(Paper) IBPS Clerk Online CWE-II Previous Year Exam Paper "Held on 15-12-2012,Computer Knowledge"

IBPS Clerk Online CWE-II Previous Year Exam Paper - 2012

Subject: Computer Knowledge

1. __ key is the example of Toggle key

(1) Alt
(2) Shift
(3) Control
(4) Escape
(5) Caps Lock

2. _____ is a feature for scheduling and multiprogramming to provide an economical interactive system of two or more users

(1) Time sharing
(2) Multitasking
(3) Time tracing
(4) Multiprocessing
(5) None of these

3. ROLLBACK in a database is _____ statement

(1) TCL
(2) DCL
(3) DML
(4) DDL
(5) SDL

4. Video controller

(1) Controls the resolution of images on screen
(2) Controls the signals to be sent and received from processor for display
(3) Handles the entire electronic work behind the formation of images on the screen
(4) Is responsible for allocating pixels for formation of images
(5) Is responsible for the refresh rate of the screen/monitor

5. The disks stores information in

(1) Tables
(2) Rows and columns
(3) Blocks
(4) Tracks and sectors
(5) All of these

DOWNLOAD IBPS CLERK Question Papers PDF

DOWNLOAD IBPS PO Question Papers PDF

DOWNLOAD MORE BANK EXAMS E-BOOKS

Printed Study Material for IBPS Clerk Exam

6. Which file(s) can be executed without mentioning its extension name

(1) .exe
(2) .bat
(3) .com
(4) .app
(5) All of these

7. A programming language having a __ is slow in execution

(1) Interpreter
(2) Compiler
(3) Assembler
(4) Linker
(5) none of these

8. The word processor used by DOS to write the programs or instructions

(1) Words tar
(2) Word Pad
(3) Notepad
(4) MS-Word
(5) EDIT

9. __ provides total solutions to reduce data redundancy, inconsistency, dependence and unauthorized access of data

(l) DBMS
(2) Tables
(3) Database
(4) Protection passwords
(5) Centralization of data

10. Codec refers to

(1) Coder- decoder
(2) Co-declaration
(3) Command declaration
(4) Command decoding
(5) None of these

11. Origin of internet can be tracked from

(1) ARPAnet
(2) Radio networks
(3) Satellite networks
(4) Indian army networks
(5) Air Force networks

12. To connect networks of similar protocols, __ are used

(1) Routers
(2) Bridges
(3) Gateways
(4) Dial-up routers
(5) None of these

13. Decimal equivalent of (1111) 2

(1) 11
(2) 10
(3) 1
(4) 15
(5) 13

14. __ is one reason for problems of data integrity

(1) Data availability constraints
(2) Data inconsistency
(3) Security constraints
(4) Unauthorized access of data
(5) Data redundancy

15. Dr. E.F. Codd represented ____ rules that a database must obey if it has to be considered truly relational

(1) 10
(2) 8
(3) 12
(4) 6
(5) 5

16. “>” symbol in DOS commands is ‘use to

(1) Compare two values
(2) Redirect input
(3) Redirect output
(4) Filter data
(5) None of these

17. System proposal is prepared in ____ phase of SDLC

(1) Conception
(2) Initiation
(3) Analysis
(4) Design
(5) construction

18. A data warehouse

(1) Contains numerous naming conventions and formats
(2) Is organized around important subject areas
(3) Contains only current data
(4) Can be updated by end users
(5) Explains some observed event or condition

19. which of these is considered intelligent CASE tool

(1) Toolkit
(2) Methodology companion
(3) Workbench
(4) Upper CASE
(5) Lower CASE

20. Super computer developed by Indian scientists

(1) Param
(2) Super301
(3) Compaq Presario
(4) Cray YMP
(5) Blue Gene

21. The errors that can be find out by a compiler are

(1) Logical errors
(2) Internal errors
(3) Semantic errors
(4) Syntax errors
(5) Execution errors

22. _____ Is used to add or put into your document such as a picture or text

(1) TV
(2) Squeeze in
(3) Push in
(4) Insert
(5) None of these

23. Office Assistant is

(1) An application that allows you to take notes and save them in file
(2) A button on the standard toolbar that executes the Save command
(3) A collection of Autocorrect options in Word
(4) An animated character that offers help and suggestions
(5) None of these

24. Pressing CTRL+9 in Excel

(1) Prints 9
(2) Prints
(3) Prints 9 followed by spaces
(4) Inserts 9 cells at the current location
(5) Hides the current row

25. To change the name of an Excel worksheet

(1) Click on the worksheet tab by holing CTRL key and type a new name
(2) Choose Save AS option from file menu
(3) Add a (?) at the end of file-name while saving the workbook
(4) Press CTRL+SHIFT keys and new name
(5) Double click at the work-sheet tab and type a new name

26. A computer used at supermarkets, departmental stores and restaurant etc is called terminal

(1) P-O-S
(2) Dumb
(3) Intelligent
(4) Smart
(5) calculating

27. __ acts as temporary high-speed holding area between the memory and the CPU thereby improving processing capabilities

(1) ROM
(2) RAM
(3) Temporary memory
(4) Cache memory
(5) Flash memory

28. A document that explains how to use a software program is called __ manual

(1) User
(2) System
(3) Software
(4) Program
(5) Technical

29. The process that deals with the technical and management issues of software development is

(1) Delivery process
(2) Control process
(3) Software process
(4) Testing process
(5) Monitoring process

30. A collection of conceptual tools for describing data, relationships, semantics and constraints is referred to as

(1) ER model
(2) Data base
(3) Data Model
(4) DBMS
(5) None of these

31. You can protect sensitive data from prying eyes using __

(1) Encryption
(2) Passwords
(3) File locks
(4) File permissions
(5) None of these

32. Android is

(1) Operating system
(2) Application
(3) Interface
(4) Software
(5) A collection of all these

33. __ search engine sends request for Information to several search engines simultaneously and compiles the results

(1) Meta
(2) Individual
(3) Directory
(4) Subject directory
(5) None of these

34. _____ search method is conducted for a specific title, domain, URL, or host

(1) Keyword
(2) Field
(3) Boolean
(4) Miscellaneous
(5) Logical

35. To access a website or web content from a web server, the client sends a(n) __

(1) Information
(2) Message
(3) Request
(4) Response
(5) Interrupt

36. An http request contains __ parts

(1) 2
(2) 5
(3) 3
(4) 4
(5) 1

37. Through ____ , an administrator or another user can access Someone else’s computer remotely

(1) Administrator
(2) Web server
(3) Web application
(4) HTTP
(5) Telnet

38. Telnet is a __ based computer protocol

(1) Sound
(2) Text
(3) Image
(4) Animation
(5) Digits

39. To allow someone else schedule your meetings and appointments, __ feature of Outlook is used

(1) Monthly calendar
(2) Event manager
(3) Appointments
(4) Delegate Access
(5) None of these

40. P2P is a application architecture

(1) Client/ server
(2) Distributed
(3) Centralized
(4) I-tier
(5) None of these

DOWNLOAD IBPS CLERK Question Papers PDF

DOWNLOAD IBPS PO Question Papers PDF

DOWNLOAD MORE BANK EXAMS E-BOOKS

Printed Study Material for IBPS Clerk Exam

<<Go Back To Main Page