IBPS Clerk Online CWE Previous Year Exam Paper - 2016 (Held on: 01-01-2017) (Computer Knowledge)


IBPS Clerk Online CWE Previous Year Exam Paper - 2016 (Held on: 01-01-2017)


 Subject : Computer Knowledge


1.The scrambling of code is known as:

(1) Encryption
(2) Firewalling
(3) Scrambling
(4) Deception
(5) Permuting

2.What is the full form of VolP?

(1) Voice of Internet Power
(2) Voice Over Internet Protocol
(3) Voice on Internet Protocol
(4) Very Optimized Internet Protocol
(5) Very Official InternetProtocol

3.Why do you log off from you computer when going out from your office?

(1) Someone might steal your files and passwords etc.
(2) In order to save electricity
(3) Logging off is essential to increase performance.
(4) Logging off is mandatory you before go out
(5) Logging off is a good exercise to perform regularly.

4.Which of the following is not responsible for the performance of the computer?

(1) Number of keys in the keyboard.
(2) Name of the video/ graphics card
(3) Memory in the video/graphics card
(4) The clock speed of the processor.
(4) The clock speed of the processor.

5.Which of the following is used to access a file from the computer store?

(1) Insert
(2) Retrieve
(3) File
(4) Print
(5) Find

6.Hard drive is used to store ………………..

(1) volatile data
(2) non-volatile data
(3) permanent data
(4) temporary data
(5) intermediate data

7.Which of the following is the combination of numbers, alphabets along with username used to get access to .user account?

(1) Password
(2) Username
(3) Title name
(4) Host-id
(5) Screen name

8.Which of the following is the type of software that has self-replicating software that causes damage to files and system?

(1) Viruses
(2) Trojan horses
(3) Bots
(4) Worms
(5) Backdoors

9.……… is used for very large files or where a fast response time is not critical. The files to be transmitted are gathered over a period and then sent together as a batch.

(1) Batch processing
(2) Online processing
(3) File processing
(4) Data processing
(5) Text processing

10.Which of the following system is a function of dedicated PCs?

(1) Meant for a single user
(2) Meant for the single task
(3) Deal with single software
(4) Deal with only editing
(5) Deal for music purpose

11.What can possibly be the drawback of emails?

(1) emails requires being physically delivered to the user.
(2) emails infects computer.
(3) emails are very expensive to transmit.
(4) emails are slow to load.
(5)people don't check emails regularly.

12.Which of the following is a valid email address?

(1) [email protected]@ed
(2) name.web site @info. in
(3) [email protected]
(4) [email protected]
(5)[email protected]@info.com

13.Which of the follOwing character set supports Japanese and Chinese font?

(1) EBCDIC
(2) ASCII
(3) BC
(4) ECBI
(5) Unicode

14.What is the full form of RTF?

(1) Richer Text Formatting
(2) Rich Text Format
(3) Right Text Fishing
(4) Right Text Font
(5) Rich Text Font

15.Which of the following is the text alignment available in word processing software that adjusts the left margin while keeping the right margin in any way?

(1) Justify
(2) Left justify
(3) Right justify
(4) Centre
(5) Orientation

16.Which of the following is false about the clock of the system?

(1) It is the property of the toolbar.
(2) The system can periodically refresh the time by synchronising with a time source.
(3) System time is the current date and time of day.
(4) The system keeps time so that your applications have ready access to accurate time.
(5) The system bases system time on coordinated universal time (UTC).

17.Which of the following are properties of USB?

(1) Platform independent
(2) Platform dependent
(3) Source dependent
(4) Software dependent
(5) Software independent

18.An act of sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information?

(1) Phishing
(2) Spam
(3) Hacking
(4) Cracking
(5) Malware

19.Which of the following is the organized collection of large amount of interrelated data stored in a meaningful way used for manipulation and updating?

(1) Database
(2) File
(3) Folder
(4) Data-mining
(5) Data source

20.Which among the following cycle consists of an input, processing, output and storage as its constituents?

(1) Processing
(2) Output
(3) Input
(4) Storage
(5) Data

Printed Study Material for IBPS Clerk Exam

21.The part of a computer that coordinates all its functions is called its:

(1) ROM program
(2) System board
(3) Arithmetic logic unit
(4) Control unit
(5) None of these

22.Oracle is a :

(1) RDBMS
(2) Hardware
(3) System software
(4) High level language
(5) None of the above

23.Which of the following computer languages is a mathematically oriented language used for scientific problems?

(1) FORTRAN
(2) COBOL
(3) LISP
(4) PROLOG
(5) ANDROID

24.Coded entries which are used to gain access to a computer system are called:

(1) Entry codes
(2) Passwords
(3) Security commands
(4) Codewords
(5) None of these

25.Communication between a computer and a keyboard involves……………………….. transmission.

(1) Automatic
(2) Half-duplex
(3) Full-duplex
(4) Simplex
(5) None of the above

26.In which of the following level of OSI model, data encryption is done?

(1) Application layer
(2) Session layer
(3) Transport layer
(4) Network layer
(5) Presentation layer

27.………………..controls the way in which the computer system functions and provides a means by which users can interact with the computer.

(1) The operating system
(2) The motherboard
(3) The platform
(4) Application software
(5) Hardware

28.Which of the following is not a property of fibre optic cabling?

(1) Transmits at faster speeds than copper cabling
(2) Easier to capture a signal from than copper cabling
(3) Very resistant to interference
(4) Carries signals as light waves
(5) Less attenuation

29.DEL command is used to ……………………

(1) delete files
(2) delete directory
(3) delete labels
(4) delete contents of file
(5) None of these

30.…………………………….. are software which is used to do particular task.

(1) Operating system
(2) Program
(3) Data software
(4) Data
(5) None of these

31.……………is the process of dividing the disk into tasks and sectors.

(1) Alloting
(2) Crashing
(3) Formatting
(4) Tracking
(5) Decrypting

32.What type of software creates a smaller file that is faster to transfer over the internet?

(1) Compression
(2) Fragmentation
(3) Encapsulation
(4) Unzipped
(5) Abstraction

33.A process known as……………… is used by large retailers to study trends.

(1) data mining
(2) data selection
(3) POS
(4) data conversion
(5) data inversion

34.The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality is called …………………..

(1) Robotics
(2) Simulation
(3) Computer forensics
(4) Animation
(5) Encapsulation

35.…………………..is data that has been organised and presented in a meaningful fashion.

(1)Aprocess
(2) Software
(3) Storage
(4) Information
(5) Data

36.The components that process data are located in which of the following?

(1) Input devices
(2) Output devices
(3) System unit
(4) Storage component
(5) None of these

37.The CPU and memory are located in which of the following devices?

(1) Motherboard
(2) Expansion board
(3) Storage device
(4) Output device
(5)None of these

38.…………….is the revolving around the use of nanostructures to build devices on an extremely small scale.

(1) Nanotechnology
(2) Micro-technology
(3) Computer forensics
(4) Artificial Intelligence
(5) Very small scale technology

39.The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called ………………………….

(1) instructions
(2) the operating system
(3) application software
(4) the system unit
(5) the hardware unit

40.Which of the metal or plastic case that holds all the physical parts of the computer?

(1) System unit
(2) CPU
(3) Mainframe
(4) Platform
(5) Microprocessor

Printed Study Material for IBPS Clerk Exam

<<Go Back To Main Page