Practice Paper Set For IBPS PO 2013 Computer Knowledge) 1. What - TopicsExpress



          

Practice Paper Set For IBPS PO 2013 Computer Knowledge) 1. What is the process of copying software programs from secondary storage media to the hard disk called? (A) Configuration (B) Download (C) Storage (D) Upload (E) Installation 2. When the pointer is positioned on a _____, it is shaped like a hand. (A) Grammar error (B) Formatting error (C) Screen Tip (D) Spelling error (E) Hyperlink 3. Personal computers can be connected together to form a- (A) server (B) Supercomputer (C) Network (D) Enterprise (E) None of these 4. A _____ is the term used when a search engine returns a Web page that matches the search criteria. (A) Blog (B) Hit (C) Link (D) View (E) Success 5. _____are words that a programming language has set aside for its own use. (A) Control words (B) Control structures (C) Reserved words (D) Reserved keys (E) None of these 6. Mobile Commerce is best described as- (A) The use of Kiosks in marketing (B) Transporting products (C) Buying and selling goods/ services through wireless hand-held devices (D) Using notebook PC’s in marketing (E) None of the above 7. Which of the following controls the manner of interaction between the user and the operating system? (A) Language translator (B) Platform (C) User interface (D) Icon (E) None of these 8. You can keep your personal files/folders in (A) My Folder (B) My Documents (C) My Files (D) My Text (E) My Collection 9. Three types of compact disks include CD-ROM, CD-R, and (A) CD-W (B) CD-RAM (C) CD-DVD (D) CD-RW (E) None of these 10. All computers must have (A) A word processing software (B) An operating system (C) An attached printer (D) A virus checking program (E) None of these 11. Collecting personal information and effectively posing as another individual is known as (A) Spooling (B) Spoofing (C) Hacking (D) Identity theft (E) None of these 12. To change selected text to all capital Letters, click the change case buttons, then click (A) UPPERCASE (B) UPPER ALL (C) CAPS LOCK (D) Lock Upper (E) Large Size 13. A person who used his or her expertise to gain access to other people’s computers to get information illegally or to do damage is a (A) Hacker (B) Analyst (C) Instant messenger (D) Programmer (E) Spammer 14. A device that connects to a network without the use of cables is said to be (A) Distributed (B) Free (C) Centralized (D) Open Source (E) None of these 15. Reusable optical storage will usually have the acronym (A) CD (B) DVD (C) ROM (D) RW (E) ROS 16. The most common type of storage devices are: (A) Persistent (B) Optical (C) Magnetic (D) Flash (E) Steel 17. Codes consisting of lines of varying widths or lengths that are computer-readable are known as (A) An ASCII code (B) A magnetic tape (C) An OCR scanner (D) A bar code (E) None of these 18. A Website’s main page is called its (A) Home Page (B) Browser Page (C) Search Page (D) Bookmark (E) None of these 19. Part number, part description, and number of parts ordered are examples of (A) Control (B) Output (C) Processing (D) Feedback (E) Input 20. To access properties of an object, the mouse technique to use is (A) Dragging (B) Dropping (C) Right-clicking (D) Shift-clicking (E) None of these 21. Computers use the number system to store data and perform calculations. (A) Binary (B) Octal (C) Decimal (D) Hexadecimal (E) None of these 22. _________are attempts by individuals to obtain confidential information from you by falsifying their identity. (A) Phishing trips (B) Computer viruses (C) Spyware scams (D) Viruses (E) Phishing scams 23. Why is it unethical to share copyrighted files with your friends ? (A) It is not unethical, because it is legal. (B) It is unethical because the files are being given for free. (C) Sharing copyrighted files without permission breaks copyright laws. (D) It is not unethical because the files are being given for free. (E) It is not unethical – anyone can access a computer. 24. Which of the following can be used to select the entire document ? (A) CTRL+A (B) ALT+F5 (C) SHIFT+A (D) CTRL+K (E) CTRL+H 25. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to Auto Fit Contents. (A) Fit to Form (B) Format (C) Auto size (D) Contents (E) Auto Fit 26. The simultaneous processing of two or more programs by multiple processors is (A) Multiprogramming (B) Multitasking (C) Time-sharing (D) Multiprocessing (E) None of these 27. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is (A) Memory-only (B) Write-only (C) Once-only (D) Run-only (E) Read-only 28. What is the permanent memory built into your computer called ? (A) RAM (B) Floppy (C) CPU (D) CD-ROM (E) ROM 29. The default view in Excel is view. (A) Work (B) Auto (C) Normal (D) Roman (E) None of these 30. What displays the contents of the active cell in Excel ? (A) Name box (B) Row Headings (C) Formula bar (D) Task pane (E) None of these 31. In Word, you can force a page break (A) By positioning your cursor at the appropriate place and pressing the Fl key (B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter (C) By using the Insert/Section Break (D) By changing the font size of your document (E) None of these 32. Grouping and processing all of a firm’s transactions at one time is called (A) A database management system (B) Batch processing (C) A real-time system (D) An on-line system (E) None of these 33. Help Menu is available at which button ? (A) End (B) Start (C) Turnoff (D) Restart (E) Reboot 34. You can keep your personal files/ folders in (A) My Folder (B) My Documents (C) My Files (D) My Text (E) None of these 35. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n) (A) Supercomputer (B) Minicomputer (C) Laptop (D) Server (E) None of these 36. When you save to this, your data will remain intact even when the computer is turned off. (A) RAM (B) Motherboard (C) Secondary storage device (D) Primary storage device (E) None of these 37. The folder retains copies of messages that you have started but are not yet ready to send. (A) Drafts (B) Outbox (C) Address Book (D) Sent Items (E) Inbox 38. You can a search by providing more information the search engine can use to select a smaller, more useful set of results. (A) Refine (B) Expand (C) Load (D) Query (E) Slowdown 39. The contents of are lost when the computer turns off. (A) Storage (B) Input (C) Output (D) Memory (E) None of these 40. The enables you to simultaneously keep multiple Web pages open in one browser window. (a) Tab box (B) Pop-up helper (C) Tab row (D) Address bar (E) Esc key 41. A DVD is an example of a(n) (A) Hard disk (B) Optical disc (C) Output device (D) Solid-state storage device (E) None of these 42. What are the two parts of an e-mail address? (A) User name and street address (B) Legal name and phone number (C) User name and domain name (D) Initials and password (E) User name and recipient name 43. If you wish to extend the length of the network without having the signal degrade, you would use a (A) Resonance (B) Router (C) Gateway (D) Switch (E) Repeater 44. A repair for a known software bug, usually available at no charge on the internet, is called (A) version (B) Patch (C) Tutorial (D) FAQ (E) Rectifier 45. URL stands for (A) Universal Research List (B) Universal Resource List (C) Uniform Research List (D) Uniform Research Locator (E) Uniform Resource Locator 46. When data changes in multiple lists and all lists are not updated, this causes (A) Data redundancy (B) Information overload (C) Duplicate data (D) Data inconsistency (E) Data repetition 47. What is a backup? (A) Restoring the information backup (B) An exact copy of a system’s information (C) The ability to get a system up and running in the event of a system crash or failure (D) All of these (E) None of these 48. The Internet is (A) A large network of networks (B) An internal communication system for a business (C) A communication system for the Indian government (D) A communication system for some states of India (E) A communication system for some cities of India 49. Computers that are portable and convenient for users who travel are known as (A) Supercomputers (B) Planners (C) Minicomputers (D) File servers (E) Laptops 50. What is the storage area for e-mail messages called? (A) A folder (B) A mail box (C) A directory (D) The hard disk (E) None of these Answers 1. E 2. E 3. C 4. E 5. C 6. C 7. C 8. B 9. D 10. B 11. B 12. A 13. A 14. E 15. D 16. C 17. D 18. A 19. E 20. C 21. A 22. A 23. C 24. A 25. A 26. D 27. E 28. E 29. C 30. C 31. B 32. C 33. B 34. B 35. D 36. D 37. A 38. A 39. D 40. C 41. B 42. C 43. E 44. B 45. E 46. D 47. D 48. A 49. E 50. B
Posted on: Sat, 12 Oct 2013 01:53:22 +0000

Trending Topics



Recently Viewed Topics




© 2015