(Paper) IBPS Clerk Previous Year Exam Paper "Held on 14-12-2013, Computer Knowledge"


(Paper) IBPS Clerk Previous Year Exam Paper "Held on 14-12-2013, Computer Knowledge" 

IBPS Clerk Previous Year Exam Paper - 2013

Subject: Computer Knowledge

1. The advantage of a LAN is

(1) Sharing peripherals 
(2) Backing up your data 
(3) Saving all your data 
(4) Accessing the Web 
(5) Automatic printing of data
2. Of the 5 words listed below which one is the odd one out?

(1) Applications
(2) Peripherals 
(3) Programs 
(4) Software 
(5) Operating System
3. What type of device is a computer printer?

(1) Input 
(2) Input / Output 
(3) Software 
(4) Storage 
(5) Output
4. What is the biggest number you can get with 8 bits?

(1) 256 
(2) 128 
(3) 1000 
(4) 255 
(5) 1024
5. What type of device is a digital camera?

(1) Input 
(2) Output 
(3) Software 
(4) Storage 
(5) Input / Output
6. Which of the following domains is used by for-profit businesses?

(1) .com
(2) .edu
(3) .mil
(4) .net 
(5) .org
7. WAN stands for __

(1) Wired Area Network 
(2) Wide Area Network 
(3) Wide Array Net 
(4) Wireless Area Network 
(5) Wanted Area Network
8. What are lists of programs waiting to be run called?

(1) Shells 
(2) The background 
(3) Queues 
(4) Page frames 
(5) Lists
9. An example of peripheral equipment is the-

(1) Printer 
(2) CPU 
(3) spreadsheet 
(4) microcomputer
(5) ALU
10. Which of the following commercial software products are examples of operating system software and application software respectively?

(1) Microsoft Windows XP and Microsoft. Word 
(2) Microsoft Office XP and Microsoft Windows XP 
(3) MS DOS and Microsoft Windows XP 
(4) UNIX and LINUX 
(5) UNIX and Java
11. __ are attempts by individuals to obtain confidential information from you by falsifying their identity.

(1) Phishing trips 
(2) Computer viruses 
(3) Spyware scams 
(4) Viruses 
(5) Phishing scams
12. Why is it unethical to share copyrighted files with your friends?

(1) It is not unethical, because it is legal. 
(2) It is unethical because the files are being given for free. 
(3) Sharing copyrighted files without permission breaks copyright laws. 
(4) It is not unethical because the files are being given for free.
(5) It. is not unethical - any- one can access a computer
13. Which of the following can be used to select the entire document?

(1) CTRL + A 
(2) ALT + F5 
(3) SHIFT + A 
(4) CTRL + K 
(6) CTRL + H
14. The system unit-

(1) coordinates input and output devices 
(2) is the container that houses electronic components 
(3) is a combination of hardware and software 
(4) controls and manipulates data 
(5) does the arithmetic operations
15. The simultaneous processing of two or more programs by multiple processors is __

(1) multiprogramming 
(2) multitasking 
(3) time-sharing
(4) multiprocessing 
(5) None of these
16. The device which helps you to communicate with computer is called:

(1) Input device 
(2) Output device 
(3) Software device 
(4) Storage device 
(5) None of these
17. In order to avoid memorizing e-mail address you should use

(1) Browser 
(2) Search engine 
(3) List of Birth date 
(4) Phonebook 
(5) Address book
18. The devices which store information and that are used by computer for its functioning are called:

(1) Input devices
(2) Output devices 
(3) Software devices 
(4) Storage devices 
(5) None of these
19. Which among the following is not such an operation which can be carried out on objects in graphic programmed?

(1) Spell check 
(2) Change size
(3) Move 
(4) Delete 
(5) None of these
20. A hardware device which converts data into meaningful information is called

(1) Protector 
(2) Output device 
(3) Input device 
(4) Program 
(5) Processor
21. Which process checks to ensure the components of the computer are operating and connected properly?

(1) Booting 
(2) Processing 
(3) Saving 
(4) Editing 
(5) Starting
22. A means of capturing an image (drawing or photo) so that it can be stored on a computer is —

(1) Modem 
(2) Software 
(3) Scanner 
(4) Keyboard 
(5) Mouse
23. An error in a computer program

(1) Crash 
(2) Power Failure 
(3) Bug 
(4) Virus 
(5) Fatal error
24. Access control based on a person’s fingerprints is an example of—

(1) biometric identification 
(2) characteristic identification 
(3) characteristic security 
(4) fingerprint security 
(5) logistics
25. The patterns of printed lines on most products are called

(1) prices 
(2) striping 
(3) scanners 
(4) OCR 
(5) barcodes
26. Most mail programs automatically complete the following two parts in an e-mail –

(1) From: and Body: 
(2) From: and Date: 
(3) From: and To: 
(4) From: and Subject: 
(5) None of these
27. The computer’s capability of distinguishing spoken words is called –

(1) voice analysts 
(2) speech acknowledgement 
(3) voice recognition 
(4) speech interpretation 
(5) vocalization
28. Which of the following is an advantage of mounting an application on the Web?

(1) the possibility of 24-hour access for users 
(2) creating a system that can extend globally 
(3) standardizing the design of the interface 
(4) All of these 
(5) None of these
29. The first page of a Web site is called the –

(1) Homepage 
(2) Index 
(3) Java Script 
(4) Book mark 
(5) Intro Page
30. ERP is an acronym for –

(1) Enterprise Retirement Planning 
(2) Enterprise Relationship Planning 
(3) Enterprise Resource Planning 
(4) Enterprise Reorder Planning 
(5) Enterprise Retention Planning
31. Origin of internet can be tracked from

(1) ARPAnet 
(2) Radio networks 
(3) Satellite networks 
(4) Indian army networks 
(5) Air Force networks
32. To connect networks of similar protocols. __ are used

(1) Routers 
(2) Bridges 
(3) Gateways 
(4) Dial-up routers 
(5) None of these
33. Decimal equivalent of (11l1)2

(1) 11 
(2) 10 
(3) 1 
(4) 15 
(5) 13
34. _ is one reason for problems of data integrity

(1) Data availability constraints 
(2) Data inconsistency 
(3) Security constraints 
(4) Unauthorized access of data 
(5) Data redundancy
35. Dr. E.F. Codd represented____ rules that a database must obey if it has to be considered truly relational

(1) 10
(2) 8 
(3) 12 
(4) 6 
(5) 5
36. “>” symbol in DOS commands is use to

(1) Compare two values
(2) Redirect input 
(3) Redirect output 
(4) Filter data 
(5) None of these
37. System proposal is prepared in ____ phase of SDLC

(1) Conception 
(2) Initiation 
(3) Analysis 
(4) Design 
(5) construction
38. A data warehouse

(1) Contains numerous naming conventions and formats 
(2) Is organized around important subject areas 
(3) Contains only current data 
(4) Can be updated by end users 
(5) Explains some observed event or condition
39. Which of these is considered intelligent CASE tool

(1) Toolkit 
(2) Methodology companion 
(3) Workbench 
(4) Upper CASE 
(5) Lower CASE
40. Super computer developed by Indian scientists

(1) Param 
(2) Super301 
(3) Compaq Presario 
(4) CrayYMP 
(5) Blue Gene

Previous
Next Post »
Powered by Blogger.