only in government securities is known as?
a) Narrow Banking concept
b) Tarapore and Narasimham concept
c) Banking investment concept
d) Four-tire banking concept e) None
17. Automatically converting amount from savings bank account into fixed deposit,
beyond a fixed limit, set as per the customer's request is known as .......
a) Re-investment deposit
b) Demand Term deposit c) Flexi deposit
d) Recurring deposit e) None of these
18. What are loans and advances provided by banks to meet working capital requirements
of a business entity?
a) Overdraft b) Cash credit
c) Purchase and discounting of bills
d) Loans e) All the above
19. As per RBI guidelines what percentage does Indian banks must lend to Priority
Sector?
a) 40% b) 32%
c) More than 50% d) 18%
e) As per the individual bank's capacity
20. Exchange Earner's Foreign Currency (EEFC) account .....
a) It is a current account so no interest is paid to the deposits in the account
b) Account deposits are not in Indian Rupee
c) This account can be opened by all categories of foreign exchange earners but resident in India
d) The amount have to be convert into Indian rupee before a month
e) All the above
21. Which of the following credit rating institutions is promoted by RBI along with SBI, HDFC Bank and ICICI Bank?
a) ICRA b) CIBIL c) CRISIL
d) CRO e) None of these
22. Identify the odd one from the following. While lending banks will follow certain
cardinal principle, those are ........
a) Safety and Security
b) Liquidity and Profitability c) Purpose
d) Diversification of risk e) None
23. What are methods used to estimate the working capital needs?
a) Operating cycle
b) Turn over projection
c) Net working capital projection
d) All the above e) None of these
24. What is the mode of charges laid on vehicle loan?
a) Pledge b) Hypothecation
c) Assignment d) Mortgage
e) All the above
25. Generally banks face a credit risk when ....
a) Customer defaulting to repay the loan
b) Banks lend money to RBI
c) Banks lend money to government
d) Credit given to the customer
e) All the above
26. Identify the odd out of following with respect to priority sector ......
a) Agriculture b) Education c) Housing
d) Consumer durable credit
e) Export Credit
27. What is the percent of advances does Khadi and Village Industries Sector (KVI) must be lent by banks in the SME and MSME category of Priority Sector advancing?
a) More than 50% SME and MSME category
b) 60% of total Priority Sector advances
c) 60% of SME and MSME category
d) Less than 40% SME and MSME category
e) None of these
28. As per present RBI guidelines what is minimum percentage does commercial banks
need to lend Government?
a) 22% b) 4% c) 9% d) 8% e) No need to lend
29. A reduction in SLR rate leads to .......
a) Gold rate decrease
b) Support the credit growth in India.
c) Government will be funded more as the rate is reduced.
d) Reduction in credit growth in India
e) None of these
Key: 1-a; 2-b; 3-a; 4-c; 5-d; 6-b; 7-c; 8-d; 9-a; 10-a; 11-c; 12-d; 13-b; 14-a; 15-b; 16-a; 17-c; 18-e; 19-a; 20-e; 21-b; 22-e; 23-d; 24-b; 25-a; 26-d; 27-c; 28-a; 29-b.
PSU Jobs, Govt Vacancies, Bank Clerks and POs, Model Questions and Previous Papers - 2016
Showing posts with label IBPS - Computer Knowledge. Show all posts
Showing posts with label IBPS - Computer Knowledge. Show all posts
20 September 2024
Cumputer Knowledge Questions for Bank Recruitments
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

Computer Knowledge for IBPS and SBI - POs and Clerks Recruitments
Banks collect deposits for low rates of interest and lend for higher rate of interest. The margin between these two rates of interest is banks profit. Here the banks should follow a perfect and safe ways in lending, as they need to pay back the money to depositors on demand.
Lending business is a risky activity. As banks' main function is lending, they must follow certain principles in order to protect their funds. The basic principles that banks follow while lending are....
1. Safety: Banks need to consider the borrowers' capacity to pay, willingness to pay,
and income generation of the person or business entity. This is a safety check that banks need to consider while lending.
2. Liquidity: Lent amount is to be paid in proper repayment schedules and inflow towards the loan or advance must be proper in order to fulfill the demand of their depositors.
3. Profitability: The activity of lending is done in order to make some profit out of it.
4. Purpose: The loans must be grant for some income generation purpose and not for speculation or some anti social activity. The purpose must be genuine.
5. Diversification of risk: Banks need to diversify their risk by lending to different
type, sectors and areas of businesses.
6. Security: Security on the loan is the primary criteria for the bank. All secure loans are safe and can be recovered even the borrower is a defaulter.
Different types of lending....
Banks lend money in different ways. These are classified into following
categories:
Fund based advances: Fund based advances are those where the bank give money as loan or advance. These are for business entities and individuals. These are like term loans and working capital loans. Those may be secure or unsecure loans.
Working capital loans: these are generally unsecure loans but vary from bank to bank and borrower to borrower. This is a type of loan taken to meet day to day cash requirement of the business entities. Requirements like purchase of raw material, payment of wages, payments to vendors etc.,. As said the criteria differ in lending,
the documentation and securities also differ, where the loan will not have a fixed amount, or fixed intervals, or fixed period or fixed schedule for repayment. The best
example is Overdraft (OD).
Term loans: As the word 'term' denotes period these loans have to be paid back in a fixed period and fixed schedule. For these loans the rate of interest will be fixed as well as payment period and payment amount (like EMIs). These loans may be secure or unsecure loans and rate of interest varies for both, as rate of interest will be lower to secure loans compared with unsecure loans.
The best examples are: business loans, vehicle loans, jewellery loans. These are secure loans. And personal loan, credit cards etc are unsecure loans.
Secure loans: These are loans that are granted on basis of certain security against it as collateral. If the borrower defaults in payment of the loan the security will be used for repayment. Security may be land, house, factory, jewellry, vehicle, shares, life insurance policies, fixed deposits etc.
Unsecure loans: These loans are granted by banks without any security against it.
Banks may be at high risk in these cases. The examples are loans like credit cards,
personal loans, overdraft etc.
Lending business is a risky activity. As banks' main function is lending, they must follow certain principles in order to protect their funds. The basic principles that banks follow while lending are....
1. Safety: Banks need to consider the borrowers' capacity to pay, willingness to pay,
and income generation of the person or business entity. This is a safety check that banks need to consider while lending.
2. Liquidity: Lent amount is to be paid in proper repayment schedules and inflow towards the loan or advance must be proper in order to fulfill the demand of their depositors.
3. Profitability: The activity of lending is done in order to make some profit out of it.
4. Purpose: The loans must be grant for some income generation purpose and not for speculation or some anti social activity. The purpose must be genuine.
5. Diversification of risk: Banks need to diversify their risk by lending to different
type, sectors and areas of businesses.
6. Security: Security on the loan is the primary criteria for the bank. All secure loans are safe and can be recovered even the borrower is a defaulter.
Different types of lending....
Banks lend money in different ways. These are classified into following
categories:
Fund based advances: Fund based advances are those where the bank give money as loan or advance. These are for business entities and individuals. These are like term loans and working capital loans. Those may be secure or unsecure loans.
Working capital loans: these are generally unsecure loans but vary from bank to bank and borrower to borrower. This is a type of loan taken to meet day to day cash requirement of the business entities. Requirements like purchase of raw material, payment of wages, payments to vendors etc.,. As said the criteria differ in lending,
the documentation and securities also differ, where the loan will not have a fixed amount, or fixed intervals, or fixed period or fixed schedule for repayment. The best
example is Overdraft (OD).
Term loans: As the word 'term' denotes period these loans have to be paid back in a fixed period and fixed schedule. For these loans the rate of interest will be fixed as well as payment period and payment amount (like EMIs). These loans may be secure or unsecure loans and rate of interest varies for both, as rate of interest will be lower to secure loans compared with unsecure loans.
The best examples are: business loans, vehicle loans, jewellery loans. These are secure loans. And personal loan, credit cards etc are unsecure loans.
Secure loans: These are loans that are granted on basis of certain security against it as collateral. If the borrower defaults in payment of the loan the security will be used for repayment. Security may be land, house, factory, jewellry, vehicle, shares, life insurance policies, fixed deposits etc.
Unsecure loans: These loans are granted by banks without any security against it.
Banks may be at high risk in these cases. The examples are loans like credit cards,
personal loans, overdraft etc.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

15 September 2024
Computer Awareness Model Questions for IBPS and SBI Recruitments
IBPS and SBI do not expect mastery in Computers while testing your knowledge of basic computer concepts like LAN, Monitor, Mouse, Key Board Shortcuts, MS Word applications, Spreadsheet, PPT etc. See the following model questions for IBPS / SBI Clerks and POs.
1. A name or number used to Identify a storage location is called........
1) A byte 2) A record 3) An address 4) A program 5) A bit
2. Which is the best position for operating the mouse?
1) Tail away from the user 2) Tail towards the user
3) Tail facing the right 4) Tail facing the left
5) None of these
3. Computers use the ........ number system to store data and perform calculations.
1) Decimal 2) Hexadecimal 3) Octal
4) Binary 5) None of these
4. Which toolbar displays the buttons for alignment and font size in Word?
1) Formatting toolbar 2) Standard toolbar
3) Drawing toolbar 4) Graphics toolbar 5) None of these
5. Which is the network strategy used extensively by the Internet?
1) peer-to-peer network system
2) client / server network system
3) LAN 4) stand alone network system
5) None of these
6. The ............... coordinates all of the processor's activities.
1) arithmetic logic unit
2) control unit
3) Random Access Memory (RAM)
4) expansion slot
5) None of these
7. RAM is an example of which of the following?
1) nonvolatile memory
2) cache memory 3) volatile memory
4) virtual memory 5) None of these
8. Which programming language does not need a translator?
1) BASIC 2) High language
3) Assembly language 4) C 5) Machine language
9. To move to the bottom of a WORD document the following key(s) should be used..
1) Ctrl and End 2) Ctrl 3) End 4) Home 5) None of these
10. Which of the following uniquely identifies a website?
1) ERL 2) Domain name 3) Computer 4) Network 5) URL
11. Which of the following is listed in order from largest to smallest?
1) TB, MB, GB, KB 2) GB, TB, MB, KB
3) TB, KB, GB, MB 4) TB, GB, MB, KB
5) GB, MB, TB, KB
12. Which of the following is a machine independent program ?
1) High level language
2) Low level language
3) Assembly language
4) Machine language
5) None of these
13. A portion of the worksheet displayed on the screen can be viewed through a ........
1) Worksheet window
2) the active window 3) the task bar
4) the cell 5) None of these
14. Which of the following is not a term pertaining to the Internet?
1) Browser 2) Link 3) Printer
4) Search Engine 5) Hyperlink
15. You use a(n) ............. such as a mouse, to input information.
1) output device 2) input device
3) storage device 4) processing device 5) None of these
16. Which of the following is not true about an assembler?
1) Translates instructions of assembly language into machine language
2) It does not translate a C program
3) It is involved in program's execution
4) Is a translating program
5) It does not translate a BASIC program
17. Which of the following is not a term pertaining to spreadsheets?
1) formula 2) cell 3) browser 4) character 5) None of these
18. A website is a collection of .........
1) graphics 2) programs 3) algorithms 4) web pages 5) charts
19. Computer's RAM is ...........
1) CPU 2) Computer software
3) operating system 4) ALU 5) computer hardware
20. Which of the following is not an example of hardware?
1) Mouse 2) Printer 3) Monitor 4) Operating system 5) Scanner
Answers: 1-3; 2-2; 3-4; 4-1; 5-2; 6-2; 7-3; 8-5; 9-1; 10-2; 11-4; 12-1; 13-1; 14-3; 15-2; 16-2; 17-3; 18-4; 19-5; 20-4.
1. A name or number used to Identify a storage location is called........
1) A byte 2) A record 3) An address 4) A program 5) A bit
2. Which is the best position for operating the mouse?
1) Tail away from the user 2) Tail towards the user
3) Tail facing the right 4) Tail facing the left
5) None of these
3. Computers use the ........ number system to store data and perform calculations.
1) Decimal 2) Hexadecimal 3) Octal
4) Binary 5) None of these
4. Which toolbar displays the buttons for alignment and font size in Word?
1) Formatting toolbar 2) Standard toolbar
3) Drawing toolbar 4) Graphics toolbar 5) None of these
5. Which is the network strategy used extensively by the Internet?
1) peer-to-peer network system
2) client / server network system
3) LAN 4) stand alone network system
5) None of these
6. The ............... coordinates all of the processor's activities.
1) arithmetic logic unit
2) control unit
3) Random Access Memory (RAM)
4) expansion slot
5) None of these
7. RAM is an example of which of the following?
1) nonvolatile memory
2) cache memory 3) volatile memory
4) virtual memory 5) None of these
8. Which programming language does not need a translator?
1) BASIC 2) High language
3) Assembly language 4) C 5) Machine language
9. To move to the bottom of a WORD document the following key(s) should be used..
1) Ctrl and End 2) Ctrl 3) End 4) Home 5) None of these
10. Which of the following uniquely identifies a website?
1) ERL 2) Domain name 3) Computer 4) Network 5) URL
11. Which of the following is listed in order from largest to smallest?
1) TB, MB, GB, KB 2) GB, TB, MB, KB
3) TB, KB, GB, MB 4) TB, GB, MB, KB
5) GB, MB, TB, KB
12. Which of the following is a machine independent program ?
1) High level language
2) Low level language
3) Assembly language
4) Machine language
5) None of these
13. A portion of the worksheet displayed on the screen can be viewed through a ........
1) Worksheet window
2) the active window 3) the task bar
4) the cell 5) None of these
14. Which of the following is not a term pertaining to the Internet?
1) Browser 2) Link 3) Printer
4) Search Engine 5) Hyperlink
15. You use a(n) ............. such as a mouse, to input information.
1) output device 2) input device
3) storage device 4) processing device 5) None of these
16. Which of the following is not true about an assembler?
1) Translates instructions of assembly language into machine language
2) It does not translate a C program
3) It is involved in program's execution
4) Is a translating program
5) It does not translate a BASIC program
17. Which of the following is not a term pertaining to spreadsheets?
1) formula 2) cell 3) browser 4) character 5) None of these
18. A website is a collection of .........
1) graphics 2) programs 3) algorithms 4) web pages 5) charts
19. Computer's RAM is ...........
1) CPU 2) Computer software
3) operating system 4) ALU 5) computer hardware
20. Which of the following is not an example of hardware?
1) Mouse 2) Printer 3) Monitor 4) Operating system 5) Scanner
Answers: 1-3; 2-2; 3-4; 4-1; 5-2; 6-2; 7-3; 8-5; 9-1; 10-2; 11-4; 12-1; 13-1; 14-3; 15-2; 16-2; 17-3; 18-4; 19-5; 20-4.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

