Computer Knowledge
IBPS CWE Question Paper – 2014. These are previous year bank Question Papers, which you need to check out while preparing for your bank job recruitment.
1. Another name for a program is
(a) software
(b) procedure
(c) typology
(d) utilities
(e) userware
Question 2. ……………. is a communications technology used by some incoming mail services.
(a) Telnet
(b) TCP
(c) FTP
(d) GIF
(e) POP3
3. The two basic parts of URLs are
(a) ICP and IP
(b) TCP/IP and ISP
(c) TCP and ftp
(d) destination and device
(e) the protocol and the domain name
4. The primary purpose of software is to turn data into
(a) information
(b) programs
(c) objects
(d) charts
(e) websites
Question 5. The ……….. database is the most widely used database structur
(a) hierarchical
(b) general
(c) standard
(d) table
(e) relational
6. Mail from unwanted senders can be blocked by
(a) not buying anything online so that junk mail senders will not having anything to benefit by
(b) sending them nasty replies when they send any mail
(c) using mail filters
(d) clicking the unsubscribe link
(e) e-mailing them and asking to the removed from the list
7. POP denotes
(a) Post Office Program
(b) Post Office Protocol
(c) Protocol on Program
(d) Protocol on Protocol
(e) Program of of Programmer
8. How many gigabytes are there in a petabyte?
(a) 1000
(b) 001
(c) 100
(d) 1000000
(e) 5000000
Question 9. For a browser to connect to other resources, the location or address of the resources must be specified. These addresses are called
(a) MSN
(b) e-mail forms
(c) packets
(d) IDs
(e) URLs
10. The extensions .gov, .edu, .mil, and .net are c
(a) mail to addresses
(b) add-ons
(c) domain codes
(d) DNSs
(e) e-mail targets
11. Software that is actively utilised by end-users (like Word or Photoshop) is called
(a) actionware
(b) operating system
(c) system software
(d) driver
(e) application software
12. Using a ………… helps to place an image into a live video conference.
(a) printer
(b) digital camera
(c) video camera
(d) webcam
(e) scanner
Question 13. Programs designed to perform specific tasks related to managing computer resources are called
(a) operating system
(b) helper software
(c) system software
(d) application software
(e) utility programs
14. A rectangular area on a computer screen that can contain a document, program or messages is referred to as a (n)
(a) field
(b) opening
(c) window
(d) tuplet
(e) cell
15. The storage locations in the internal storage of a CPU are called
(a) reference points
(b) addresses
(c) contents
(d) mask
(e) locations
Question 16. Of the following types of computers, which is the most powerful?
(a) Laptop
(b) Mainframe computer
(c) Minicomputer
(d) Supercomputer
(e) Microcomputer
17. An input device, which can read characters directly from an ordinary piece of paper, is
(a) OMR
(b) POS
(c) OCR
(d) MSI
(e) CD
18. The radian of a number system
(a) has nothing to do with digit position value
(b) equals the number of its distinct counting digits
(c) is more than the number of its distinctcounting digits
(d) is always an even number
(e) is variable
19. Which of the following statements is false?
(a) passwords are case sensitive.
(b) passwords are not echoed on the screen for security resasons.
(c) A good password should be no more than six characters long.
(d) password is a secret code that authenticates a person to the computer.
(e) passwords should be changed frequently
Question 20. The most common method for gaining access to the internet is through a
(a) dumb terminal
(b) keyboard
(c) provider or host computer
(d) virtual provider provider or computer
(e) point-to-point computer
21. Which of the following is a format for storing and backing up computer data on tape that evolved from the Digital Audio Tape (DAT) technology?
(a) Audio interchange file format
(b) Digital data storage
(c) Virtual tape system
(d) Tape archive
(e) Data aggregation
22. A compiler means
(a) keypunch operator
(b) computer data collector
(c) a person who compiles source programs
(d) a program which translates source program into object program
(e) the same thing as a programmer
23. Specialised programs designed to allow particular input or output devices to communicate with the rest of the computer system are called
(a) compilers
(b) action drivers
(c) interpreters
(d) device drivers
(e) operating systems
Question 24. ………. get transmitted across the web by harmful chain letters and hoaxes.
(a) Flames and infections
(b) Flames
(c) Wamings
(d) Viruses
(e) Infections
25. ATM machines run ………. OS.
(a) network
(b) web
(c) embedded
(d) disintegrated
(e) open source
26. Moving from one website to another is called
(a) jumping
(b) applying
(c) surfing
(d) moving
(e) shifting
27. In a client/server network, the user’s computer is considered the
(a) client
(b) website
(c) library
(d) server
(e) hoster
28. A program that is used to view websites is called a
(a) word processor
(b) spreadsheet
(c) browser
(d) web viewer
(e) viewer
29. The physical component of a computer that processes data in order to create information is called the
(a) specialware
(b) typology
(c) software
(d) hardware
(e) compiler
Question 30. An emerging trend is to free users from owning and storing applications by using
(a) word processing packages
(b) backup applications
(c) applications packages
(d) storage packages
(e) web-based applications
31. Which is a secondary memory device?
(a) Mouse
(b) Floppy disk
(c) Scanner
(d) CPU
(e) ALU
32. Which of the following is possible with open architecture?
(a) A minimum of six new devices to be added to a computer
(b) Hot swapping of devices.
(c) Users to upgrade and add new devices as they come on the market.
(d) All hardware, input and output devices to be located in one efficient box
(e) A minimum of four new devices to be added to a computer.
33. …………. are special visual and sound effects contained in presentation graphics file.
(a) Attractions
(b) Simulations
(c) Animatronics
(d) Graphics
(e) Animations
34. Step-by-step instructions that run the computer are
(a) CPUs
(b) Programs
(c) Solutions
(d) Hardware
(e) Documents
Question 35. The process of writing computer instructions in a programming language is known as
(a) processing
(b) algorithming
(c) coding
(d) file
(e) instrucitoning
36. Which of the following refers to too much electricity and may cause a voltage surge
(a) Shock
(b) Anomaly
(c) Splash
(d) Spike
(e) Virus
37. Rules for exchaning data between computers are called
(a) procedures
(b) protocols
(c) hyperlinks
(d) programs
(e) hyper-actions
38. Which of the following is used to write webpages?
(a) URL
(b) HTML
(c) HTTP
(d) FTP
(e) Telnet
39. ……….. is the most important/powerful computer in a typical network.
(a) Network client
(b) Desktop
(c) Network switch
(d) Network station
(e) Network server
Question 40. Raw, unprocessed facts, including text, numbers, images and sounds, are calle
(a) applets
(b) data
(c) melaware
(d) items
(e) java
You Maybe interested in- IBPS Question Paper – 2011 Clerk (CWE)
New India Assurance Administrative Officer recruitments 2021 | JOBS near me.
AP Mahesh Bank Jobs 2021 – 109 GM, Dy. GM & Other Posts |JOBS near me
MAHA Jobs 2021 | mahajobs.maharashtra.gov.in
RBI Office Attendant Marks 2021 – Online Exam Marks Released
APCOB Manager, Staff Asst Admit Card 2021 – Online Exam Call Letter Download