(Paper) IBPS Clerk Online CWE Previous Year Exam Paper "Held on 14-12-2014, Computer Knowledge"
IBPS Clerk Online CWE Previous Year Exam Paper - 2014
Subject: Computer Knowledge
1. ......... refers to the unauthorised copying and distibution of software.
(1) Hacking
(2) Software piracy
(3) Software literacy
(4) Cracking
(5) Copyright
2. Which of the following is an operating system?
(1) Linux
(2) Debugger
(3) Mozilla
(4) Google Chrome
(5) Intel 8085
3. A collection of programs that controls how your computer system runs and processes information is called
(1) operating system
(2) computer
(3) office
(4) compiler
(5) interpreter
4. Which of the following statements is a false conceiving file names?
(1) Every file in the same folder must have a unique name.
(2) The file name comes before the dot (.).
(3) File extension is another name for the type.
(4) The file extension comes before the dot (.) followed by the file name.
(5) Files may share the same name or the same extension, but not both at the same time.
DOWNLOAD IBPS CLERK Question Papers PDF
DOWNLOAD IBPS PO Question Papers PDF
DOWNLOAD MORE BANK EXAMS E-BOOKS
Printed Study Material for IBPS Clerk Exam
5. Which is not a storage device?
(1) Printer
(2) CD
(3) Hard Disk
(4) Floppy Disk
(5) DVD
6. ......... tags, placed on animal’s body can be used to record and truck in a database all of the animal’s movements.
(1) POS
(2) RFID
(3) PPS
(4) GPS
(5) Other than those given as options
7. Which of the following cables can transmit data at high speeds?
(1) Flat cables
(2) Coaxial cable
(3) Optic fibre cable
(4) Twisted pair cable
(5) UTP cable
8. The hardware device or software program that sends messages between networks is known as a
(1) bridge
(2) backbone
(3) router
(4) gateway
(5) Other than those given as options
9. If you are performing Windows 98 operating system to Windows XP you are performing a(n)
(1) push up
(2) China
(3) patch
(4) pull down
(5) update
10. ......... technology enables you to carry a powerful navigational aid in websites.
(1) Convergence
(2) Locator
(3) Sampling rate
(4) Synchronisation
(5) Global Positioning System
11. Which of the following is not true about RAM?
(1) RAM is the same as hard disk storage.
(2) RAM is a temporary storage area.
(3) RAM is volatile.
(4) RAM stands for Random Access Memory
(5) Information stored in RAM is gone when you turn the computer off.
12. All of the following are examples of real security and privacy risks EXCEPT
(1) spyware
(2) spam
(3) hackers
(4) identity theft
(5) viruses
13. Which of the following commands in Office 2007, can be used to go to first cell in the current row?
(1) Tab
(2) Shift + Tab
(3) Esc + Home
(4) Shift + Home
(5) Home
14. Software such as Viruses, Worms and Trojan Horses that has a malicious content, is known as
(1) malicious software (malware)
(2) adware
(3) scareware
(4) spyware
(5) firewall
15. Chip is a common nickname for a(n)
(1) transistor
(2) resistor
(3) integrated circuit
(4) semi-conductor
(5) other than those given as options
16. What is extension of Microsoft Word document?
(1) doc
(2) ppt
(3) dcc
(4) bd
(5) hml
17. Which of the following enables to determine how often a user visited a website?
(1) Hackers
(2) Spammers
(3) Phish
(4) Identity thefts
(5) Cookies
18. To move to the bottom of a document while working on MS Word, which command is used?
(1) Home key
(2) End key
(3) Ctrl + Page Down
(4) Insert key
(5) Ctrl key + End key
19. What is a person called who uses a computer to cause harm to people or destroy critical systems?
(1) Cyber Terrorist
(2) Black-hat Hacker
(3) Cyber Cracker
(4) Hacktivist
(5) Other than those given as options
20. ........ can interpret voice data into words that can be understood by the computer.
(1) Speech input hardware
(2) Speech recognition software
(3) Word recognition software
(4) Talking software
(5) Other than those given as options
21. Oracle is a(n)
(1) hardware
(2) high level language
(3) operating system
(4) system software
(5) RDBMS
22. Which of the following compay developed the microprocessor?
(1) Intel
(2) IBM
(3) Microsoft
(4) Apple
(5) Google
23. What does ALU in computing denote?
(1) Application and Logic Unit
(2) Algorithm Logic Unit
(3) Arithmetic Layered Unit
(4) Arithmetic Legal Unit
(5) Arithmetic Logic Unit
24. Integrated Circuit (IC) chips used in computers are made with
(1) copper
(2) aluminium
(3) gold
(4) silicon
(5) silver
25. What does the computer abbreviation ‘MB’ used for?
(1) Mega Bit
(2) Million Bytes
(3) Mega Bytes
(4) Million Bit
(5) Micro Bytes
26. What is the full form of HTTP?
(1) Hyper Text Transfer Protocol
(2) Hyper Text Transition Protocol
(3) Hyper Text Transfer Program
(4) Hyper Text Transition Program
(5) Hyper Text Trivial Protocol
27. Verification of a login name and password is known as
(1) configuration
(2) accessibility
(3) authentication
(4) logging in
(5) other than those given as options
28. Which of the following is software?
(1) Keyboard
(2) Internet Explorer
(3) Scanner
(4) Mouse
(5) Printer
29. The term ‘bit’ is short for
(1) binary digit
(2) binary number
(3) binary language
(4) small digit
(5) one byte
30. What does MICR stand for?
(1) Magnetic Ink Character Register
(2) Magnetic Ink Code Reader
(3) Magnetic Ink Code Register
(4) Magnetic Ink Character Recognition
(5) Magnetic Ink Cases Reader
31. RTGS stands for
(1) Real Time Gross Settlement
(2) Real Time General Settlement
(3) Run Time Gross Settlement
(4) Regular Time General Settlement
(5) Regular Time Gross Settlement
32. A device that converts from decimal binary number is known as
(1) instructor
(2) decoder
(3) AND gate
(4) converter
(5) decoder
33. What does the acronym ASCI stands for?
(1) American Standard Code for Information
(2) American Standard Code for Information interchange
(3) American Standardised Code for information
(4) American Standardisation Code for information
(5) American Standardisation Code for information Interchanger
34. Which of the following is not a valid formula in Microsoft Excel?
(1) = A2 + A1
(2) = A2 + 1
(3) = 1 + A2
(4) = 1A + 2
(5) = A1 + A2
35. What does the acronym ISP stand for?
(1) Internal Service Provider
(2) International Service Provider
(3) Internal Service Provider
(4) Internet Service Providing
(5) Internet Service Provision
36. What is the full form of WWW?
(1) Work Wide Web
(2) World Wide Web
(3) World With Web
(4) World Wide Wet
(5) World Weak Web
37. Which of the following is hardware?
(1) Assembler
(2) Server
(3) Compiler
(4) Interpreter
(5) Operating System
38. USB in data cables stands for
(1) Unicode Smart Bus
(2) Universal Structural Bus
(3) Unicode Serial Bus
(4) Universal Smart Bus
(5) Universal Serial Bus
39. Which of the following is not a binary number?
(1) 11101
(2) 110
(3) 233
(4) 1001
(5) 100110
40. A ......... is approximately one billion bytes.
(1) megabyte
(2) kilobyte
(3) terabyte
(4) gigabyte
(5) bit