Computer Knowledge Mock Test for IBPS and SBI Clerks and PO Recruitments
Computer Knowledge has been a crucial part of IBPS and SBI Clerks and Probationary Officers (POs) exams. The candidates are expected to have basic knowledge of computers and programmes such as MS Word, Excel, Power Point, etc. The questions will be related to the application knowledge of these topics. Here are some model questions for your practice. See answers at the end of the questions.
1. An online backing storage system capable of storing larger quantities of data is .....
1) CPU 2) Memory 3) Secondary storage
4) Mass storage 5) Temporary storage
2. ROM stands for ............
1) Read Only Memory
2) Random Open Memory
3) Read Open Memory
4) Random Only Memory
5) Ready Only Memory
3. Trackball is an example of a/ an....
1) programming device 2) pointing device
3) output device 4) software device 5) printing device
4. A page break means .........
1) breaking a page of the document into smaller parts
2) starting the next part of the document on a new page
3) breaking a page of the document into small sentences
4) breaking a page of the document into small paragraphs
5) None of these
5. ............ of the worksheet appear vertically and are identified by letters at the top of the worksheet window.
1) Rows 2) Cells 3) Columns 4) Headings 5) Range
6. Which of the following operations is not performed by computer?
1) Inputting 2) Processing
3) Controlling 4) Understanding 5) Outputting
7. BIT stands for ..........
1) Built In Tasks 2) Binary Digit
3) Before Instructed Task
4) Before Interpreting Task
5) Before Initial Task
8. The keys on the keyboard which may be programmed to do special tasks are referred to as
1) Function keys 2) Arrow keys
3) Page Up and Page Down keys
4) Shift and Alt keys 5) None of these
9. What is the shortcut key for centering the text selected by the user in Word?
1) CTRL + A 2) CTRL + B 3) CTRL + C
4) CTRL + D 5) CTRL + E
10. Excel is a ............
1) word processing program 2) game
3) database application
4) spreadsheet program
5) presentation program
11. Which of the following statements is valid?
1) 1 KB = 1024 bits
2) 1 MB = 2048 bits
3) 1 MB = 1000 kilobits
4) 1 KB = 1000 bytes
5) 1 MB = 1024 kilobytes
12. ALU is...
1) Access Logic Unit 2) Array Logic Unit
3) Application Logic unit 4) Artificial Logic Unit
5) Arithmetic Logic Unit
13. A storage device that stores the same data on several different disks so if one
gets damaged, another one will have the same data is referred to as ............
1) RAID 2) magnetic tape
3) magnetic disk 4) floppy disk
5) None of these
14. Which of the following is not a term pertaining to WORD?
1) Delete 2) Edit 3) Copy
4) Slide show 5) None of these
15. Excel documents are stored as files called .............
1) workforce 2) worksheets
3) worktables 4) workgroups 5) workbooks
16. A computer programmer ............
1) does all the thinking for a computer
2) can enter input data quickly
3) can operate all types of compute equipments
4) can draw only flowchart 5) is not a useful person
17. Which of the following categories would include a printer and a monitor?
1) Storage Devices 2) Input Devices
3) Pointing Devices 4) Output Devices 5) Scanning
18. Software turns data into ............
1) documents 2) information 3) pages
4) websites 5) None of these
19. Which words in a WORD document can be displayed colour?
1) only the title
2) all words but a colour printer is essential
3) all words 4) only the header and footer
5) None of these
20. A cookie ...........
1) stores information about the user's web activity
2) stores software developed by the user
3) stores the password of the user
4) stores the commands used by the user
5) None of these
Answers: 1-4; 2-1; 3-2; 4-2; 5-3; 6-4; 7-2; 8-1; 9-5; 10-4; 11-5; 12-5; 13-1; 14-4; 15-2; 16-1; 17-4; 18-2; 19-3; 20-1.
1. An online backing storage system capable of storing larger quantities of data is .....
1) CPU 2) Memory 3) Secondary storage
4) Mass storage 5) Temporary storage
2. ROM stands for ............
1) Read Only Memory
2) Random Open Memory
3) Read Open Memory
4) Random Only Memory
5) Ready Only Memory
3. Trackball is an example of a/ an....
1) programming device 2) pointing device
3) output device 4) software device 5) printing device
4. A page break means .........
1) breaking a page of the document into smaller parts
2) starting the next part of the document on a new page
3) breaking a page of the document into small sentences
4) breaking a page of the document into small paragraphs
5) None of these
5. ............ of the worksheet appear vertically and are identified by letters at the top of the worksheet window.
1) Rows 2) Cells 3) Columns 4) Headings 5) Range
6. Which of the following operations is not performed by computer?
1) Inputting 2) Processing
3) Controlling 4) Understanding 5) Outputting
7. BIT stands for ..........
1) Built In Tasks 2) Binary Digit
3) Before Instructed Task
4) Before Interpreting Task
5) Before Initial Task
8. The keys on the keyboard which may be programmed to do special tasks are referred to as
1) Function keys 2) Arrow keys
3) Page Up and Page Down keys
4) Shift and Alt keys 5) None of these
9. What is the shortcut key for centering the text selected by the user in Word?
1) CTRL + A 2) CTRL + B 3) CTRL + C
4) CTRL + D 5) CTRL + E
10. Excel is a ............
1) word processing program 2) game
3) database application
4) spreadsheet program
5) presentation program
11. Which of the following statements is valid?
1) 1 KB = 1024 bits
2) 1 MB = 2048 bits
3) 1 MB = 1000 kilobits
4) 1 KB = 1000 bytes
5) 1 MB = 1024 kilobytes
12. ALU is...
1) Access Logic Unit 2) Array Logic Unit
3) Application Logic unit 4) Artificial Logic Unit
5) Arithmetic Logic Unit
13. A storage device that stores the same data on several different disks so if one
gets damaged, another one will have the same data is referred to as ............
1) RAID 2) magnetic tape
3) magnetic disk 4) floppy disk
5) None of these
14. Which of the following is not a term pertaining to WORD?
1) Delete 2) Edit 3) Copy
4) Slide show 5) None of these
15. Excel documents are stored as files called .............
1) workforce 2) worksheets
3) worktables 4) workgroups 5) workbooks
16. A computer programmer ............
1) does all the thinking for a computer
2) can enter input data quickly
3) can operate all types of compute equipments
4) can draw only flowchart 5) is not a useful person
17. Which of the following categories would include a printer and a monitor?
1) Storage Devices 2) Input Devices
3) Pointing Devices 4) Output Devices 5) Scanning
18. Software turns data into ............
1) documents 2) information 3) pages
4) websites 5) None of these
19. Which words in a WORD document can be displayed colour?
1) only the title
2) all words but a colour printer is essential
3) all words 4) only the header and footer
5) None of these
20. A cookie ...........
1) stores information about the user's web activity
2) stores software developed by the user
3) stores the password of the user
4) stores the commands used by the user
5) None of these
Answers: 1-4; 2-1; 3-2; 4-2; 5-3; 6-4; 7-2; 8-1; 9-5; 10-4; 11-5; 12-5; 13-1; 14-4; 15-2; 16-1; 17-4; 18-2; 19-3; 20-1.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

14 September 2024
Computer Knowledge Questions for IBPS and SBI Recruitments
1. Which of the following is an active cell in Excel?
1) Current Cell 2) Formula 3) Range 4) Cell Address 5) None of these
2. What is included in an e-mail address?
1) Domain name followed by user's name
2) User's name followed by domain name
3) User's name followed by postal address
4) User's name followed by street address
5) None of these
3. What the secret code is called which prohibits entry into some programs?
1) Access Code 2) Passport
3) Entry Code 4) Password 5) Keyword
4. Which of the following types of menu shows the further sub choices?
1) Reverse 2) Template 3) Scrolled 4) Rapped 5) Pull-Down
5. Which of the following operations is safe if an e-mail from an unknown sender is
received?
1) Open it to know about the sender and answer it
2) Delete after opening it
3) Delete it without opening it
4) Open and try to know who is the sender
5) None of these
6. The other name of motherboard is....
1) Mouse 2) Computer Board
3) System Device 4) Central Board 5) System Board
7. By which of the following any part of a document can be seen on the screen?
1) Searching 2) Pasting 3) Scrolling 4) Editing 5) Copying
8. Which of the following characteristics is used to compute dynamically the results
from Excel data?
1) Go to 2) Table 3) Chart 4) Diagram 5) Formula and Function
9. Which type of storage is hard disc?
1) Non-permanent 2) Volatile
3) Temporary 4) Non-volatile 5) None of these
10. Which of the following is not a software?
1) Excel 2) MS office
3) Operating system 4) Power point 5) Mouse
11. Instructions or programs for controlling the computer are called...
1) Software 2) Hardware
3) Human ware 4) Programmer 5) Analysts
12. A ...... typically identifies the type of file.
1) folder 2) path 3) file extension 4) file name 5) None of these
13. A device that copies or reproduces text and images is called a / an...
1) CPU 2) reader 3) memory 4) obtainer 5) scanner
14. Which of the following should be used to move a paragraph from one place to
another in a Word document?
1) Copy and Paste 2) Cut and Paste
3) Delete and Retype 4) Find and Replace 5) None of these
15. An Excel spreadsheet has the extension..
1) .doc 2) .xls 3) .ppt 4) .accts 5) .exe
16. A thin plate or board that contains electron called ..........
1) Hard disk 2) Scanner 3) RAM 4) ROM 5) Circuit board
17. The ........ is the box that houses the most important parts of a computer system.
1) software 2) hardware
3) input device 4) system unit 5) None of these
18. The device containing a circuit breaker that is used to separate the hardware from
the power source and protect from voltage spikes is called a .........
1) voltage breaker 2) surge breaker
3) surge protector 4) voltage protector 5) ALU
19. Which menu should be selected to perform Cut and Paste in Word?
1) format menu 2) tools menu
3) edit menu 4) view menu 5) None of these
20. In a spreadsheet, the point at which a column and a row intersect is called a ......
1) col-row 2) container 3) box 4) grid 5) cell
Answers: 1-1; 2-2; 3-4; 4-5; 5-3; 6-5; 7-3; 8-5; 9-4; 10-5; 11-1; 12-3; 13-5; 14-2; 15-2; 16-5; 17-4; 18-3; 19-3; 20-5.
1) Current Cell 2) Formula 3) Range 4) Cell Address 5) None of these
2. What is included in an e-mail address?
1) Domain name followed by user's name
2) User's name followed by domain name
3) User's name followed by postal address
4) User's name followed by street address
5) None of these
3. What the secret code is called which prohibits entry into some programs?
1) Access Code 2) Passport
3) Entry Code 4) Password 5) Keyword
4. Which of the following types of menu shows the further sub choices?
1) Reverse 2) Template 3) Scrolled 4) Rapped 5) Pull-Down
5. Which of the following operations is safe if an e-mail from an unknown sender is
received?
1) Open it to know about the sender and answer it
2) Delete after opening it
3) Delete it without opening it
4) Open and try to know who is the sender
5) None of these
6. The other name of motherboard is....
1) Mouse 2) Computer Board
3) System Device 4) Central Board 5) System Board
7. By which of the following any part of a document can be seen on the screen?
1) Searching 2) Pasting 3) Scrolling 4) Editing 5) Copying
8. Which of the following characteristics is used to compute dynamically the results
from Excel data?
1) Go to 2) Table 3) Chart 4) Diagram 5) Formula and Function
9. Which type of storage is hard disc?
1) Non-permanent 2) Volatile
3) Temporary 4) Non-volatile 5) None of these
10. Which of the following is not a software?
1) Excel 2) MS office
3) Operating system 4) Power point 5) Mouse
11. Instructions or programs for controlling the computer are called...
1) Software 2) Hardware
3) Human ware 4) Programmer 5) Analysts
12. A ...... typically identifies the type of file.
1) folder 2) path 3) file extension 4) file name 5) None of these
13. A device that copies or reproduces text and images is called a / an...
1) CPU 2) reader 3) memory 4) obtainer 5) scanner
14. Which of the following should be used to move a paragraph from one place to
another in a Word document?
1) Copy and Paste 2) Cut and Paste
3) Delete and Retype 4) Find and Replace 5) None of these
15. An Excel spreadsheet has the extension..
1) .doc 2) .xls 3) .ppt 4) .accts 5) .exe
16. A thin plate or board that contains electron called ..........
1) Hard disk 2) Scanner 3) RAM 4) ROM 5) Circuit board
17. The ........ is the box that houses the most important parts of a computer system.
1) software 2) hardware
3) input device 4) system unit 5) None of these
18. The device containing a circuit breaker that is used to separate the hardware from
the power source and protect from voltage spikes is called a .........
1) voltage breaker 2) surge breaker
3) surge protector 4) voltage protector 5) ALU
19. Which menu should be selected to perform Cut and Paste in Word?
1) format menu 2) tools menu
3) edit menu 4) view menu 5) None of these
20. In a spreadsheet, the point at which a column and a row intersect is called a ......
1) col-row 2) container 3) box 4) grid 5) cell
Answers: 1-1; 2-2; 3-4; 4-5; 5-3; 6-5; 7-3; 8-5; 9-4; 10-5; 11-1; 12-3; 13-5; 14-2; 15-2; 16-5; 17-4; 18-3; 19-3; 20-5.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

Computer Knowledge for IBPS and SBI Bank Exams
1. Which of the following functions is not performed by the CPU?
1) Graphical Display of Data
2) Arithmetic Calculations
3) Managing Memory
4) Managing Input and Output
5) None of these
2. The feature that keeps track of the right margin is ......
1) find and replace 2) word wrap
3) right justified 4) left justified 5) ragged right
3. Keyboard shortcuts are used to move the.....
1) I-beam 2) insertion point
3) scroll bar 4) mouse 5) None
4. To specify margins in Word, the user has to select Page Setup option from the ....... menu.
1) Edit 2) Table 3) Auto correct 4) File 5) Format
5. What is the name of the package which helps to create, manipulate and analyze data arranged in rows and columns?
1) Application package 2) Word processing package
3) Outlining package 4) Outline processors
5) Spreadsheet package
6. What does an electronic spreadsheet consist of? (Choose the best answer)
1) Rows 2) Columns 3) Cells 4) All of these 5) None of these
7. ROM is an example of which of the following?
1) volatile memory 2) cache memory
3) nonvolatile memory 4) virtual memory 5) None of these
8. Which of the following options is used to display information such as title, page
number of the document?
1) Insert table 2) Auto correct
3) Thesaurus 4) Spelling and Grammar 5) Header and Footer
9. Which part of the computer can display the user's work?
1) Mouse 2) Keyboard 3) Disk Drive
4) Monitor 5) None of these
10. When a computer prints a report, this output is called ........
1) Program 2) Soft copy 3) Hard copy 4) Execution 5) None of these
11. The processor is a ...... chip plugged onto the motherboard in a computer system.
1) LSI 2) VLSI 3) ULSI 4) XLSI 5) WLSI
12. A register that keeps track of the next instruction to be executed is called a ......
1) Data Register 2) Instruction Register
3) Action Register 4) Program Counter 5) Accumulator
13. The microprocessor of a computer....
1) does not understand machine language
2) understands machine language and high level languages
3) understands only machine language
4) understands only high level language
5) understands only assembly language
14. A set of choices on the screen is called a(n) .........
1) menu 2) reserve video 3) action plan 4) editor 5) template
15. What is the full form of PROM?
1) Programmable Read Only Memory
2) Progressive Read-Only Memory
3) Periodic Read-Only Memory
4) Perfect Read-Only Memory
5) Program Read-Only Memory
16. Which of the following will be used if a sender of e-mail wants to bold, italic etc. the text message?
1) Rich Signature 2) Rich Text
3) Rich Format 4) Plain Format 5) Plain Text
17. Which of the following terms is not related to Internet?
1) Link 2) Function Key 3) Browser 4) Search Engine 5) Hyperlink
18. Which of the following justification align the text on both the side - left and right - of margin?
1) Right 2) Justify 3) Both sides 4) Balanced 5) None of these
19. What is the full form of LSI?
1) Low-Scale Internet
2) Large-Scale Internet
3) Low-Scale Integration
4) Large-Scale Integration
5) Local Scale Integration
20. To move the text from its original position to another position without deleting, it is called .....
1) Scrolling 2) Searching 3) Moving 4) Copying 5) Halting
Answers: 1-1; 2-5; 3-2; 4-4; 5-5; 6-4; 7-3; 8-5; 9-4; 10-3; 11-2; 12-4; 13-3; 14-1; 15-1; 16-2; 17-2; 18-2; 19-4; 20-4.
1) Graphical Display of Data
2) Arithmetic Calculations
3) Managing Memory
4) Managing Input and Output
5) None of these
2. The feature that keeps track of the right margin is ......
1) find and replace 2) word wrap
3) right justified 4) left justified 5) ragged right
3. Keyboard shortcuts are used to move the.....
1) I-beam 2) insertion point
3) scroll bar 4) mouse 5) None
4. To specify margins in Word, the user has to select Page Setup option from the ....... menu.
1) Edit 2) Table 3) Auto correct 4) File 5) Format
5. What is the name of the package which helps to create, manipulate and analyze data arranged in rows and columns?
1) Application package 2) Word processing package
3) Outlining package 4) Outline processors
5) Spreadsheet package
6. What does an electronic spreadsheet consist of? (Choose the best answer)
1) Rows 2) Columns 3) Cells 4) All of these 5) None of these
7. ROM is an example of which of the following?
1) volatile memory 2) cache memory
3) nonvolatile memory 4) virtual memory 5) None of these
8. Which of the following options is used to display information such as title, page
number of the document?
1) Insert table 2) Auto correct
3) Thesaurus 4) Spelling and Grammar 5) Header and Footer
9. Which part of the computer can display the user's work?
1) Mouse 2) Keyboard 3) Disk Drive
4) Monitor 5) None of these
10. When a computer prints a report, this output is called ........
1) Program 2) Soft copy 3) Hard copy 4) Execution 5) None of these
11. The processor is a ...... chip plugged onto the motherboard in a computer system.
1) LSI 2) VLSI 3) ULSI 4) XLSI 5) WLSI
12. A register that keeps track of the next instruction to be executed is called a ......
1) Data Register 2) Instruction Register
3) Action Register 4) Program Counter 5) Accumulator
13. The microprocessor of a computer....
1) does not understand machine language
2) understands machine language and high level languages
3) understands only machine language
4) understands only high level language
5) understands only assembly language
14. A set of choices on the screen is called a(n) .........
1) menu 2) reserve video 3) action plan 4) editor 5) template
15. What is the full form of PROM?
1) Programmable Read Only Memory
2) Progressive Read-Only Memory
3) Periodic Read-Only Memory
4) Perfect Read-Only Memory
5) Program Read-Only Memory
16. Which of the following will be used if a sender of e-mail wants to bold, italic etc. the text message?
1) Rich Signature 2) Rich Text
3) Rich Format 4) Plain Format 5) Plain Text
17. Which of the following terms is not related to Internet?
1) Link 2) Function Key 3) Browser 4) Search Engine 5) Hyperlink
18. Which of the following justification align the text on both the side - left and right - of margin?
1) Right 2) Justify 3) Both sides 4) Balanced 5) None of these
19. What is the full form of LSI?
1) Low-Scale Internet
2) Large-Scale Internet
3) Low-Scale Integration
4) Large-Scale Integration
5) Local Scale Integration
20. To move the text from its original position to another position without deleting, it is called .....
1) Scrolling 2) Searching 3) Moving 4) Copying 5) Halting
Answers: 1-1; 2-5; 3-2; 4-4; 5-5; 6-4; 7-3; 8-5; 9-4; 10-3; 11-2; 12-4; 13-3; 14-1; 15-1; 16-2; 17-2; 18-2; 19-4; 20-4.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

12 August 2024
IBPS Clerks and POs - Computer Knowledge Questions
1. The MS-DOS file extension usually attached to a file containing backup data is ...........
1) DOCX 2) BAK 3) BAC 4) DOC 5) MSD
2. The amount of data that can flow through a channel is called ...........
1) Bandlength 2) Capacity 3) Bandwidth 4) Digital Speed 5) None
3. ........ is made of static RAM
1) Cache memory 2) Buffer space
3) Clipboard 4) Virtual memory 5) None
4. COBOL, a high level programming language developed for ...........
1) Teaching children in schools
2) Designing plan for buildings
3) Maintaining the data of a firm
4) Business data processing applications
5) None
5. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ...........
1) Copy and paste
2) Copy, cut and paste
3) Cut, copy and paste
4) Cut and paste 5) None of these
6. The software tools that enable a user to interact with a computer for specific purposes are known as ...........
1) Hardware 2) Network Software
3) Shareware 4) Applications 5) None of these
7. A(n) ......... backup contains a copy of every program, data, and system file on a computer
1) Restoration 2) Bootstrap
3) Differential 4) Full 5) None of these
8. Where is data saved permanently?
1) Memory 2) Storage device 3) CPU 4) Printer 5) None of these
9. Which is not a basic function of a computer?
1) Copy text 2) Accept input
3) Process data 4) Store data 5) None of these
10. A MODEM is connected in between a telephone line and a ...........
1) Network 2) Computer
3) Communication Adapter 4) Serial Port 5) All of these
11. The ........... is the box that houses the most important parts of a computer system.
1) Software 2) Hardware
3) Input device 4) System unit 5) None of these
12. The first computer introduced in Nepal was
1) IBM 1400 2) IBM 1401 3) IBM 1402 4) IBM 1403 5) None of these
13. Data that is copied from an application is stored in the ...........
1) Driver 2) Terminal 3) Prompt 4) Clipboard 5) None of these
14. In a spreadsheet program the ....... contains related work sheets and documents.
1) Workbook 2) Column 3) Cell
4) Formula 5) None of these
15. What is the permanent memory built into your computer called?
1) RAM 2) ROM 3) CPU 4) CD-ROM 5) None of these
16. Another word for software is....
1) input 2) output 3) program 4) system 5) None of these
17. An input device that can interpret pencil marks on paper media is called as ...........
1) Pencil Mark Reader 2) Scanner
3) Optical Character Reader
4) Overlapped Pencil Marker
5) Optical Mark Reader
18. A register in CPU that is used to store the address of the next instruction to be executed is ...........
1) Program runner
2) Next program data counter
3) Program counter
4) Processing desk 5) Cache memory
19. An electronic circuit with about 10,000 transistors fabricated in a single silicon chip is...
1) Valves 2) Mega Transistor 3) VLSI 4) SMEP 5) IC
20. Which of the following is not a set of instructions?
1) Program 2) Program File 3) Software 4) Data File 5) None
21. CP/M stands for .....
1) Command Program /Management
2) Control Program / Micro Computer
3) Control Program / Mini Computer
4) Control Program / Super Computer
5) None of these
22. Find the odd man out.
1) Internet 2) Intranet 3) RING 4) MID 5) None
23. What does 'S' stand for in ISP?
1) Service 2) Sources 3) Select 4) Server 5) Sketch
Answers:
1-2; 2-3; 3-1; 4-4; 5-4; 6-4; 7-4; 8-2; 9-5; 10-2; 11-4; 12-2; 13-4; 14-1; 15-2; 16-3; 17-5; 18-3; 19-3; 20-4; 21-2; 22-4; 23-1.
1) DOCX 2) BAK 3) BAC 4) DOC 5) MSD
2. The amount of data that can flow through a channel is called ...........
1) Bandlength 2) Capacity 3) Bandwidth 4) Digital Speed 5) None
3. ........ is made of static RAM
1) Cache memory 2) Buffer space
3) Clipboard 4) Virtual memory 5) None
4. COBOL, a high level programming language developed for ...........
1) Teaching children in schools
2) Designing plan for buildings
3) Maintaining the data of a firm
4) Business data processing applications
5) None
5. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ...........
1) Copy and paste
2) Copy, cut and paste
3) Cut, copy and paste
4) Cut and paste 5) None of these
6. The software tools that enable a user to interact with a computer for specific purposes are known as ...........
1) Hardware 2) Network Software
3) Shareware 4) Applications 5) None of these
7. A(n) ......... backup contains a copy of every program, data, and system file on a computer
1) Restoration 2) Bootstrap
3) Differential 4) Full 5) None of these
8. Where is data saved permanently?
1) Memory 2) Storage device 3) CPU 4) Printer 5) None of these
9. Which is not a basic function of a computer?
1) Copy text 2) Accept input
3) Process data 4) Store data 5) None of these
10. A MODEM is connected in between a telephone line and a ...........
1) Network 2) Computer
3) Communication Adapter 4) Serial Port 5) All of these
11. The ........... is the box that houses the most important parts of a computer system.
1) Software 2) Hardware
3) Input device 4) System unit 5) None of these
12. The first computer introduced in Nepal was
1) IBM 1400 2) IBM 1401 3) IBM 1402 4) IBM 1403 5) None of these
13. Data that is copied from an application is stored in the ...........
1) Driver 2) Terminal 3) Prompt 4) Clipboard 5) None of these
14. In a spreadsheet program the ....... contains related work sheets and documents.
1) Workbook 2) Column 3) Cell
4) Formula 5) None of these
15. What is the permanent memory built into your computer called?
1) RAM 2) ROM 3) CPU 4) CD-ROM 5) None of these
16. Another word for software is....
1) input 2) output 3) program 4) system 5) None of these
17. An input device that can interpret pencil marks on paper media is called as ...........
1) Pencil Mark Reader 2) Scanner
3) Optical Character Reader
4) Overlapped Pencil Marker
5) Optical Mark Reader
18. A register in CPU that is used to store the address of the next instruction to be executed is ...........
1) Program runner
2) Next program data counter
3) Program counter
4) Processing desk 5) Cache memory
19. An electronic circuit with about 10,000 transistors fabricated in a single silicon chip is...
1) Valves 2) Mega Transistor 3) VLSI 4) SMEP 5) IC
20. Which of the following is not a set of instructions?
1) Program 2) Program File 3) Software 4) Data File 5) None
21. CP/M stands for .....
1) Command Program /Management
2) Control Program / Micro Computer
3) Control Program / Mini Computer
4) Control Program / Super Computer
5) None of these
22. Find the odd man out.
1) Internet 2) Intranet 3) RING 4) MID 5) None
23. What does 'S' stand for in ISP?
1) Service 2) Sources 3) Select 4) Server 5) Sketch
Answers:
1-2; 2-3; 3-1; 4-4; 5-4; 6-4; 7-4; 8-2; 9-5; 10-2; 11-4; 12-2; 13-4; 14-1; 15-2; 16-3; 17-5; 18-3; 19-3; 20-4; 21-2; 22-4; 23-1.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

IBPS Clerks and POs Material - Computer Acronyms
GUI: Graphical User Interface, a design that uses Icons / graphics representations.
GIGO: Garbage in Garbage Out - When the instructions are faulty and not clear, the results produced by the computer will also be faulty and not clear. This phenomenon of wrong output of data due to wrong input of instructions / data is termed as GIGO.
IANA: Internet Assigned Numbers Authority, of IAB (Internet Architecture Board) that
overlook the allocation of IP address, port address and other numerical standards.
IEEE: Institute of Electronic and Electrical Engineers.
HTML: Hyper Text Mark-up Language, for documents on the WWW.
ISP: Internet Service Provider - A company that provides individuals or companies access to the Internet and the World Wide Web. ex: BSNL,VSNL, etc.
ISCII: Indian Standard Code for Information Interchange. An 8-bit common by the bureau of Indian standards to represent character of all Indian language.
JPEG: Joint Photographic Experts Group, a bit mapped file format that compresses image size.
LAN: Local Area Network, an interconnection of many computers located within 10 km radius via a fast communication link.
LED: Light Emitting Diode, a electronic device made from semiconductor materials.
GIGO: Garbage in Garbage Out - When the instructions are faulty and not clear, the results produced by the computer will also be faulty and not clear. This phenomenon of wrong output of data due to wrong input of instructions / data is termed as GIGO.
IANA: Internet Assigned Numbers Authority, of IAB (Internet Architecture Board) that
overlook the allocation of IP address, port address and other numerical standards.
IEEE: Institute of Electronic and Electrical Engineers.
HTML: Hyper Text Mark-up Language, for documents on the WWW.
ISP: Internet Service Provider - A company that provides individuals or companies access to the Internet and the World Wide Web. ex: BSNL,VSNL, etc.
ISCII: Indian Standard Code for Information Interchange. An 8-bit common by the bureau of Indian standards to represent character of all Indian language.
JPEG: Joint Photographic Experts Group, a bit mapped file format that compresses image size.
LAN: Local Area Network, an interconnection of many computers located within 10 km radius via a fast communication link.
LED: Light Emitting Diode, a electronic device made from semiconductor materials.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

Labels:
IBPS - Computer Knowledge
IBPS Clerks and POs - Computer Knowledge Study Material
Printers are the devices through which the computer can provide the results to the user. Printers, Monitor etc. are output devices.
Printer: This peripheral device produces hard copies of electronic documents. It is
attached to a computer by means of a peripheral cable or a USB cable. Printer is sometimes combined with a scanner that serves as a photocopier.
Printers can be categorized in any of several ways. The most common distinction is impact vs. non-impact. Impact printers physically strike the paper and are exemplified by pin, in which the print medium is physically struck.
Impact printers are divided into:
Line Printers
Drum Printers
Chain Printers
Character or Serial Printer
Dot Matrix Printer
Letter Quality Printers
ex: Daisy Wheel (or) Thimble Printers.
Non-impact printers: These printers include every other type of print mechanism, in which there is no physical contact between the printing head and the printing surface.
Non-impact printers fall into three main categories:
Laser printers
Ink-jet printers
Thermal printers
ex: fax machine, portable calculators & credit card machines.
Printer: This peripheral device produces hard copies of electronic documents. It is
attached to a computer by means of a peripheral cable or a USB cable. Printer is sometimes combined with a scanner that serves as a photocopier.
Printers can be categorized in any of several ways. The most common distinction is impact vs. non-impact. Impact printers physically strike the paper and are exemplified by pin, in which the print medium is physically struck.
Impact printers are divided into:
Line Printers
Drum Printers
Chain Printers
Character or Serial Printer
Dot Matrix Printer
Letter Quality Printers
ex: Daisy Wheel (or) Thimble Printers.
Non-impact printers: These printers include every other type of print mechanism, in which there is no physical contact between the printing head and the printing surface.
Non-impact printers fall into three main categories:
Laser printers
Ink-jet printers
Thermal printers
ex: fax machine, portable calculators & credit card machines.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

Labels:
IBPS - Computer Knowledge
30 July 2024
IBPS - RRB Assistants - Computer Knowledge Previous Questions Based on Memory
121. Computers process data into information by working exclusively with ---
1) Multimedia 2) Words 3) Characters 4) Numbers 5) None of these
122. Which of the following memory chip is programmed during the manufacturing process?
1) RAM 2) ROM 3) PROM 4) EEPROM 5) None of these
123. A byte is a collection of --
1) Four Bits 2) Six Bits 3) Eight Bits 4) Ten Bits 5) Twelve Bits
124. CD-ROM is an example of ---
1) Input device 2) Output device 3) Both Input & Output 4) Pointing Device 5) None of these
125. Volatility is a property of ---
1) Computer networks 2) ROM 3) Disk 4) Software 5) RAM
126. Java is an example of a(n)
1) Machine language 2) Assembly language
3) High-level language 4) Fourth generation language
5) None of these
127. Which of the following is not one of the four major data processing functions of a computer?
1) Gathering data
2) Processing data into information
3) Analysing the data or information
4) Storing the data or information
5) None of these
128. The hardware device commonly referred to as the "brain" of the computer is the ---
1) RAM Chip 2) Data input 3) CPU 4) Secondary storage 5) None of these
129. When the computer is working on given instructions, it is called --
1) Output 2) Storage 3) Processing 4) Input 5) None of these
130. An input device that is used widely in supermarkets is
1) Keyboard 2) Mouse 3) Trackball 4) Bar Code reader 5) None of these
131. Producing output involves
1) Accepting information from the outside world
2) Communication with another computer
3) Moving and storing information
4) Communicating information to the outside world.
5) None of these
132. Compiler is the
1) Name given to the computer operator
2) Part of the digital machine to store the information
3) Operator of Boolean Algebra
4) Part of the arithmetic logic unit
5) Translator of source programme of object code
133. A computer programme is ---
1) A set of instructions that enable the computer to solve problem of perform a task
2) Main memory 3) Pscudocode 4) A flow chart 5) None of these
134. ---- terminals (formerly known as cash registers) are often connected to complex investor and sales computer systems.
1) Data 2) Point-of-sale (POS) 3) Sales 4) Query 5) None of these
135. --- is a cross between human language and a programming language
1) Pseudocode 2) Java 3) The Java Virtual Machine 4) The Compiler 5) None of these
136. Viruses, Trojan horses and Worms are --
1) Able to harm computer system
2) Unable to detect if present on computer
3) User-friendly applications
4) Harmless applications resident on computer
5) None of these
137. Computers gather data, which means that they allow users to -- data.
1) Present 2) Input 3) Output 4) Display 5) None of these
138. The components that process data are located in the --
1) Input devices 2) Output devices 3) System unit 4) Storage component 5) None of these
139. Software refers to --
1) The Physical components that a computer is made
2) Firm ware 3) Programmes 4) People Ware 5) None of these
140. The shortcut key to print documents is --
1) Ctrl +D 2) Ctrl +A 3) Ctrl +B 4) Ctrl +C 5) Ctrl +P
141. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of --
1) Eight bytes 2) Eight Kilobytes 3) Eight characters 4) Eight bits 5) None of these
142. Graphical picture's that represent an objecting like file, folder etc, are
1) Task bar 2) Windows 3) Desktop 4) Icons 5) None of these
143. Because of their size and cost, these computers are relatively rare ---
1) Mini Computers 2) Mainframe computers
3) Micro Computers 4) Laptops 5) Super Computers
144. RAM is an acronym for --
1) Read All Memory 2) Read Any Memory
3) Ready Access Memory 4) Random Area Memory 5) Random Access Memory
145. This type of software works with end users, application software, and computer hardware to handle the majority of technical details
1) Communication software 2) Application software
3) Utility software 4) System software 5) None of these
146. Special-purpose applications include all of the following except --
1) Web authoring programme
2) Database management systems
3) Multimedia creation programmes
4) Virtual reality programmes 5) None of these
147. An object typically hides its data, but allows outside code to access ---
1) The methods that operate on the data 2) The data files
3) Private data members 4) The pseudocode 5) None of these
148. A rectangular area on a computer screen that can contain a document, programme, or messages is referred to as a (n) ---
1) Cell 2) Window 3) Tuplet 4) Field 5) None of these
149. Specialised programs designed to allow particular input or output devices to communicate with the rest of the computer system are called ---
1) Compilers 2) Device drivers 3) Interpreters 4) Operating systems 5) None of these
150. This type of computer is the least powerful, yet the most widely used and fastest-growing type of computer
1) Mainframe Computers 2) Super Computers 3) Mini Computers
4) Micro Computers 5) None of these
151. Programs designed to perform specific tasks related to managing computer resources are called --
1) System Software 2) Operating system
3) Application software 4) Utility programs 5) None of these
152. Of the following types of computers, which is the most powerful?
1) Mini Computer 2) Mainframe Computer 3) Super Computer
4) Micro Computer 5) None of these
153. The Internet service that provides a multimedia interface to available resources is called --
1) FTP 2) World Wide Web 3) Telnet 4) Gopher 5) None of these
154. Word processing software is used to create
1) Databases 2) Documents 3) Spreadsheets 4) Electronic slides 5) None of these
155. A device that connects to a network without the use of cables is said to be ---
1) Distributed 2) Cabled 3) Centralised 4) Open Source 5) None of these
156. Menus are a part of the
1) Hardware 2) User interface 3) Status Bar 4) Monitor 5) None of these
157. A program that is used to view Web sites is called a
1) Word processor 2) Web viewer 3) Spreadsheet 4) Search engine 5) Browser
158. Which of the following is not an example of a document file?
1) Spreadsheet 2) Memo 3) Letter 4) Term Paper 5) Thesis
159. Toolbars contain small out-lined areas called --- that provide shortcuts for quick access to commonly used commands.
1) Buttons 2) Dials 3) Bullets 4) Pointers 5) None of these
160. A business's customer, inventory, and payroll records would best be stored in a -- file
1) Database 2) Document 3) Worksheet 4) presentation 5) None of these
Answers:
121-4; 122-2; 123-3; 124-1; 125-5; 126-3; 127-5; 128-3; 129-3; 130-4; 131-4; 132-5; 133-1; 134-2; 135-1; 136-1; 137-2; 138-3; 139-3; 140-5; 141-4; 142-4; 143-5; 144-5; 145-3; 146-4; 147-3; 148-1; 149-4; 150-3; 151-2; 152-2; 153-2; 154-2; 155-5; 156-3; 157-5; 158-1; 159-1; 160-1.
1) Multimedia 2) Words 3) Characters 4) Numbers 5) None of these
122. Which of the following memory chip is programmed during the manufacturing process?
1) RAM 2) ROM 3) PROM 4) EEPROM 5) None of these
123. A byte is a collection of --
1) Four Bits 2) Six Bits 3) Eight Bits 4) Ten Bits 5) Twelve Bits
124. CD-ROM is an example of ---
1) Input device 2) Output device 3) Both Input & Output 4) Pointing Device 5) None of these
125. Volatility is a property of ---
1) Computer networks 2) ROM 3) Disk 4) Software 5) RAM
126. Java is an example of a(n)
1) Machine language 2) Assembly language
3) High-level language 4) Fourth generation language
5) None of these
127. Which of the following is not one of the four major data processing functions of a computer?
1) Gathering data
2) Processing data into information
3) Analysing the data or information
4) Storing the data or information
5) None of these
128. The hardware device commonly referred to as the "brain" of the computer is the ---
1) RAM Chip 2) Data input 3) CPU 4) Secondary storage 5) None of these
129. When the computer is working on given instructions, it is called --
1) Output 2) Storage 3) Processing 4) Input 5) None of these
130. An input device that is used widely in supermarkets is
1) Keyboard 2) Mouse 3) Trackball 4) Bar Code reader 5) None of these
131. Producing output involves
1) Accepting information from the outside world
2) Communication with another computer
3) Moving and storing information
4) Communicating information to the outside world.
5) None of these
132. Compiler is the
1) Name given to the computer operator
2) Part of the digital machine to store the information
3) Operator of Boolean Algebra
4) Part of the arithmetic logic unit
5) Translator of source programme of object code
133. A computer programme is ---
1) A set of instructions that enable the computer to solve problem of perform a task
2) Main memory 3) Pscudocode 4) A flow chart 5) None of these
134. ---- terminals (formerly known as cash registers) are often connected to complex investor and sales computer systems.
1) Data 2) Point-of-sale (POS) 3) Sales 4) Query 5) None of these
135. --- is a cross between human language and a programming language
1) Pseudocode 2) Java 3) The Java Virtual Machine 4) The Compiler 5) None of these
136. Viruses, Trojan horses and Worms are --
1) Able to harm computer system
2) Unable to detect if present on computer
3) User-friendly applications
4) Harmless applications resident on computer
5) None of these
137. Computers gather data, which means that they allow users to -- data.
1) Present 2) Input 3) Output 4) Display 5) None of these
138. The components that process data are located in the --
1) Input devices 2) Output devices 3) System unit 4) Storage component 5) None of these
139. Software refers to --
1) The Physical components that a computer is made
2) Firm ware 3) Programmes 4) People Ware 5) None of these
140. The shortcut key to print documents is --
1) Ctrl +D 2) Ctrl +A 3) Ctrl +B 4) Ctrl +C 5) Ctrl +P
141. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of --
1) Eight bytes 2) Eight Kilobytes 3) Eight characters 4) Eight bits 5) None of these
142. Graphical picture's that represent an objecting like file, folder etc, are
1) Task bar 2) Windows 3) Desktop 4) Icons 5) None of these
143. Because of their size and cost, these computers are relatively rare ---
1) Mini Computers 2) Mainframe computers
3) Micro Computers 4) Laptops 5) Super Computers
144. RAM is an acronym for --
1) Read All Memory 2) Read Any Memory
3) Ready Access Memory 4) Random Area Memory 5) Random Access Memory
145. This type of software works with end users, application software, and computer hardware to handle the majority of technical details
1) Communication software 2) Application software
3) Utility software 4) System software 5) None of these
146. Special-purpose applications include all of the following except --
1) Web authoring programme
2) Database management systems
3) Multimedia creation programmes
4) Virtual reality programmes 5) None of these
147. An object typically hides its data, but allows outside code to access ---
1) The methods that operate on the data 2) The data files
3) Private data members 4) The pseudocode 5) None of these
148. A rectangular area on a computer screen that can contain a document, programme, or messages is referred to as a (n) ---
1) Cell 2) Window 3) Tuplet 4) Field 5) None of these
149. Specialised programs designed to allow particular input or output devices to communicate with the rest of the computer system are called ---
1) Compilers 2) Device drivers 3) Interpreters 4) Operating systems 5) None of these
150. This type of computer is the least powerful, yet the most widely used and fastest-growing type of computer
1) Mainframe Computers 2) Super Computers 3) Mini Computers
4) Micro Computers 5) None of these
151. Programs designed to perform specific tasks related to managing computer resources are called --
1) System Software 2) Operating system
3) Application software 4) Utility programs 5) None of these
152. Of the following types of computers, which is the most powerful?
1) Mini Computer 2) Mainframe Computer 3) Super Computer
4) Micro Computer 5) None of these
153. The Internet service that provides a multimedia interface to available resources is called --
1) FTP 2) World Wide Web 3) Telnet 4) Gopher 5) None of these
154. Word processing software is used to create
1) Databases 2) Documents 3) Spreadsheets 4) Electronic slides 5) None of these
155. A device that connects to a network without the use of cables is said to be ---
1) Distributed 2) Cabled 3) Centralised 4) Open Source 5) None of these
156. Menus are a part of the
1) Hardware 2) User interface 3) Status Bar 4) Monitor 5) None of these
157. A program that is used to view Web sites is called a
1) Word processor 2) Web viewer 3) Spreadsheet 4) Search engine 5) Browser
158. Which of the following is not an example of a document file?
1) Spreadsheet 2) Memo 3) Letter 4) Term Paper 5) Thesis
159. Toolbars contain small out-lined areas called --- that provide shortcuts for quick access to commonly used commands.
1) Buttons 2) Dials 3) Bullets 4) Pointers 5) None of these
160. A business's customer, inventory, and payroll records would best be stored in a -- file
1) Database 2) Document 3) Worksheet 4) presentation 5) None of these
Answers:
121-4; 122-2; 123-3; 124-1; 125-5; 126-3; 127-5; 128-3; 129-3; 130-4; 131-4; 132-5; 133-1; 134-2; 135-1; 136-1; 137-2; 138-3; 139-3; 140-5; 141-4; 142-4; 143-5; 144-5; 145-3; 146-4; 147-3; 148-1; 149-4; 150-3; 151-2; 152-2; 153-2; 154-2; 155-5; 156-3; 157-5; 158-1; 159-1; 160-1.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

29 July 2024
Marketing and Computer Knowledge for IBPS Exams
1. The discount made on the list price for services made available by the intermediary is ...
1) Trade Discount 2) Price Discount
3) Cost discount 4) Company discount 5) None of these
2. Marketing activity that concerns the handling and the movement of goods is
1) Planning 2) Implementation
3) Physical Distribution 4) Analysing 5) Control
3. Public relations can be carried out through
1) Media relations 2) Newsletters
3) Special events 4) Sponsorships 5) All the above
4. What are marketing channels?
1) Communication Channels
2) Distribution Channels 3) Service channels
4) All the above 5) None of these
5. Marketing depending on hardcore selling is ..
1) Risky 2) Profitable 3) Worthy
4) All the above 5) None of these
6. Marketing objectives of the bank are
1) Deposits mobilization
2) Customer services to their satisfaction
3) Increasing customer base
4) Positioning bank brand in customers
5) All the above
7. ......... is an area of buyer need and interest that a bank has a high probability of profitably satisfying.
1) Internal environment
2) Marketing opportunity
3) Marking analysis
4) All the above 5) None of these
8. Marketing formula STP stands for
1) Segmentation, Targeting, Positioning
2) Segmentation, Targeting, Pricing
3) Satisfaction, Threats, Product
4) Satisfaction, Treating, Presenting
5) None of these
9. A potential loan customer of a bank should possess..
1) Character 2) Capacity
3) Capital and collateral
4) Credit worthiness 5) All the above
10. Who all can be channel intermediaries of banks, under financial inclusion?
1) NGOs/ SHGs
2) Micro-Finance intuitions (MFIs)
3) Civil Society Organisations (CSOs)
4) Post offices 5) All the above
11. Which of the following statement is false?
1) Banks are allowed to sell gold through its branch network
2) Banks are allowed to mortgage gold jewels form customer only
3) Banks are allowed to sell and purchase gold jewels from customers
4) Banks are allowed to make their own denomination of gold coins for selling
5) All the above
12. What menu is selected to print?
1) Edit 2) Special 3) File
4) Tools 5) None of these
13. The name a user assigns to a document is called a(n)..............
1) filename 2) program 3) record 4) data 5) None of these
14. A.............. is an electronic device that process data converting it into information.
1) processor 2) computer 3) case
4) stylus 5) None of these
15. ..............are words that a programming language has set aside for its own use.
1) Control words 2) Reserved words 3) Reserved keys
4) Controls structures 5) None of these
16. What are the two types of output devices?
1) Monitor and printer
2) Storage-disks (floppy, CD)
3) Keyboard and mouse
4) Windows 2000, Windows NT 5) None
17. Bank and its employee effectively transforming the service into customer satisfaction. This service is categorised as ....
1) Service quantity 2) Service productivity
3) Service affected 4) Service improved
5) None of these
18. A(n)..............is a program that makes the computer easier to use.
1) operating stystem 2) application
3) utility 4) network 5) None
19. Connections to the Internet using a phone line and a modem are called ... connections.
1) digital 2) dial-up 3) broadband
4) dish 5) None of these
20. To access a mainframe or supercomputer, users often use a..............
1) terminal 2) node 3) desktop
4) handheld 5) None of these
21. A flaw in a program that causes it to produce incorrect or inappropriate results is called a...
1) bug 2) byte 3) attribute 4) unit problem 5) None of these
22. A web site address is a unique name that identifies a specific .............. on the web.
1) Web browser 2) PDA 3) Web site 4) Link 5) None of these
23. Every component of your computer is either..
1) hardware or software
2) software or CPU/ RAM
3) application software or system software
4) input devices or output devices
5) None of these
24. To make the number pad act as directional arrows, you press the ..............key.
1) numlock 2) caps lock 3) arrow lock 4) shift 5) None of these
25. When creating a word-processed document, this step involves the user changing how words on the page appear, both on the screen and in printed form.
1) Editing text
2) Inserting tables and indexes
3) Formating text 4) Proofing document
5) None of these
26. The .............. performs simple mathematics for the CPU.
1) ALU 2) DIMM 3) BUS 4) Register 5) None of these
27. Reusable optical storage will typically have the acronym..............
1) CD 2) RW 3) DVD 4) ROM 5) None of these
28. .............. is processed by the computer into information.
1) numbers 2) processor 3) input 4) data 5) None of these
29. Personal computers can be connected together to form a..............
1) server 2) supercomputer
3) enterprise 4) network 5) None of these
30. A word in a web page that, when clicked opens another document is called..............
1) anchor 2) hyperlink 3) reference 4) URL 5) None of these
31. The..............of software contains lists of commands and options.
1) title bar 2) menu bar 3) formula bar 4) tool bar 5) None of these
Answers:
1-1; 2-3; 3-5; 4-4; 5-1; 6-5; 7-2; 8-1; 9-5; 10-5; 11-3; 12-3; 13-1; 14-1; 15-3; 16-1; 17-2; 18-1; 19-2; 20-3; 21-1; 22-4; 23-1; 24-1; 25-3; 26-1; 27-2; 28-3; 29-4; 30-2; 31-2.
1) Trade Discount 2) Price Discount
3) Cost discount 4) Company discount 5) None of these
2. Marketing activity that concerns the handling and the movement of goods is
1) Planning 2) Implementation
3) Physical Distribution 4) Analysing 5) Control
3. Public relations can be carried out through
1) Media relations 2) Newsletters
3) Special events 4) Sponsorships 5) All the above
4. What are marketing channels?
1) Communication Channels
2) Distribution Channels 3) Service channels
4) All the above 5) None of these
5. Marketing depending on hardcore selling is ..
1) Risky 2) Profitable 3) Worthy
4) All the above 5) None of these
6. Marketing objectives of the bank are
1) Deposits mobilization
2) Customer services to their satisfaction
3) Increasing customer base
4) Positioning bank brand in customers
5) All the above
7. ......... is an area of buyer need and interest that a bank has a high probability of profitably satisfying.
1) Internal environment
2) Marketing opportunity
3) Marking analysis
4) All the above 5) None of these
8. Marketing formula STP stands for
1) Segmentation, Targeting, Positioning
2) Segmentation, Targeting, Pricing
3) Satisfaction, Threats, Product
4) Satisfaction, Treating, Presenting
5) None of these
9. A potential loan customer of a bank should possess..
1) Character 2) Capacity
3) Capital and collateral
4) Credit worthiness 5) All the above
10. Who all can be channel intermediaries of banks, under financial inclusion?
1) NGOs/ SHGs
2) Micro-Finance intuitions (MFIs)
3) Civil Society Organisations (CSOs)
4) Post offices 5) All the above
11. Which of the following statement is false?
1) Banks are allowed to sell gold through its branch network
2) Banks are allowed to mortgage gold jewels form customer only
3) Banks are allowed to sell and purchase gold jewels from customers
4) Banks are allowed to make their own denomination of gold coins for selling
5) All the above
12. What menu is selected to print?
1) Edit 2) Special 3) File
4) Tools 5) None of these
13. The name a user assigns to a document is called a(n)..............
1) filename 2) program 3) record 4) data 5) None of these
14. A.............. is an electronic device that process data converting it into information.
1) processor 2) computer 3) case
4) stylus 5) None of these
15. ..............are words that a programming language has set aside for its own use.
1) Control words 2) Reserved words 3) Reserved keys
4) Controls structures 5) None of these
16. What are the two types of output devices?
1) Monitor and printer
2) Storage-disks (floppy, CD)
3) Keyboard and mouse
4) Windows 2000, Windows NT 5) None
17. Bank and its employee effectively transforming the service into customer satisfaction. This service is categorised as ....
1) Service quantity 2) Service productivity
3) Service affected 4) Service improved
5) None of these
18. A(n)..............is a program that makes the computer easier to use.
1) operating stystem 2) application
3) utility 4) network 5) None
19. Connections to the Internet using a phone line and a modem are called ... connections.
1) digital 2) dial-up 3) broadband
4) dish 5) None of these
20. To access a mainframe or supercomputer, users often use a..............
1) terminal 2) node 3) desktop
4) handheld 5) None of these
21. A flaw in a program that causes it to produce incorrect or inappropriate results is called a...
1) bug 2) byte 3) attribute 4) unit problem 5) None of these
22. A web site address is a unique name that identifies a specific .............. on the web.
1) Web browser 2) PDA 3) Web site 4) Link 5) None of these
23. Every component of your computer is either..
1) hardware or software
2) software or CPU/ RAM
3) application software or system software
4) input devices or output devices
5) None of these
24. To make the number pad act as directional arrows, you press the ..............key.
1) numlock 2) caps lock 3) arrow lock 4) shift 5) None of these
25. When creating a word-processed document, this step involves the user changing how words on the page appear, both on the screen and in printed form.
1) Editing text
2) Inserting tables and indexes
3) Formating text 4) Proofing document
5) None of these
26. The .............. performs simple mathematics for the CPU.
1) ALU 2) DIMM 3) BUS 4) Register 5) None of these
27. Reusable optical storage will typically have the acronym..............
1) CD 2) RW 3) DVD 4) ROM 5) None of these
28. .............. is processed by the computer into information.
1) numbers 2) processor 3) input 4) data 5) None of these
29. Personal computers can be connected together to form a..............
1) server 2) supercomputer
3) enterprise 4) network 5) None of these
30. A word in a web page that, when clicked opens another document is called..............
1) anchor 2) hyperlink 3) reference 4) URL 5) None of these
31. The..............of software contains lists of commands and options.
1) title bar 2) menu bar 3) formula bar 4) tool bar 5) None of these
Answers:
1-1; 2-3; 3-5; 4-4; 5-1; 6-5; 7-2; 8-1; 9-5; 10-5; 11-3; 12-3; 13-1; 14-1; 15-3; 16-1; 17-2; 18-1; 19-2; 20-3; 21-1; 22-4; 23-1; 24-1; 25-3; 26-1; 27-2; 28-3; 29-4; 30-2; 31-2.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

26 July 2024
Computer Knowledge for Bank Clerks Recruitment Exams
1. To access properties of an object, the mouse technique to use is .........
1) right-clicking 2) shift-clicking 3) dragging 4) dropping 5) None of these
2. What is the term for unsolicited e-mail?
1) news group 2) use net
3) backbone 4) flaming 5) spam
3. A device operating at the physical layer is called a......
1) Bridge 2) Router
3) Repeater 4) All of the above 5) None of these
4. A ..... can make it easier to play games.
1) mouse 2) joystick 3) keyboard
4) pen 5) None of these
5. The blinking symbol on the computer screen is called the .....
1) mouse 2) logo 3) hand 4) palm 5) cursor
6. To make the number pad act as directional arrows, you press the ........ key.
1) shift 2) arrow lock
3) num lock 4) caps lock 5) None of these
7. Something which has easily-understood instructions is said to be ........
1) user friendly 2) information
3) word processing 4) icon 5) None of these
8. What is output?
1) what the processor takes from the user
2) what the user gives to the processor
3) what the processor gets from the user
4) what the processor gives to the user
5) None of these
9. The basic building block of a database that contains related record is .......
1) Query 2) Form 3) Table 4) Edited page 5) Report
10. Soft copy is the intangible output, so then what is hard copy?
1) the physical parts of the computer
2) the printed parts of the computer
3) the printed output
4) the physical output devices
5) None of these
Answers:
1-1; 2-2; 3-3; 4-2; 5-5; 6-3; 7-1; 8-4; 9-5; 10-3.
1) right-clicking 2) shift-clicking 3) dragging 4) dropping 5) None of these
2. What is the term for unsolicited e-mail?
1) news group 2) use net
3) backbone 4) flaming 5) spam
3. A device operating at the physical layer is called a......
1) Bridge 2) Router
3) Repeater 4) All of the above 5) None of these
4. A ..... can make it easier to play games.
1) mouse 2) joystick 3) keyboard
4) pen 5) None of these
5. The blinking symbol on the computer screen is called the .....
1) mouse 2) logo 3) hand 4) palm 5) cursor
6. To make the number pad act as directional arrows, you press the ........ key.
1) shift 2) arrow lock
3) num lock 4) caps lock 5) None of these
7. Something which has easily-understood instructions is said to be ........
1) user friendly 2) information
3) word processing 4) icon 5) None of these
8. What is output?
1) what the processor takes from the user
2) what the user gives to the processor
3) what the processor gets from the user
4) what the processor gives to the user
5) None of these
9. The basic building block of a database that contains related record is .......
1) Query 2) Form 3) Table 4) Edited page 5) Report
10. Soft copy is the intangible output, so then what is hard copy?
1) the physical parts of the computer
2) the printed parts of the computer
3) the printed output
4) the physical output devices
5) None of these
Answers:
1-1; 2-2; 3-3; 4-2; 5-5; 6-3; 7-1; 8-4; 9-5; 10-3.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

Computer Knowledge for IBPS and SBI Clerks Recruitment
1. What deletes the entire file except the file structure?
1) Erase 2) Delete 3) ZAP 4) PACK 5) None of these
2. What are the columns in a Microsoft access table called?
1) Rows 2) Records 3) Fields 4) Columns 5) None of these
3. In ...... there is no direct contact with the end users.
1) B2B 2) B2C 3) C2C 4) All of the above 5) None of these
4. In case of bus/ tree topology signal balancing issues is overcome by
1) Modulation 2) Polling 3) Segmentation
4) Strong transmitter 5) None of these
5. The Spacing between character pairs is called..
1) Kerning 2) X-Height 3) Intercap
4) Serif 5) None of these
6. BCC in the internet refers to
1) Black Carbon Copy
2) Blind Corbon Copy
3) Blank Corbon Copy
4) Beautiful Carbon Copy
5) None of these
7. Education combined with entertainment is called .....
1) Simulation 2) CAI
3) Edutainment 4) Synchronization
5) None of these
8. We can't delete the ..... icon but we can made it invisible.
1) Recycle Bin 2) My computer
3) Internet explorer 4) Messenger
5) None of these
9. Which of the following is not a computer language?
1) Java 2) COBOL 3) ASP
4) UDP 5) None of these
10. What is the full meaning of the terminology SMTP?
1) State Mail Transfer Protocol
2) Simple Mail Tailor Protocol
3) Simple Management Transfer Protocol
4) Simple Mail Transfer Protocol
5) None of these
Answers:
1-3; 2-3; 3-1; 4-3; 5-1; 6-2; 7-3; 8-1; 9-4; 10-4.
1) Erase 2) Delete 3) ZAP 4) PACK 5) None of these
2. What are the columns in a Microsoft access table called?
1) Rows 2) Records 3) Fields 4) Columns 5) None of these
3. In ...... there is no direct contact with the end users.
1) B2B 2) B2C 3) C2C 4) All of the above 5) None of these
4. In case of bus/ tree topology signal balancing issues is overcome by
1) Modulation 2) Polling 3) Segmentation
4) Strong transmitter 5) None of these
5. The Spacing between character pairs is called..
1) Kerning 2) X-Height 3) Intercap
4) Serif 5) None of these
6. BCC in the internet refers to
1) Black Carbon Copy
2) Blind Corbon Copy
3) Blank Corbon Copy
4) Beautiful Carbon Copy
5) None of these
7. Education combined with entertainment is called .....
1) Simulation 2) CAI
3) Edutainment 4) Synchronization
5) None of these
8. We can't delete the ..... icon but we can made it invisible.
1) Recycle Bin 2) My computer
3) Internet explorer 4) Messenger
5) None of these
9. Which of the following is not a computer language?
1) Java 2) COBOL 3) ASP
4) UDP 5) None of these
10. What is the full meaning of the terminology SMTP?
1) State Mail Transfer Protocol
2) Simple Mail Tailor Protocol
3) Simple Management Transfer Protocol
4) Simple Mail Transfer Protocol
5) None of these
Answers:
1-3; 2-3; 3-1; 4-3; 5-1; 6-2; 7-3; 8-1; 9-4; 10-4.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

17 December 2023
IBPS Computer Knowledge Model Paper with Answers
1. Memory, also called Random Access Memory, or RAM .......
1) contains the electronic circuit that cause processing to occur.
2) makes the information resulting from processing available for use
3) allows data, program, commands, and user responses to be entered into a computer
4) consist of electronic components that store data
5) None of these
2. Correcting errors in a program is referred to as ........
1) debugging 2) bugging 3) rectifying 4) modifying 5) None of these
3. An assembler is used to translate a program written in ........
1) a low level language 2) machine language
3) a high level language 4) assembly language 5) None of these
4. The capability of operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is ........
1) Multiprocessing 2) Multitasking
3) Multiprogramming 4) Multiexecution 5) None of these
5. The basic goal of computer process is to convert data into ........
1) information 2) table 3) files 4) graphs 5) None of these
6. A hard copy of documents is ........
1) stored in the hard disk
2) stored in the floppy 3) Stored on a CD
4) Printed on the printer 5) None of these
7. Find the odd man out?
1) plotter 2) printer 3) scanner 4) monitor 5) None of these
8. Which key combination is used for special tasks?
1) Insert, Delete 2) Ctrl, Shift
3) Left Arrow, Right Arrow
4) Page up, Page Down 5) None of these
9. Which is the part of a computer that one can touch and feel?
1) Programs 2) Software 3) Hardware 4) Output 5) None of these
10. A store that combines online and physical presence is called a(n) ........ store.
1) brick-and-mortar 2) click-and-mortar
3) combination 4) e-commerce 5) M commerce
11. The main processing unit of computer is known as ........
1) CD-run on memory
2) Central Processing Unit
3) Call powers Up
4) Create Program User 5) None of these
12. ...... move the cursor one space to the right or puts spaces in between words.
1) Control key 2) space bar 3) printer 4) mouse 5) None of these
13. Which key has to be used to type all letters capital without using the shift key for each character ........
1) shifter 2) upper case 3) caps lock key 4) icon 5) None of these
14. A device that reads the information contained on a disk and transfer it to the computer's memory ........
1) monitor 2) screen 3) keyboard 4) disk drive 5) None of these
15. Which of the following is not the major function of a computer?
1) Processing data into information
2) Storing data or information
3) Gathering data
4) Analysing data or information
5) None of these
16. A disk on which you store information ........
1) plate 2) data disk 3) paper disk 4) TV disk 5) None of these
17. ........ is used to print document on printer.
1) ribbon 2) monitor 3) go now 4) control + p 5) None of these
18. Easy to use means ........
1) user friendly 2) select 3) helpful 4) ever-ready 5) None of these
19. When your computer stops working suddenly it is referred to as a ........
1) crash 2) die 3) death 4) penalty 5) None of these
20. The smallest item of useful in information a computer can handle ........
1) bite 2) byte 3) bit 4) belt 5) None of these
21. Device that let the computer communicate with you ........
1) input 2) output 3) type 4) print 5) None
22. Device that allows you to put information into the computer ........
1) input 2) output 3) type 4) print 5) None of these
23. The different style of lettering in a word processing program ........
1) font 2) calligraphy 3) writing 4) manuscript 5) None of these
24. Any letter, number or symbol found on the keyboard that you can type into the computer ........
1) output 2) character 3) type 4) print 5) None of these
25. A symbol or question on the screen that prompts you to take an action and tell the
computer what to do next ........
1) scanner 2) questionnaire 3) prompt on dialog box
4) information seeker 5) None of these
26. Choices are referred to as ........
1) options 2) exit 3) boot 4) folder 5) None of these
27. The OSI model is divided into how many Processes called layers?
1) Five 2) Six 3) Seven 4) Eight 5) None of these
28. ........ lets you leave a screen or program
1) boot 2) programs 3) exit 4) text 5) None of these
29. A place that a user can create files ........
1) cursor 2) test 3) folder 4) boot 5) None of these
30. ........ start or restart the computer.
1) exit 2) kick 3) boot 4) kick-start 5) None of these
31. A blinking indicator that shows you where your next action will happen is ........
1) CPU 2) cursor 3) tool bar 4) boot 5) None of these
32. Commands at the top of a screen such; FILE-EDIT-FONT-TOOLS to operate and
change things within programs is ........
1) menu bar 2) tool bar 3) user friendly 4) word processor 5) None of these
33. CD-ROM stands for ........
1) Central processing unit
2) CD-remote open mouse
3) CD resizer or minimize
4) CD-read only memory
5) None of these
34. To change written work already done ........
1) find 2) edit 3) cut 4) close 5) None of these
35. A key that will erase information from the computer's memory and characters on the
screen ........
1) edit 2) delete key 3) dummy out 4) trust key 5) None of these
36. To insert copy of the clipboard contents, whatever was last cut or copied at the
insertion point ........
1) paste 2) stick in 3) fit in 4) push in 5) None of these
37. The command used to remove text or graphics from a document. (The information
is then stored on a clipboard so you can paste it)
1) chop 2) cut 3) clip 4) chart away 5) None of these
38. To encourage repeat customers, e-commerce sites recommend users create a(n)
........
1) profile 2) account 3) Survey 4) wish list 5) None of the above
39. A removable magnetic disk that holds information is .........
1) floppy disk 2) hard drive 3) monitor 4) portable 5) None of these
40. A command that saves what you are working on into the hard drive, or onto a disk?
1) view 2) hold 3) save 4) go 5) None of these
41. To move down a page in a document
1) jump 2) fly 3) wriggle 4) scroll 5) None of these
42. A command to get a file you worked already and it was stored in memory ........
1) close 2) delete 3) open 4) get it 5) None of these
43. The primary device that a computer uses to store information .......
1) TV 2) storehouse 3) desk 4) hard drive 5) None of these
44. Screen that comes on when you turn on your computer that shows all the icons
1) desktop 2) fact to face 3) viewer 4) view space 5) None of these
45. A program that works like a calculator for keeping track of money and making budgets ........
1) calculator 2) spreadsheet 3) budgeter 4) financier 5) None of these
46. The operating system is the most common type of ........ software
1) communications 2) applications 3) system 4) word- processing 5) None of these
47. A ........ is approximately one billion bytes
1) kilo byte 2) bit 3) megabyte
4) gigabyte 5) None of these
48. A scanner scans ........
1) pictures 2) text 3) both pictures and text
4) neither pictures nor text
5) None of these
49. Dumb terminals have terminals and ........
1) Mouse 2) Keyboard 3) Speakers
4) Mouse or speakers 5) None of these
50. The portion of the CPU that coordinates the activities of all the other computer components is the ........
1) mother board 2) coordination board
3) control unit 4) arithmetic logic unit
5) None of these
Key / Answers:
1-4
2-1
3-4
4-2
5-1
6-4
7-3
8-2
9-3
10-5
11-2
12-2
13-3
14-4
15-3
16-2
17-4
18-1
19-1
20-3
21-2
22-1
23-1
24-2
25-3
26-1
27-3
28-3
29-3
30-3
31-2
32-1
33-4
34-2
35-2
36-1
37-2
38-2
39-1
40-3
41-4
42-3
43-4
44-1
45-2
46-3
47-4
48-3
49-3
50-3.
1) contains the electronic circuit that cause processing to occur.
2) makes the information resulting from processing available for use
3) allows data, program, commands, and user responses to be entered into a computer
4) consist of electronic components that store data
5) None of these
2. Correcting errors in a program is referred to as ........
1) debugging 2) bugging 3) rectifying 4) modifying 5) None of these
3. An assembler is used to translate a program written in ........
1) a low level language 2) machine language
3) a high level language 4) assembly language 5) None of these
4. The capability of operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is ........
1) Multiprocessing 2) Multitasking
3) Multiprogramming 4) Multiexecution 5) None of these
5. The basic goal of computer process is to convert data into ........
1) information 2) table 3) files 4) graphs 5) None of these
6. A hard copy of documents is ........
1) stored in the hard disk
2) stored in the floppy 3) Stored on a CD
4) Printed on the printer 5) None of these
7. Find the odd man out?
1) plotter 2) printer 3) scanner 4) monitor 5) None of these
8. Which key combination is used for special tasks?
1) Insert, Delete 2) Ctrl, Shift
3) Left Arrow, Right Arrow
4) Page up, Page Down 5) None of these
9. Which is the part of a computer that one can touch and feel?
1) Programs 2) Software 3) Hardware 4) Output 5) None of these
10. A store that combines online and physical presence is called a(n) ........ store.
1) brick-and-mortar 2) click-and-mortar
3) combination 4) e-commerce 5) M commerce
11. The main processing unit of computer is known as ........
1) CD-run on memory
2) Central Processing Unit
3) Call powers Up
4) Create Program User 5) None of these
12. ...... move the cursor one space to the right or puts spaces in between words.
1) Control key 2) space bar 3) printer 4) mouse 5) None of these
13. Which key has to be used to type all letters capital without using the shift key for each character ........
1) shifter 2) upper case 3) caps lock key 4) icon 5) None of these
14. A device that reads the information contained on a disk and transfer it to the computer's memory ........
1) monitor 2) screen 3) keyboard 4) disk drive 5) None of these
15. Which of the following is not the major function of a computer?
1) Processing data into information
2) Storing data or information
3) Gathering data
4) Analysing data or information
5) None of these
16. A disk on which you store information ........
1) plate 2) data disk 3) paper disk 4) TV disk 5) None of these
17. ........ is used to print document on printer.
1) ribbon 2) monitor 3) go now 4) control + p 5) None of these
18. Easy to use means ........
1) user friendly 2) select 3) helpful 4) ever-ready 5) None of these
19. When your computer stops working suddenly it is referred to as a ........
1) crash 2) die 3) death 4) penalty 5) None of these
20. The smallest item of useful in information a computer can handle ........
1) bite 2) byte 3) bit 4) belt 5) None of these
21. Device that let the computer communicate with you ........
1) input 2) output 3) type 4) print 5) None
22. Device that allows you to put information into the computer ........
1) input 2) output 3) type 4) print 5) None of these
23. The different style of lettering in a word processing program ........
1) font 2) calligraphy 3) writing 4) manuscript 5) None of these
24. Any letter, number or symbol found on the keyboard that you can type into the computer ........
1) output 2) character 3) type 4) print 5) None of these
25. A symbol or question on the screen that prompts you to take an action and tell the
computer what to do next ........
1) scanner 2) questionnaire 3) prompt on dialog box
4) information seeker 5) None of these
26. Choices are referred to as ........
1) options 2) exit 3) boot 4) folder 5) None of these
27. The OSI model is divided into how many Processes called layers?
1) Five 2) Six 3) Seven 4) Eight 5) None of these
28. ........ lets you leave a screen or program
1) boot 2) programs 3) exit 4) text 5) None of these
29. A place that a user can create files ........
1) cursor 2) test 3) folder 4) boot 5) None of these
30. ........ start or restart the computer.
1) exit 2) kick 3) boot 4) kick-start 5) None of these
31. A blinking indicator that shows you where your next action will happen is ........
1) CPU 2) cursor 3) tool bar 4) boot 5) None of these
32. Commands at the top of a screen such; FILE-EDIT-FONT-TOOLS to operate and
change things within programs is ........
1) menu bar 2) tool bar 3) user friendly 4) word processor 5) None of these
33. CD-ROM stands for ........
1) Central processing unit
2) CD-remote open mouse
3) CD resizer or minimize
4) CD-read only memory
5) None of these
34. To change written work already done ........
1) find 2) edit 3) cut 4) close 5) None of these
35. A key that will erase information from the computer's memory and characters on the
screen ........
1) edit 2) delete key 3) dummy out 4) trust key 5) None of these
36. To insert copy of the clipboard contents, whatever was last cut or copied at the
insertion point ........
1) paste 2) stick in 3) fit in 4) push in 5) None of these
37. The command used to remove text or graphics from a document. (The information
is then stored on a clipboard so you can paste it)
1) chop 2) cut 3) clip 4) chart away 5) None of these
38. To encourage repeat customers, e-commerce sites recommend users create a(n)
........
1) profile 2) account 3) Survey 4) wish list 5) None of the above
39. A removable magnetic disk that holds information is .........
1) floppy disk 2) hard drive 3) monitor 4) portable 5) None of these
40. A command that saves what you are working on into the hard drive, or onto a disk?
1) view 2) hold 3) save 4) go 5) None of these
41. To move down a page in a document
1) jump 2) fly 3) wriggle 4) scroll 5) None of these
42. A command to get a file you worked already and it was stored in memory ........
1) close 2) delete 3) open 4) get it 5) None of these
43. The primary device that a computer uses to store information .......
1) TV 2) storehouse 3) desk 4) hard drive 5) None of these
44. Screen that comes on when you turn on your computer that shows all the icons
1) desktop 2) fact to face 3) viewer 4) view space 5) None of these
45. A program that works like a calculator for keeping track of money and making budgets ........
1) calculator 2) spreadsheet 3) budgeter 4) financier 5) None of these
46. The operating system is the most common type of ........ software
1) communications 2) applications 3) system 4) word- processing 5) None of these
47. A ........ is approximately one billion bytes
1) kilo byte 2) bit 3) megabyte
4) gigabyte 5) None of these
48. A scanner scans ........
1) pictures 2) text 3) both pictures and text
4) neither pictures nor text
5) None of these
49. Dumb terminals have terminals and ........
1) Mouse 2) Keyboard 3) Speakers
4) Mouse or speakers 5) None of these
50. The portion of the CPU that coordinates the activities of all the other computer components is the ........
1) mother board 2) coordination board
3) control unit 4) arithmetic logic unit
5) None of these
Key / Answers:
1-4
2-1
3-4
4-2
5-1
6-4
7-3
8-2
9-3
10-5
11-2
12-2
13-3
14-4
15-3
16-2
17-4
18-1
19-1
20-3
21-2
22-1
23-1
24-2
25-3
26-1
27-3
28-3
29-3
30-3
31-2
32-1
33-4
34-2
35-2
36-1
37-2
38-2
39-1
40-3
41-4
42-3
43-4
44-1
45-2
46-3
47-4
48-3
49-3
50-3.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

16 December 2023
IBPS Clerks Computer Knowledge Imp Questions
COPY: While working with MS-DOS, you can use COPY command to transfer a specific file from one disk to another.
Default values: This is the name given to the values that are automatically provided by software to reduce keystrokes and improve a computer user's productivity.
1. Which of the following is the expansion of EBCDIC?
1) Extended bit comparable to digital interface for computer.
2) Extended bootable computerised digital infrared calculator.
3) Extended binary coded decimal inter change code.
4) Extended binary coded decimal information code.
5) Extended binary code for digital circuit.
2. Which is used to store firmware?
1) RAM 2) ROM 3) PROM 4) EPROM 5) Cache
3. What is the number of bit patterns provided by a 7-bit code?
1) 256 2) 128 3) 64 4) 512 5) None of the above
4. Hard disks are formatted in the same manner as floppy disks. However, before a hard
disk can be formatted, it must first be .........
1) partitioned 2) sectioned 3) deleted
4) inter-sectioned 5) write protected
5. An error in computer program is called .....
1) Chip 2) Bug 3) Bit 4) Byte 5) Fault
6. Which printer is very commonly used for DTP?
1) Laser printer 2) Ink-jet printer
3) Daisy wheel printer 4) Dot-matrix printer 5) Drum Printer
7. In serial, asynchronous transmissions, the .......... bit is used to indicate the end of the the data frame.
1) start 2) stop 3) parity 4) data 5) None of the above
8. What is the name of the storage device which is used to synchronise the speed difference between devices?
1) Cache 2) Concentrator 3) Buffer 4) I/O device 5) L3 Cache
9. The excess 3 code is also known as .....
1) cyclic redundancy code
2) weighted code
3) self complementing code
4) algebraic code 5) None
10. The 9's complement of 381 is ......
1) 372 2) 508 3) 618 4) 390 5) 828
11. Flow chart is a ...........
1) type of diagram that represents an algorithm or process.
2) pictorial representation of program.
3) designing and documentation of complex processes or programs.
4) All the above 5) None
12. Basic computer processing cycle consists of ......
1) Input, Processing and Output
2) System and Application.
3) Data, Information and Application.
4) Hardware, Software and Firmware.
5) Process, Output, Information.
13. GIF is expanded as?
1) Graphics Interchange File.
2) Graphics Interchange Format.
3) Graphics Information File.
4) Graphics Information Format.
5) Graphic Interleave Format.
14. Portable program means?
1) Program with wheels.
2) Independent from its authors.
3) Independent of platform.
4) Compiler Dependent . 5) None
15. The principal electronic payment systems for electronic commerce is .......
1) Credit Card 2) Digital Wallet
3) Electronic Cheque 4) All of the above
5) None
16. Which type of system puts the user into direct conversation with the computer
through a keyboard?
1) Real time processing.
2) Interactive computer.
3) Batch processing.
4) Time sharing 5) None of the above
17. Decryption and encryption of data are responsibility of ......
1) Physical layer 2) Data link layer
3) Presentation layer 4) Session layer
5) Network Layer
18. Which of the following switching techniques is most suitable for interactive traffic?
1) Circuit switching 2) Message switching
3) Packet switching 4) All of the above
5) None
19. The hierarchical database is implemented as ......
1) Table 2) Array 3) List 4) Tree 5) Graph
20. ...... is not an E-Commerce application.
1) House banking 2) Buying stocks
3) Conducting an auction
4) Evaluating an employee 5) None
21. Which segment focuses on consumers dealing with each other?
1) B2B 2) B2C 3) C2B 4) C2C 5) All the above
22. The internet banking facility is known as
1) Online SBI 2) Net Banking 3) E Pay 4) SBI Connect 5) All the above
23. Trojan Horse .......
1) is a code segment that misuse its file
2) good for file accessing
3) is useful utility
4) both (a) and (b) 5) None of the above
24. The paragraph mark (¶) is a formatting mark that indicates where the ...... was
pressed.
1) TAB key 2) SPACE bar 3) ENTER key 4) SHIFT key 5) CTRL
25. The ........., or typeface, defines the appearance and shape of letters, numbers, and special characters.
1) font 2) font size 3) point 4) paragraph formatting 5) styles
26. To insert new slide in the current Presentation, we can choose:
1) CTRL + M 2) CTRL + N 3) CTRL + O 4) CTRL + S 5) CTR + A
27. We can replace a font on all slides with another font using the ......... option.
1) Edit → Fonts 2) Tools → Fonts
3) Tools → Replace Fonts
4) Format → Replace Fonts 5) None
28. CAD system uses the following for printing drawing and graphs ....
1) Dot matrix printer 2) Plotter
3) Line printer 4) Daisy wheel printer 5) Ink Jet printer
29. When did IBM introduced the 80286 based PC / T?
1) 1982 2) 1984 3) 1985 4) 1989 5) 1981
30. Who is credited with the idea of using punch cards to Machine?
1) Pascal 2) Hollerith 3) Babbage 4) Jacquard 5) Nikolaou's
31. A collection of related fields in data organisation is called ......
1) Group 2) File 3) Information 4) Register 5) Record
32. ....... is when the more power hungry components, such as the monitor and hard
drive are put in idle.
1) Hibernation 2) Power down
3) Standby mode 4) The shutdown procedure 5) None of the above
33. To take information from one source and bring it to your computer is referred to as....
1) Copying 2) Download 3) Transfer 4) Delink 5) Upload
34. Podcast is a kind of .......
1) Hardware 2) Software
3) Digital media 4) Firmware 5) Wetware
35. Domineering is ......
1) Domain name procedure
2) Internet utility 3) Web-based marketing
4) Hardware 5) None
36. NASSCOM is .......
1) National Association of Software and Services Companies
2) National Association of Social and Services Companies
3) National Association of Software and Society of Companies
4) National All Software and Services Companies
5) None
37. A dumb terminal has ......
1) An embedded microprocessor
2) Extensive memory
3) Independent processing
4) A keyboard and screen
5) A keyboard, processor and screen
38. ...... is a private corporate network used exclusively by company employees.
1) Internet 2) Local Area Network 3) Intranet 4) Peer to Peer 5) None
Key / Answers:
1-3
2-2
3-2
4-1
5-2
6-1
7-2
8-3
9-3
10-3
11-4
12-1
13-2
14-3
15-4
16-2
17-3
18-3
19-4
20-4
21-4
22-2
23-1
24-1
25-1
26-1
27-4
28-2
29-2
30-2
31-5
32-1
33-2
34-3
35-3
36-1
37-4
38-3.
Default values: This is the name given to the values that are automatically provided by software to reduce keystrokes and improve a computer user's productivity.
1. Which of the following is the expansion of EBCDIC?
1) Extended bit comparable to digital interface for computer.
2) Extended bootable computerised digital infrared calculator.
3) Extended binary coded decimal inter change code.
4) Extended binary coded decimal information code.
5) Extended binary code for digital circuit.
2. Which is used to store firmware?
1) RAM 2) ROM 3) PROM 4) EPROM 5) Cache
3. What is the number of bit patterns provided by a 7-bit code?
1) 256 2) 128 3) 64 4) 512 5) None of the above
4. Hard disks are formatted in the same manner as floppy disks. However, before a hard
disk can be formatted, it must first be .........
1) partitioned 2) sectioned 3) deleted
4) inter-sectioned 5) write protected
5. An error in computer program is called .....
1) Chip 2) Bug 3) Bit 4) Byte 5) Fault
6. Which printer is very commonly used for DTP?
1) Laser printer 2) Ink-jet printer
3) Daisy wheel printer 4) Dot-matrix printer 5) Drum Printer
7. In serial, asynchronous transmissions, the .......... bit is used to indicate the end of the the data frame.
1) start 2) stop 3) parity 4) data 5) None of the above
8. What is the name of the storage device which is used to synchronise the speed difference between devices?
1) Cache 2) Concentrator 3) Buffer 4) I/O device 5) L3 Cache
9. The excess 3 code is also known as .....
1) cyclic redundancy code
2) weighted code
3) self complementing code
4) algebraic code 5) None
10. The 9's complement of 381 is ......
1) 372 2) 508 3) 618 4) 390 5) 828
11. Flow chart is a ...........
1) type of diagram that represents an algorithm or process.
2) pictorial representation of program.
3) designing and documentation of complex processes or programs.
4) All the above 5) None
12. Basic computer processing cycle consists of ......
1) Input, Processing and Output
2) System and Application.
3) Data, Information and Application.
4) Hardware, Software and Firmware.
5) Process, Output, Information.
13. GIF is expanded as?
1) Graphics Interchange File.
2) Graphics Interchange Format.
3) Graphics Information File.
4) Graphics Information Format.
5) Graphic Interleave Format.
14. Portable program means?
1) Program with wheels.
2) Independent from its authors.
3) Independent of platform.
4) Compiler Dependent . 5) None
15. The principal electronic payment systems for electronic commerce is .......
1) Credit Card 2) Digital Wallet
3) Electronic Cheque 4) All of the above
5) None
16. Which type of system puts the user into direct conversation with the computer
through a keyboard?
1) Real time processing.
2) Interactive computer.
3) Batch processing.
4) Time sharing 5) None of the above
17. Decryption and encryption of data are responsibility of ......
1) Physical layer 2) Data link layer
3) Presentation layer 4) Session layer
5) Network Layer
18. Which of the following switching techniques is most suitable for interactive traffic?
1) Circuit switching 2) Message switching
3) Packet switching 4) All of the above
5) None
19. The hierarchical database is implemented as ......
1) Table 2) Array 3) List 4) Tree 5) Graph
20. ...... is not an E-Commerce application.
1) House banking 2) Buying stocks
3) Conducting an auction
4) Evaluating an employee 5) None
21. Which segment focuses on consumers dealing with each other?
1) B2B 2) B2C 3) C2B 4) C2C 5) All the above
22. The internet banking facility is known as
1) Online SBI 2) Net Banking 3) E Pay 4) SBI Connect 5) All the above
23. Trojan Horse .......
1) is a code segment that misuse its file
2) good for file accessing
3) is useful utility
4) both (a) and (b) 5) None of the above
24. The paragraph mark (¶) is a formatting mark that indicates where the ...... was
pressed.
1) TAB key 2) SPACE bar 3) ENTER key 4) SHIFT key 5) CTRL
25. The ........., or typeface, defines the appearance and shape of letters, numbers, and special characters.
1) font 2) font size 3) point 4) paragraph formatting 5) styles
26. To insert new slide in the current Presentation, we can choose:
1) CTRL + M 2) CTRL + N 3) CTRL + O 4) CTRL + S 5) CTR + A
27. We can replace a font on all slides with another font using the ......... option.
1) Edit → Fonts 2) Tools → Fonts
3) Tools → Replace Fonts
4) Format → Replace Fonts 5) None
28. CAD system uses the following for printing drawing and graphs ....
1) Dot matrix printer 2) Plotter
3) Line printer 4) Daisy wheel printer 5) Ink Jet printer
29. When did IBM introduced the 80286 based PC / T?
1) 1982 2) 1984 3) 1985 4) 1989 5) 1981
30. Who is credited with the idea of using punch cards to Machine?
1) Pascal 2) Hollerith 3) Babbage 4) Jacquard 5) Nikolaou's
31. A collection of related fields in data organisation is called ......
1) Group 2) File 3) Information 4) Register 5) Record
32. ....... is when the more power hungry components, such as the monitor and hard
drive are put in idle.
1) Hibernation 2) Power down
3) Standby mode 4) The shutdown procedure 5) None of the above
33. To take information from one source and bring it to your computer is referred to as....
1) Copying 2) Download 3) Transfer 4) Delink 5) Upload
34. Podcast is a kind of .......
1) Hardware 2) Software
3) Digital media 4) Firmware 5) Wetware
35. Domineering is ......
1) Domain name procedure
2) Internet utility 3) Web-based marketing
4) Hardware 5) None
36. NASSCOM is .......
1) National Association of Software and Services Companies
2) National Association of Social and Services Companies
3) National Association of Software and Society of Companies
4) National All Software and Services Companies
5) None
37. A dumb terminal has ......
1) An embedded microprocessor
2) Extensive memory
3) Independent processing
4) A keyboard and screen
5) A keyboard, processor and screen
38. ...... is a private corporate network used exclusively by company employees.
1) Internet 2) Local Area Network 3) Intranet 4) Peer to Peer 5) None
Key / Answers:
1-3
2-2
3-2
4-1
5-2
6-1
7-2
8-3
9-3
10-3
11-4
12-1
13-2
14-3
15-4
16-2
17-3
18-3
19-4
20-4
21-4
22-2
23-1
24-1
25-1
26-1
27-4
28-2
29-2
30-2
31-5
32-1
33-2
34-3
35-3
36-1
37-4
38-3.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

21 October 2024
IBPS Computer Knowledge - Important Bits with Answers
Important concepts
Mnemonics: The symbols used in an assembly language.
Sorting: Arranging data in a logical sequence.
Robot: An automatic machine that performs routine seemingly human tasks.
Dr. Herman Hollerith: Father of Punched Card Processing.
1. Which of the following is NOT one of the four major data processing functions of a computer?
1) gathering data
2) processing data into information
3) Analysing the data or information
4) storing the data or information
5) All the above
2. To delete an incorrect character in a document ...... to erase to the right of the insertion point.
1) Press the left mouse key
2) Double-click the right mouse key
3) Press the BACKSPACE key
4) Press the delete key
5) None of these
3. Virtual memory is typically located:
1) on a floppy disk 2) in the CPU
3) in a flash card
4) on the hard drive
5) In the ROM
4. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is to view?
1) List 2) Thumbnails 3) Details
4) Icon 5) None of the above
5. ATM terminals are examples of ......
1) Dump terminals 2) Intelligent terminals
3) Smart terminals 4) Offline terminals
5) None of the above
6. The required task is chosen from a list of choices known as
1) File 2) Menu 3) Field 4) Record 5) Option list
7. What is the short cut key to open the Spell check?
1) F12 2) Shift F12 3) Alt + F12 4) Ctrl + F12 5) F7
8. The material coated on a CD-ROM is
1) Copper 2) Brass 3) Aluminium 4) Zinc 5) Iron Peroxide
9. The time required by the access arm to reach the specified cylinder is known as
1) Real time 2) Seek time 3) Access time 4) Execution time 5) None of the above
10. The register which holds the address of the location when an instruction is read out or written in the memory is...
1) PC 2) Stack 3) MBR 4) MAR 5) Lag
11. What type of virus uses computer hosts to reproduce itself?
1) Time bomb 2) Worm 3) Melissa virus 4) Macro virus 5) Add ware
12. How can the slide show be repeated continuously?
1) Loop continuously until 'Esc'
2) Repeat continuously 3) Loop more
4) Until press Return 5) None
13. Power Point 2000 has .... number of views.
1) 3 2) 4 3) 5 4) 6 5) 8
14. ...... are specially designed computers that perform complex calculations extremely rapidly.
1) Servers 2) Supercomputers
3) Laptops 4) Mainframes 5) PDA
15. When a logic bomb is activated by a time related event, it is known as a:
1) Time-related bomb sequence
2) Virus 3) Time bomb
4) Trojan horse 5) Worms
16. A set of information that defines the status of resources allocated to a process is
1) Process Control 2) ALU 3) Register Unit 4) Process description 5) None of the above
17. Any method for controlling access to or use of memory is known as
1) Memory map
2) Memory protection
3) Memory management
4) Memory instruction
5) All the above
18. The person contribution the idea of the stored program was
1) John Neumann 2) Charles Babbage
3) Thomas 4) Dennis Ritchie
5) Howard h. Aiken
19. Using Windows Explorer, a plus (+) sign in front of a folder indicates:
1) An open folder
2) The folder contains subfolders
3) A text file 4) A graphics file
5) A video file
20. Which of the following is an example of an input device?
1) Scanner 2) Speaker 3) CD
4) Printer 5) Modem
21. A program embedded in a semiconductor chip during their manufacture is called
1) Human ware 2) Firmware 3) Hardware 4) Live ware 5) Software
22. How can the user determine what programs are available on a computer?
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the OS for a list of installed programs
4) Checking the existing files saved on the disk
5) None of the above
23. DSL is an example of a(n) ...... connection.
1) Network 2) Wireless 3) Slow
4) Broadband 5) None of the above
24. Power Point presentation is a collection of...
1) Slides and Hand-outs
2) Speaker's notes 3) Outlines
4) All of the above 5) None
25. A File which contains readymade styles that can be used for a presentation is called .......
1) Auto Style 2) Template 3) Wizard
4) Pre formatting 5) All the above
26. Notepad is a:
1) ASCII Text Editor 2) Binary Editor
3) Formatted Text Editor 4) Calculator
5) None
27. HTML uses
1) Pre-defined tags 2) User defined tags
3) Tags only for linking
4) Fixed tags defined by the language
5) All the above
28. What is not considered to be a standard component of a window?
1) Minimize and Maximize buttons
2) Task bar 3) Scroll bar
4) Menu bar 5) ICONS
29. The Giga byte refers to
1) 1024 bytes 2) 1024 kilobytes
3) 1024 Megabytes 4) 1024 Gigabytes
5) None of the above
30. A database ....... fields store numbers used to perform calculation.
1) Binary 2) Key 3) Alphanumeric
4) Numeric 5) None of the above
31. Which of the following computer languages are a mathematically oriented languages used for scientific problems?
1) FORTRAN 2) COBOL 3) LISP 4) PROGLOG 5) ADA
32. The ..... key and the ..... key can be used in the combination with other keys to perform shortcuts and special tasks.
1) Control, Alt 2) Function, Toggle
3) Delete, Insert
4) Caps, Locks, Num Lock
5) Space bar, Insert
33. Login, Logout process is carried out by
1) Application Layer 2) Session Layer
3) Physical Layer 4) Transport Layer
5) Internet Layer
34. The term byte stuffing refers to:
1) Data stuffing used with character oriented hardware.
2) Data stuffing used with bit oriented hardware.
3) Data stuffing used with both (A) & (B)
4) Data stuffing used with byte oriented hardware. 5) None
35. A Network uses a star topology if
1) Computers are arranged in a closed loop.
2) All computers attach to a central point.
3) All computers attach to a single long cable.
4) Computers attach to multiple hierarchical cables.
5) Server is not required
36. In internet online news is broadcasted with the help of ....... protocol.
1) X.23 2) NNTP 3) TCP 4) WAP 5) POP
37. Any storage device added to a computer beyond the immediately usable main storage is known as
1) Floppy disk 2) Hard disk 3) Backing store 4) Punched card 5) None of the above
Answers / Key
1-3
2-4
3-4
4-3
5-3
6-2
7-5
8-3
9-2
10-4
11-2
12-1
13-1
14-2
15-3
16-4
17-2
18-1
19-2
20-1
21-2
22-4
23-4
24-4
25-2
26-1
27-4
28-2
29-3
30-4
31-1
32-1
33-2
34-1
35-2
36-2
37-3.
Mnemonics: The symbols used in an assembly language.
Sorting: Arranging data in a logical sequence.
Robot: An automatic machine that performs routine seemingly human tasks.
Dr. Herman Hollerith: Father of Punched Card Processing.
1. Which of the following is NOT one of the four major data processing functions of a computer?
1) gathering data
2) processing data into information
3) Analysing the data or information
4) storing the data or information
5) All the above
2. To delete an incorrect character in a document ...... to erase to the right of the insertion point.
1) Press the left mouse key
2) Double-click the right mouse key
3) Press the BACKSPACE key
4) Press the delete key
5) None of these
3. Virtual memory is typically located:
1) on a floppy disk 2) in the CPU
3) in a flash card
4) on the hard drive
5) In the ROM
4. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is to view?
1) List 2) Thumbnails 3) Details
4) Icon 5) None of the above
5. ATM terminals are examples of ......
1) Dump terminals 2) Intelligent terminals
3) Smart terminals 4) Offline terminals
5) None of the above
6. The required task is chosen from a list of choices known as
1) File 2) Menu 3) Field 4) Record 5) Option list
7. What is the short cut key to open the Spell check?
1) F12 2) Shift F12 3) Alt + F12 4) Ctrl + F12 5) F7
8. The material coated on a CD-ROM is
1) Copper 2) Brass 3) Aluminium 4) Zinc 5) Iron Peroxide
9. The time required by the access arm to reach the specified cylinder is known as
1) Real time 2) Seek time 3) Access time 4) Execution time 5) None of the above
10. The register which holds the address of the location when an instruction is read out or written in the memory is...
1) PC 2) Stack 3) MBR 4) MAR 5) Lag
11. What type of virus uses computer hosts to reproduce itself?
1) Time bomb 2) Worm 3) Melissa virus 4) Macro virus 5) Add ware
12. How can the slide show be repeated continuously?
1) Loop continuously until 'Esc'
2) Repeat continuously 3) Loop more
4) Until press Return 5) None
13. Power Point 2000 has .... number of views.
1) 3 2) 4 3) 5 4) 6 5) 8
14. ...... are specially designed computers that perform complex calculations extremely rapidly.
1) Servers 2) Supercomputers
3) Laptops 4) Mainframes 5) PDA
15. When a logic bomb is activated by a time related event, it is known as a:
1) Time-related bomb sequence
2) Virus 3) Time bomb
4) Trojan horse 5) Worms
16. A set of information that defines the status of resources allocated to a process is
1) Process Control 2) ALU 3) Register Unit 4) Process description 5) None of the above
17. Any method for controlling access to or use of memory is known as
1) Memory map
2) Memory protection
3) Memory management
4) Memory instruction
5) All the above
18. The person contribution the idea of the stored program was
1) John Neumann 2) Charles Babbage
3) Thomas 4) Dennis Ritchie
5) Howard h. Aiken
19. Using Windows Explorer, a plus (+) sign in front of a folder indicates:
1) An open folder
2) The folder contains subfolders
3) A text file 4) A graphics file
5) A video file
20. Which of the following is an example of an input device?
1) Scanner 2) Speaker 3) CD
4) Printer 5) Modem
21. A program embedded in a semiconductor chip during their manufacture is called
1) Human ware 2) Firmware 3) Hardware 4) Live ware 5) Software
22. How can the user determine what programs are available on a computer?
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the OS for a list of installed programs
4) Checking the existing files saved on the disk
5) None of the above
23. DSL is an example of a(n) ...... connection.
1) Network 2) Wireless 3) Slow
4) Broadband 5) None of the above
24. Power Point presentation is a collection of...
1) Slides and Hand-outs
2) Speaker's notes 3) Outlines
4) All of the above 5) None
25. A File which contains readymade styles that can be used for a presentation is called .......
1) Auto Style 2) Template 3) Wizard
4) Pre formatting 5) All the above
26. Notepad is a:
1) ASCII Text Editor 2) Binary Editor
3) Formatted Text Editor 4) Calculator
5) None
27. HTML uses
1) Pre-defined tags 2) User defined tags
3) Tags only for linking
4) Fixed tags defined by the language
5) All the above
28. What is not considered to be a standard component of a window?
1) Minimize and Maximize buttons
2) Task bar 3) Scroll bar
4) Menu bar 5) ICONS
29. The Giga byte refers to
1) 1024 bytes 2) 1024 kilobytes
3) 1024 Megabytes 4) 1024 Gigabytes
5) None of the above
30. A database ....... fields store numbers used to perform calculation.
1) Binary 2) Key 3) Alphanumeric
4) Numeric 5) None of the above
31. Which of the following computer languages are a mathematically oriented languages used for scientific problems?
1) FORTRAN 2) COBOL 3) LISP 4) PROGLOG 5) ADA
32. The ..... key and the ..... key can be used in the combination with other keys to perform shortcuts and special tasks.
1) Control, Alt 2) Function, Toggle
3) Delete, Insert
4) Caps, Locks, Num Lock
5) Space bar, Insert
33. Login, Logout process is carried out by
1) Application Layer 2) Session Layer
3) Physical Layer 4) Transport Layer
5) Internet Layer
34. The term byte stuffing refers to:
1) Data stuffing used with character oriented hardware.
2) Data stuffing used with bit oriented hardware.
3) Data stuffing used with both (A) & (B)
4) Data stuffing used with byte oriented hardware. 5) None
35. A Network uses a star topology if
1) Computers are arranged in a closed loop.
2) All computers attach to a central point.
3) All computers attach to a single long cable.
4) Computers attach to multiple hierarchical cables.
5) Server is not required
36. In internet online news is broadcasted with the help of ....... protocol.
1) X.23 2) NNTP 3) TCP 4) WAP 5) POP
37. Any storage device added to a computer beyond the immediately usable main storage is known as
1) Floppy disk 2) Hard disk 3) Backing store 4) Punched card 5) None of the above
Answers / Key
1-3
2-4
3-4
4-3
5-3
6-2
7-5
8-3
9-2
10-4
11-2
12-1
13-1
14-2
15-3
16-4
17-2
18-1
19-2
20-1
21-2
22-4
23-4
24-4
25-2
26-1
27-4
28-2
29-3
30-4
31-1
32-1
33-2
34-1
35-2
36-2
37-3.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

