(Paper) IBPS Clerk Previous Year Exam Paper "Held on 14-12-2013, Computer Knowledge"

IBPS Clerk Previous Year Exam Paper - 2013

Subject: Computer Knowledge

1. The advantage of a LAN is

(1) Sharing peripherals
(2) Backing up your data
(3) Saving all your data
(4) Accessing the Web
(5) Automatic printing of data

2. Of the 5 words listed below which one is the odd one out?

(1) Applications
(2) Peripherals
(3) Programs
(4) Software
(5) Operating System

3. What type of device is a computer printer?

(1) Input
(2) Input / Output
(3) Software
(4) Storage
(5) Output

4. What is the biggest number you can get with 8 bits?

(1) 256
(2) 128
(3) 1000
(4) 255
(5) 1024

DOWNLOAD IBPS CLERK Question Papers PDF

DOWNLOAD IBPS PO Question Papers PDF

DOWNLOAD MORE BANK EXAMS E-BOOKS

Printed Study Material for IBPS Clerk Exam

5. What type of device is a digital camera?

(1) Input
(2) Output
(3) Software
(4) Storage
(5) Input / Output

6. Which of the following domains is used by for-profit businesses?

(1) .com
(2) .edu
(3) .mil
(4) .net
(5) .org

7. WAN stands for __

(1) Wired Area Network
(2) Wide Area Network
(3) Wide Array Net
(4) Wireless Area Network
(5) Wanted Area Network

8. What are lists of programs waiting to be run called?

(1) Shells
(2) The background
(3) Queues
(4) Page frames
(5) Lists

9. An example of peripheral equipment is the-

(1) Printer
(2) CPU
(3) spreadsheet
(4) microcomputer
(5) ALU

10. Which of the following commercial software products are examples of operating system software and application software respectively?

(1) Microsoft Windows XP and Microsoft. Word
(2) Microsoft Office XP and Microsoft Windows XP
(3) MS DOS and Microsoft Windows XP
(4) UNIX and LINUX
(5) UNIX and Java

11. __ are attempts by individuals to obtain confidential information from you by falsifying their identity.

(1) Phishing trips
(2) Computer viruses
(3) Spyware scams
(4) Viruses
(5) Phishing scams

12. Why is it unethical to share copyrighted files with your friends?

(1) It is not unethical, because it is legal.
(2) It is unethical because the files are being given for free.
(3) Sharing copyrighted files without permission breaks copyright laws.
(4) It is not unethical because the files are being given for free.
(5) It. is not unethical - any- one can access a computer

13. Which of the following can be used to select the entire document?

(1) CTRL + A
(2) ALT + F5
(3) SHIFT + A
(4) CTRL + K
(6) CTRL + H

14. The system unit-

(1) coordinates input and output devices
(2) is the container that houses electronic components
(3) is a combination of hardware and software
(4) controls and manipulates data
(5) does the arithmetic operations

15. The simultaneous processing of two or more programs by multiple processors is __

(1) multiprogramming
(2) multitasking
(3) time-sharing
(4) multiprocessing
(5) None of these

16. The device which helps you to communicate with computer is called:

(1) Input device
(2) Output device
(3) Software device
(4) Storage device
(5) None of these

17. In order to avoid memorizing e-mail address you should use

(1) Browser
(2) Search engine
(3) List of Birth date
(4) Phonebook
(5) Address book

18. The devices which store information and that are used by computer for its functioning are called:

(1) Input devices
(2) Output devices
(3) Software devices
(4) Storage devices
(5) None of these

19. Which among the following is not such an operation which can be carried out on objects in graphic programmed?

(1) Spell check
(2) Change size
(3) Move
(4) Delete
(5) None of these

20. A hardware device which converts data into meaningful information is called

(1) Protector
(2) Output device
(3) Input device
(4) Program
(5) Processor

21. Which process checks to ensure the components of the computer are operating and connected properly?

(1) Booting
(2) Processing
(3) Saving
(4) Editing
(5) Starting

22. A means of capturing an image (drawing or photo) so that it can be stored on a computer is —

(1) Modem
(2) Software
(3) Scanner
(4) Keyboard
(5) Mouse

23. An error in a computer program

(1) Crash
(2) Power Failure
(3) Bug
(4) Virus
(5) Fatal error

24. Access control based on a person’s fingerprints is an example of—

(1) biometric identification
(2) characteristic identification
(3) characteristic security
(4) fingerprint security
(5) logistics

25. The patterns of printed lines on most products are called

(1) prices
(2) striping
(3) scanners
(4) OCR
(5) barcodes

26. Most mail programs automatically complete the following two parts in an e-mail –

(1) From: and Body:
(2) From: and Date:
(3) From: and To:
(4) From: and Subject:
(5) None of these

27. The computer’s capability of distinguishing spoken words is called –

(1) voice analysts
(2) speech acknowledgement
(3) voice recognition
(4) speech interpretation
(5) vocalization

28. Which of the following is an advantage of mounting an application on the Web?

(1) the possibility of 24-hour access for users
(2) creating a system that can extend globally
(3) standardizing the design of the interface
(4) All of these
(5) None of these

29. The first page of a Web site is called the –

(1) Homepage
(2) Index
(3) Java Script
(4) Book mark
(5) Intro Page

30. ERP is an acronym for –

(1) Enterprise Retirement Planning
(2) Enterprise Relationship Planning
(3) Enterprise Resource Planning
(4) Enterprise Reorder Planning
(5) Enterprise Retention Planning

31. Origin of internet can be tracked from

(1) ARPAnet
(2) Radio networks
(3) Satellite networks
(4) Indian army networks
(5) Air Force networks

32. To connect networks of similar protocols. __ are used

(1) Routers
(2) Bridges
(3) Gateways
(4) Dial-up routers
(5) None of these

33. Decimal equivalent of (11l1)2

(1) 11
(2) 10
(3) 1
(4) 15
(5) 13

34. _ is one reason for problems of data integrity

(1) Data availability constraints
(2) Data inconsistency
(3) Security constraints
(4) Unauthorized access of data
(5) Data redundancy

35. Dr. E.F. Codd represented____ rules that a database must obey if it has to be considered truly relational

(1) 10
(2) 8
(3) 12
(4) 6
(5) 5

36. “>” symbol in DOS commands is use to

(1) Compare two values
(2) Redirect input
(3) Redirect output
(4) Filter data
(5) None of these

37. System proposal is prepared in ____ phase of SDLC

(1) Conception
(2) Initiation
(3) Analysis
(4) Design
(5) construction

38. A data warehouse

(1) Contains numerous naming conventions and formats
(2) Is organized around important subject areas
(3) Contains only current data
(4) Can be updated by end users
(5) Explains some observed event or condition

39. Which of these is considered intelligent CASE tool

(1) Toolkit
(2) Methodology companion
(3) Workbench
(4) Upper CASE
(5) Lower CASE

40. Super computer developed by Indian scientists

(1) Param
(2) Super301
(3) Compaq Presario
(4) CrayYMP
(5) Blue Gene

DOWNLOAD IBPS CLERK Question Papers PDF

DOWNLOAD IBPS PO Question Papers PDF

DOWNLOAD MORE BANK EXAMS E-BOOKS

Printed Study Material for IBPS Clerk Exam

<<Go Back To Main Page