Pls Note:If any file is not downloading pls mark mail to nsmfdoon@gmail.com with file name/detail to get the file in your mail box directaly.

Wednesday, 28 December 2011

Computer Awareness Sample Paper IBPS CWET CLERK


IBPS CWET CLERK COMPUTER KNOWLEDGE MODEL PRACTICE PAPER


1. One megabyte equals approximately
1) 1,000 bits, 2) 1,000 bytes, 3) 1 million bytes, 4) 1 million bits, 5) 2,000 bytes

2. Data going into the computer is called?
1) Output, 2) Algorithm, 3) Input, 4) Calculations, 5) Flowchart

3. Which of the following refers to the memory in your computer?
1) RAM, 2) DSL, 3) USB, 4) LAN, 5) CPU

4. When you are working on a document on PC, where is the document temporarily stored?
1) RAM, 2) ROM, 3) The CPU, 4) Flash memory, 5) The CD-Rom

5. Information travels between components on the mother board through-
1) Flash memory, 2) CMOS, 3)Bays, 4) Buses, 5) Peripherals

6. How are data organised in a spreadsheet?
1) Lines and spaces, 2) Layers and planes, 3) Height and width, 4) Rows and columns, 5) None of these

7. Which of the following is true?
1) Byte is a single digit in a binary number
2) Bit represents a grouping of digital numbers
3) Eight-digit binary number is called a byte
4) Eight-digit binary number is called a bit, 5) None of these

8. Transformation of input into output is performed by?
1) Peripherals, 2) Memory, 3) Storage, 4) The Input-Output unit, 5) The CPU

9. How many options does a binary choice offer?
1) None, 2) One, 3) Two, 4) It depends on the amount of memory in the computer
5) It depends on the speed of the computer's processor

10. .....is collection of web pages and ......is the very first page that we see on opening of a web-site
1) Home-page, Web-page, 2) Web-site, Home-page
3) Web-page, Home-page, 4) Web-page, Web-site, 5) None of these

11. When the pointer is positioned on a _____ it is shaped like a hand.
1) Grammar error, 2) Hyperlink, 3) Screen tip, 4) Spelling error, 5) Formatting error

12. The _____ of a system includes the programs or instructions.
1) Hardware, 2) Icon, 3) Information, 4) Software, 5) None of these

13. 'www' stands for _____
1) World Word Web, 2) World Wide Web, 3) World White Web
4) World Work Web, 5) None of these

14. What menu is selected to cut, copy, and paste?
1) File, 2) Tools, 3) Special, 4) Edit, 5) None

15. You can use the tab key to
1) Move a cursor across the screen, 2) Indent a paragraph
3) Move the cursor down the screen, 4) Only (1) and (2)
5) None of these

16. The most important or powerful computer in a typical network is _____
1) Desktop, 2) Network client, 3) Network server, 4) Network station, 5) None

17. Which of the following is an example of connectivity?
1) Internet, 2) Floppy disk, 3) Power cord, 4) Data, 5) None of these

18. The ability to find an individual item in a file immediately _____ is used.
1) File allocation table, 2) Directory
3) Sequential access, 4) Direct access, 5) None of these

19. The primary purpose of software is to turn data into _____
1) Web sites, 2) Information, 3) Programs, 4) Objects, 5) None of these

20. To what temporary area can you store text and other data, and later paste them to another location?
1) The clipboard, 2) ROM, 3) CD-ROM, 4) The hard disk, 5) None
21. Storage that retains its data after the power is tuned off is referred to as
1) volatile storage, 2) non-volatile storage, 3) sequential storage
4) direct storage, 5) None of these

22. _____is the science that attempts to produce machines that display the same type of intelligence that humans do.
1) Nano science, 2) Nanotechnology, 3) Simulation
4) Artificial intelligence (AI), 5) None of these

23. Changing an existing document is called _____ the document.
1) Creating, 2) Editing, 3) Modifying, 4) Adjusting, 5) None of these

24. Computers use the _____ number system to store data and perform calculations.
1) Decimal, 2) Hexadecimal, 3) Octal, 4) Binary, 5) None of these

25. Which of the following is the largest unit of storage?
1) GB, 2) KB, 3) MB, 4) TB, 5) None of these

26. The _____ key will launch the start buttons.
1) Esc, 2) Shift, 3) Windows, 4) Shortcut, 5) None of these

27. _____is the process of finding errors in software code.
1) Compiling, 2) Testing, 3) Running, 4) Debugging, 5) None of these

28. To move to the beginning of a line of text, press the _____ key.
1) Home, 2) A, 3) Page-up, 4) Enter, 5) None of these

29. Virtual memory is
1) Memory on the hard disk that the CPU uses as an extended RAM
2) RAM
3) Only necessary if you do not have any RAM in your computer
4) A back up device for floppy disks,             5) None of these

30. A _____ contains specific rules and words that express the logical steps of an algorithm.
1) Syntax,       2) Programming structure,        3) Programming language
4) Logic chart,   5) None of these

31. When sending an e-mail, the _____ line describes the contents of the message.
1) to, 2) subject, 3) contents, 4) CC, 5) None of these

32. The _____ tells the computer how to use its components.
1) Utility, 2) Network, 3) Operating system, 4) Application program, 5) None
33. Which grouping do you work with when formatting text in word?
1) Tables, paragraphs and indexes, 2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs, 4) Indexes, characters and tables
5) None of these

34. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data, 4) Accessing data on tape, 5) None

35. Network components are connected to the same cable in the _____ topology.
1) Star, 2) Ring, 3) Bus, 4) Mesh, 5) Mixed

36. This component is required to process data into information and consists of integrated circuits.
1) Hard disk, 2) RAM, 3) CPU, 4) ROM, 5) None of these

37. One advantage of dial-up-internet access is ___
1) It utilises broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast, 5) None of these

38. What is the term for unsolicited e-mail?
1) News group, 2) Use net, 3) Backbone, 4) Flaming, 5) Spam

39. Two or more computers connected to each other of sharing information form a _____
1) Network, 2) Router, 3) Server, 4) Tunnel, 5) Pipeline

40. Computers that are portable and convenient for users who travel are known as _____
1) Super computers, 2) Lap tops, 3) Mini computers, 4) File servers, 5) None

41. A computer checks the _____ of user names and passwords for a match before granting access.
1) Website, 2) Network, 3) Backup file, 4) Data base, 5) None of these

42. Office LANs that are spread geographically apart on a large scale can be connected using a corporate _____
1) CAN, 2) LAN, 3) DAN, 4) WAN, 5) TAN

43. The code for a Web page is written using _____
1) A fifth generation language, 2) Win Zip
3) Peripherals, 4) Hypertext Markup Language, 5) URL

44. What is the process of copying software programs from secondary storage media to the hard disk called?
1) Configuration, 2) Download, 3) Storage, 4) Upload, 5) Installation

45. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as _____
1) Flash, 2) Spiders, 3) Cookies, 4) Applets, 5) Sparks

46. The first computers were programmed using _____
1) Assembly language, 2) Machine language, 3) Source code, 4) Object code
5) Spaghetti code

47. Which process checks to ensure the components of the computer and operating are connected properly?
1) Booting, 2) Processing, 3) Saving, 4) Editing, 5) None of these

48. In a relational database, this is a data structure that organizes the information about a single topic into rows and columns.
1) Block, 2) Record, 3) Tuple, 4) Table, 5) Command line interface

49. How can the user determine what programs are available on a computer?
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the operating system for a list of installed programs.
4) Checking the existing files saved on the disk, 5) None of these

50. When we run a program in HTML coding _____ is used as backend and ____ works as front-end.
1) Notepad - Internet-Explorer, 2) Notepad - Msn-messenger
3) MS-Word - Internet Explorer, 4) Both (1) and (2), 5) None of these

ANSWERS:
1)3 2)3 3)1 4)1 5)4 6)3 7)3 8)5 9)3 10)2 
11)2 12)4 13)2 14)4 15)2 16)3 17)1 18)1 19)2 20)1
21)2 22)4 23)2 24)4 25)4 26)3 27)4 28)1 29)2 30)3
31)2 32)3 33)1 34)2 35)2 36)3 37)2 38)5 39)1 40)2
41)4 42)4 43)4 44)5 45)4 46)2 47)1 48)4 49)4 50)1

No comments:

Post a Comment