26 September 2024
IBPS - RRBs Computer Knowledge Model Questions with Key
1. A reusable set of commands or steps saved by a user is called a:
1) function 2) template 3) macro 4) relative reference 5) None of these
2. Types of charts that can be created in a MS-Excel include all EXCEPT a ____________ chart.
1) pie 2) scatter 3) block 4) bar 5) None of these
3. Pixels are:
1) dots on the screen arranged in rows.
2) dots of ink from an inkjet printer.
3) points of light used by a cordless, wireless, optical mouse.
4) points on the end of PDA handheld devices
5) None of these
4. The density of pixels on a screen is known as:
1) screen clarity 2) pixility 3) pixel depth 4) resolution 5) None of these
5. Previously drawn images that artists can legally use in their own work are known as:
1) copy art 2) clip art 3) free art 4) shareware 5) None of these
6. CAD software is primarily used in:
1) desktop publishing 2) software development 3) engineering 4) accounting 5) None of these
7. CAD stands for:
1) Computer - Assisted Design
2) Computer Application Design
3) Computer Application and Design
4) Computer - Aided Design
5) None of these
8. Power Point is an example of:
1) presentation graphics software
2) raster graphics software
3) photo management software
4) gray-scale graphics software
5) None of these
9. The creation of motion from still pictures is called:
1) a presentation 2) 3-D modeling 3) transition 4) animation 5) None
10. When something is displayed at the same time as it is created, accessed, or imported, it is known as:
1) digital time 2) real time 3) online time 4) batch time 5) None of these
11. The process of copying files to a CD is known as:
1) storing 2) copying 3) burning 4) pasting 5) None of these
12. The term ____________ generally means using some combination of text, graphics, animation, video, music, voice, and sound effects to communicate.
1) MIDI 2) Hyperlinking 3) WYSIWYG 4) Multimedia 5) None of these
13. ____________ combines virtual worlds with networking, placing multiple participants in a virtual space.
1) Virtual reality 2) Hypermedia 3) Hyper reality 4) Real time 5) None of these
14. MIDI stands for:
1) Musical Instruction and Digitized Instruments
2) Musical Instrument Digital Interface
3) Music and Instruments Digitized Instantly
4) Musical Interface Digitally Integrated
5) None of these
15. A database is a(n)
1) spreadsheet program 2) application
3) desktop publishing program
4) operating system
5) None of these
16. A collection of information stored in an organized form in a computer is a(n):
1) database 2) database program 3) operating system 4) utility tool 5) None of these
17. A database is typically composed of one or more:
1) rows 2) tables 3) files 4) columns 5) None of these
18. Information about just one individual person is referred to as a:
1) column 2) cell 3) record 4) table 5) None of these
19. A new, powerful data description language that can access databases through the Internet is:
1) HTML 2) intranets 3) SML 4) XML 5) None of these
20. When a user uses English-like language to query a database, it is known as:
1) SQL 2) object-oriented language 3) a multi-media database 4) natural language 5) None of these
21. A basic computer network can be described as:
1) a minimum of five computers linked together
2) computer and cables that link the network together
3) two or more computers that are linked together
4) the use of satellites linking computers together
5) None of these
22. The three essential components of every computer system include all EXCEPT:
1) software 2) hardware 3) people or users 4) cables 5) None of these
23. Which of the following statement is NOT TRUE about wireless networks?
1) Wireless networks are convenient
2) Wireless networks are faster than wired networks
3) Wireless networks use radio transmitters
4) Wireless networks are slower than wired LANs
5) None of these
24. MAN stands for:
1) Metropolitan Area Network
2) Marked Area Network
3) Metropolitan Arranged Network
4) Manufactured Arrangement of Networks
5) None of these
25. The hardware device or software program that sends messages between networks is known as a:
1) bridge 2) backbone 3) router 4) gateway 5) None of these
26. The system of satellites that circle the earth and can determine any position is known as a:
1) GPS 2) LAN 3) receiver 4) MAN 5) None of these
27. Remote access means that:
1) a computer is linked directly to a network
2) you connect to a network through a phone line, television cable, or satellite
3) you can access the Internet from anywhere
4) your Internet connection is through a satellite rather than phone lines
5) None of these
28. NIC stands for:
1) Network Internal Card
2) Network Interface Card
3) Networking Internet Connection
4) Newer Industrial Computer 5) None
29. A NIC allows direct connection to:
1) the Internet 2) a printer 3) a network 4) a modem 5) None
30. Computer bits must be ______ to travel over phone lines.
1) digital signals 2) analog signals 3) modem signals 4) converted to bytes 5) None of these
31. Modems use ____________ cable to connect to a telephone network through a modular phone jack.
1) phone 2) coaxial 3) digital 4) analog 5) None of these
32. Modem speed is measured in:
1) bits per second 2) bytes per second 3) bits per millisecond 4) bytes per minute 5) None of these
33. What is the term for the amount of information transmitted through a communication medium in a certain amount of time?
1) DPI 2) Bandwidth 3) BPS 4) Baud rate 5) None of these
34. Broadband connections include all EXCEPT:
1) cable modems 2) DSL 3) wireless 4) phone modems 5) None of these
35. What type of cable uses light waves to carry information at high speed?
1) Cable modems 2) Wireless cables 3) Fiber-optic cables 4) Phone lines 5) None of these
36. Which type of media has the longest maximum distance?
1) Twisted pair 2) Coaxial cable 3) Wireless 4) Fiber-optic 5) None of these
37. The rules for exchanging data between a terminal and one or more computers is known as a(n):
1) procedure 2) algorithm 3) set of laws 4) protocol 5) None of these
38. In a client/ server environment, most or all of the network operating system resides on the:
1) Client machine 2) Server computer 3) CD 4) Mainframe 5) None of these
39. The network configuration that allows every computer to act as both a client and a server is a:
1) client/ server model 2) host system 3) server network 4) peer-to-peer network 5) None of these
40. The _________ stores data and software that are to be shared by several users.
1) mainframe 2) file server 3) print server 4) client 5) None of these
Key:
1-3
2-3
3-1
4-4
5-2
6-3
7-4
8-1
9-4
10-2
11-3
12-4
13-1
14-2
15-2
16-1
17-2
18-3
19-4
20-1
21-3
22-4
23-2
24-1
25-3
26-1
27-2
28-2
29-3
30-2
31-1
32-1
33-2
34-4
35-3
36-3
37-4
38-2
39-4
40-2.
1) function 2) template 3) macro 4) relative reference 5) None of these
2. Types of charts that can be created in a MS-Excel include all EXCEPT a ____________ chart.
1) pie 2) scatter 3) block 4) bar 5) None of these
3. Pixels are:
1) dots on the screen arranged in rows.
2) dots of ink from an inkjet printer.
3) points of light used by a cordless, wireless, optical mouse.
4) points on the end of PDA handheld devices
5) None of these
4. The density of pixels on a screen is known as:
1) screen clarity 2) pixility 3) pixel depth 4) resolution 5) None of these
5. Previously drawn images that artists can legally use in their own work are known as:
1) copy art 2) clip art 3) free art 4) shareware 5) None of these
6. CAD software is primarily used in:
1) desktop publishing 2) software development 3) engineering 4) accounting 5) None of these
7. CAD stands for:
1) Computer - Assisted Design
2) Computer Application Design
3) Computer Application and Design
4) Computer - Aided Design
5) None of these
8. Power Point is an example of:
1) presentation graphics software
2) raster graphics software
3) photo management software
4) gray-scale graphics software
5) None of these
9. The creation of motion from still pictures is called:
1) a presentation 2) 3-D modeling 3) transition 4) animation 5) None
10. When something is displayed at the same time as it is created, accessed, or imported, it is known as:
1) digital time 2) real time 3) online time 4) batch time 5) None of these
11. The process of copying files to a CD is known as:
1) storing 2) copying 3) burning 4) pasting 5) None of these
12. The term ____________ generally means using some combination of text, graphics, animation, video, music, voice, and sound effects to communicate.
1) MIDI 2) Hyperlinking 3) WYSIWYG 4) Multimedia 5) None of these
13. ____________ combines virtual worlds with networking, placing multiple participants in a virtual space.
1) Virtual reality 2) Hypermedia 3) Hyper reality 4) Real time 5) None of these
14. MIDI stands for:
1) Musical Instruction and Digitized Instruments
2) Musical Instrument Digital Interface
3) Music and Instruments Digitized Instantly
4) Musical Interface Digitally Integrated
5) None of these
15. A database is a(n)
1) spreadsheet program 2) application
3) desktop publishing program
4) operating system
5) None of these
16. A collection of information stored in an organized form in a computer is a(n):
1) database 2) database program 3) operating system 4) utility tool 5) None of these
17. A database is typically composed of one or more:
1) rows 2) tables 3) files 4) columns 5) None of these
18. Information about just one individual person is referred to as a:
1) column 2) cell 3) record 4) table 5) None of these
19. A new, powerful data description language that can access databases through the Internet is:
1) HTML 2) intranets 3) SML 4) XML 5) None of these
20. When a user uses English-like language to query a database, it is known as:
1) SQL 2) object-oriented language 3) a multi-media database 4) natural language 5) None of these
21. A basic computer network can be described as:
1) a minimum of five computers linked together
2) computer and cables that link the network together
3) two or more computers that are linked together
4) the use of satellites linking computers together
5) None of these
22. The three essential components of every computer system include all EXCEPT:
1) software 2) hardware 3) people or users 4) cables 5) None of these
23. Which of the following statement is NOT TRUE about wireless networks?
1) Wireless networks are convenient
2) Wireless networks are faster than wired networks
3) Wireless networks use radio transmitters
4) Wireless networks are slower than wired LANs
5) None of these
24. MAN stands for:
1) Metropolitan Area Network
2) Marked Area Network
3) Metropolitan Arranged Network
4) Manufactured Arrangement of Networks
5) None of these
25. The hardware device or software program that sends messages between networks is known as a:
1) bridge 2) backbone 3) router 4) gateway 5) None of these
26. The system of satellites that circle the earth and can determine any position is known as a:
1) GPS 2) LAN 3) receiver 4) MAN 5) None of these
27. Remote access means that:
1) a computer is linked directly to a network
2) you connect to a network through a phone line, television cable, or satellite
3) you can access the Internet from anywhere
4) your Internet connection is through a satellite rather than phone lines
5) None of these
28. NIC stands for:
1) Network Internal Card
2) Network Interface Card
3) Networking Internet Connection
4) Newer Industrial Computer 5) None
29. A NIC allows direct connection to:
1) the Internet 2) a printer 3) a network 4) a modem 5) None
30. Computer bits must be ______ to travel over phone lines.
1) digital signals 2) analog signals 3) modem signals 4) converted to bytes 5) None of these
31. Modems use ____________ cable to connect to a telephone network through a modular phone jack.
1) phone 2) coaxial 3) digital 4) analog 5) None of these
32. Modem speed is measured in:
1) bits per second 2) bytes per second 3) bits per millisecond 4) bytes per minute 5) None of these
33. What is the term for the amount of information transmitted through a communication medium in a certain amount of time?
1) DPI 2) Bandwidth 3) BPS 4) Baud rate 5) None of these
34. Broadband connections include all EXCEPT:
1) cable modems 2) DSL 3) wireless 4) phone modems 5) None of these
35. What type of cable uses light waves to carry information at high speed?
1) Cable modems 2) Wireless cables 3) Fiber-optic cables 4) Phone lines 5) None of these
36. Which type of media has the longest maximum distance?
1) Twisted pair 2) Coaxial cable 3) Wireless 4) Fiber-optic 5) None of these
37. The rules for exchanging data between a terminal and one or more computers is known as a(n):
1) procedure 2) algorithm 3) set of laws 4) protocol 5) None of these
38. In a client/ server environment, most or all of the network operating system resides on the:
1) Client machine 2) Server computer 3) CD 4) Mainframe 5) None of these
39. The network configuration that allows every computer to act as both a client and a server is a:
1) client/ server model 2) host system 3) server network 4) peer-to-peer network 5) None of these
40. The _________ stores data and software that are to be shared by several users.
1) mainframe 2) file server 3) print server 4) client 5) None of these
Key:
1-3
2-3
3-1
4-4
5-2
6-3
7-4
8-1
9-4
10-2
11-3
12-4
13-1
14-2
15-2
16-1
17-2
18-3
19-4
20-1
21-3
22-4
23-2
24-1
25-3
26-1
27-2
28-2
29-3
30-2
31-1
32-1
33-2
34-4
35-3
36-3
37-4
38-2
39-4
40-2.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

Subscribe to:
Posts (Atom)

Latest Opportunities 2016
TSPSC News
APPSC News