Jul 4, 2016

IBPS Clerk Computer Solved Paper Computer Knowledge Awareness

IBPS Clerk Computer Solved Paper

IBPS Clerk Computer Solved Paper


1. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is ________________
(1) Memory only
(2) write-only
(3) once—0nly
(4) run-only
(5) read-only

2. What is the permanent memory built into your computer called?
(1) RAM
(2) Floppy
(3) CPU
(4) CD-ROM
(5) ROM

3. The default view in Excel is ______________ view.
(1) Work
(2) Auto
(3) Normal
(4) Roman
(5) None of these

4. System software ______________
(1) allows the user to diagnose and troubleshoot the device
(2) is a programming language
(3) is part of a productivity suite
(4) is an optional form of software
(5) helps the computer manage internal resources

5. In Word you can force a page break ______________
(1) By positioning your cursor at the appropriate place and pressing the F1 key
(2) By positioning your cursor at the appropriate place and pressing Ctrl+Enter
(3) By using the Insert/Section Break
(4) By changing the font size of your document
(5) None of these


MCQ Objective Computer Knowledge Question Answer for IBPS Exam


6. Grouping and processing all of a firm's transactions at one time is called _____________
(1) a database management system
(2) batch processing
(3) a real-time system
(4) an online system
(5) None of these

7. Help Menu is available at which button?
(1) End
(2) Start
(3) Turnoff
(4) Restart
(5) Reboot

8. You can keep your personal files/ folders in _____________
(1) My folder
(2) My Documents
(3) My Files
(4) My Text
(5) None of these

9. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n) _____________
(1) Supercomputer
(2) Minicomputer
(3) Laptop
(4) Server
(5) None of these

10. When you save to this, your data will remain intact even when the computer is turned off.
(1) RAM
(2) Motherboard
(3) secondary storage device
(4) primary storage device
(5) None of these

11. To change selected text to all capital letters, click the change case button, then click
(1) UPPERCASE
(2) UPPER ALL
(3) CAPS LOCK
(4) Lock Upper
(5) Large Size

12. A person -who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a _____________
(1) Hacker
(2) Analyst
(3) instant messenger
(4) programmer
(5) spammer

13. Where you are likely to find an embedded operating system?
(1) on a desktop operating system
(2) on a networked PC
(3) on a network server
(4) on a PDA
(5) on a mainframe

14. Reusable optical storage will typically have the acronym ______
(1) CD
(2) DVD
(3) ROM
(4) RW
(5) ROS

15. An online discussion group that allows direct “live” communication is known as ______
(1) Webcrawler
(2) chat group
(3) regional service provider
(4) hyperlink
(5) email

16. _______________ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses.
(1) Cybergaming crime
(2) Memory shaving
(3) Syn flooding
(4) Software piracy
(5) None of these

17. Which of these is a point-and-draw device?
(1) Mouse
(2) Scanner
(3) Printer
(4) CD-ROM
(5) Keyboard

18. The letter and number of the intersecting column and row is the
(1) cell location
(2) cell position
(3) cell address
(4) cell coordinates
(5) cell contents

19. A set of rules for telling the computer what operations to perform is called a ____________
(1) procedural language
(2) structures
(3) natural language
(4) command language
(5) programming language

20. A detailed written description of the programming cycle and the program, along with the test results and a printout of the program is called ____________
(1) Documentation
(2) Output
(3) Reporting
(4) spec sheets
(5) Directory

21. A(n) ___________ language reflects the way people think mathematically.
(1) cross-platform programming
(2) SGL business programming
(3) event-driven programming
(4) functional
(5) None of these

22. When entering text within a document, the Enter key is normally pressed at the end of every __________
(1) Line
(2) Sentence
(3) Paragraph
(4) Word
(5) File

23. When a real-time telephone call between people is made over the Internet using computers. It is called ____________
(1) a chat session
(2) an e- mail
(3) an instant message
(4) Internet telephony
(5) None of these

24. Which of the following is the first step in sizing a window?
(1) Point to the title bar
(2) Pull down the View menu to display the toolbar
(3) Point to any corner or border
(4) Pull down the View menu and change to large icons
(5) None of these

25. Which of the following software could assist someone who cannot use their hands for computer input?
(1) Video conferencing
(2) Speech recognition
(3) Audio digitizer
(4) Synthesizer
(5) None of these
Questions Answers
1 5
2 5
3 3
4 5
5 2
6 2
7 2
8 2
9 4
10 3
11 3
12 1
13 4
14 4
15 2
16 3
17 1
18 3
19 5
20 1
21 4
22 3
23 4
24 3
25 2


No comments: