IBPS CWET CLERK COMPUTER KNOWLEDGE MODEL PRACTICE PAPER
1. One megabyte equals approximately
1) 1,000 bits, 2) 1,000 bytes, 3) 1 million bytes, 4) 1 million bits, 5) 2,000 bytes
2. Data going into the computer is called?
1) Output, 2) Algorithm, 3) Input, 4) Calculations, 5) Flowchart
3. Which of the following refers to the memory in your computer?
1) RAM, 2) DSL, 3) USB, 4) LAN, 5) CPU
4. When you are working on a document on PC, where is the document temporarily stored?
1) RAM, 2) ROM, 3) The CPU, 4) Flash memory, 5) The CD-Rom
5. Information travels between components on the mother board through-
1) Flash memory, 2) CMOS, 3)Bays, 4) Buses, 5) Peripherals
6. How are data organised in a spreadsheet?
1) Lines and spaces, 2) Layers and planes, 3) Height and width, 4) Rows and columns, 5) None of these
7. Which of the following is true?
1) Byte is a single digit in a binary number
2) Bit represents a grouping of digital numbers
3) Eight-digit binary number is called a byte
4) Eight-digit binary number is called a bit, 5) None of these
8. Transformation of input into output is performed by?
1) Peripherals, 2) Memory, 3) Storage, 4) The Input-Output unit, 5) The CPU
9. How many options does a binary choice offer?
1) None, 2) One, 3) Two, 4) It depends on the amount of memory in the computer
5) It depends on the speed of the computer's processor
10. .....is collection of web pages and ......is the very first page that we see on opening of a web-site
1) Home-page, Web-page, 2) Web-site, Home-page
3) Web-page, Home-page, 4) Web-page, Web-site, 5) None of these
11. When the pointer is positioned on a _____ it is shaped like a hand.
1) Grammar error, 2) Hyperlink, 3) Screen tip, 4) Spelling error, 5) Formatting error
12. The _____ of a system includes the programs or instructions.
1) Hardware, 2) Icon, 3) Information, 4) Software, 5) None of these
13. 'www' stands for _____
1) World Word Web, 2) World Wide Web, 3) World White Web
4) World Work Web, 5) None of these
14. What menu is selected to cut, copy, and paste?
1) File, 2) Tools, 3) Special, 4) Edit, 5) None
15. You can use the tab key to
1) Move a cursor across the screen, 2) Indent a paragraph
3) Move the cursor down the screen, 4) Only (1) and (2)
5) None of these
16. The most important or powerful computer in a typical network is _____
1) Desktop, 2) Network client, 3) Network server, 4) Network station, 5) None
17. Which of the following is an example of connectivity?
1) Internet, 2) Floppy disk, 3) Power cord, 4) Data, 5) None of these
18. The ability to find an individual item in a file immediately _____ is used.
1) File allocation table, 2) Directory
3) Sequential access, 4) Direct access, 5) None of these
19. The primary purpose of software is to turn data into _____
1) Web sites, 2) Information, 3) Programs, 4) Objects, 5) None of these
20. To what temporary area can you store text and other data, and later paste them to another location?
1) The clipboard, 2) ROM, 3) CD-ROM, 4) The hard disk, 5) None
21. Storage that retains its data after the power is tuned off is referred to as
1) volatile storage, 2) non-volatile storage, 3) sequential storage
4) direct storage, 5) None of these
22. _____is the science that attempts to produce machines that display the same type of intelligence that humans do.
1) Nano science, 2) Nanotechnology, 3) Simulation
4) Artificial intelligence (AI), 5) None of these
23. Changing an existing document is called _____ the document.
1) Creating, 2) Editing, 3) Modifying, 4) Adjusting, 5) None of these
24. Computers use the _____ number system to store data and perform calculations.
1) Decimal, 2) Hexadecimal, 3) Octal, 4) Binary, 5) None of these
25. Which of the following is the largest unit of storage?
1) GB, 2) KB, 3) MB, 4) TB, 5) None of these
26. The _____ key will launch the start buttons.
1) Esc, 2) Shift, 3) Windows, 4) Shortcut, 5) None of these
27. _____is the process of finding errors in software code.
1) Compiling, 2) Testing, 3) Running, 4) Debugging, 5) None of these
28. To move to the beginning of a line of text, press the _____ key.
1) Home, 2) A, 3) Page-up, 4) Enter, 5) None of these
29. Virtual memory is
1) Memory on the hard disk that the CPU uses as an extended RAM
2) RAM
3) Only necessary if you do not have any RAM in your computer
4) A back up device for floppy disks, 5) None of these
30. A _____ contains specific rules and words that express the logical steps of an algorithm.
1) Syntax, 2) Programming structure, 3) Programming language
4) Logic chart, 5) None of these
31. When sending an e-mail, the _____ line describes the contents of the message.
1) to, 2) subject, 3) contents, 4) CC, 5) None of these
32. The _____ tells the computer how to use its components.
1) Utility, 2) Network, 3) Operating system, 4) Application program, 5) None
1) volatile storage, 2) non-volatile storage, 3) sequential storage
4) direct storage, 5) None of these
22. _____is the science that attempts to produce machines that display the same type of intelligence that humans do.
1) Nano science, 2) Nanotechnology, 3) Simulation
4) Artificial intelligence (AI), 5) None of these
23. Changing an existing document is called _____ the document.
1) Creating, 2) Editing, 3) Modifying, 4) Adjusting, 5) None of these
24. Computers use the _____ number system to store data and perform calculations.
1) Decimal, 2) Hexadecimal, 3) Octal, 4) Binary, 5) None of these
25. Which of the following is the largest unit of storage?
1) GB, 2) KB, 3) MB, 4) TB, 5) None of these
26. The _____ key will launch the start buttons.
1) Esc, 2) Shift, 3) Windows, 4) Shortcut, 5) None of these
27. _____is the process of finding errors in software code.
1) Compiling, 2) Testing, 3) Running, 4) Debugging, 5) None of these
28. To move to the beginning of a line of text, press the _____ key.
1) Home, 2) A, 3) Page-up, 4) Enter, 5) None of these
29. Virtual memory is
1) Memory on the hard disk that the CPU uses as an extended RAM
2) RAM
3) Only necessary if you do not have any RAM in your computer
4) A back up device for floppy disks, 5) None of these
30. A _____ contains specific rules and words that express the logical steps of an algorithm.
1) Syntax, 2) Programming structure, 3) Programming language
4) Logic chart, 5) None of these
31. When sending an e-mail, the _____ line describes the contents of the message.
1) to, 2) subject, 3) contents, 4) CC, 5) None of these
32. The _____ tells the computer how to use its components.
1) Utility, 2) Network, 3) Operating system, 4) Application program, 5) None
33. Which grouping do you work with when formatting text in word?
1) Tables, paragraphs and indexes, 2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs, 4) Indexes, characters and tables
5) None of these
34. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data, 4) Accessing data on tape, 5) None
1) Tables, paragraphs and indexes, 2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs, 4) Indexes, characters and tables
5) None of these
34. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data, 4) Accessing data on tape, 5) None
35. Network components are connected to the same cable in the _____ topology.
1) Star, 2) Ring, 3) Bus, 4) Mesh, 5) Mixed
36. This component is required to process data into information and consists of integrated circuits.
1) Hard disk, 2) RAM, 3) CPU, 4) ROM, 5) None of these
37. One advantage of dial-up-internet access is ___
1) It utilises broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast, 5) None of these
38. What is the term for unsolicited e-mail?
1) News group, 2) Use net, 3) Backbone, 4) Flaming, 5) Spam
39. Two or more computers connected to each other of sharing information form a _____
1) Network, 2) Router, 3) Server, 4) Tunnel, 5) Pipeline
40. Computers that are portable and convenient for users who travel are known as _____
1) Super computers, 2) Lap tops, 3) Mini computers, 4) File servers, 5) None
41. A computer checks the _____ of user names and passwords for a match before granting access.
1) Website, 2) Network, 3) Backup file, 4) Data base, 5) None of these
42. Office LANs that are spread geographically apart on a large scale can be connected using a corporate _____
1) CAN, 2) LAN, 3) DAN, 4) WAN, 5) TAN
43. The code for a Web page is written using _____
1) A fifth generation language, 2) Win Zip
3) Peripherals, 4) Hypertext Markup Language, 5) URL
44. What is the process of copying software programs from secondary storage media to the hard disk called?
1) Configuration, 2) Download, 3) Storage, 4) Upload, 5) Installation
45. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as _____
1) Flash, 2) Spiders, 3) Cookies, 4) Applets, 5) Sparks
46. The first computers were programmed using _____
1) Assembly language, 2) Machine language, 3) Source code, 4) Object code
5) Spaghetti code
47. Which process checks to ensure the components of the computer and operating are connected properly?
1) Booting, 2) Processing, 3) Saving, 4) Editing, 5) None of these
48. In a relational database, this is a data structure that organizes the information about a single topic into rows and columns.
1) Block, 2) Record, 3) Tuple, 4) Table, 5) Command line interface
49. How can the user determine what programs are available on a computer?
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the operating system for a list of installed programs.
4) Checking the existing files saved on the disk, 5) None of these
50. When we run a program in HTML coding _____ is used as backend and ____ works as front-end.
1) Notepad - Internet-Explorer, 2) Notepad - Msn-messenger
3) MS-Word - Internet Explorer, 4) Both (1) and (2), 5) None of these
ANSWERS:
1)3 2)3 3)1 4)1 5)4 6)3 7)3 8)5 9)3 10)2
11)2 12)4 13)2 14)4 15)2 16)3 17)1 18)1 19)2 20)1
21)2 22)4 23)2 24)4 25)4 26)3 27)4 28)1 29)2 30)3
31)2 32)3 33)1 34)2 35)2 36)3 37)2 38)5 39)1 40)2
41)4 42)4 43)4 44)5 45)4 46)2 47)1 48)4 49)4 50)1
No comments:
Post a Comment