Jul 4, 2016

IBPS Clerk Exam Computer Model Paper Computer Awareness

IBPS Clerk Exam Computer Model Paper

IBPS Clerk Exam Computer Model Paper


1. Most mail programs automatically complete the following two parts in an e-mail __________
(1) From : and Body :
(2) From: and Date :
(3) From: and To :
(4) From: and Subject:
(5) None of these

2. The computers capability of distinguishing spoken words is called ___________
(1) voice analysis
(2) speech acknowledgement
(3) voice recognition
(4) speech interpretation
(5) vocalisation

3. Which of the following is an advantage of mounting an application on the Web?
(1) the possibility of 24-hour access for users
(2) creating a system that can extend globally
(3) standardtzing the design of the interface
(4) All of these
(5) None of these

4. The first page of a Web site is called the __________
(1) Homepage
(2) Index
(3) Java Script
(4) Book mark
(5) Intro Page


MCQ Objective Computer Knowledge Question Answer for IBPS Exam


5. ERP is an acronym for ___________
(1) Enterprise Retirement Planning
(2) Enterprise Relationship Planning
(3) Enterprise Resource Planning
(4) Enterprise Reorder Planning
(5) Enterprise Retention Planning

6. The software that allows users to surf the Internet is called a/ an __________
(1) Search engine
(2) Internet Service Provider (ISP)
(3) Multimedia application
(4) Browser
(5) Internet Surfing Provider

7. The issues that deal with the collection and use of data about individuals is ___________
(1) Access
(2) Publicity
(3) Accuracy
(4) Property
(5) privacy

8. A term relating to sending data to a satellite is __________
(1) Downlink
(2) Modulate
(3) Demodulate
(4) Uplink
(5) interrelate

9. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with relation information are called ____________
(1) Hypermedia
(2) Hypertext
(3) HTML
(4) URL
(5) FTP

10. Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _________ security is concerned with protecting software from unauthorized tampering or damage.
(1) Data
(2) Cyber
(3) Internet
(4) Metaphysical
(5) publicity

11. Hackers ________________
(1) all have the same motive
(2) are people who maintain computers
(3) may legally break into computers as long as they do not do any damage
(4) are people who are allergic to computers
(5) break into other people's computers

12. Unauthorized copying of software to be used for personal gain instead of for personal backups is called ______________
(1) program thievery
(2) data snatching
(3) software piracy
(4) program looting
(5) data looting

13. Junk e- mail is also called ____________
(1) Spam
(2) Spoof
(3) cookie crumbs
(4) sniffer script
(5) Spill

14. What is usually used for displaying information at public places?
(1) Monitors
(2) Overhead Projections
(3) Monitors and Overhead Projections
(4) Touch Screen Kiosks
(5) Loud Speakers

15. What is MP3?
(1) A mouse
(2) A Printer
(3) A Sound format
(4) A Scanner
(5) A Mobile Phone

16. Deleted data remains on a disk until __________
(1) The data is overwritten
(2) the recycle bin is emptied
(3) a file compression utility is used
(4) the disk is scanned
(5) None of these

17. When you cut or copy information it gets place in the _____________
(1) Clipart
(2) Clipboard
(3) Internet
(4) Motherboard
(5) None of these

18. Provides the means to move the pointer on the screen and give information to the computer by clicking its buttons _____________
(1) Scanner
(2) Mouse
(3) Keyboard
(4) Program
(5) None of these

19. The name of the location of a particular piece of data is its ____________
(1) Address
(2) memory name
(3) storage site
(4) data location
(5) None of these

20. A device that is connected to the motherboard is __________
(1) called an external device
(2) called an adjunct device
(3) called a peripheral device
(4) must connect using ribbon cable
(5) None of these

21. The physical components of a computer system is _____________
(1) Software
(2) Hardware
(3) ALU
(4) Control Unit
(5) None of these

22. A computer works on a __________ number system
(1) Binary
(2) Octal
(3) Decimal
(4) Hexadecimal
(5) None of these

23. Which is a graphical representation of an application?
(1) Windows 95
(2) Windows Explorer
(3) Icon
(4) Taskbar
(5) None of these

24. A field is a related group of __________
(1) Records
(2) Files
(3) Characters
(4) Cables
(5) None of these

25. To restart the computer ____________ key is used.
(1) Del + Ctrl
(2) Backspace + Ctrl
(3) Ctrl + Alt + Del
(4) Reset
(5) None of these

Questions Answers
1 2
2 3
3 4
4 1
5 3
6 4
7 5
8 4
9 2
10 1
11 5
12 3
13 1
14 2
15 5
16 1
17 2
18 2
19 1
20 4
21 3
22 1
23 3
24 1
25 3

No comments: