Sunteți pe pagina 1din 19

1.The Title and Page number of a document can be displayed using which of the following options?

1) Insert table 2) Spelling and Grammar 3) Header and Footer 4) Thesaurus 5) File 4. Which of the following is not used to align text in a document? 1) Left 2) Right 3) Center 4) Diagonal 5) Justify 7. Which of the following refers to the process of trading goods over the internet? 1) E-seva 2) E-Trading 3) E-Finance 4) E-Sales 5) E-Commerce 10. USB 3.0 is the second major revision of the Universal Serial Bus standard for Computer Connectivity. Which of the following is true about USB 3.0? 1) It is more than 10 times as fast as USB 2.0 2) Its Data transfer rate is up to 5 Gbits/sec 3) Power consumption is less than USB 2.0 4) All the above 5) None of the above 13. Which of the following uses computers and data communication to transmit data electronically between computers? 1) EDI 2) Physical Media 3) Printing a paper 4) DTE 5) None 16. .... are attempts by individuals to obtain confidential information from the user by falsifying their identity. 1) Phishing Trips 2) Computer Virus 3) Spyware Scams 4) Viruses 5) None of these 19. Which of the following is not an advantage of multiprocessor system? 1) Low Cost 2) High Reliability 3) Increased Throughput 4) All of these 5) None of these 22. Which memory is normally used between RAM and CPU? 1) Cache 2) Register 3) Virtual 4) Disk

2. Which of the following is the advantage of Assembly language over Machine language? 1) Easy to use 2) Easy to understand 3) Easy to modify 4) Only 1 and 3 5) All the above 5. Which of the following characteristics is/are used to compute the results from excel data? 1) Goto 2) Table 3) Diagram 4) Formula and Function 5) None of these 8. Multiple autonomous computers communicating through a computer network to achieve a common goal is called ....... 1) Centralized Computing 2) Co-operative Computing 3) Distributed Computing 4) Connected Computing 5) None of these 11. MICR is exclusively used in: 1) Libraries 2) Super markets 3) Stock markets 4) Banking Industry 5) None of these

3. Pop-ups are a form of ..... on the World Wide Web? 1) Instant Messaging 2) Search Engines 3) Browsers 4) Mark-up Languages 5) Online Advertising 6. ....... is a combination of text, audio, still images, animation, video. 1) Multiplexer 2) Multiplier 3) Multimedia 4) Multiuser 5) None of these 9. In order to change page margins in a word document: 1) Drag the scroll box on the scroll bars. 2) Delete the margin boundaries on the ruler 3) Right Click on the ruler 4) Drag the margin boundaries on the ruler 5) None of these 12. A communication system which provides communication in both directions, but not simultaneously is known as: 1) Half-Duplex 2) Full-Duplex 3) Broadcast 4) Only 1 and 2 5) None of these

14. Which key, when toggled off, causes keyed characters to override existing characters? 1) Delete 2) Insert 3) Page up 4) Page down 5) Down arrow 17. The default view in Excel is: 1) Work 2) Auto 3) Normal 4) Roman 5) None of these

15. An act of unauthorized copying of computer software is called: 1) Network Piracy 2) License Piracy 3) Plagiarism 4) Software Piracy 5) None of these 18. Bus topology is also known as ........ 1) Multipoint network 2) Multi drop network 3) Broadcasting network 4) All of these 5) None of these

20. Data redundancy can be eliminated by using: 1) Networking 2) DBMS 3) Operating System 4) Processing the data manually 5) None of these 23. ...... is a computer software designed to help people involved in a common task to achieve goals. 1) Shareware 2) Software 3) Freeware

21. System bus is also known as : 1) Internal bus 2) Information bus 3) RTA bus 4) Component bus 5) None of these 24. The CPU of a computer ? 1) understands only assembly language 2) understands machine language and high-level languages 3) understands only machine language 4) understands only high-level language

1. Digital Camera is an? 1) Input Device 2) Output Device 3) Storage Device 4) Controller Device 5) None 4. Which of the following is the largest storage? 1) Mega Byte 2) Kilo Byte 3) Giga Byte 4) Byte 5) Tera Byte 7. Which of the following best defines batch processing? 1) Sharing of a computing resource among many users 2) Execution of bulk jobs at a time 3) Allocation of computer system and its resources to more than one user 4) Execution of series of jobs on a computer without manual intervention 5) None 10. Which of the following is true about CPU? 1) It contains electronic circuits that cause processing to occur 2) It makes the information resulting from processing available for use 3) It allows data, programs, commands to be entered into a computer 4) It is comprised of electronic components that store data 5) None 13. Raja wants to print his music notes sheet from a document. He used the keyboard shortcut Ctrl + P. The document, by default is printed in .... mode. 1) Landscape 2) Portrait 3) Page Setup 4) Print View 5) None 16. Which of the following is not a packaged software? 1) MS - PowerPoint 2) MS - Excel 3) MS - Access 4) Adobe Photoshop 5) None 19. Which of the following device is used to send and receive information printed on a paper through telephone line? 1) Scanner 2) Printer 3) Fax Machine 4) e - mail 5) MICR 22. Which of the following contains Only input devices? 1) Scanner, Printer, Monitor 2) Keyboard, Printer, Monitor 3) Mouse, Printer, Monitor 4) Plotter, Printer, Monitor

2. Adwords is a(n)? 1) Advertising Service by Microsoft 2) Advertising Service by Google 3) Advanced Search Engine 4) Automatic words Search Engine by Yahoo 5) Advertising Service by Yahoo 5. Application software contains programs designed for a(n)? 1) Computer Administrator 2) Computer Programmer 3) Initiator 4) End User 5) None 8. Which of the following is true about RAM and ROM? 1) They belong to internal storage 2) They are directly accessible 3) They are read only memories 4) All of these 5) Only 1 and 2

3. When a computer is switched on, during which process POST is performed? 1) In booting process 2) In integrity process 3) During reliability test 4) In shut down process 5) None 6. System Software includes which of the following? 1) Linkers 2) Debuggers 3) Loaders 4) Compilers 5) All the above 9. The secret code that restricts entry to some programs / software is: 1) Password 2) Pass code 3) Entry - code 4) Access code 5) None

11. Which of the following keys on keyboard cannot work independently and should be used in combination with another key to perform a task? 1) Function 2) Control 3) Arrow 4) Space bar 5) None 14. Which of the following computers is most powerful? 1) Mini Computers 2) Mainframe Computers 3) Super Computers 4) Micro Computers 5) None

12. The commonly used name for Malicious Software is? 1) Badware 2) Malware 3) Malicious Software 4) Unethical ware 5) Harmful ware

15. Word Processing softwares are used to create: 1) Databases 2) Documents 3) Spreadsheets 4) Slides 5) None

17. The number of distinct pixels in each dimension that can be displayed is called 1) Quality 2) Correctness 3) Resolution 4) Repetition 5) Projection 20. Which of the following is a data - entry device? 1) Barcode Reader 2) MICR 3) OMR 4) OCR 5) All of these 23. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group? 1) Printer 2) Scanner 3) Mouse

18. The amount of space that has been used up and the remaining free space of the hard disk is known to the user by? 1) Viewing the properties 2) Opening it 3) Renaming it 4) Moving it to trash / Recyclebin 5) None 21. In Computer terminology, Choices are usually referred to as? 1) Options 2) Exits 3) Sources 4) Codes 5) None 24. What is the function of a Drop Cap in MS - Word? 1) It does not allow capital letters to be used in the documents. 2) It turns the first letter of each word into Upper Case

1. Which of the following memory chip is programmed during the manufacturing process? 1) RAM 2) ROM 3) PROM 4) EEPROM 5) None 4. Which of the following is the India's first Super Computer? 1) Aakash 2) Sea Deep 3) First PC 4) PARAM 8000 5) Cray - 1 7. ...... terminals are often connected to complex inventory and sales computer systems. 1) Data 2) Information 3) Credit Cards 4) Query 5) Point-of-Sale (POS) 10. Which of the following is true about URL ? 1) It is a web browser 2) It is a messenger 3) It is a mail service 4) It is a global address of documents and other resources on World Wide Web 5) It is same as internet 13. Producing Output involves: 1) Accepting information from the outside world 2) Communication with another computer 3) Moving and storing information 4) Communicating information to the outside world 5) None 16. Which of the following is / are the functions of operating system? 1) Memory Management 2) Access to I/O devices 3) Controlled Access to files 4) All the above 5) None 19. Moving the page around to view all the pages in the document on the screen is referred to as: 1) Surfing 2) Navigating 3) Hyperlink 4) Scrolling 5) Browsing 22. WWW can be accessed using ? 1) Web Browsers 2) e - mail 3) Search Engine 4) http 5) Chatting 25. The components that process data

2. Computer uses which of the following languages to process data? 1) High Level 2) Assembly 3) Binary 4) Hexa Decimal 5) Octal 5. Parallelogram in a flowchart usually represents: 1) Input 2) Output 3) Process 4) Both 1 & 2 5) Decision 8. Which of the following is true about Dialup internet access? 1) It utilizes the existing telephone services 2) It uses a router for security 3) It utilizes the broadband technology 4) Modem speeds are very fast 5) All are Correnct 11. A computer program is: 1) A set of instructions that enable the computer to solve a problem or perform a task 2) Main memory 3) Pseudo code 4) A flowchart 5) None 14. One of the reasons to copy files from CD - ROM to the computer's hard disk is: 1) The above stated procedure cannot be done 2) Faster access 3) To be able to print 4) CD - ROM can only be read once 5) CD - ROM contains only Temporary data

3. Magnetic Disk medium uses ..... method for accessing data. 1) Direct 2) Serial 3) Sequential 4) Rotational 5) None 6. Registers are located in? 1) Memory 2) ALU 3) OS 4) CPU 5) None 9. Icons, Windows, Menu and buttons are features of ? 1) DOS 2) GUI 3) Command Driven Interface 4) All the above 5) None 12. Graphical pictures that represent an object like file, folder etc., are: 1) Taskbar 2) Graphical toolbar 3) Desktop 4) Folder 5) Icon 15. The place in a computer, where the OS, application programs and data in current use are kept so that they can be quickly reached by the computer processor is? 1) ROM 2) RAM 3) TRASH 4) Access control list 5) None 18. Which part of the URL http://www.ibps.in/clerks2012.html will specify the rules to be followed when accessing a file ? 1) http:// 2) www 3) ibps 4) .in 5) /clerks2012.html 21. Which kind of malware typically has a tendency to reside in / to get attach to a computer program? 1) Worm 2) Trojan Horse 3) Computer Virus 4) All the Above 5) None 24. Kalyan gave incorrect settings in the CMOS which can prevent him from? 1) Logging on to the internet 2) Searching on the web 3) Booting up the computer 4) Accessing the computer 5) Printing a document 27. Which of the following are the least

17. The easiest way to select text is to left click the mouse and ? 1) Hold the Shift key 2) Hold the Ctrl key 3) Move the mouse 4) Drag Over the words you want to highlight 5) None

20. Which of the following is the short-cut key to close an active tab of a browser? 1) Alt + F4 2) Ctrl + C 3) Ctrl + F4 4) Shift + C 5) Ctrl + W 23. A wireless network uses ...... waves to transmit signals. 1) Electro-Magnetic 2) Sound 3) Radio 4) Video 5) None 26. Which of the following is not one of the

1. Which of the following peripheral devices displays information to a user? 1) Monitor 2) Keyboard 3) Secondary Storage Devices 4) Secondary Storage Media 5) None

4. Which of the following is not a form of Biometrics? 1) Fingerprint 2) Password 3) Retina Scan 4) Breath Scan 5) None of these

7. What is the cell content alignment by default in a Excel? 1) Left Aligned 2) Centrally Aligned 3) Text is left aligned and numbers are right aligned 4) Text is right aligned and numbers are left aligned 5) None of these 10. Printed information called ......, exists physically and is more permanent form of output than that presented on a display device. 1) Soft Copy 2) Hard Copy 3) Carbon Copy 4) Desk Copy 5) None of these 13. Which of the following keyboard short-cut is used to center the paragraph? 1) Ctrl + C 2) Ctrl + E 3) Ctrl + L 4) Ctrl + R 5) None of these 16. Simultaneous execution of two or more instructions is called: 1) Sequential Access 2) Reduced Instruction Set Computing (RISC) 3) Multiprocessing 4) Disk Mirroring 5) None of these 19. Which of the following is not an Operating System of Microsoft? 1) XP 2) 7 3) CE 4) Vista 5) Linux 22. Which of the following functions is not performed by servers? 1) Processing Websites 2) Database Sharing 3) Storage 4) Word Processing

2. Bandwidth refers to 1) The cost of the cable required to implement a WAN 2) The cost of the cable required to implement a LAN 3) The amount of information a peer-to-peer network can store 4) The amount of information a communication medium can transfer in a given amount of time 5) None of these 5. Which of the following best defines a compiler? 1) Translates machine language into a high level language 2) Translates one statement at a time as the program executes 3) Translates two statements at a time as the program executes 4) Produces object code 5) is less sophisticated than an assembler 8. Which of the following device is used to transmit data over telecommunication lines? 1) Drive 2) Folder 3) Modem 4) Platforms 5) None of these 11. To restart the computer .... key/ button is used. 1) Ctrl + Del 2) Backspace + Ctrl 3) Ctrl + Alt + del 4) Reset 5) None 14. If a memory chip is volatile, it will ....... 1) explode if exposed to high temperatures 2) lose its contents if current is turned off 3) be used for data storage only 4) be used to both read and write data 5) None of these 17. The different styles of lettering in a word processing program is called: 1) Font 2) Calligraphy 3) Writing 4) Manuscript 5) None of these 20. The code for a web page is written using: 1) A fifth generation language 2) Winzip 3) Perl 4) Hypertext Markup Language 5) C++ 23. Documentation of softwares/ Computer programs is important so that: 1) Users can learn how to use the program 2) Other programmers can know how to maintain the program 3) The programmer can see why the code is

3. A processor that collects the transmissions from several communication media and send them over a single line that operates at a higher capacity is called ........ 1) Multiplexer 2) Bridge 3) Hub 4) Router 5) None of these 6. Which of the following is not a web browser? 1) Opera 2) Netscape 3) Microsoft Outlook 4) Internet Explorer 5) Safari

9. A ........ is approximately one billion bytes. 1) Kilobyte 2) Bit 3) Gigabyte 4) Megabyte 5) None of these 12. Which of the following is the benefit of using computer? 1) Computers are very fast and can store huge amounts of data 2) Computers provide accurate output even when input is incorrect 3) Computers are designed to be inflexible 4) All the above 5) None of these 15. Which of the following is not a hardware? 1) An image file 2) A keyboard 3) A monitor 4) A mouse 5) Pen drive 18. A CD-ROM disk ... 1) cannot be erased and rewritten 2) has more storage capacity than a CD-R 3) holds less data than a floppy disk 4) can be written only once 5) None of these 21. Periodically adding, changing and deleting file records is called 1) Updating 2) Upgrading 3) Restructuring 4) Renewing 5) None of these 24. What is the difference between a check box and Radio button? 1) No difference 2) In radio buttons multiple options can be selected whereas in check boxes only single option can be selected

1. Pick the odd one out: 1) Interpreter 2) Operating System 3) Compiler 4) Assembler 5) None of these 4. Servers are computers that provide resources to other computers connected to a 1) Network 2) Super Computer 3) Micro Computer 4) Client 5) None of these 7. To save an existing file with a new name or to a new location, you should use the ..... command. 1) Save 2) Save and Replace 3) Save as 4) New file 5) None of these 10. Where is data saved permanently? 1) RAM 2) ROM 3) CPU 4) Printer 5) None of these

2. When a particular object or an image is copied, in which of the following places it is stored? 1) Notice Board 2) Interim Board 3) Notepad 4) Clipboard 5) None of these 5. A bar which is seen at the bottom of the screen (usually) when the computer is turned on is known as: 1) Address Bar 2) Task Bar 3) Windows Bar 4) Line bar 5) None of these 8. Peripheral devices such as printers and monitors are considered to be: 1) Hardware 2) Software 3) Data 4) Information 5) None of these 11. Which of the following describes relational database? 1) It provides relationship between integers 2) It consists of separate tables of related data 3) It retrieves data related to its queries 4) It provides the relationship between floats 5) None of these 14. Domain name Extension '.nic.in' is generally used for which of the following: 1) Organization websites 2) Educational Websites in india 3) Companies in india 4) e-governance websites 5) None of these 17. '' symbol in computers refers to: 1) Copy 2) Circled 'C' 3) Copyright 4) Italicized C 5) None of these 20. Ctrl, shift, alt are called ....... keys. 1) Adjustment 2) Function 3) Modifier 4) Alphanumeric 5) None of these 23. ........... is processed by the computer into information. 1) Numbers 2) Processor 3) Input 4) Data 5) None of these 26. Which of the following is a function of UPS? 1) It limits damage caused by fluctuating

3. The Term 'BIT' is the short form for: 1) Mega Byte 2) Binary Language 3) Binary Digit 4) Binary Number 5) None of these 6. Something which has easily understood instructions is said to be: 1) User friendly 2) Information 3) Word Processing 4) Icon 5) None of these 9. In a database, ....... fields store numbers used to perform calculations. 1) Next 2) Key 3) Alpha Numeric 4) Numeric 5) None of these 12. Find the odd one out: 1) Projector 2) Speakers 3) Monitor 4) Microphone 5) Printer

13. A program for viewing webpages is called: 1) Word Processor 2) Spread sheet 3) Protocol 4) Browser 5) Database 16. What is the symbol for inbox in mail? 1) BOX 2) Envelope 3) Upper Case 'I' 4) Lower case 'I' 5) None of these 19. File ....... shrinks the size of a file so that it requires less storage space. 1) Scanning 2) Synthesizing 3) Defragmenting 4) Compression 5) None of these 22. The name, a user assigns to a document is called: 1) File name 2) Program 3) Record 4) Data 5) None of these 25. The internet allows you to: 1) Send electronic mail 2) View web pages

15. ........... view shows how the content on printed page, along with footer and margin header, appear. 1) Draft 2) Full screen reading 3) Outline 4) Page layout 5) None of these 18. Which of the following is a professional social networking site? 1) Facebook 2) Orkut 3) Twitter 4) LinkedIn 5) None of these 21. An email address typically consists of user id followed by ........ and the domain name. 1) @ 2) # 3) & 4) 5) None of these 24. A menu contains a list of ........ 1) commands 2) data 3) objects 4) reports 5) None of these 27. Youtube, which provides a service of streaming videos online is provided by .... 1) Google

11. Internet Protocol Version 4, Consists of how many bits? 1) 16 bits 2) 8 bits 3) 30 bits 4) 32 bits 5) 64 bits 4. A ....... is approximately equal to one billion bytes. 1) Kilobyte 2) Bit 3) Gigabyte 4) Megabyte 5) None 7. What is the capacity of a standard 3.5'' floppy disk? 1) 1.44 GB 2) 1.44 MB 3) 1.44 KB 4) 1.44 B 5) None 10. A collection of programs that controls how the computer runs and processes information is called: 1) Operating System 2) Computer 3) Office 4) Compiler 5) Interpreter 13. Find the odd one out. 1) Hard Disk 2) Flash Drive 3) DVD 4) CD 5) Monitor

2. A computer virus is a software program which has the essential ability to1) Clone itself 2) Hide itself 3) Damage Program 4) Damage Data 5) None 5. Which of the following operations is not performed by Computer? 1) Taking the input 2) Processing 3) Controlling 4) Understanding 5) None 8. Which of the following Operating Systems does not have a Graphical User Interface? 1) UNIX 2) LINUX 3) Microsoft Windows 4) Mac OS 5) None 11. Which of the following is not an example of hardware? 1) Word 2) Printer 3) Monitor 4) Mouse 5) Scanner

3. Which of the following is the short cut for opening Task Manager? 1) Ctrl + Shift + Del 2) Alt + Shift + Del 3) Ctrl + Alt + Del 4) Alt + Windows + Del 5) None 6. ....... is a set of computer programs used on a computer to help perform tasks. 1) An instruction 2) Software 3) Memory 4) Processor 5) None 9. Which of the following shortcut keys is used to check spelling in Microsoft Word? 1) F1 2) F5 3) F4 4) F7 5) None 12. Peripheral Devices such as Printers and Plotters are considered to be: 1) Hardware 2) Software 3) Data 4) Information 5) None

14. To move the data from one part of the document to another, which of the following is used? 1) Cut and Paste 2) Copy and Paste 3) Cut and Delete 4) Copy and Undo 5) Cut and Insert 17. Which of the following is the short cut key to center a paragraph? 1) Ctrl + C 2) Ctrl + E 3) Alt + P 4) Alt + C 5) None

15. Which of the following is the full form of LSI? 1) Low Scale Information 2) Large Scale Information 3) Low Scale Integration 4) Large Scale Integration 5) Local Scale Integration 18. In windows XP, what does 'XP' stand for? 1) XTRA Programming 2) XTREME Programming 3) XTRA Processing 4) XTREME Power 5) None

16. Which of the following is an active cell in Excel? 1) Current Cell 2) Formula 3) Range 4) Cell Address 5) None 19. ADSL is the abbreviation of:

20. 'FIND' option is available under which 21. Which of the following keys launches

1) Asymmetric Digital Subscriber Line 2) Anti Dot Subscriber Line 3) Asymmetric Digital System Line 4) Anti Digital System Line 5) None 22. Which of the following is not a type of error? 1) Logical Error 2) Runtime Error 3) Syntax Error 4) All the above 5) None 25. DSL is an example of ............ connection. 1) Network 2) Wireless 3) Slow 4) Broadband 5) None

of the following menu? 1) Tools 2) View 3) File 4) Edit 5) None 23. '.bmp' extension is used by which of the following software? 1) MS- Powerpoint 2) MS- Word 3) MS-Excel 4) Paint 5) All the above 26. The number of pixels displayed on a screen is known as the screen ..... 1) Resolution 2) Colour Depth 3) Refresh Rate 4) Viewing Size 5) None

'Start' button? 1) Windows 2) Shift 3) Shortcut 4) Esc 5) None 24. Which of the following is the minimum zoom percentage supported by MS Word? 1) 10% 2) 15% 3) 25% 4) 4% 5) None 27. Which of the following is the correct order of the four major functions of a computer? 1) Process, Output, Input, Storage 2) Input, Output, Process, Storage 3) Process, Storage, Input, Output 4) Input, Process, Output, Storage 5) None

28. ....... servers store and manage files for network users. 1) Authentication 2) Main 3) Web 4) File 5) None

29. Which of the following keys is used to move to the bottom of the document? 1) Insert key 2) Home Key 3) Ctrl + End 4) End 5) None

30. Which of the following folder retains copies of mails that are started but are not yet ready to send? 1) Inbox 2) Outbox 3) Drafts 4) Sent Items 5) Address Box

31. Date and time are available on the desktop are available at which of the following places? 1) TaskBar 2) My Computer 3) Recycle Bin 4) Only 2 and 3 5) None 34. Which of the following is the slowest Internet connection? 1) Digital Subscriber Line 2) T1 3) Cable Modem 4) Leased Line 5) Dial-Up

32. What is the full form of USB? 1) Universal Security Block 2) Universal Security Bus 3) Under Security Block 4) Universal Serial Block 5) Universal Serial Bus

33. Before beginning to use e-mail, one must have a(n) 1) Printer 2) Mouse 3) Server 4) Scanner 5) e-mail Account 36. The speed of the clock frequency of a micro-processor is measured in .... 1) Hertz 2) Baud Rate 3) CPS 4) Bits 5) Bytes/sec

35. What happens when Ctrl + V is pressed? 1) A capital V letter is typed into your document at the cursor point 2) The selected item is pasted from the clipboard 3) The selected item is pasted to the Clipboard.

4) The selected drawing objects are distributed vertically on the page. 5) None 37. Which among the following has the smallest storage capacity? 1) Hard Disk 2) Floppy Disk 3) CD 4) DVD 5) Zip Disk 40. What is the full form of SQL, related to Database? 1) Structured Queue Language 2) Systematic Queue Language 3) Structured Query Language 4) Systematic Query Language 5) None 38. How many types of views are present in Power point? 1) 3 2) 4 3) 5 4) 6 5) None 39. Which of the following Computer languages is used for Artificial Intelligence? 1) FORTRAN 2) PROLOG 3) C 4) COBOL 5) None 21-1; 22-5; 23-4; 24-1; 25-4; 26-1; 27-4; 28-3; 29-3; 30-3; 31-1; 32-5; 33-5; 34-5; 35-2; 36-1; 37-2; 38-2; 39-2; 40-3.

ANSWERS:
1-4; 2-1; 3-3; 4-3; 5-4; 6-2; 7-2; 8-1; 9-4; 10-1; 11-1; 12-1; 13-5; 14-1; 15-4; 16-1; 17-2; 18-2; 19-1; 20-4;

1. Which of the following is most essential for effective multimedia presentations incorporates user participation or .... 1) Links 2) Buttons 3) Interactivity 4) Integration 5) None 4. Microsoft Windows and Apple Mac are widely used Operating systems in today's world. Which of the following feature makes them so popular? 1) Multitasking Capacity 2) Calligraphy 3) User-friendly GUI 4) Being Inexpensive 5) None of these 7. In Windows XP, which of the following views is the best to see the file size and modified dates of all files in a folder. 1) List 2) Icon 3) Thumbnails 4) Details 5) None of these

2. Most of the websites have moving graphics, which are called as: 1) animations 2) vectors 3) links 4) morphs 5) None

3. Which of the following is the term used to enlarge a window to its maximum area so that it fills the entire desktop? 1) Maximize 2) Zoom 3) Enlarge 4) Extend 5) None of these 6. Which of the following is an object oriented feature: 1) Structured Programming 2) Multi-Tasking 3) Linking 4) Inheritance 5) None of these

5. Physical components of a computer are called: 1) Hardware 2) Software 3) Viruses 4) Internet 5) None of these

8. Which of the following keys is used to remove a character on the right of the cursor in a word document? 1) Home 2) End 3) Delete 4) Backspace 5) None of these

9. During the boot process, which of the following looks for the system files? 1) CD 2) BIOS 3) CPU 4) DVD 5) None of these

10. DNS is the abbreviation of: 1) Domain Name Service 2) Domain Name System 3) Direct Network Service 4) Direct Network System 5) None of these

11. File transfer protocol is used for: 1) Transferring email 2) Uploading files 3) Downloading files 4) Both 1 and 2 5) Both 2 and 3

12. Which of the following keys is used in combination with another key to perform a specific task? 1) Function 2) Space Bar 3) Del 4) Alt 5) Arrow 15. Which of the following shows all the websites and pages that are already visited over a period of time? 1) Status Bar 2) Task Bar 3) History List 4) Tool Bar 5) None 18. Which of the following allows users to upload files to an online site so that they can be viewed and edited from another location? 1) Office Live 2) Microsoft Outlook 3) Common-Purpose applications 4) Web-hosted Technology 5) None of these 21. In the basic computer processing cycle which of the following are present? 1) Input processing and output 2) System and application 3) Data information and application 4) Hardware, software and storage 5) None of these 24. Which of the following is considered as both input and output device? 1) Printer 2) Scanner 3) Monitor 4) Speaker 5) Modem

13. Which of the following command is used to start MS Word from the Run command in the Start Menu? 1) Msword 2) Winword 3) Winms 4) Worddoc 5) None of these 16. A Web browser is an example of: 1) Open Source Software 2) Horizontal Market Software 3) Vertical Market Software 4) Firmware 5) None of these

14. Windows Explorer is a ......... 1) Personal Computer 2) Drive 3) Browser 4) Network 5) File manager

17. Hyperlink in a web document usually appears: 1) Bold and Coloured 2) Bold and Italicized 3) Underlined and coloured 4) Bold and underlined 5) Italicized and underlined 20. In Power-point, the Footer and Header button can be found on the Insert tab in which of the following groups? 1) Illustrations Group 2) Object Group 3) Text Group 4) Tables Group 5) None of these 23. Which of the following can be used instead of remembering e-mail addresses? 1) Phone book 2) Address Book 3) Search Engine 4) Browser software 5) None of these

19. The letter and the number of the intersecting column and row is the ........ 1) Cell location 2) Cell position 3) Cell address 4) Cell coordinates 5) Cell contents 22. Which of the following defines a Firmware? 1) The physical Component used in a computer system. 2) A set of instructions through which a computer does one or more work. 3) People involved in the computing process. 4) A set of programs that are preinstalled in read-only memory of computer during manufacturing. 5) None of these 25. '.exe', '.html', '.mp3', '.doc' etc, are examples of which of the following? 1) Databases 2) Extensions 3) Domains

26. Computers that are portable and convenient for users who travel are known as: 1) Super Computers 2) Laptops

27. Which of the following menu is selected to go to print preview? 1) Edit 2) File 3) Insert

4) Protocols 5) Websites 28. Which of the following is a popular programming language for developing multimedia web pages, websites and web-based applications? 1) COBOL 2) Java 3) BASIC 4) FORTRAN 5) None of these 31. Any letter, number or symbol found on the keyboard that you can type into the computer is called: 1) Output 2) Character 3) Type 4) Print 5) None of these

3) Mini Computers 4) Mainframe Computers 5) None of these 29. Which of the following will be the common file extension for an installation file? 1) .mpeg 2) .doc 3) .ppt 4) .pdf 5) .exe 32. A technology for using the Internet or another intermediate network to connect computers to isolated remote computer networks that would otherwise be inaccessible is known as: 1) Local Area Network (LAN) 2) File Transfer Protocol (FTP) 3) Campus Area Network (CAN) 4) Virtual Private Network (VPN) 5) None of these 35. Which of the following is not a graphic file format that allows animation to be viewed on a computer? 1) GIF 2) MNG 3) MP8 4) SVG 5) SWF

4) View 5) None of these 30. Windows XP, Mac, Linux are examples of: 1) Processors 2) Domain names 3) Modems 4) Operating systems 5) None of these

33. Pick the odd one out. 1) Mouse 2) Keyboard 3) Printer 4) Windows 5) Speaker

34. When sending an e-mail, the ..... line describes the contents of the message. 1) To 2) Subject 3) Contents 4) CC 5) None of these

ANSWERS:
1-3; 2-1; 3-1; 4-3; 5-1; 6-4; 7-4; 8-3; 9-2; 10-2; 11-5; 12-4; 13-2; 14-5; 15-3; 16-2; 17-3; 18-4; 19-3; 20-3; 21-1; 22-4; 23-2; 24-5; 25-2; 26-2; 27-2; 28-2; 29-5; 30-4; 31-2; 32-4; 33-4; 34-2; 35-3;

1. Which of the following powerpoint view displays each slide of the presentation as a thumbnail and is useful for rearranging slides? 1) Slide show of memory gets lost 1. Which type 2) Slide master off? when you switch 3) Slide sorter 1) ROM 4) Notes Page 2) RAM 5) Design Slide 3) CACHE 4) Dynamic 4. The speed of which of the following 5) Static memory chips is faster? 1) Notprogram for viewing web pages 4. A Fixed 2) called: is DRAM 3) SRAM 1) hardware 4) For smaller chips SRAM is faster 2) software 5) For larger chips DRAM is faster 3) storage 4) browser 5) None of these 7. In the URL 'www.dbsdynamic.blogspot.in' what 7. In the URL https://twitter.com, what does the domain name extension '.in' does 's' represent in 'https'? represent? 1) Safe 1) International 2) System 2) internet 3) Start-up 3) intra net 4) Semantic 4) India 5) Secured these 5) None of 10. A device that connects to a 10. Which of the following is an/ are network without the use of a cable is advantages of LAN? said to be: 1) Sharing peripherals 1) Distributed 2) Backing up your data 2) Non-Wired 3) Saving all your data 3) Centralised 4) Accessing the web 4) Open source 5) Automatic printing of data 5) Wireless 13. Mr. Prashanth has a song sung by 13. The example of standard file him on the desktop, in the C drive, format is: and also in the D drive. This scenario 1) JPEG (.jpg) in computer language is generally 2) Bitmap (.bmp) referred to as: 3) Word (.doc) 1) Data Redundancy 4) Text (.txt) 2) Multiple Data Places 5) Excel (.xls) 3) Various File Places 4) Data Inconsistency 16. The ability of an 5) Data Independent Operating system to run more than one application at a time is called: 1) Multitasking 2) Multi user computing 3) Time sharing 16. When data changes in multiple 4) Programming language lists and all lists are not updated, this 5) None of these causes: 1) Data Population Problem 2) Data Reduction 19. Which of the 3) Data Induction following is a 4) Data Overload 5) Data Inconsistency 19. Find the Mis-Matched pair. 1) Chrome - Google 2) Opera - Opera Software

2. A set of rules for telling the computer what operations to perform is / are called: 1) Structures 2) Procedural Language 3) Command Language would use 2. Which type of network 4) Natural Language phone lines? 5) Programming Language 1) WAN 2) LAN 3) WWAN 4) Wireless 5. Mahesh Babu has his cute childhood 5) None of these photos in an album which might fade out in a A computer cannot perform which of 5. couple of years, which he wants to showfollowingfans by uploading it in his the it to his functions? twitter account. Which of the following 1) Addition devices can he use to do that? 2) Subtraction 1) Keyboard 3) Bake a cake 2) Mouse 4) Division 3) Printer of these 5) None 4) Scanner 5) None of theserepair of the software 8. Free of cost bug available in internet is called: 8. Which among the following is the file 1) Version extension for Word Documents? 2) Ad-on 1) .xls 3) Tutorial 2) .ppt 4) FAR 3) .docx 5) Patch 4) .worddoc 5) None 11. Which of the following software 11. Four of the following are alike in a applications would be most appropriate certain way and so form a group. Which for performing Statistical and Numerical is the one that does not belong to the calculations: group? 1) Document Processor 1) Applications 2) Graphics Package II 2) Peripherals 3) Power Point 3) Programs 4) SpreadSheet 4) Software 5) Meta Processor 5) Operating system 14. What is a Firewall? 14. Which of the following is the fastest 1) A wall to protect against Fire Memory? 2) A software to protect from computer 1) Hard disk hacker intrusions 2) DVD ROMs 3) A software to destroy computer 3) Cache Memory 4) A wall to make partitions in computer 4) Static RAM 5) None of these 5) None of these 17. While filling up an application form which of the following keys is used to move the cursor to the next box? 1) Esc 2) Shift 17. The legal right to use software based 3) Control on specific restrictions is granted via a: 4) Tab 1) Software privacy policy 5) Alt 2) Software License 3) Software password manager 20. When log 4) Softwarea computer is attacked by a 5) None of these 20. What is the full form of RISC? 1) Reduced Instruction Set Computing 2) Reformed Instruction System

3. Devices that enter information and let you communicate with the computer are called: 1) Software 2) Hardware 3) Output Devices 3. Speakers / Headphones are ____ devices. 4) Input 1) Input / Output devices 5) Input Devices 2) Input/ Output 3) Software 4) Storage 5) Output 6. Which of the following is not a social networking site? 1) WAYN 6. CD's or DVD's are ____ type of devices. 2) Hi 5 1) Input 3) Orkut 2) Output 4) Yahoo 3) Software 5) Facebook 4) Storage 5) Input/output 9. Which of the following is READ only disc? 1) DVD-R 9. Linux Operating system is an example of 2) DVD-ROM which of the 3) DVD-RW following? 1) Freeware 4) CD-R 2) Open Source 5) None of these Software 3) Shareware 4) Complimentary 5) None of these 12. Removing and replacing devices without 12. Digital camera is a ____device. turning off the computer is referred to as: 1) Input 1) Search Engines 2) Output 2) Operating System 3) Software 3) Software 4) Storage device 4) Resource Locators 5) Input/ output 5) Plug-n-Play

15. Chiranjeevi sent a mail to Pavan Kalyan by 15. Which of the following is NOT a common putting his email address in 'Cc' and to feature of software application? Nagababu by putting his email address in 'Bcc'. 1) Menus Which of the following is true based on the 2) Windows given scenario? 3) Help 1) Pavan Kalyan can view the email address of 4) Search Chiranjeevi and Nagababu 5) None of these 2) Nagababu can view the email address of Pavan Kalyan & Chiranjeevi 18. Pavan Kalyan can view the email Banks of 3) The Softwares which are used in address generally are: Nagababu only 1) Character Driven 4) Both 1 and 2 2) Folder of them is true 5) None Driven 3) Menu Driven 4) Touch screens 18. Which of the following is not an operating 5) None of these system? 1) Windows 2000 2) DOS 3) Windows 7 21. Mac Os X Lion mode4) In page preview 5) Google 21. The common name for Modulator and Demodulator is: 1) Modem

measurement of speed of internet? 1) MB 2) Kbps 3) KB 4) TB 5) QPSI

virus it cannot lead to: 1) Disk Crash 2) Motherboard Crash 3) Corruption of a program 4) Deletion of files 5) None of these

1) You can see all pages of your document 2) You can only see the page you are currently working 3) You can only see pages that do not contain graphics 4) You can only see the title page of your document 5) None of these 24. Files are organized by storing them in: 1) Archives 2) Folders 3) Indexes 4) Lists 5) None of these

22. What is the full form of EDI? 1) Electronic Data Information 2) Electronic Disk Information 3) Electric Data information 4) Electronic Data Interchange 5) None of these

23. How many different documents can be opened at one time? 1) Not more than Three 2) Only One 3) As many as your computer memory will hold 4) No more than your taskbar can display 5) None of these 26. Saving is a process to: 1) Copy the document from memory to storage medium 2) Bring change in the present status of the document 3) Change the face or entire form 4) Develop the document by recording the text with the use of keyboard 5) None of these 29. The among of vertical space between lines of text in a document is called : 1) Double-space 2) Line spacing 3) Single space 4) Vertical spacing 5) None of these 32. What is the full form of Wi-Fi? 1) Wireless Front 2) Wired Front 3) Wireless Fidelity 4) Wired Fidelity 5) None of these

25. What kind of resource is most likely to be a shared common resource in a computer network? 1) Printers 2) Speakers 3) Floppy drives 4) Keyboards 5) None of these

27. In word you can force a page break by: 1) Positioning your cursor at the appropriate place and pressing the F1 key 2) Using the Insert / section Break 3) By positioning your cursor at the appropriate place and pressing Ctrl + Enter 4) By changing the font size of your document 5) None of these

28. A computer cannot 'boot' if it does not have: 1) Compiler 2) Loader 3) Operating System 4) Assembler 5) None of these 31. A software which has a capability of replicating itself and can be harmful to the computer is: 1) MS-Office 2) Win Zip 3) Virus 4) Windows Media Player 5) Notepad 34. What is the full form of EPROM? 1) Erasable Programmable ReadOnly Memory 2) Electronic Programmable ReadOnly Memory 3) Enterprise Programmable ReadOnly Memory

30. Which of the following shortcut keys is used to underline a word / line in a word document 1) Ctrl + L 2) Ctrl + U 3) Ctrl + K 4) Alt + U 5) Tab + L 33. The process of transferring files from a computer on the Internet to your computer is called: 1) Downloading 2) Uploading 3) FTP 4) JPEG 5) Downsizing

35. CISC the abbreviation of: 1) Complex Instruction Set Code 2) Communication Instruction Set Computing 3) Complex Instruction Signal Computing 4) Communication Instruction Signal

ANSWERS:
1-2; 2-1; 3-5; 4-4; 5-3; 6-4; 7-4; 8-5; 9-2; 10-1; 11-2; 12-5; 13-4; 14-3; 15-2; 16-1;17-4; 18-3; 19-2; 20-2; 21-1; 22-4; 23-3; 24-2; 25-1; 26-1; 27-3; 28-3; 29-2; 30-2; 31-3; 32-3; 33-2; 34-1; 35-5

4) Extended Programmable ReadOnly Memory 5) Electrical Programmable ReadOnly Memory

Code 5) Complex Instruction Set Computing

1. What is e-commerce? 1) Buying and selling of international goods 2) Buying and selling of products and services over the internet 3) Buying and selling of products having to do with computers 4) Buying and selling of products and services not found in stores 5) Buying and selling of electronic goods 4. An error is also known as : 1) Debug 2) Bug 3) Cursor 4) Icon 5) None of these

2. The term user Interface refers to : 1) What the user sees on the screen and how they can interact with it 2) How the operating system responds to the user commands 3) The means by which the user interacts with the peripheral devices on the computer 4) All of these 5) None of these 5. Archive is : 1) Back-up Storage 2) Forward Operation 3) Primary Storage 4) Name of famous processor 5) None of these

3. Which of the following is not an input device? 1) Keyboard 2) Joystick 3) Monitor 4) Microphone 5) None of these

6. Which media has the ability to have data/information written on them by users more than once 1) CD-R disks 2) CD-RW disks 3) Zip disks 4) Opti disks 5) Both CD-RW and Zip disks 9. A pictorial representation that uses predefined symbols to describe either the logic of the computer program or the data flow and processing steps of a system is referred as : 1) Flow chart 2) Algorithm 3) Program 4) Protocol 5) None of these 12. The most frequently used instructions of a computer program are likely to be fetched from: 1) the hard disk 2) cache memory 3) RAM 4) registers 5) None of these 15. Verification of a login name and password is known as: 1) authorization 2) accessibility

7. BCC in regard to emails, stands for : 1) Best Client Copy 2) Better Communication Copy 3) Best Computer Copy 4) Better Client Copy 5) None of these

8. A(n) .................. contains text as well as information about the text 1) browser language 2) machine language 3) protocol language 4) markup language 5) annotated language

10. A ........ is the term used when a search engine returns a web page that matches the search criteria 1) Blog 2) Hit 3) Link 4) View 5) None of these 13. What is a backup? 1) Restoring the information backup 2) An exact copy of a system's information

11. URL stands for ........ 1) Universal Research List 2) Universal Resource List 3) Uniform Resource Locator 4) Uniform Research Locator 5) None of these

14. Which of the following statements is FALSE concerning file names? 1) Files may share the same name or the same extension but not both

3) The ability to get a system up and running in the event of a system crash or failure 4) All of these 5) None of these

2) Every file in the same folder must have a unique name 3) File extension is another name for file type 4) The file extension comes before the dot (.) followed by the file name 5) None of these 17. Which term identifies a specific computer on the web and the main page of the entire site 1) URL 2) Website Address 3) Hyperlink 4) Domain name 5) None of these

3) authentication 4) logging in 5) None

16. Every computer has a(n) ........; many also have ......... 1) Operating System; a client system 2) Operating system; instruction sets 3) Application programs; an operating system 4) Application programs; a client system 5) Operating system; application programs 19. ......... means that the data contained in a database is accurate and reliable. 1) Data redundancy 2) Data Integrity 3) Data Reliability 4) Data consistency 5) None 22. Which of the following window allows entering values and formulas in the Excel ? 1) Title bar 2) Menu Bar 3) Formula Bar 4) Standard Tool Bar 5) None of these 25. A DVD is an example of a(n) 1) Hard disk 2) Optical disk 3) Output device 4) Solid-state storage device 5) None of these

18. The altering of data so that it is not usable unless the changes are undone is ...... 1) Bio metrics 2) Compression 3) Encryption 4) Ergonomics 5) None of these

20. Device that take a picture of an object and convert it into a computerized image : 1) Hard drive 2) Scanner 3) Printer 4) Modem 5) Cable 23. Which of the following helps to store information in the computer? 1) Disk Drive 2) Keyboard 3) Monitor 4) Printer 5) None of these

21. Which of the following is not a search engine? 1) Bing 2) Baidu 3) Yahoo 4) Safari 5) Ask 24. A computer virus normally attaches itself to another computer program known as : 1) Target program 2) Host program 3) Bluetooth 4) Front door program 5) Trojan horse

26. Computer programs are written in a highlevel programming language; however, the human readable version of a program is called........ 1) cache 2) instruction set 3) source code 4) word size 5) None of these 29. The ......... file format is a method of encoding pictures on a computer. 1) HTML 2) JPEG 3) FTP 4) URL 5) DOC

27. The software tools that enable a user to interact with a computer for specific purposes are known as 1) Hardware 2) Networked Software 3) Shareware 4) Applications 5) None of these

28. A ......... is a set of rules. 1) resource locator 2) domain 3) hypertext 4) URL 5) protocol

30. The shortcut key for finding a word or a part of the word in MS word is : 1) Ctrl + M 2) Ctrl + S 3) Alt + M 4) Alt + K

5) Ctrl + F 31. Storage that retains its data after the power is turned off is referred to as 1) Volatile storage 2) Non-volatile storage 3) Sequential Storage 4) Direct storage 5) None of these 34. Antivirus is an example of which of the following? 1) An operating system 2) A business software 3) A security utility 4) An office suite 5) None 32. HTML stands for: 1) Hyper Text Mark-Up language 2) High Technology Mobile Language 3) Hyper Text Mobile Language 4) High Technology Mark-up Language 5) None of these 35. A computer checks the ......... of user names and passwords for a match before granting access. 1) Website 2) Network 3) Backup file 4) Database 5) None of these 33. Which ports connect special types of musical instruments to sound cards ? 1) BUS 2) CPU 3) USB 4) MIDI 5) MINI 36. Restarting a computer that is already on is referred to as: 1) shutting down 2) cold booting 3) warm booting 4) logging off 5) None of these

ANSWERS:
1-2; 2-1; 3-3; 4-2; 5-1; 6-2; 7-5; 8-4; 9-1; 10-2; 11-3; 12-2; 13-4; 14-4; 15-3; 16-5; 17-1; 18-3; 19-2; 20-2; 21-4; 22-3; 23-1; 24-5; 25-2; 26-3; 27-4; 28-5; 29-2; 30-5; 31-2; 32-1; 33-4; 34-3; 35-4; 36-3

at Monday, July 30, 2012 Email ThisBlogThis!Share to TwitterShare to Facebook Labels: MCQ, PRACTICE QUESTIONS

2 comments:
sai said... nice.......... 20 October 2012 19:44

bare bones said... Its Really Cool!! It will help beginners a lot..

Windows MAC Support 20 October 2012 22:10

Post a Comment
Newer PostOlder PostHome

VISITORS LOCATION USEFUL SITES

IBPS STUDY MATERIAL


RESOURCES

COMPUTER TERMS (1) HISTORY OF COMPUTERS(7) IBPS (19) MCQs (51) MODEL PAPER (12) PRACTICE QUESTIONS (52) SHORTCUTS (2) SOLVED PAPERS (21) TERMINOLOGY (3)

IBPS CLERKS EXAM GENERAL AWARENESS PRACTICE MCQs - 1. As per the modern definition of the bank, which is the first bank established in India in 1786? 1) The General Bank of India 2) Union Bank of India 3) ... 12 hours ago

BLOG ARCHIVE

2012 (59) November (2) BANKING AWARENESS October (3) September (3) IndiaFirst Life launches Simple Benefit August (1) Plan - Private insurer July (8) IndiaFirst Life Insurance SBI launched Simple Benefit ASSOCIATE BANKS CLERKS Plan that offers dual EXAM COMPUTER benefits of a life cover and AWARENESS... COMPUTERassured savings. Simple Benefit ... AWARENESS PRACTICE

QUESTIONS

6 days ago

COMPUTER SOCIO KNOWLEDGE PRACTICE ECONOMY AT QUESTIONS A GLANCE COMPUTER KNOWLEDGE PRACTICE MCQs ABOUT ME COMPUTER KNOWLEDGR PRACTICE COMPUTER QUESTIONS FOR BANK EXA... KNOWLEDGE COMPUTERView my complete profile KNOWLEDGE TOTAL IBPS PAGEVIEW Probationary Officers' Exam 2011 S COMPUTER ABBREVIATIONS FOR BANK 246, EXAMS June (1) 249 May (6) April (16) March (5) February (13) January (1) 2011 (60)

FOLLOWERS

RECENT VISI TO RS
Simple template. Template images by latex. Powered by Blogger.

S-ar putea să vă placă și